Introduction to Networks - Chapter 1 & 2
82 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of a network's fault tolerance characteristic?

  • To ensure redundancy and minimize failures (correct)
  • To reduce the overall cost of network infrastructure
  • To enhance data transmission speeds
  • To eliminate the need for security measures

Which type of network covers a small geographic area such as a home or office?

  • GAN (Global Area Network)
  • MAN (Metropolitan Area Network)
  • WAN (Wide Area Network)
  • LAN (Local Area Network) (correct)

What type of device manages data flow in a network?

  • NIC
  • Intermediary Device (correct)
  • Packet Switch
  • End Device

Which of the following is NOT a characteristic of a reliable network architecture?

<p>High Speed (B)</p> Signup and view all the answers

Which security measure is primarily used for home networks?

<p>Antivirus and firewalls (D)</p> Signup and view all the answers

What is the role of a Network Interface Card (NIC)?

<p>To connect a device to a network (D)</p> Signup and view all the answers

Which of the following describes packet switching?

<p>A technique that segments data for transmission (C)</p> Signup and view all the answers

Which access method provides encrypted remote access for device management?

<p>SSH (D)</p> Signup and view all the answers

In Cisco IOS, which command would you use to enter global configuration mode?

<p>configure terminal (D)</p> Signup and view all the answers

What characteristic defines IPv4 as a protocol?

<p>Best effort delivery (D)</p> Signup and view all the answers

What is the purpose of the Time To Live (TTL) field in an IPv4 packet?

<p>Limits the packet lifetime (B)</p> Signup and view all the answers

Which command is used to save the current configuration to NVRAM in Cisco IOS?

<p>copy running-config startup-config (A)</p> Signup and view all the answers

Which configuration mode is used for advanced commands related to configuration and management?

<p>Privileged EXEC Mode (D)</p> Signup and view all the answers

What method is not secure and should be avoided for remote access in Cisco IOS?

<p>Telnet (A)</p> Signup and view all the answers

What type of network topology connects multiple local area networks (LANs) over long distances?

<p>WAN (B)</p> Signup and view all the answers

Which command would you use to exit to the previous mode from Global Configuration Mode?

<p>Both A and B (B)</p> Signup and view all the answers

What is a primary benefit of IPv6's larger address space?

<p>Eliminates the need for NAT (B)</p> Signup and view all the answers

How do hosts determine which router to send packets to when the destination is on a different network?

<p>By accessing the default gateway (A)</p> Signup and view all the answers

Which of the following routes in a router's routing table indicates IP addresses assigned to interfaces?

<p>Local Routes (C)</p> Signup and view all the answers

What is the primary function of the CPU in a router?

<p>To process and forward packets (A)</p> Signup and view all the answers

Which memory type in a router retains the running configuration during operation?

<p>RAM (C)</p> Signup and view all the answers

What is the first step in the router boot-up process?

<p>Run POST diagnostics (A)</p> Signup and view all the answers

What does a subnet mask do in an IPv4 addressing scheme?

<p>Defines the network boundaries (B)</p> Signup and view all the answers

Which type of IPv4 address is not routable on the internet?

<p>Private Address (C)</p> Signup and view all the answers

What does the term 'Multicast' refer to in IPv4 addressing?

<p>One-to-a-group communication (B)</p> Signup and view all the answers

Which of the following is NOT a component of the anatomy of a router?

<p>Network Interface Card (C)</p> Signup and view all the answers

Which of the following address ranges is classified as a private IPv4 address range?

<p>192.168.1.0/24 (A), 10.0.0.0/8 (D)</p> Signup and view all the answers

What is the purpose of the Link-Local address range 169.254.0.0/16?

<p>Auto-configured when DHCP fails (C)</p> Signup and view all the answers

In which IPv4 address class would you find an address range suitable for medium-sized networks?

<p>Class B (A)</p> Signup and view all the answers

Which statement about CIDR (Classless Inter-Domain Routing) is accurate?

<p>CIDR allows for more efficient use of IP addresses (A)</p> Signup and view all the answers

What is the main function of the Internet Control Message Protocol (ICMP)?

<p>Facilitates connection errors and diagnostics (D)</p> Signup and view all the answers

When converting binary to decimal, which of the following methods is correct?

<p>Calculate each bit's value using powers of 2 (C)</p> Signup and view all the answers

What does a subnet mask of /24 signify?

<p>24 bits are dedicated to the network portion (A)</p> Signup and view all the answers

Which of the following options correctly describes a static IP address?

<p>Fixed IP for specific devices like servers (C)</p> Signup and view all the answers

Which ICMP message indicates that the destination is unreachable?

<p>Destination unreachable (A)</p> Signup and view all the answers

What is the effect of borrowing more bits from the host portion in subnetting?

<p>More subnets but fewer hosts per subnet (A)</p> Signup and view all the answers

What is the primary purpose of dynamic routing protocols?

<p>To find the shortest path to a destination. (C)</p> Signup and view all the answers

Which of the following statements about floating static routes is true?

<p>They activate only when the primary route fails. (C)</p> Signup and view all the answers

Which of the following best describes link-state protocols?

<p>They build a complete topology map of the network. (D)</p> Signup and view all the answers

What distinguishes classless protocols from classful protocols?

<p>Classful protocols do not send subnet mask information. (A)</p> Signup and view all the answers

Which of the following metrics is NOT typically used to determine the best path in a routing protocol?

<p>Number of switches in the path (D)</p> Signup and view all the answers

Protocols govern message formatting, timing, delivery, and acknowledgment.

<p>True (A)</p> Signup and view all the answers

The OSI model has seven layers, including Transport and Application, while the TCP/IP model has four layers.

<p>True (A)</p> Signup and view all the answers

MAC addresses are used to identify devices for end-to-end delivery over the internet.

<p>False (B)</p> Signup and view all the answers

When data is encapsulated, it goes from Frames to Packets to Segments.

<p>False (B)</p> Signup and view all the answers

TCP manages the integrity and orderly delivery of data segments across a network.

<p>True (A)</p> Signup and view all the answers

In a WAN, data is transmitted more quickly than in a LAN due to shorter distances.

<p>False (B)</p> Signup and view all the answers

Confidentiality, integrity, and availability are key goals of network security.

<p>True (A)</p> Signup and view all the answers

Cisco IOS provides a Command-Line Interface (CLI) for device management.

<p>True (A)</p> Signup and view all the answers

Privileged EXEC Mode allows for view-only commands.

<p>False (B)</p> Signup and view all the answers

Telnet is recommended for secure remote access to network devices.

<p>False (B)</p> Signup and view all the answers

The Network Layer is responsible for addressing and routing data packets.

<p>True (A)</p> Signup and view all the answers

IPv4 guarantees packet delivery and maintains the order of packets.

<p>False (B)</p> Signup and view all the answers

The command 'exit' in Cisco IOS moves you to the previous mode.

<p>True (A)</p> Signup and view all the answers

The Source IP field is part of the IPv4 header and identifies the receiver.

<p>False (B)</p> Signup and view all the answers

The console port provides encrypted remote access to network devices.

<p>False (B)</p> Signup and view all the answers

The command 'copy running-config startup-config' is used to save changes to NVRAM.

<p>True (A)</p> Signup and view all the answers

IPv6 eliminates the need for NAT due to its larger address space.

<p>True (A)</p> Signup and view all the answers

Hosts use the network layer to send packets only to devices on the same network.

<p>False (B)</p> Signup and view all the answers

CPU and Flash memory are two key components of a router.

<p>True (A)</p> Signup and view all the answers

The host routing table contains only the known routes without any gateways.

<p>False (B)</p> Signup and view all the answers

A subnet mask of /24 corresponds to the address range 255.255.255.254.

<p>False (B)</p> Signup and view all the answers

Public IPv4 addresses are routable on external networks.

<p>True (A)</p> Signup and view all the answers

The router boot-up process does not require loading the IOS.

<p>False (B)</p> Signup and view all the answers

Multicast addressing allows communication from one device to all devices on a network.

<p>False (B)</p> Signup and view all the answers

Directly connected routes in the router routing table are indicated by the letter 'D'.

<p>False (B)</p> Signup and view all the answers

NVRAM retains the running configuration during router operation.

<p>False (B)</p> Signup and view all the answers

A default static route is used to forward all packets without a more specific match.

<p>True (A)</p> Signup and view all the answers

Link-state protocols share routing updates with all routers in the network and do not maintain a complete view of network topology.

<p>False (B)</p> Signup and view all the answers

Floating static routes are activated when the primary route fails, and they are configured with a lower administrative distance.

<p>False (B)</p> Signup and view all the answers

Dynamic routing protocols are advantageous because they reduce administrative overhead and can automatically adapt to topology changes.

<p>True (A)</p> Signup and view all the answers

Classful protocols support Variable Length Subnet Masking (VLSM) and Classless Inter-Domain Routing (CIDR).

<p>False (B)</p> Signup and view all the answers

Subnetting improves network performance by dividing it into smaller broadcast domains.

<p>True (A)</p> Signup and view all the answers

The IP address range 192.0.0.0 - 223.255.255.255 is classified as Class A.

<p>False (B)</p> Signup and view all the answers

The subnet mask of /20 allows for more hosts per subnet compared to a /24 subnet mask.

<p>True (A)</p> Signup and view all the answers

ICMP is used primarily for data encryption in network communication.

<p>False (B)</p> Signup and view all the answers

The Loopback address 127.0.0.0/8 is used for local testing of network configurations.

<p>True (A)</p> Signup and view all the answers

CIDR allows fixed subnetting of IP addresses without consideration of the number of hosts needed.

<p>False (B)</p> Signup and view all the answers

Dynamic IP addresses are assigned manually to devices in a network.

<p>False (B)</p> Signup and view all the answers

Borrowing more bits from the host portion in subnetting results in fewer subnets but more hosts per subnet.

<p>False (B)</p> Signup and view all the answers

The address range 169.254.0.0/16 is designated for automatic configuration when DHCP fails.

<p>True (A)</p> Signup and view all the answers

The total number of subnets can be calculated with the formula 2^n, where n is the number of borrowed bits.

<p>True (A)</p> Signup and view all the answers

Flashcards

LAN

A network covering a small geographic area (like a home or office).

WAN

A network spanning a large geographic area (like cities or countries).

Network Components

The physical devices that make up a network (e.g., computers, routers, cables).

Network Security

Protecting network infrastructure and data from unauthorized access.

Signup and view all the flashcards

Fault Tolerance

A network feature that minimizes failures by having multiple paths.

Signup and view all the flashcards

Communication Rules

Essential elements required for any communication (sender, receiver, medium).

Signup and view all the flashcards

Network Topology

The physical or logical layout of a network.

Signup and view all the flashcards

Cisco IOS

The operating system used by Cisco network devices like routers and switches. It provides a command-line interface (CLI) for device management.

Signup and view all the flashcards

Console Port

A physical port on a Cisco device that allows direct, local access to the IOS using a console cable.

Signup and view all the flashcards

Telnet

A protocol for remote access to Cisco devices, but it lacks encryption, making it insecure.

Signup and view all the flashcards

User EXEC Mode

The basic mode in Cisco IOS, used for viewing device information. The prompt ends with a '>' symbol.

Signup and view all the flashcards

Privileged EXEC Mode

The advanced mode in Cisco IOS allowing you to configure and manage the device. The prompt ends with a '#' symbol.

Signup and view all the flashcards

Global Configuration Mode

A mode in Cisco IOS where you can configure device-wide settings. The prompt includes '(config)' after the device name.

Signup and view all the flashcards

Interface Mode

A mode in Cisco IOS where you can configure specific ports or interfaces on the device.

Signup and view all the flashcards

IPv4 Header

Contains information about the IPv4 packet, including version, Time-to-Live (TTL), and source/destination IP addresses.

Signup and view all the flashcards

IPv6 Address Space

IPv6 uses 128-bit addresses, providing an immense number of unique addresses.

Signup and view all the flashcards

NAT (Network Address Translation)

A technique that translates private IP addresses to public ones, needed in IPv4 but not in IPv6.

Signup and view all the flashcards

Default Gateway

The router that connects your local network to the internet.

Signup and view all the flashcards

Host Routing Table

A table on your device storing routes to reach different networks.

Signup and view all the flashcards

Router Routing Table

A table on a router storing routes for all connected networks.

Signup and view all the flashcards

Directly Connected Routes

Routes to networks directly connected to a router.

Signup and view all the flashcards

Remote Routes

Routes to networks that a router learns from other routers.

Signup and view all the flashcards

Router Boot-up Process

The series of steps a router performs to start up and become operational.

Signup and view all the flashcards

Startup Configuration

A saved set of instructions that determines how a router operates.

Signup and view all the flashcards

Static Route

A manually configured route that directs traffic to a specific network or host. It's like a permanent road sign pointing to a destination.

Signup and view all the flashcards

Default Static Route

A route that forwards all traffic without a specific match to a designated gateway. It's like a default route on a map that takes you to the nearest main road.

Signup and view all the flashcards

Floating Static Route

A backup route that activates when the primary route fails. Like a spare tire for your car, it's used only when the primary route is unavailable.

Signup and view all the flashcards

Dynamic Routing

A system where routers automatically learn and update routing information based on network changes. It's like having a live map that updates as you travel.

Signup and view all the flashcards

Distance-Vector Routing

A dynamic routing protocol where routers share routing updates with their neighbors, but don't have a full network map. They only know about their immediate surroundings.

Signup and view all the flashcards

Loopback Address

A special IP address (127.0.0.1) used to test the local network stack. It allows communication with the host itself.

Signup and view all the flashcards

Link-Local Address

A temporary IP address (169.254.0.0/16) assigned automatically when a device fails to get an address from a DHCP server.

Signup and view all the flashcards

Test-Net Address

A reserved IP address range (192.0.2.0/24) specifically for testing and education, preventing conflicts with the internet.

Signup and view all the flashcards

Class A Network

A network with a wide range of IP addresses (0.0.0.0 - 127.255.255.255), suitable for large organizations.

Signup and view all the flashcards

Class B Network

A network with a medium range of IP addresses (128.0.0.0 - 191.255.255.255), ideal for medium-sized organizations.

Signup and view all the flashcards

Class C Network

A network with a smaller range of IP addresses (192.0.0.0 - 223.255.255.255), commonly used for small offices or home networks.

Signup and view all the flashcards

CIDR Notation

Classless Inter-Domain Routing (CIDR) allows flexible subnetting by using a slash followed by the number of bits used for the network portion.

Signup and view all the flashcards

Subnetting

Dividing a large network into smaller sub-networks (broadcast domains) for better network performance, security, and manageability.

Signup and view all the flashcards

Subnet Mask

A special IP address that defines the network portion and determines the number of usable hosts on a subnet.

Signup and view all the flashcards

What is ping?

A network utility that sends ICMP echo requests to a destination host to test connectivity and measure network latency.

Signup and view all the flashcards

Protocol Layers

Sets of rules that define communication between devices, often organized in tiers like the OSI model (7 layers) or TCP/IP model (4 layers). Each layer handles a specific aspect of data transmission.

Signup and view all the flashcards

Encapsulation

The process of wrapping data in headers and trailers at each network layer, adding information to guide it across the network. Each layer adds its own 'envelope' to the data.

Signup and view all the flashcards

Data Link Layer

The layer responsible for transmitting data frames between devices on the same network (like your local network). It handles error detection and flow control.

Signup and view all the flashcards

IP Address

A unique numerical address assigned to every device connected to the internet, used for end-to-end delivery of data packets. Think of it as the unique address of your house on the internet.

Signup and view all the flashcards

Secure Shell (SSH)

An encrypted protocol for remote access to Cisco devices, ensuring secure communication.

Signup and view all the flashcards

Save Configuration

The process of saving changes made to the device configuration to non-volatile RAM (NVRAM) for permanent storage.

Signup and view all the flashcards

Security Configuration

The process of setting up security measures on a Cisco device, such as strong passwords and access control.

Signup and view all the flashcards

Why does IPv6 eliminate NAT?

IPv6 eliminates the need for NAT because it has a much larger address space, allowing every device to have a unique public IP address.

Signup and view all the flashcards

What is a Default Gateway?

The router that connects a local network to external networks, enabling devices to access the internet.

Signup and view all the flashcards

What are Directly Connected Routes?

Routes in a router's routing table that represent networks directly connected to the router's interfaces.

Signup and view all the flashcards

What is NVRAM?

Non-Volatile Random Access Memory (NVRAM) in a router stores the startup configuration, which is loaded when the router boots up.

Signup and view all the flashcards

What is the Router Boot-up Process?

The series of steps a router performs during startup, starting with POST (Power-On Self Test) and ending with loading the configuration.

Signup and view all the flashcards

What is IPv4 Address Structure?

IPv4 addresses are 32-bit binary numbers divided into 4 octets (e.g., 192.168.1.1). The first part identifies the network, and the second part identifies the host.

Signup and view all the flashcards

What is a Subnet Mask?

A special IP address that separates the network portion from the host portion of an IPv4 address. It determines how many hosts can be on a subnet.

Signup and view all the flashcards

Difference between Public and Private Addresses?

Public addresses are routable on the internet, while private addresses are not. They are used internally within a network.

Signup and view all the flashcards

What is Broadcast?

A type of communication where a message is sent to every device on a network (e.g., 255.255.255.255).

Signup and view all the flashcards

Private IP Address Ranges

IP address ranges specifically reserved for internal networks and not routable on the public internet. Examples include 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

Signup and view all the flashcards

Borrowing Host Bits

A technique used in subnetting where host bits are borrowed to create more subnets. However, it reduces the number of usable hosts in each subnet.

Signup and view all the flashcards

What is Traceroute?

A network utility that displays the path and delay for packets traveling from a source to a destination.

Signup and view all the flashcards

ICMP Messages

Communication messages used within the Internet Control Message Protocol (ICMP) for diagnostics and error reporting.

Signup and view all the flashcards

Study Notes

Chapter 1: Introduction to Networks

  • Networks connect devices globally for communication, learning, work, and entertainment.
  • Communication methods include texting, social media, online collaboration, blogs, and gaming.

Chapter 2: Types of Networks

  • LAN (Local Area Network): Covers small geographic areas like homes, offices, or campuses, with high-speed bandwidth and single administration.
  • WAN (Wide Area Network): Connects LANs over large geographic areas (cities, countries), managed by multiple service providers with slower speeds.
  • Internet: A global network of interconnected LANs and WANs using copper, fiber optic, and wireless media.

Chapter 2: Network Components

  • End Devices: Devices like computers and phones where messages originate or are received.
  • Intermediary Devices: Devices like routers, switches, and firewalls that manage data flow.
  • Media Types: Copper cables, fiber optics, and wireless technologies.

Chapter 2: Network Architectures

  • Fault Tolerance: Redundancy mechanisms to minimize failures in a network.
  • BYOD (Bring Your Own Device): Employees using personal devices to access company resources.
  • Cloud Computing: Storing and accessing data over the internet (public, private, hybrid clouds).
  • Online Collaboration and Video Communication: Tools for virtual teamwork (e.g., Cisco WebEx, TelePresence).
  • Smart Homes: Integrating technology into appliances.

Chapter 2: Security

  • Threats: External (viruses, hacking, DoS attacks) and Internal (accidental or intentional breaches by employees).
  • Solutions: Home network security (antivirus, firewalls), and large network security (access control lists, intrusion prevention systems, VPNs).

Chapter 2/1: Key Topics on Networking

  • Communication Rules: Require sender, receiver, and medium (channel). Protocols define message formatting, timing, delivery, and acknowledgment.
  • Data Encapsulation: Data is wrapped in protocol layers (frame, packet) like envelopes.
  • Network Protocols and Standards: Protocols like TCP/IP and OSI ensure interoperability and define communication standards.
  • Common Protocols: HTTP (web communications), TCP (manages data segments), and IP (assigns source and destination addresses).

Chapter 2/1: Data Encapsulation

  • Data travels through layers during encapsulation (sender) and de-encapsulation (receiver). (Application to segments to packets to frames).

Chapter 2/1: Addressing

  • IP Address: Identifies source and destination for end-to-end delivery.
  • MAC Address: Provides data link delivery within a network.
  • Local Network Access: Data link frames are sent directly.
  • Remote Network Access: Frames use a default gateway (router).

Chapter 2/1: Reference Models

  • OSI Model: Seven layers (Application, Presentation, Session, Transport, Network, Data Link, Physical).
  • TCP/IP Model: Four layers (Application, Transport, Internet, Network Access).

Chapter 2/1: Network Security

  • Goals: Confidentiality (authorized access only), Integrity (prevent data alteration), and Availability (reliable access for authorized users).
  • Threats: External (viruses, attacks, data theft), and Internal (human errors, malicious activity).

Chapter 2/1: Network Types

  • LAN: Local Area Network.
  • BYOD (Bring Your Own Device)
  • Cloud Computing
  • Online Collaboration and Video Communication

Chapter 2/1: Internet Structure

  • LANs and WANs connect through ISPs.
  • Intranet/Extranet: Private networks for internal or external authorized users.

Chapter 2/2: Cisco IOS Overview

  • Cisco IOS: Operating system for network devices (routers, switches).
  • Command-line Interface (CLI) for device management.

Chapter 2/2: Cisco IOS Command Modes

  • User EXEC Mode: Basic commands (view-only); Switch>.
  • Privileged EXEC Mode: Advanced commands; Switch#.
  • Global Configuration Mode: Device-wide settings; Switch(config)#.
  • Sub-configuration Modes: Interface and Line Modes for specific settings of devices and access.

Chapter 2/2: Important Commands

  • Moving between command modes.

Chapter 2/2: Security Configuration

  • Password Security
  • Secure console and privileged EXEC mode with secret passwords.
  • Save configurations with copy running-config startup-config

Chapter 3: Network Layer Overview

  • Networks handles end-to-end communication, addressing, encapsulation, routing, and de-encapsulation.
  • Internet Protocol (IP): The most commonly used protocol (IPv4, IPv6).

Chapter 3: Characteristics of IP

  • Connectionless Protocol: Does not require prior connection establishment before sending packets.
  • Best Effort Delivery: Does not guarantee packet delivery or order. (Errors handled by upper layers)
  • Media Independent: Operates over various media types.

Chapter 3: IPv4 and IPv6 Packets

  • IPv4 header fields: Version, time to live (TTL), and source/destination IP.

Chapter 3: IPv4 Header Enhancements

  • Simplified structures for faster processing
  • Larger address space (128-bit addresses)
  • Eliminates the need for NAT

Chapter 3: Host Routing Decisions

  • Hosts use the network layer to send packets locally or remotely via a default gateway.

Chapter 3: Routing Tables

  • Host Routing Table (routers store default gateway & known routes).
  • Router Routing Table (Active interfaces, Local Routes (IP addresses assigned to interfaces), Remote Routes learned via manual or dynamic protocols).
  • Router Anatomy: Contains crucial components (CPU, RAM, ROM, NVRAM, and Flash memory). RAM stores running configuration.

Chapter 3: Router Operation

  • POST (Power-On Self Test) - diagnostics
  • Load Bootstrap - copies from ROM to RAM.
  • Load IOS - Load the operating system from Flash to RAM.
  • Load Configuration - startup config from NVRAM to RAM or setup.

Chapter 3: Configuring a Router

  • