Beruflich Dokumente
Kultur Dokumente
SERIES MODELS
Each series will have different models Each models will have
different features or functions
700 701,702,703,704,710 (supports ISDN
Technology)
800 801,803,805,810 (supports ISDN+Leased
line connection)
1000 1001,1003,1010,1011,1015
1100 1101,1102,1102,1115
1400 1401 - 1411
1600
1700
2500
2600
3600
4000
5000
7000
12000GSR
Gigabit Switched Routers
Products of Cisco:
Router
Switches
Bridges
Brouters
Repeaters
PIX – Packet Information Exchange
VPN Concentrator
AAA Server – Authentication, Authorizing, Accounting Server
IDS – Intrusion Detection System
Policy Manager
Fibre Optics
CRS – Carrier Routing System (provides 9.6TeraBytes per second)
CMTS or UBR – Cable Modem Terminating System
Network
Connection of two or more nodes over the physical media is called as
Network.
Networking
Connection of two or more nodes over the physical media and sharing the
resources is called as Networking.
Types of Network:
1.Peer-to-Peer Network
Peer meaning client, Operating system used as client are win95, 98,NT4.0
Workstation, Win2000 prof, ME, XP prof.
Workgroup is a small group of computers where no centralized
administration and no security is provided.
Media:
There are 2 types of media
1.Guided media (wired media) 2.UnGuided media (wireless media)
Co-axial cable
1.Maximum Distance 500mts
2.Low response
3.Less attenuation
4.Speed 10Mbps
5.Communication done is half duplex
6.Connection done using BNC – Bayonet Neil Concellmen Connector
7.Registered Guage Standard (RG)
RG 9,11,12 Thinnet Coaxial Cable
RG 58 Thicknet Coaxial Cable
RG 58/U, RG 58A/U Military Network
RG 59 Dish Network
RG 62 Arc Net
Microwaves
1.Electromagnetic Waves > 1Mhz
Radio Waves
1.Introduced in 1998 for computers
2.Electromagnetic Waves < 1Mhz
3.Maximum frequency available now is 2Ghz
Protocols
A set of rules for a particular type of communication.
Connection Oriented
1.Follows the same path for data transfer
2.Acknowledgement
3.Reliable
4.e.g. TCP, SPX, AppleTalk datagram protocol
Connectionless Oriented
1.Follows the path where less traffic is found
2.No Acknowledgement
3.Non-Reliable
4.e.g. IP, IPX, UDP, AppleTalk protocol
Standards
Two types of Standards
1.Defacto Standard 2.Dejuire Standard
Defacto Standard
Standard widely used by all is called as Defacto Standard.
Dejuire Standard
Standard defined by an organization is called as Dejuire Standard.
Network Segmentation
Breaking up a larger network into a number of smaller ones is called as
Network Segmentation and is accomplished using Routers, Switches and
Bridges.
Broadcast Domain
A group of devices receiving broadcast frames initiating from any device
within the group.
Collision Domain
The network area in Ethernet over, which frames that have collided and
damaged.
Broadcast Storms
An undesired event on the network caused by the simultaneous transmission
of any number of broadcasts across the network.
Multicasting
Any communication between a single sender and multiple receivers.
ARP
Address Resolution Protocol, the protocol that traces IP addresses to MAC
addresses.
IPX
Internetwork Packet Exchange, layer 3 protocol used in Novell Netware
networks for transferring information from servers to workstations.
Router
It’s a layer 3 device that connects 2 different networks and routes packets of
data from one network to another. It breaks up Broadcast domain as well as
Collision Domain.
Advantages of Router
1.Router don’t forward Broadcasts by default.
2.Perform access control on the traffic that flows through the router i.e.
Packet Filtering.
3.Network Address Translation.
4.Quality of Service for particular network traffic.
5.Can be used as a DHCP relay agent.
7.Connects different VLAN’s.
Hub:
Hub operates at Layer 1 Physical Layer
No Filtering
No Addressing
Hub creates single collision domain and single broadcast domain
Make forwarding to all the ports when signal is arrived
What is RAID?
A method used to standardize and categorize fault-tolerant disk systems. RAID
levels provide various mixes of performance, reliability, and cost. Some servers
provide three of the RAID levels: Level 0 (striping), Level 1 (mirroring), and Level
5 (striping & parity).
