Академический Документы
Профессиональный Документы
Культура Документы
Switch:
Address Learning
Loop Avoidance
Hub:
No Filtering
No Addressing
A utility that verifies connections to one or more remote hosts. The ping command uses
the ICMP echo request and echo reply packets to determine whether a particular IP
system on a network is functional. Ping is useful for diagnosing IP network or router
failures.
Communication is the process of sending and receiving data by means of a data cable that
is connected externally.
Transmission means the transfer of data from the source to the destination.
6. What is RAID?
A method used to standardize and categorize fault-tolerant disk systems. RAID levels
provide various mixes of performance, reliability, and cost. Some servers provide three of
the RAID levels: Level 0 (striping), Level 1 (mirroring), and Level 5 (striping & parity).
10BaseT an Ethernet term meaning a maximum transfer rate of 10 Megabits per second
that uses two pairs of twisted-pair baseband signaling, with a contiguous cable segment
length of 100 meters.
An industry standard suite of protocols for the use of point-to-point links to transport
multiprotocol datagrams.
Half-duplex
Full-duplex
Layers PDU
Transport Segments
Network Packets/Datagrams
Physical Bits
Peer-to-Peer Network
Computers can act as both servers sharing resources and as clients using the resources.
Server-based Network
Provide centralized control of network resources and rely on server computers to provide
security and network administration
When the computers on the network simply listen and receive the signal, they are referred
to as passive because they don’t amplify the signal in any way.
Gateway
Router
It’s a layer 3 device that connects 2 different networks and routes packets of data from
one network to another. It breaks up Broadcast domain as well as Collision Domain.
It’s a Hybrid device that combines the features of both bridges and routers.
A subdivision of an IP network.
Frame relay is an industry standard, shared access, switched Data Link Layer
encapsulation that services multiple virtual circuits and protocols between connected
mechanism.
The use of software, installed on PC or LAN server, that allows the PC to function as if it
were dumb terminal directly attached to a particular type of mainframe.
An FDDI frame or Token Ring frame that points to serious problem with the ring, such as
a broken cable. The beacon frame carries the address of the station thought to be down.
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
The address for a device as it is identified at the Media Access Control (MAC) layer in
the network architecture. MAC address is usually stored in ROM on the network adapter
card and is unique.
It is a Network Layer Internet protocol, which can report errors and status information.
We can use the ping command to send ICMP echo request messages and record the
receipt of ICMP echo reply messages. With these messages, we can detect network or
host communication failures and troubleshoot common TCP/IP connectivity problems.
The protocol within the TCP/IP stack that maps MAC addresses to IP addresses.
28. What is the difference between TFTP and FTP application layer
protocols?
TFTP – Trivial File Transfer Protocol
A stripped down version of FTP, easy to use and fast. TFTP has no Directory browsing,
no Authentication and insecure it can only send and receive files.
The TCP/IP protocol used for transmitting files between network nodes. FTP allows
access to both Directories and files, manipulating directories, typing file contents and
copying files between hosts.
In a Ethernet network, between any two points on the network, there can be no more than
five network segments or four repeaters, and of those five segments only three of
segments can be populated.
31. What is the difference between routable and non- routable protocols?
Routable protocols can work with a router and can be used to build large networks. Non-
Routable protocols are designed to work on small, local networks and cannot be used
with a router.
One of two sublayers of the data link layer of OSI reference model, as defined by the
IEEE 802 standard. This sublayer is responsible for error detection but not correction,
flow control and framing.
A logical circuit that is created by Virtual channel links. It carries data between two
endpoints in a network.
Along any transmission path from a given source to a given destination, a group of virtual
circuits can be grouped together into what is called path.
35. What is Packet Filter?
Sending a message to a group multicast address is called multicasting, and its routing
algorithm is called multicast routing.
It is the protocol the routers in neighboring autonomous systems use to identify the set of
networks that can be reached within or via each autonomous system.
A group of Networks under mutual administration that share the same routing
methodology. Autonomous Systems are subdivided by Areas and must be assigned an
individual 16-bit number by the IANA.
It is a protocol used to advertise the set of networks that can be reached within an
autonomous system. BGP enables this information to be shared with the autonomous
system. This is newer than EGP (Exterior Gateway Protocol).
It’s a Classless Routing Protocol meaning when updates are sent they send both IP
address and Subnet mask.
Administrative Distance is 110.
