Beruflich Dokumente
Kultur Dokumente
Types
Routers are of two types, Modular and Non-Modular
1.Modular
Routers will not have fix interfaces, can be added or removed whenever required.
2.Non-Modular
Routers will have fix interfaces, cannot be added or removed, they are fixed.
SERIES
Each series will have different models
MODELS
Each models will have different features or functions
700
800
1000
1001,1003,1010,1011,1015
1100
1101,1102,1102,1115
1400
1600
1700
2500
2600
3600
4000
5000
7000
12000GSR
Gigabit Switched Routers
Products of Cisco
Router
1401 1411
Switches
Bridges
Brouters
Repeaters
PIX Packet Information Exchange
VPN Concentrator
AAA Server Authentication, Authorizing, Accounting Server
IDS Intrusion Detection System
Policy Manager
Fibre Optics
CRS Carrier Routing System (provides 9.6TeraBytes per second)
CMTS or UBR Cable Modem Terminating System
Network
Connection of two or more nodes over the physical media is called as Network.
Networking
Connection of two or more nodes over the physical media and sharing the resources is called as
Networking.
Types of Network
1.Peer-to-Peer Network
Peer meaning client, Operating system used as client are win95, 98,NT4.0 Workstation, Win2000 prof,
ME, XP prof.
Workgroup is a small group of computers where no centralized administration and no security is
provided.
2.Server based Networks
Server is the one that serves the resources to clients.
Client is the one that requests for the resources from server.
Non-dedicated Server is the system that works both as client and server.
Operating system used as server is WinNT 3.51, 4.0, Win2000server, Win2003server.
Domain
Logical group of computers where centralized administration and security is concerned.
Media
There are 2 types of media
1.Guided media (wired media)
Military Network
RG 59
Dish Network
RG 62
Arc Net
Thicknet also called as 10base5 where 10 Bandwidth base Baseband and 5 500mts
Thinnet also called as 10base2 where 10 Bandwidth base Baseband and 2 200mts
Twisted pair cable
1.Maximum Distance 100mts
2.Speed 10/100/1000Mbps
3.Communication done is half / full duplex
Supports 10Mbps
10baseTx
100baseT
Supports 100Mbps
1000baseTx
Supports 1Gbps
orange/white tap.
All orange/white, green/white, blue/white, brown/white provides grounding to the orange, green, blue,
brown wires.
Types of Twisted pair cable
1.Unshielded Twisted Pair Cable (UTP)
CAT2
CAT3
CAT4
CAT5
Telephones
RJ12
RJ45
3.Multipoint communication (distance between 2 computers should not be more than 30 mts)
4.Maximum Bandwidth 11Mbps
Microwaves
1.Electromagnetic Waves > 1Mhz
Radio Waves
1.Introduced in 1998 for computers
2.Electromagnetic Waves < 1Mhz
3.Maximum frequency available now is 2Ghz
Protocols
A set of rules for a particular type of communication.
Two types of Protocols
1.Connection Oriented
2.Connectionless Oriented
Connection Oriented
1.Follows the same path for data transfer
2.Acknowledgement
3.Reliable
4.e.g. TCP, SPX, AppleTalk datagram protocol
Connectionless Oriented
1.Follows the path where less traffic is found
2.No Acknowledgement
3.Non-Reliable
4.e.g. IP, IPX, UDP, AppleTalk protocol
Standards
Two types of Standards
1.Defacto Standard
2.Dejuire Standard
Defacto Standard
Standard widely used by all is called as Defacto Standard.
Dejuire Standard
Standard defined by an organization is called as Dejuire Standard.
Network Segmentation
Breaking up a larger network into a number of smaller ones is called as Network Segmentation and is
accomplished using Routers, Switches and Bridges.
Broadcast Domain
A group of devices receiving broadcast frames initiating from any device within the group.
Collision Domain
The network area in Ethernet over, which frames that have collided and damaged.
