Beruflich Dokumente
Kultur Dokumente
CCNA 1 Chapter 10
Routing Fundamentals and Subnets
The network layer interfaces to networks and provides the best end-to-end packet
delivery services to its user, the transport layer. The network layer sends packets from the
source network to the destination network.
Routers are devices that implement the network service. They provide interfaces for a
wide range of links and subnetworks at various speeds. Routers are active and intelligent
network nodes; therefore, they can participate in managing the network. Routers manage
networks by providing dynamic control over resources and supporting the tasks and goals
for networks: connectivity, reliable performance, management control, and flexibility.
In addition to the basic switching and routing functions, routers have implemented a
variety of value-added features that help to improve the cost-effectiveness of the network.
These features include sequencing traffic based on priority and traffic filtering.
Typically, routers are required to support multiprotocol stacks, each with its own routing
protocols, and to allow these different environments to operate in parallel. In practice,
routers also incorporate bridging functions and can serve as a limited form of hub.
IP addressing makes it possible for data that is passing over the network media of the
Internet to find its destination. Because each IP address is a 32-bit value, there are four
billion different IP address possibilities. IP addresses are hierarchical addresses, like
phone numbers and zip codes. They provide a better way to organize computer addresses
than MAC addresses, which are "one-dimensional" addresses (like social security
numbers). IP addresses can be set in software, so they are flexible. MAC addresses are
burned into hardware. Both addressing schemes are important for efficient
communications among computers.
Concept Questions
Demonstrate your knowledge of these concepts by answering the following questions in
the space provided.
1. Path determination occurs at the network layer. Routers are another type of
internetworking device. These devices pass data packets among networks based
on network protocol or Layer 3 information. Explain how this process works.
2. Routers have the capability to make intelligent decisions as to the best path for
delivery of data on the network. What criteria do routers use to make these
decisions?
Routers share information with other routers, educating one another about
known networks within the internetwork. The router uses this table, almost
like a network roadmap. When requested to forward a packet, the router
refers to this map/table and forwards the packet to the next appropriate
interface and neighbor.
3. IP addresses are 32-bit values that are written as four octets separated with
periods. To make them easier to remember, IP addresses are usually written in
dotted notation with decimal numbers. IP addresses are used to identify a machine
on a network and the network to which it is attached. What do dotted-decimal and
hexadecimal mean?
6. Time-to-live (TTL) is a field that specifies the number of hops a packet may
travel. Describe how this field can prevent a packet from looping endlessly.
1. RIP is a distance vector routing protocol that uses hop count as its
metric to determine the direction and distance to any link in the
internetwork.
2. IGRP is a distance-vector routing protocol developed by Cisco. IGRP
was developed specifically to address problems associated with
routing in large networks that were beyond the range of protocols
such as RIP.
3. OSPF is a link-state routing protocol developed by the Internet
Engineering Task Force (IETF) in 1988. OSPF was written to address
the needs of large, scalable internetworks that RIP could not.
4. Border Gateway Protocol (BGP) is an example of an External
Gateway Protocol (EGP). BGP exchanges routing information
between autonomous systems while guaranteeing loop-free path
selection.
9. List and describe four routed protocols.
The Internet Protocol (IP) and Novell Internetwork Packet Exchange (IPX)
are examples of routed protocols. Other examples include DECnet,
AppleTalk, Banyan VINES, and Xerox Network Systems (XNS). Routed or
routable protocols are used at the network layer to transfer data from one
host to another across a router. Routed protocols transport data across a
network. Routing protocols allow routers to choose the best path for data
from a source to a destination.
Vocabulary Exercise
Define the following terms as completely as you can. Use the online curriculum or
CCNA 1 Chapter 10 from the Cisco Networking Academy Program CCNA 1 and 2
Companion Guide, Revised Third Edition, for help.
Focus Questions
1. What type of addressing scheme does the network layer address use?
Logical addressing occurs at the network layer. The network layer address
has both network and host representation; because of this, Layer 3 addresses
are said to be hierarchical.
2. Switches can learn layer two addresses and routers can learn layer three
addresses. Why must switches forward broadcasts, leading to possible broadcast
storms?
The Layer 2 switch builds its forwarding table using MAC addresses. When
a host has data for a non-local IP address, it sends the frame to the closest
router. This router is also known as its default gateway. The host uses the
MAC address of the router as the destination MAC address.
3. What type of determination is the process the router uses to choose a course for
the packet to travel to its destination?
Path determination is the process that a router uses to choose the next hop in
a path toward a packet’s ultimate destination.
A network address helps the router identify a path within the network cloud.
The router uses the network address to identify the destination network of a
packet within an internetwork. In addition to the network address, network
protocols use some form of host, or node, address. For some network layer
protocols, a network administrator assigns host addresses according to some
predetermined network addressing plan.
Specifies the length of the entire IP packet, including data and header, in two
bytes (16 bits).
8. What three pieces of information does the subnet mask give to network devices?
The subnet mask allows the host to identify the size of the network on which
it is participating. The subnet mask also allows for the identification of a
network address (all 0s in the Host field) and the identification of the
broadcast address (all 1s in the Host field).
9. What happens to a packet if there is no route found in the routing table for the
packets destination network?
If the packet does not match any entries in the table, the router checks to see
if a default route has been set. If a default route has been set, the packet is
forwarded to the associated port. A default route is a route that is configured
by the network administrator as the route to use if there are no matches in
the routing table. If there is no default route, the packet is discarded. A
message is often sent back to the device that sent the data to indicate that the
destination was unreachable.
1. OSPF
2. Intermediate System-to-Intermediate System (IS-IS) protocol
1. Which layer of the OSI model uses the Internet Protocol addressing scheme to
determine the best way to move data from one place to another?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
10. In a Class A address, the value of the first octet can equal which of the following?
A. 0 through 127
B. 128 through 191
C. 192 through 223
D. 192 through 255
14. Given a host with the IP address of 172.16.55.33 and the default subnet mask,
what is the network number?
A. 172.16.55.32
B. 172.16.55.0
C. 172.16.0.0
D. 172.0.0.0
15. Which of the following addresses is a Class C address? (Choose all that apply.)
A. 129.219.95.193
B. 209.101.218.30
C. 151.13.27.38
D. 192.119.15.17
A. Layer 4 address
B. Layer 3 address
C. Layer 2 address
D. All of the above
17. If you have only one class C network and you need to create 6 subnets with at
least 22 hosts, on each subnet what will your subnet mask be?
A. 255.255.255.0
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.224
18. If you have only one class C network and you need to create 11 subnets with at
least 11 hosts, on each subnet what will your subnet mask be?
A. 255.255.255.224
B. 255.255.255.240
C. 255.255.255.248
D. 255.255.255.252
19. What is the maximum number of bits that can be borrowed from a Class C
network?
A. 2
B. 4
C. 6
D. 8
20. What is the maximum number of bits that can be borrowed from a Class B
network?
A. 2
B. 8
C. 14
D. 16
21. How many subnets are usable with a subnet mask of 255.255.252.0 with a Class
B network?
A. 62
B. 64
C. 256
D. 1024
22. How many subnets are created with a subnet mask of 255.255.255.240 with a
Class B network?
A. 16
B. 2048
C. 4096
D. 65,536