Server-based Network
Provide centralized control of network resources and rely on server computers to
provide security and network administration
Router
It’s a layer 3 device that connects 2 different networks and routes packets of data
from one network to another. It breaks up Broadcast domain as well as Collision
Domain.
What is Brouter?
It’s a Hybrid device that combines the features of both bridges and routers.
What is Subnet?
A subdivision of an IP network.
What is Beaconing?
An FDDI frame or Token Ring frame that points to serious problem with the ring,
such as a broken cable. The beacon frame carries the address of the station
thought to be down.
What is Cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
What is Attenuation?
In communication weakening or loss of signal energy, typically caused by
distance.
What is ICMP?
ICMP – Internet Control Message Protocol
It is a Network Layer Internet protocol, which can report errors and status
information. We can use the ping command to send ICMP echo request
messages and record the receipt of ICMP echo reply messages. With these
messages, we can detect network or host communication failures and
troubleshoot common TCP/IP connectivity problems.
What is the difference between TFTP and FTP application layer protocols?
TFTP – Trivial File Transfer Protocol
A stripped down version of FTP, easy to use and fast. TFTP has no Directory
browsing, no Authentication and insecure it can only send and receive files.
What MAU?
MAU – Multistation Access Unit
What is Kerberos?
An authentication mechanism used to verify user or host identity. Kerberos uses
encryption to prevent intruders from discovering passwords and gaining
unauthorized access to files.
Router ID
If the priority is set 1 to all the routers then there is a tie in priority, in this case it
will check if there is any loopback address is given to any router if not the router
with highest value of IP address will be elected as Router ID.
This router will be then called as Designated Router and the router with less
value of IP address after Designated Router will be called as Backup Designated
Router.
If a Router has all interfaces existing in single area than that router is called as
Internal Router.
Whenever a router send routing updates to DR and BDR it uses Destination
address as 224.0.0.6 and when DR send updates to all the routers it uses
Destination address as 224.0.0.5.
In OSPF routing updates are called as Link State Advertisements.
If an OSPF router wants to send updates to other OSPF router then it should
carry 3 requirements i.e.
Hello Packets Received
It contains Area Id, Uptime, Password, Hello Interval, Dead Interval,
Neighborship Table and Router Id.
Point-to-Point Link Point to Multipoint Link
Halo Interval – 10 Halo Interval – 30
Dead Interval – 40 Dead Interval – 120
Adjacency Built
If both router interfaces belongs to same Area, same Password then Hallo and
Dead Intervals should be set same.
Neighborship Built
If both routers are adjacent to each other then Neighborship is built in Routers.
When one routerRA sends updates i.e. Link State Advertisements to other
routerRB it will send that update to Topology Database of routerRB and will run
an algorithm SPF on routerRB to create a new Topology Table. After that Dijisktra
Algorithm is run to find the best path and that entry will be put in Routing Table.
The router when sends Hallo packets to other router a Neighborship Table is set
on that Router.
RIP Timers
Route update timer – 30seconds
Route invalid timer – 180 seconds
Holddown timer – 180 seconds
Route flush timer – 240 seconds
What are the advantages and disadvantages of the three types of routing
tables?
Besides the names suggesting that addresses reside at different layers, other
differences do exist. Data Link layer addresses are assigned by the manufacturer
and identify the actual hardware device. A Network layer address is a logical
address assigned by the network administrator to identify a device running a
Network layer protocol, such as IP.
First, they are all Physical layer devices. Repeaters regenerate and amplify the
signal traveling on the wire to extend the normal distance limitation of the signal.
A repeater can connect two network segments. A hub and a concentrator are the
same thing, with hub being the more common term used today. Hubs are
repeaters with 8–24 ports. When one machine attached to the hub sends
anything over the network, all the devices attached to the hub receive that signal.
It confines user traffic to a segment and addresses and solves distance limitation
problems. Segmentation also cuts down on the traffic generated by broadcasts
and multicasts, and thereby increases performance. Because of the reduction of
the size of the segment, collisions and overall traffic also are reduced.
Cut-Through switching is the fastest method because the switches read only the
first six bytes of the frame before forwarding it.