Broadcast Storms
An undesired event on the network caused by the simultaneous transmission of any number of
broadcasts across the network.
Multicasting
Any communication between a single sender and multiple receivers.
ARP
Address Resolution Protocol, the protocol that traces IP addresses to MAC addresses.
IPX
Internetwork Packet Exchange, layer 3 protocol used in Novell Netware networks for transferring
information from servers to workstations.
Router
Its a layer 3 device that connects 2 different networks and routes packets of data from one network
to another. It breaks up Broadcast domain as well as Collision Domain.
Advantages of Router
1.Router dont forward Broadcasts by default.
2.Perform access control on the traffic that flows through the router i.e. Packet Filtering.
3.Network Address Translation.
In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be
sent simultaneously.
What is Protocol Data Unit?
The processes at each layer of the OSI model.
Layers
PDU
Transport
Segments
Network
Packets/Datagrams
Data Link
Frames
Physical
Bits
The use of software, installed on PC or LAN server, that allows the PC to function as if it were dumb
terminal directly attached to a particular type of mainframe.
Telnet is also called as terminal emulation. It belongs to application layer.
What is Beaconing?
An FDDI frame or Token Ring frame that points to serious problem with the ring, such as a broken
cable. The beacon frame carries the address of the station thought to be down.
What are NetBIOS and NetBEUI?
NetBIOS Network Basic Input / Output System
An application-programming interface (API) that can be used by programs on a local area network
(LAN). NetBIOS provides programs with a uniform set of commands for requesting the lower-level
services required to manage names, conduct sessions, and send datagrams between nodes on a
network.
NetBEUI NetBIOS Extended User Interface
An improved version of the NetBIOS protocol, a network protocol native to Microsoft Networking. It is
usually used in small, department-size local area networks (LANs) of 1 to 200 clients. It can use Token
Ring source routing as its only method of routing.
What is Cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
What is Attenuation?
In communication weakening or loss of signal energy, typically caused by distance.
What is MAC address?
The address for a device as it is identified at the Media Access Control (MAC) layer in the network
architecture. MAC address is usually stored in ROM on the network adapter card and is unique.
What is ICMP?
ICMP Internet Control Message Protocol
It is a Network Layer Internet protocol, which can report errors and status information. We can use
the ping command to send ICMP echo request messages and record the receipt of ICMP echo reply
messages. With these messages, we can detect network or host communication failures and
troubleshoot common TCP/IP connectivity problems.
What is difference between ARP and RARP?
ARP Address Resolution Protocol
The protocol that traces IP addresses to MAC addresses.
RARP Reverse Address Resolution Protocol
The protocol within the TCP/IP stack that maps MAC addresses to IP addresses.
What is the difference between TFTP and FTP application layer protocols?
TFTP Trivial File Transfer Protocol
A stripped down version of FTP, easy to use and fast. TFTP has no Directory browsing, no
Authentication and insecure it can only send and receive files.
FTP File Transfer Protocol
The TCP/IP protocol used for transmitting files between network nodes. FTP allows access to both
Directories and files, manipulating directories, typing file contents and copying files between hosts.
Explain 5-4-3 rule?
In a Ethernet network, between any two points on the network, there can be no more than five
network segments or four repeaters, and of those five segments only three of segments can be
populated.
What MAU?
MAU Multistation Access Unit
What is the difference between routable and non- routable protocols?
Routable protocols can work with a router and can be used to build large networks. Non-Routable
protocols are designed to work on small, local networks and cannot be used with a router.
What is logical link control?
One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802
standard. This sublayer is responsible for error detection but not correction, flow control and framing.
What is Virtual Channel?
A logical circuit that is created by Virtual channel links. It carries data between two endpoints in a
network.
The other name for Virtual Channel is Virtual Circuit.
What is Virtual Path?
Along any transmission path from a given source to a given destination, a group of virtual circuits can
be grouped together into what is called path.
What is Packet Filter?
