Documente Academic
Documente Profesional
Documente Cultură
MODELS
Each models will have different features or functions
701,702,703,704,710 (supports ISDN Technology)
801,803,805,810 (supports ISDN+Leased line connection)
1001,1003,1010,1011,1015
1101,1102,1102,1115
1401 - 1411
Products of Cisco:
Router
Switches
Bridges
Brouters
Repeaters
PIX Packet Information Exchange
VPN Concentrator
AAA Server Authentication, Authorizing, Accounting Server
IDS Intrusion Detection System
Policy Manager
Fibre Optics
CRS Carrier Routing System (provides 9.6TeraBytes per second)
Supports 10Mbps
Supports 10 or 100 Mbps
Supports 100Mbps
Supports 1Gbps
orange/white tap.
All orange/white, green/white, blue/white, brown/white provides grounding to the orange, green, blue,
brown wires.
Types of Twisted pair cable
1.Unshielded Twisted Pair Cable (UTP)
RJ11
Telephones
RJ12
Telephone Network, Modems, Small Networks
RJ45
Local Area Network
Optical Fibre Cable
1.Maximum Distance 3 to 10 Kms
2.No EMI Electro Magnetic Interference
3.Speed 100Mbps or Higher
4.Connectors used are ST Straight Trip and SC Subscriber Connectors
5.Two modes of communication Single mode (single beam) and Multiple mode (multiple beam)
2.UnGuided media (wireless media)
e.g. infrared, microwaves, radio waves
Infrared
1.Introduced in 1985
2.Point-to-Point communication (distance between 2 computers should not be more than 15mts)
3.Multipoint communication (distance between 2 computers should not be more than 30 mts)
4.Maximum Bandwidth 11Mbps
Microwaves
1.Electromagnetic Waves > 1Mhz
Radio Waves
1.Introduced in 1998 for computers
2.Electromagnetic Waves < 1Mhz
3.Maximum frequency available now is 2Ghz
Protocols
A set of rules for a particular type of communication.
Two types of Protocols
1.Connection Oriented
2.Connectionless Oriented
Connection Oriented
1.Follows the same path for data transfer
2.Acknowledgement
3.Reliable
4.e.g. TCP, SPX, AppleTalk datagram protocol
Connectionless Oriented
1.Follows the path where less traffic is found
2.No Acknowledgement
3.Non-Reliable
4.e.g. IP, IPX, UDP, AppleTalk protocol
Standards
2.Dejuire Standard
Defacto Standard
Standard widely used by all is called as Defacto Standard.
Dejuire Standard
Standard defined by an organization is called as Dejuire Standard.
Standard Organizations / Committees
IEEE Institute of Electrical and Electronics Engineers
IANA International Assigned Number Authority
ISO International Standards Organization
ITU-T International Telecommunication Union Telecommunication Standardization Sector
EIA / TIA Electronics Industry Association / Telecommunication Industry Association
ANSI American National Standards Institute
Network Segmentation
Breaking up a larger network into a number of smaller ones is called as Network Segmentation and is
accomplished using Routers, Switches and Bridges.
Causes of LAN Traffic congestion
1.Too many hosts in a broadcast domain
2.Broadcast storms
3.Multicasting
4.Low Bandwidth
5.Adding Hubs for connectivity to the network
6.A large amount of ARP and IPX Traffic.
Broadcast Domain
A group of devices receiving broadcast frames initiating from any device within the group.
Collision Domain
The network area in Ethernet over, which frames that have collided and damaged.
Broadcast Storms
An undesired event on the network caused by the simultaneous transmission of any number of broadcasts
across the network.
Multicasting
Any communication between a single sender and multiple receivers.
ARP
Address Resolution Protocol, the protocol that traces IP addresses to MAC addresses.
IPX
Internetwork Packet Exchange, layer 3 protocol used in Novell Netware networks for transferring
information from servers to workstations.
Router
Its a layer 3 device that connects 2 different networks and routes packets of data from one network to
another. It breaks up Broadcast domain as well as Collision Domain.
Advantages of Router
1.Router dont forward Broadcasts by default.
2.Perform access control on the traffic that flows through the router i.e. Packet Filtering.
3.Network Address Translation.
4.Quality of Service for particular network traffic.
5.Can be used as a DHCP relay agent.
7.Connects different VLANs.
DCE-Data Communications Equipment
The DCE supplies the physical connection to the network, forwards traffic, and provides a clocking signal to
synchronize data transmission between DTE and DCE devices.
DTE-Data Terminal Equipment
Any device located at the end user i.e. network interface serving as a destination or source or both. DTE
includes devices such as Multiplexers, routers, protocol translators and computers.
Different Modes for configuring a router
1.User Mode- some basic commands like ping, telnet can be done. Prompt will be Router >
2.Execution or Privilege or Enable Mode- can view all configuration details, minimal commands like ping,
telnet, and clock setting. Prompt will be Router #
3.Global Configuration Mode- where all configurations are done. Prompt will be Router(config)#
Sub Configuration Modes
1.Interface configuration mode, prompt will be Router(config-if)#
2.Router configuration mode, prompt will be Router(config-router)#
3.Line configuration mode, prompt will be Router(config-line)#
What is Beaconing?
An FDDI frame or Token Ring frame that points to serious problem with the ring,
such as a broken cable. The beacon frame carries the address of the station
thought to be down.
What are NetBIOS and NetBEUI?
NetBIOS Network Basic Input / Output System
An application-programming interface (API) that can be used by programs on a
local area network (LAN). NetBIOS provides programs with a uniform set of
commands for requesting the lower-level services required to manage names,
conduct sessions, and send datagrams between nodes on a network.
NetBEUI NetBIOS Extended User Interface
An improved version of the NetBIOS protocol, a network protocol native to
Microsoft Networking. It is usually used in small, department-size local area
networks (LANs) of 1 to 200 clients. It can use Token Ring source routing as its
only method of routing.
What is Cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
What is Attenuation?
In communication weakening or loss of signal energy, typically caused by
distance.
What is MAC address?
The address for a device as it is identified at the Media Access Control (MAC)
layer in the network architecture. MAC address is usually stored in ROM on the
network adapter card and is unique.
What is ICMP?
ICMP Internet Control Message Protocol
It is a Network Layer Internet protocol, which can report errors and status
information. We can use the ping command to send ICMP echo request
messages and record the receipt of ICMP echo reply messages. With these
messages, we can detect network or host communication failures and
troubleshoot common TCP/IP connectivity problems.
What is difference between ARP and RARP?
ARP Address Resolution Protocol
The protocol that traces IP addresses to MAC addresses.
RARP Reverse Address Resolution Protocol
The protocol within the TCP/IP stack that maps MAC addresses to IP addresses.
What is the difference between TFTP and FTP application layer protocols?
TFTP Trivial File Transfer Protocol
A stripped down version of FTP, easy to use and fast. TFTP has no Directory
browsing, no Authentication and insecure it can only send and receive files.
FTP File Transfer Protocol
The TCP/IP protocol used for transmitting files between network nodes. FTP
allows access to both Directories and files, manipulating directories, typing file
contents and copying files between hosts.
Explain 5-4-3 rule?
In a Ethernet network, between any two points on the network, there can be no
more than five network segments or four repeaters, and of those five segments
only three of segments can be populated.
What MAU?
MAU Multistation Access Unit
What is the difference between routable and non- routable protocols?
Routable protocols can work with a router and can be used to build large
networks. Non-Routable protocols are designed to work on small, local networks
and cannot be used with a router.
What is logical link control?
One of two sublayers of the data link layer of OSI reference model, as defined by
the IEEE 802 standard. This sublayer is responsible for error detection but not
correction, flow control and framing.
What is Virtual Channel?
A logical circuit that is created by Virtual channel links. It carries data between
two endpoints in a network.
The other name for Virtual Channel is Virtual Circuit.
What is Virtual Path?
Along any transmission path from a given source to a given destination, a group
of virtual circuits can be grouped together into what is called path.
What is Packet Filter?
Point-to-Point Link
Point to Multipoint Link
In OSPF a single large Autonomous system is break into small areas. There
should be atleast one area by name Area 0. Its called as Backbone Area.
