Module 2 Review Exam

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a characteristic of public IP addresses?

  • Routable on the public internet
  • Globally unique
  • Assigned by the Internet Assigned Numbers Authority (IANA)
  • Used for communication within local networks (correct)

What is the maximum number of hosts that can be placed on the 192.168.10.0/24 subnet?

  • 253
  • 256
  • 255
  • 254 (correct)

What is the primary function of Network Address Translation (NAT)?

  • Converting private IP addresses to public IP addresses
  • Assigning unique IP addresses to devices on a local network
  • Both A and B (correct)
  • Allowing devices on a local network to communicate with the public internet

What does the '/24' notation in a subnet mask, such as 192.168.10.0/24, indicate?

<p>The number of bits used for the network ID (D)</p> Signup and view all the answers

Which of the following is responsible for the global allocation of IP address space?

<p>Internet Assigned Numbers Authority (IANA) (A)</p> Signup and view all the answers

What is the purpose of private IP addresses?

<p>To provide unique addresses for devices within local networks (D)</p> Signup and view all the answers

What is the primary function of public IP addresses?

<p>They enable routing and data delivery between networks. (D)</p> Signup and view all the answers

How do private IP addresses conserve the global IP address space?

<p>By allowing organizations to use the same internal address ranges without conflicts. (A)</p> Signup and view all the answers

What is Network Address Translation (NAT), and why is it important?

<p>It is a method used to convert private IP addresses into public IP addresses for external communication. (A)</p> Signup and view all the answers

Which of the following is an advantage of using private IP addresses?

<p>Conservation of the global IP address space. (D)</p> Signup and view all the answers

Why are public IP addresses considered essential for public-facing services and devices?

<p>They enable direct routability and communication with other devices and services on the internet. (C)</p> Signup and view all the answers

What happens to private IP addresses when devices on a private network need to communicate with the internet?

<p>They are converted to public IP addresses using NAT. (A)</p> Signup and view all the answers

Which decimal number does the binary value "0010" represent?

<p>2 (C)</p> Signup and view all the answers

What is the main benefit of using NAT?

<p>It conserves the global IP address space and adds a layer of security to private networks. (B)</p> Signup and view all the answers

Why is it important to ensure that a 4-bit binary number has exactly four digits, including leading zeros?

<p>To prevent ambiguity between different binary values. (A)</p> Signup and view all the answers

Which of the following is NOT a valid hexadecimal digit?

<p>G (D)</p> Signup and view all the answers

What is the decimal equivalent of the binary number 10101111?

<p>175 (B)</p> Signup and view all the answers

Which of the following is a valid MAC address? (Select all that apply)

<p>00:11:22:33:44:55 (B), AA:BB:CC:DD:EE:FF (C), 00:1A:2B:3C:4D:5E (D)</p> Signup and view all the answers

What is the primary purpose of physical network addressing?

<p>To provide a unique identifier for each device on a network. (B)</p> Signup and view all the answers

What is the purpose of subnetting in this context?

<p>To divide a network into smaller, more manageable subnetworks. (B)</p> Signup and view all the answers

How many network bits are required to create at least 10 subnets?

<p>4 (B)</p> Signup and view all the answers

What is the new subnet mask after subnetting the Class B 172.16.0.0/16 network into 10 subnets?

<p>/20 (B)</p> Signup and view all the answers

What is the primary advantage of Classless Inter-Domain Routing (CIDR) over the older classful IP address assignment method?

<p>CIDR simplifies routing and reduces the size of routing tables. (C)</p> Signup and view all the answers

What does the notation 192.168.10.0/24 mean in CIDR?

<p>The first 24 bits identify the network ID and the remaining 8 bits identify the host IDs. (C)</p> Signup and view all the answers

How does Variable Length Subnet Mask (VLSM) differ from traditional subnetting?

<p>VLSM allows for subnets of different sizes, while traditional subnetting requires all subnets to be the same size. (B)</p> Signup and view all the answers

What is the main limitation of using powers of 2 when calculating the number of subnets?

<p>It can lead to wasted IP address space. (C)</p> Signup and view all the answers

What is the minimum length of a network prefix in an IPv6 address?

<p>0 (C)</p> Signup and view all the answers

What is the maximum number of bits that can be used for the interface ID in an IPv6 address?