What is multicast routing?
Sending a message to a group multicast address is called multicasting, and its routing algorithm is
called multicast routing.
What is IGP (Interior Gateway Protocol)?
Any protocol used by an internetwork to exchange routing data within an autonomous system. E.g.
RIP, IGRP and OSPF.
What is Kerberos?
An authentication mechanism used to verify user or host identity. Kerberos uses encryption to prevent
intruders from discovering passwords and gaining unauthorized access to files.
What is OSPF (Open Shortest Path First)?
OSPF is the first Open Standard Link State Routing Protocol.
Its a Classless Routing Protocol meaning when updates are sent they send both IP address and
Subnet mask.
Administrative Distance is 110.
Metric used is Cost i.e. Cost=
108
Bandwidth
OSPF uses algorithm to build Routing Table called Dijisktra.
Sends only Incremental and Triggered updates. Route updates sent within the routers will be secured
with the help of MD5 encrypted password.
Routing updates are sent as Multicast addresses i.e.
224.0.0.5 SPF (all OSPF routers)
224.0.0.6 Designated router and Backup Designated router
OSPF maintains 3 types of Routing table i.e. Routing Table (Dijisktra), Topology Table (SPF) and
Neighborship Table.
In OSPF Routers can be connected in two methods i.e.
Point-to-Point Link
Point to Multipoint Link
In OSPF a single large Autonomous system is break into small areas. There should be atleast one area
by name Area 0. Its called as Backbone Area.
The Router that connects more than one Area is called as Area Border Routers.
The Router that connects to other Autonomous system is called as Autonomous System Boundary
Router.
Router ID
If the priority is set 1 to all the routers then there is a tie in priority, in this case it will check if there is
any loopback address is given to any router if not the router with highest value of IP address will be
elected as Router ID.
This router will be then called as Designated Router and the router with less value of IP address after
Designated Router will be called as Backup Designated Router.
If a Router has all interfaces existing in single area than that router is called as Internal Router.
Whenever a router send routing updates to DR and BDR it uses Destination address as 224.0.0.6 and
when DR send updates to all the routers it uses Destination address as 224.0.0.5.
In OSPF routing updates are called as Link State Advertisements.
If an OSPF router wants to send updates to other OSPF router then it should carry 3 requirements i.e.
Hello Packets Received
It contains Area Id, Uptime, Password, Hello Interval, Dead Interval, Neighborship Table and Router
Id.
Point-to-Point Link
Halo Interval 10
Halo Interval 30
Dead Interval 40
Adjacency Built
If both router interfaces belongs to same Area, same Password then Hallo and Dead Intervals should
be set same.
Neighborship Built
If both routers are adjacent to each other then Neighborship is built in Routers.
When one routerRA sends updates i.e. Link State Advertisements to other routerRB it will send that
update to Topology Database of routerRB and will run an algorithm SPF on routerRB to create a new
Topology Table. After that Dijisktra Algorithm is run to find the best path and that entry will be put in
Routing Table.
The router when sends Hallo packets to other router a Neighborship Table is set on that Router.
What is SLIP (Serial Line Internet Protocol)?
An industry standard serial encapsulation for point-to-point connections that supports only a single
routed protocol, TCP/IP.
increases performance. Because of the reduction of the size of the segment, collisions and overall
traffic also are reduced.
Which of the three switching methods is fastest, and why?
Cut-Through switching is the fastest method because the switches read only the first six bytes of the
frame before forwarding it.
What services do bridges and switches provide?
Bridges and switches can determine whether a frame is destined for the local network segment or
needs to be forwarded to another network segment based on the destination MAC address.
What are some of the advantages to using bridging and switching instead of routing?
Increased overhead and latency
Reduced overhead and latency
Broadcast propagation
Lower equipment costs
Answer A is incorrect because it is a negative aspect of routing as compared to switching.Answer B is
correct because bridges and switches look only at Data Link layer information, whereas
routers must process all the logical address information in the route tables. Answer C is
incorrect because switches do not have this effect. Answer D is incorrect because switches are now
very sophisticated and can cost as much as routers.