The Router that connects more than one Area is called as Area Border Routers.
The Router that connects to other Autonomous system is called as Autonomous
System Boundary Router.
Router ID
If the priority is set 1 to all the routers then there is a tie in priority, in this case it
will check if there is any loopback address is given to any router if not the router
with highest value of IP address will be elected as Router ID.
This router will be then called as Designated Router and the router with less
value of IP address after Designated Router will be called as Backup Designated
Router.
If a Router has all interfaces existing in single area than that router is called as
Internal Router.
Whenever a router send routing updates to DR and BDR it uses Destination
address as 224.0.0.6 and when DR send updates to all the routers it uses
Destination address as 224.0.0.5.
In OSPF routing updates are called as Link State Advertisements.
If an OSPF router wants to send updates to other OSPF router then it should
carry 3 requirements i.e.
Hello Packets Received
It contains Area Id, Uptime, Password, Hello Interval, Dead Interval,
Neighborship Table and Router Id.
Point-to-Point Link
Point to Multipoint Link
Halo Interval 10
Halo Interval 30
Dead Interval 40
Dead Interval 120
Adjacency Built
If both router interfaces belongs to same Area, same Password then Hallo and
Dead Intervals should be set same.
Neighborship Built
If both routers are adjacent to each other then Neighborship is built in Routers.
When one routerRA sends updates i.e. Link State Advertisements to other
routerRB it will send that update to Topology Database of routerRB and will run
an algorithm SPF on routerRB to create a new Topology Table. After that Dijisktra
Algorithm is run to find the best path and that entry will be put in Routing Table.
The router when sends Hallo packets to other router a Neighborship Table is set
on that Router.
What is SLIP (Serial Line Internet Protocol)?
terms,
the
reasons
for
implementing
LAN
It confines user traffic to a segment and addresses and solves distance limitation
problems. Segmentation also cuts down on the traffic generated by broadcasts
and multicasts, and thereby increases performance. Because of the reduction of
the size of the segment, collisions and overall traffic also are reduced.
Which of the three switching methods is fastest, and why?
Cut-Through switching is the fastest method because the switches read only the
first six bytes of the frame before forwarding it.
What services do bridges and switches provide?
Bridges and switches can determine whether a frame is destined for the local
network segment or needs to be forwarded to another network segment based
on the destination MAC address.
What are some of the advantages to using bridging and switching instead
of routing?
Increased overhead and latency
Reduced overhead and latency
Broadcast propagation
Lower equipment costs
Answer A is incorrect because it is a negative aspect of routing as compared to
switching. Answer B is correct because bridges and switches look only at
Data Link layer information, whereas routers must process all the logical
address information in the route tables. Answer C is incorrect because
switches do not have this effect. Answer D is incorrect because switches are now
very sophisticated and can cost as much as routers.
What would be the best network segmentation device if you wanted to
connect two dissimilar networks, such as Ethernet and Token-Ring?
A bridge or a switch
A concentrator or a hub
A router
A gateway
Answer A is incorrect because bridges and switches cant perform protocol
translation. Answer B is incorrect because neither a concentrator nor a hub can
segment a network. Answer C is correct because routers can provide
translation between dissimilar protocols, among other things. Answer D is
incorrect because a gateway functions as a translator, not a segmentation
device.
Why is overhead or latency associated with routers? (Choose all that
apply.)
Routers must work at layer 3, which is inherently slower.
Inter-Switch Link
VLAN Switch Link
Answer C is correct because Inter-Switch Link protocol is the
encapsulation protocol used on Fast Ethernet links. Answers A, B, and D is
incorrect because no such links exist.
At which layer of the OSI model does ISL function?
Data Link layer
Network layer
Physical layer
LLC Data Link sublayer
Answer A is correct because ISL functions at the Data Link layer of the OSI
model. Answers B and C are incorrect because ISL does not function at those
layers of the OSI model. Answer D is incorrect because the specific sublayer
does not have any distinction in this context.
Which method is used by VTP to convey VLAN configuration information
within its management domain?
Through directed broadcasts
Through LSAs local service advertisements
Through multicast advertisements
Through port flooding
Answer C is correct because multicast advertisement convey configuration
information to all connected switches in the same management
domain. Answers A, B, and D is incorrect because they do not convey
information within management domains.
In ATM LANE, what factor determines the type of trunking protocol used?
VTP (Virtual Trunking Protocol) exists at which layer and for what purpose?
Layer 2, to maintain VLAN configuration consistency
Layer 2, to maintain trunking protocol synchronization
Layer 2, to maintain domain synchronization
Layer 3, to maintain access lists
Answer A is correct because VTP operates at layer 2 and maintains VLAN
configuration consistency. Although the OSI layer is correct, answers B and C
are incorrect because the second portion of the answers is incorrect. Answer D is
incorrect because VTP and switching do not operate at layer 3 and access lists
are maintained on routers.
What two basic steps are necessary to create access list filters?
The first step is to build the list at global configuration mode using the access-list
command followed by an access list number signifying the type. The second step
is to apply the list to an interface by using the [protocol type] access-group
command followed by the access list number and parameters.
Identify the appropriate access list range values used to create access
lists.
IP standard access list = 199
IP extended access list = 100199
IPX standard access list = 800899
IPX extended access list = 900999
IPX SAP filter = 10001099
What is the purpose of a wildcard mask?
255.255.255.0
Answer A is correct because, if unspecified, the default mask used is
0.0.0.0. Answers B and C are incorrect because neither are the default mask.
Answer D is incorrect because it is a regular mask, which is not used for wildcard
masking.
Write the command that would apply access list 100 to interface E0 in an
outbound direction. (Assume you are already at interface configuration
mode of the Ethernet interface.)
IP access-group 100 out
IP access-list 100 out
IP access-group 100 in
IP access-group E0 out
Answer A is correct because IP access-group 100 out is the command that
would apply access list 100 to interface E0 in an outbound direction.
Answers B, C, and D are simply incorrect.
Which of the following commands creates a standard IP extended access
list that enables ping echo requests to be sent from any host on network
166.10.0.0 to network 155.10.0.0?
Access-list 12 permit IP 166.10.0.0.0.0.255.255 host 155.10.0.0
Access-list 120 permit ICMP 166.10.0.0 0.0.255.155 155.10.0.0 0.0.0.255 eq
echo
Access-list 120 permit 166.10.0.0.0.0.255.255 host 155.10.0.0
Access-list 120 permit ICMP 166.10.0.0 0.0.255.255 155.10.0.0 0.0.255.255 eq
echo
Answer A is incorrect because the access list number is not an extended list
number. Also, the protocol type is IP not ICMP, and the destination is specifying
the host keyword but using a subnet value instead, which is invalid. Answer B is
incorrect because it uses an incorrect inverse mask for the destination network.
Answer C is incorrect because it does not specify the protocol after the permit
statement and also is using the host keyword with the destination
network. Answer D is correct because it uses a valid access list number and
syntax to forward ICMP echo requests.
Write the command to view all access lists created on your router
regardless of protocol.
show access-lists
show ip access-lists
show ipx interfaces
show ipx servers
Answer A is correct because show access-lists enables you to view all
access lists created on your router regardless of protocol. Answers B, C,
and D are incorrect because these commands do not enable you to perform that
specific function.
Which of the following best describes the function of the following access
list line?
Access-list 87 permit 145.19.2.1 0.0.0.0 155.6.0.0 0.0.255.255
Any host on subnet 155.6.0.0 can access host 145.19.2.1.
It is an IPX standard access list allowing host 145.19.2.1 to access any host on
subnet 155.6.0.0.
It is an extended IP access list allowing hosts on network 145.19.0.0 to access
hosts on network 145.19.0.0, which can access host 155.6.255.255.
It is an IP standard access list enabling host 145.19.2.1 to access any host on
subnet 155.6.0.0.
Answers A and C are incorrect because they do not state the actions of this
access list correctly. Answer B is incorrect because this is not an IPX standard
list. Answer D is correct because it correctly describes the access list
behavior.
Which of the following commands applies IPX SAP filter 1010 to an
interface in the outbound direction?
IPX access-group 1010 out
IPX output-sap-filter 1010
IPX output sap-filter 1010