<p>128 (A)</p> Signup and view all the answers

Which of the following is NOT a type of IPv6 address?

<p>Broadcast (B)</p> Signup and view all the answers

Which type of IPv6 address is used for communication within a single network segment?

<p>Link-Local (C)</p> Signup and view all the answers

Which of the following is a characteristic of global unicast IPv6 addresses?

<p>They are globally unique and routable on the IPv6 internet. (B)</p> Signup and view all the answers

What is the length of the global routing prefix in a global unicast IPv6 address?

<p>48 bits (B)</p> Signup and view all the answers

What is the purpose of multicast addresses in IPv6?

<p>To send traffic to a specific group of nodes (A)</p> Signup and view all the answers

Which of the following is NOT a function of anycast addresses in IPv6?

<p>To send traffic to all nodes on a network (A)</p> Signup and view all the answers

What is the main disadvantage of a full mesh topology in large networks?

<p>High cost and complexity due to the large number of connections. (A)</p> Signup and view all the answers

Which network topology is commonly used in wireless mesh networks?

<p>Mesh topology (D)</p> Signup and view all the answers

What is the advantage of using a hybrid topology in a network?

<p>Combines the strengths of different topologies for optimal performance. (B)</p> Signup and view all the answers

Which of the following is NOT a factor that influences traffic flow in a network?

<p>Number of users online (D)</p> Signup and view all the answers

Which type of traffic flow involves sending data to all devices on a network?

<p>Broadcast (B)</p> Signup and view all the answers

What is the main benefit of a partial mesh topology compared to a full mesh topology?

<p>Lower cost and complexity to implement. (D)</p> Signup and view all the answers

Flashcards

Network ID

The portion of an IP address that identifies the specific network.

Host ID

The unique identifier for a device within a specific network.

Subnet Mask /24

Indicates that the first 24 bits are the network part of the IP address.

Total Hosts in /24

A /24 subnet can support 254 unique usable IP addresses for hosts.

Signup and view all the flashcards

Public IP Address

A globally unique IP assigned to devices for internet communication.

Signup and view all the flashcards

Private IP Address

Addresses used within a local network, not routable on the public internet.

Signup and view all the flashcards

NAT (Network Address Translation)

A technique allowing private IP addresses to communicate outside their network.

Signup and view all the flashcards

Global Uniqueness of IPs

Every public IP address is unique across the entire internet.

Signup and view all the flashcards

Full Mesh Topology

A network topology where all devices are interconnected, allowing high reliability but limited scalability.

Signup and view all the flashcards

Partial Mesh Topology

A network topology where some devices are connected to all others, promoting scalability but with fewer direct connections.

Signup and view all the flashcards

Hybrid Topology

A network configuration that combines multiple topology types to optimize performance and reliability.

Signup and view all the flashcards

Traffic Flow

The movement of data packets within a network, involving sources, destinations, and routing.

Signup and view all the flashcards

North-South Traffic

Data movement between clients (end devices) and servers, typically moving from edge to core.

Signup and view all the flashcards

East-West Traffic

Data movement between devices within the same data center or network segment.

Signup and view all the flashcards

Data Packets

Small units of data transmitted across a network, containing the information to be sent.

Signup and view all the flashcards

Fault Tolerance

The ability of a network to continue operating despite the failure of one or more components.

Signup and view all the flashcards

8-bit binary number

A binary number composed of exactly eight digits, including leading zeros.

Signup and view all the flashcards

4-bit binary number

A binary number with precisely four digits, including leading zeros.

Signup and view all the flashcards

Hexadecimal system

A base 16 numeral system using symbols 0-9 and A-F to represent values.

Signup and view all the flashcards

Conversion from hexadecimal to binary

Transform each hex digit into a 4-bit binary equivalent.

Signup and view all the flashcards

Conversion from binary to hexadecimal

Group binary digits into 4 bits and convert each group to a hex digit.

Signup and view all the flashcards

MAC address

A 48-bit unique identifier for network devices, often shown in hexadecimal.

Signup and view all the flashcards

Importance of leading zeros

Leading zeros maintain the fixed length of binary numbers to avoid confusion.

Signup and view all the flashcards

Physical network addressing

The identification method using MAC addresses to distinguish devices on a network.

Signup and view all the flashcards

Required subnets

Minimum number of subnetworks needed, in this case, 10.

