The Bits And Bytes Of Computer Networking. Week 2: The Network Layer

10 September 2022
4.7 (114 reviews)
23 test answers

Unlock all answers in this set

Unlock answers (19)
question
Please select all of the valid IP addresses. Check all that apply. 8.8.8.8, 123.456.123.456, 192.168.1.1, 257.70.312.49
answer
8.8.8.8, 192.168.1.1
question
How many IP addresses does a class C network have?
answer
254 addresses
question
What does CIDR stand for?
answer
CIDR stands for Classless Inter-Domain Routing
question
Which of the following is a correct form of CIDR notation?
answer
192.168.1.0/24; CIDR notation uses a forward slash and then lists the numbers of bits in the subnet mask.
question
How many octets does a subnet mask have?
answer
4; A subnet mask is the same length as an IP address.
question
Select examples of routing protocols. Check all that apply.
answer
Border Gateway Protocol/ Routing Information Protocol
question
Who is permitted to use non-routable address space?
answer
Anyone; Anyone can use non-routable address space.
question
A typical routing table may contain which of the following? Check all that apply.
answer
Total hops/ Destination network
question
An ARP broadcast is sent to the special MAC address ________.
answer
FF:FF:FF:FF:FF:FF; ARP broadcasts are used to ask all devices on a local area network if they're associated with a specific IP address.
question
The process of taking a large network and splitting it up into many individual and smaller subnetworks is known as ________.
answer
Subnetting; Subnetting allows for much finer-grained controls of network sizes than the old class system could support.
question
TTL stands for _______.
answer
Time to Live; TTL is used to make sure that an undeliverable packet doesn't spend all of eternity waiting for delivery.
question
Ranges of IP addresses that anyone can use for their internal networks are known as ______.
answer
Non-routable address space; Non-routable address space can be used by anyone.
question
In binary, 1 +1 = _____. 2, 10, 1, 0
answer
not 1
question
Calculate how many decimal numbers a 4-bit number can represent. 256, 4, 16, 8
answer
not 256; Please review the videos in the "Network Layer" module for a refresher.
question
A router is performing basic routing functions. What will be the third step in the transmission of a packet?
answer
The router looks up the destination network in its routing table; The router looks up the destination network of the IP address in its routing table in the third step.
question
How many bits long is an IP address?
answer
32 bits; IP addresses are 32-bit-long numbers made up of four octets, and each octet is normally described in decimal numbers.
question
Which number cannot be represented by eight bits of data?
answer
436; Eight bits of data, or a single octet, can represent all decimal numbers from 0-255. 436 is beyond this limit.
question
Which IP address is Class C?
answer
192.37.48.98; Class C addresses begin with a first octet value of 192 through 223.
question
What protocol is used to discover the hardware address of a node with a certain IP address?
answer
ARP table; An ARP table is just a list of IP addresses and the MAC addresses associated with them.
question
What is the process of taking a large network and splitting it up into many individual and smaller subnetworks called?
answer
Subnetting; Subnetting is the process of taking a large network and splitting it up into many individual and smaller subnetworks, or subnets.
question
What is the maximum decimal number possible to represent with 16 bits? 256, 1600, 16, 65536
answer
not 256; Not quite. Please review the videos in the "Basic Binary Math" module for a refresher.
question
How many possible host IDs do you always lose per network?
answer
2; You always lose two host IDs per network. So, if a /24 network has 2^8 or 256 potential hosts, you really only have 256 - 2 = 254 available IPs to assign.
question
Which are a type of interior gateway protocol? (Check all that apply)
answer
Link state routing protocols; Link state protocols get their name because each router advertises the state of the links of each of its interfaces. This information about each router is propagated to every other router on an autonomous system. Distance-vector protocols; A router using a distance vector protocol basically just takes its routing table, which is a list of every network known to it and how far away these networks are in terms of hops. Then the router sends this list to every neighboring router, which is basically every router directly connected to it.