Bridges and switches can determine whether a frame is destined for the local
network segment or needs to be forwarded to another network segment based
on the destination MAC address.
What are some of the advantages to using bridging and switching instead
of routing?
A bridge or a switch
A concentrator or a hub
A router
A gateway
Routers must hold a frame for a given period of time for security purposes.
Routers must translate the signal, but then the signal can cut through directly.
They build tables and make their decisions based on those tables.
They perform lookups and make their decisions dynamically with discovery.
Choose the devices that are used for Data Link layer segmentation.
They’re more flexible because they enable device assignment only on a port-by-
port basis.
Answers A and D are correct because Store and Forward switching copies
the entire frame into the buffer before forwarding, which also provides for
error checking. Answers B and C are incorrect because they describe Cut-
Through.
Name the Cisco proprietary protocol used on Fast Ethernet VLAN trunk
links.
ISL (Inter-Switch Link) protocol is used to encapsulate VLAN traffic over Fast
Ethernet trunk links.
You need a router that has some kind of viable trunking connection, such as Fast
Ethernet (ISL), and must be configured with subinterfaces.
Set up an Intra-LAN.
Answers A and B are incorrect because they are simply false. Answer C is
correct because each VLAN becomes its own broadcast domain. Answer D
is incorrect because a firewall is meant to shelter internal networks from intrusion
from the outside.
Answer A is incorrect because routers are not at all necessary for a VLAN to
operate. Answers B and E are correct because VLAN implementation
controls broadcasts and provides isolation, therefore security. Answers C
and D are simply incorrect.
Inter-Switch Link
Network layer
Physical layer
Answer A is correct because ISL functions at the Data Link layer of the OSI
model. Answers B and C are incorrect because ISL does not function at those
layers of the OSI model. Answer D is incorrect because the specific sublayer
does not have any distinction in this context.
In ATM LANE, what factor determines the type of trunking protocol used?
Answer A is correct because the link type determines the type of trunking
protocol used. Answers B and C are incorrect because they are simply false.
Answer D is incorrect because the ATM LANE Module is a hardware card and
does not affect trunking protocols.
VTP (Virtual Trunking Protocol) exists at which layer and for what purpose?
What two basic steps are necessary to create access list filters?
The first step is to build the list at global configuration mode using the access-list
command followed by an access list number signifying the type. The second step
is to apply the list to an interface by using the [protocol type] access-group
command followed by the access list number and parameters.
Identify the appropriate access list range values used to create access
lists.
0–100
1–100
1–99
1–10
101–199
0.0.0.0
255.255.255.255
0.0.255.255
255.255.255.0
Write the command that would apply access list 100 to interface E0 in an
outbound direction. (Assume you are already at interface configuration
mode of the Ethernet interface.)
IP access-group 100 in
IP access-group E0 out
Answer A is incorrect because the access list number is not an extended list
number. Also, the protocol type is IP not ICMP, and the destination is specifying
the host keyword but using a subnet value instead, which is invalid. Answer B is
incorrect because it uses an incorrect inverse mask for the destination network.
Answer C is incorrect because it does not specify the protocol after the permit
statement and also is using the host keyword with the destination
network. Answer D is correct because it uses a valid access list number and
syntax to forward ICMP echo requests.
Write the command to view all access lists created on your router
regardless of protocol.
show access-lists
show ip access-lists
Which of the following best describes the function of the following access
list line?
It is an IPX standard access list allowing host 145.19.2.1 to access any host on
subnet 155.6.0.0.
Answers A and C are incorrect because they do not state the actions of this
access list correctly. Answer B is incorrect because this is not an IPX standard
list. Answer D is correct because it correctly describes the access list
behavior.
Which command can you use to display a list of access list filters
configured on your router for IP only?
show IP access-lists
show access-lists
Write the command to bind IPX extended access list 901 to interface serial
0 on an inbound direction.
Which two of the following commands will enable Telnet traffic from all
hosts on network 166.10.0.0 to be forwarded to the Telnet server
137.2.10.1?
Answers A and C are correct. The only difference between the two is that
Answer A uses the host keyword and the Telnet keyword instead of a port
number. Answer B is incorrect because the access list number is 99, which is
used for standard lists. Answer D is incorrect because it uses IP instead of TCP
after the permit statement.