Signup and view all the flashcards

Borrowed bits

Extra bits taken from the host portion to create more subnets.

Signup and view all the flashcards

CIDR

A method for IP address allocation and network routing optimizing flexibility.

Signup and view all the flashcards

Classful addressing

Old method of dividing IP addresses into fixed classes (A, B, C).

Signup and view all the flashcards

Private IP ranges

Specific IP addresses reserved for private networks, not routable on the internet.

Signup and view all the flashcards

Routing efficiency

The optimization of directing data packets in a network to reduce overhead.

Signup and view all the flashcards

Variable Length Subnet Mask (VLSM)

Allows subnets of different sizes using various subnet mask lengths.

Signup and view all the flashcards

RFC1918

The document that defines the private address ranges for IPv4 networks.

Signup and view all the flashcards

IPv4 address ranges

Specific address ranges designated for private networks, such as 192.168.x.x and 10.x.x.x.

Signup and view all the flashcards

Example of public IP

A web server may have an IP like 203.0.113.10 allowing global access.

Signup and view all the flashcards

Conservation of IP addresses

Using private IP addresses helps reduce the depletion of public IPs.

Signup and view all the flashcards

Home network IPs

Devices in a home network often use the 192.168.x.x address range.

Signup and view all the flashcards

IPv6 Address Structure

An IPv6 address consists of a network prefix and an interface ID, totaling 128 bits.

Signup and view all the flashcards

Network Prefix

The network prefix, or ID, identifies a specific subnet and has a variable length specified in CIDR notation.

Signup and view all the flashcards

Interface ID

The interface ID uniquely identifies an interface on a host, determined by subtracting the prefix length from 128 bits.

Signup and view all the flashcards

Global Unicast Address

Globally unique and routable addresses on the IPv6 internet, starting with the prefix 2000::/3.

Signup and view all the flashcards

Link-Local Address

Addresses used for communication within a single network segment, starting with the prefix fe80::/10.

Signup and view all the flashcards

CIDR Notation

Classless Inter-Domain Routing notation indicates the length of the network prefix in bits.

Signup and view all the flashcards

Unicast Traffic

Traffic sent from one specific host to another specific host.

Signup and view all the flashcards

IPv6 Multicast Addressing

A method to send a packet to multiple hosts, replacing IPv4 broadcast addresses.

Signup and view all the flashcards

Study Notes

Transmission Media and Transceivers

  • Transmission media are the physical pathways that facilitate data transmission between network devices
  • Guided media (wired): uses physical cables (twisted pair, coaxial, fiber optic) to guide signals along a specific path
  • Unguided media (wireless): transmits signals through air or space without physical conductors (radio waves, microwaves, infrared)
  • Wireless transmission media allows data transmission without physical cables, using electromagnetic waves for communication.
  • 802.11 standards are crucial for Wi-Fi networks
  • Cellular networks enable mobile communication and internet access, and satellite communication systems provide connectivity over vast distances, including remote and rural areas.

802.11 Standards

  • 802.11 standards set the guidelines for wireless local area network (WLAN) communication
  • The 802.11 family covers frequency bands, data rates, modulation techniques, and security protocols, ensuring interoperability between devices
  • 2.4 GHz Wi-Fi band is popular due to its longer range and penetration through obstacles, but prone to interference from other devices
  • 5 GHz Wi-Fi band offers faster data rates and better performance, but has a shorter range compared to 2.4 GHz
  • 6 GHz Wi-Fi band (introduced with Wi-Fi 6E) provides even higher speeds and reduced congestion, ideal for high-bandwidth applications
  • Each version of 802.11 standard improves speed, range, reliability, and security

Wireless Frequency bands

  • Wireless frequency refers to the rate at which electromagnetic waves oscillate during transmission
  • Measured in Hertz (Hz)
  • Different frequencies are used for various technologies, balancing range, data speed and interference

Wireless Frequency Bands

  • Lower frequencies typically offer longer ranges and better penetration through obstacles.
  • Higher frequencies can carry more data but over shorter distances

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Network Fundamentals chapter 13
255 questions
Computer Networking Fundamentals
17 questions
IP Addressing Chapter 7 Flashcards
46 questions
IPv4 Addresses Flashcards
6 questions
Use Quizgecko on...
Browser
Browser