What would be the best network segmentation device if you wanted to connect two
dissimilar networks, such as Ethernet and Token-Ring?
A bridge or a switch
A concentrator or a hub
A router
A gateway
Answer A is incorrect because bridges and switches cant perform protocol translation. Answer B is
incorrect because neither a concentrator nor a hub can segment a network. Answer C is correct
because routers can provide translation between dissimilar protocols, among other
things. Answer D is incorrect because a gateway functions as a translator, not a segmentation device.
Why is overhead or latency associated with routers? (Choose all that apply.)
Routers must work at layer 3, which is inherently slower.
Routers must examine the frame header before passing it.
Routers must hold a frame for a given period of time for security purposes.
Routers must translate the signal, but then the signal can cut through directly.
Answer A is correct because resolving those addresses is more time consuming. Answer B is
correct because the router must examine and consider the frame header detail before
passing it, which slows processing. Answers C and D are incorrect because they are simply not
accurate.
Which of the following represents Physical layer devices?
Repeaters, bridges, and concentrators
Answer A is incorrect because routers are not at all necessary for a VLAN to operate. Answers B and
E are correct because VLAN implementation controls broadcasts and provides isolation,
therefore security. Answers C and D are simply incorrect.
What is the purpose of a trunking protocol?
To connect the backbone of a primary VLAN to the backbone of a secondary VLAN
For one switch fabric to be integrated with another switch fabric
For a VLAN on one switch to be linked to a VLAN on another switch
To enable multiple trunking protocols to communicate
Answers A is incorrect because it uses wrong terminology. Answer B is incorrect because switch fabric
is a hardware-related component of a switch and belongs to one switch only. Answer C is correct
because trunking protocols allow management of VLANs with similar or dissimilar trunking
protocols. Answer D is incorrect because a trunking protocol does not enable multiple trunking
protocols to communicate.
Choose the encapsulation protocol used on Fast Ethernet links.
Cisco Switch Link
Dedicated Switch Link
Inter-Switch Link
VLAN Switch Link
Answer C is correct because Inter-Switch Link protocol is the encapsulation protocol used
on Fast Ethernet links. Answers A, B, and D is incorrect because no such links exist.
At which layer of the OSI model does ISL function?
Data Link layer
Network layer
Physical layer
LLC Data Link sublayer
Answer A is correct because ISL functions at the Data Link layer of the OSI model. Answers B
and C are incorrect because ISL does not function at those layers of the OSI model. Answer D is
incorrect because the specific sublayer does not have any distinction in this context.
Which method is used by VTP to convey VLAN configuration information within its
management domain?
Through directed broadcasts
Through LSAs local service advertisements
Through multicast advertisements
Through port flooding
Answer C is correct because multicast advertisement convey configuration information to
all connected switches in the same management domain. Answers A, B, and D is incorrect
because they do not convey information within management domains.
In ATM LANE, what factor determines the type of trunking protocol used?
The link type
VTP (Virtual Trunking Protocol) exists at which layer and for what purpose?
Layer 2, to maintain VLAN configuration consistency
Layer 2, to maintain trunking protocol synchronization
Layer 2, to maintain domain synchronization
Layer 3, to maintain access lists
Answer A is correct because VTP operates at layer 2 and maintains VLAN configuration
consistency. Although the OSI layer is correct, answers B and C are incorrect because the second
portion of the answers is incorrect. Answer D is incorrect because VTP and switching do not operate at
layer 3 and access lists are maintained on routers.
What two basic steps are necessary to create access list filters?
The first step is to build the list at global configuration mode using the access-list command followed
by an access list number signifying the type. The second step is to apply the list to an interface by
using the [protocol type] access-group command followed by the access list number and parameters.
Identify the appropriate access list range values used to create access lists.