—————
Bandwidth
Sends only Incremental and Triggered updates. Route updates sent within the routers will
be secured with the help of MD5 encrypted password.
OSPF maintains 3 types of Routing table i.e. Routing Table (Dijisktra), Topology Table
(SPF) and Neighborship Table.
Point-to-Point Link
In OSPF a single large Autonomous system is break into small areas. There
should be atleast one area by name Area 0. It’s called as Backbone Area.
The Router that connects more than one Area is called as Area Border Routers.
The Router that connects to other Autonomous system is called as Autonomous System
Boundary Router.
Router ID
If the priority is set 1 to all the routers then there is a tie in priority, in this case it will
check if there is any loopback address is given to any router if not the router with highest
value of IP address will be elected as Router ID.
This router will be then called as Designated Router and the router with less value of IP
address after Designated Router will be called as Backup Designated Router.
If a Router has all interfaces existing in single area than that router is called as
Internal Router.
If an OSPF router wants to send updates to other OSPF router then it should carry 3
requirements i.e.
Adjacency Built
If both router interfaces belongs to same Area, same Password then Hallo and Dead
Intervals should be set same.
Neighborship Built
If both routers are adjacent to each other then Neighborship is built in Routers.
When one routerRA sends updates i.e. Link State Advertisements to other
routerRB it will send that update to Topology Database of routerRB and will run
an algorithm SPF on routerRB to create a new Topology Table. After that
Dijisktra Algorithm is run to find the best path and that entry will be put in Routing
Table.
The router when sends Hallo packets to other router a Neighborship Table is set on that
Router.
Rip run on any Routers hence called as Open Standard Distance Vector Routing Protocol.
It’s a classful routing protocol meaning when updates are sent they send only IP address
but not subnet mask.
Metric used is Hop counts (number of routers to cross to reach the destination).
Rip uses algorithm name Bellman Ford Algorithm to determine the best path selection.
RIP Timers
46. What are the advantages and disadvantages of the three types of
routing tables?
The HELLO protocol uses time instead of distance to determine optimal routing.
It is an alternative to the Routing Information Protocol.
Interior gateways connect LANs of one organization, whereas exterior gateways connect
the organization to the outside world.
A resource record is an entry in a name server’s database. There are several types of
resource records used, including name-to-address resolution information. Resource
records are maintained as ASCII files.
51. BOOTP helps a diskless workstation boot. How does it get a message
to the network looking for its ip address?
52. What is anonymous FTP and why would you use it?
Anonymous FTP enables users to connect to a host without using a valid login and
password. Usually, anonymous FTP uses a login called anonymous or guest, with the
password usually requesting the user’s ID for tracking purposes only. Anonymous FTP is
used to enable a large number of users to access files.
53. How do Data Link layer addresses and Network addresses differ? Give
a description of each.
Besides the names suggesting that addresses reside at different layers, other
differences do exist. Data Link layer addresses are assigned by the manufacturer
and identify the actual hardware device. A Network layer address is a logical
address assigned by the network administrator to identify a device running a
Network layer protocol, such as IP.
54. What are the differences or similarities, if any, between repeaters, hubs,
and concentrators?
First, they are all Physical layer devices. Repeaters regenerate and amplify the
signal traveling on the wire to extend the normal distance limitation of the signal.
A repeater can connect two network segments. A hub and a concentrator are the
same thing, with hub being the more common term used today. Hubs are
repeaters with 8–24 ports. When one machine attached to the hub sends
anything over the network, all the devices attached to the hub receive that signal.
It confines user traffic to a segment and addresses and solves distance limitation
problems. Segmentation also cuts down on the traffic generated by broadcasts
and multicasts, and thereby increases performance. Because of the reduction of
the size of the segment, collisions and overall traffic also are reduced.
56. Which of the three switching methods is fastest, and why?
Cut-Through switching is the fastest method because the switches read only the
first six bytes of the frame before forwarding it.
Bridges and switches can determine whether a frame is destined for the local
network segment or needs to be forwarded to another network segment based
on the destination MAC address.
58. What are some of the advantages to using bridging and switching
instead of routing?
Broadcast propagation
59. What would be the best network segmentation device if you wanted to
connect two dissimilar networks, such as Ethernet and Token-Ring?
A bridge or a switch
A concentrator or a hub
A router
A gateway
Routers must hold a frame for a given period of time for security purposes.
Routers must translate the signal, but then the signal can cut through directly.
They build tables and make their decisions based on those tables.
They perform lookups and make their decisions dynamically with discovery.
They’re more flexible because they enable device assignment only on a port-by-
port basis.
67. Name the Cisco proprietary protocol that allows VLANs to be managed
within domains.
68. Name the three VTP modes in which a switch can operate.
69. Name the Cisco proprietary protocol used on Fast Ethernet VLAN trunk
links.
ISL (Inter-Switch Link) protocol is used to encapsulate VLAN traffic over Fast
Ethernet trunk links.
You need a router that has some kind of viable trunking connection, such as Fast
Ethernet (ISL), and must be configured with subinterfaces.
72. Choose one method of decreasing broadcasts across a switched
network.
Set up an Intra-LAN.
Answers A and B are incorrect because they are simply false. Answer C is
correct because each VLAN becomes its own broadcast domain. Answer D
is incorrect because a firewall is meant to shelter internal networks from intrusion
from the outside.
Answer A is incorrect because routers are not at all necessary for a VLAN to
operate. Answers B and E are correct because VLAN implementation
controls broadcasts and provides isolation, therefore security. Answers C
and D are simply incorrect.
Inter-Switch Link
Network layer
Physical layer
Answer A is correct because ISL functions at the Data Link layer of the OSI
model. Answers B and C are incorrect because ISL does not function at those
layers of the OSI model. Answer D is incorrect because the specific sublayer
does not have any distinction in this context.
78. In ATM LANE, what factor determines the type of trunking protocol
used?
Answer A is correct because the link type determines the type of trunking
protocol used. Answers B and C are incorrect because they are simply false.
Answer D is incorrect because the ATM LANE Module is a hardware card and
does not affect trunking protocols.
81. VTP (Virtual Trunking Protocol) exists at which layer and for what
purpose?
82. What two basic steps are necessary to create access list filters?
The first step is to build the list at global configuration mode using the access-list
command followed by an access list number signifying the type. The second step
is to apply the list to an interface by using the [protocol type] access-group
command followed by the access list number and parameters.
83. Identify the appropriate access list range values used to create access
lists.
86. How does the direction in which an access list is applied affect
datagram processing?
87. What is the access list number range used to identify an IP standard
access list?
0–100
1–100
1–99
1–10
101–199
88. Which of the following represents the default wildcard mask value?
0.0.0.0
255.255.255.255
0.0.255.255
255.255.255.0
Answer A is correct because, if unspecified, the default mask used is
0.0.0.0. Answers B and C are incorrect because neither are the default mask.
Answer D is incorrect because it is a regular mask, which is not used for wildcard
masking.
89. Write the command that would apply access list 100 to interface E0 in
an outbound direction. (Assume you are already at interface configuration
mode of the Ethernet interface.)
IP access-group 100 in
IP access-group E0 out
Answer A is incorrect because the access list number is not an extended list
number. Also, the protocol type is IP not ICMP, and the destination is specifying
the host keyword but using a subnet value instead, which is invalid. Answer B is
incorrect because it uses an incorrect inverse mask for the destination network.
Answer C is incorrect because it does not specify the protocol after the permit
statement and also is using the host keyword with the destination network.
Answer D is correct because it uses a valid access list number and syntax
to forward ICMP echo requests.
91. Write the command to view all access lists created on your router
regardless of protocol.
show access-lists
show ip access-lists
92. Which of the following best describes the function of the following
access list line?
It is an IPX standard access list allowing host 145.19.2.1 to access any host on
subnet 155.6.0.0.
Answers A and C are incorrect because they do not state the actions of this
access list correctly. Answer B is incorrect because this is not an IPX standard
list. Answer D is correct because it correctly describes the access list
behavior.
93. Which of the following commands applies IPX SAP filter 1010 to an
interface in the outbound direction?
94. Which command can you use to display a list of access list filters
configured on your router for IP only?
show IP access-lists
show access-lists
95. Write the command to bind IPX extended access list 901 to interface
serial 0 on an inbound direction.
96. Which two of the following commands will enable Telnet traffic from all
hosts on network 166.10.0.0 to be forwarded to the Telnet server
137.2.10.1?
Answers A and C are correct. The only difference between the two is that
Answer A uses the host keyword and the Telnet keyword instead of a port
number. Answer B is incorrect because the access list number is 99, which is
used for standard lists. Answer D is incorrect because it uses IP instead of TCP
after the permit statement.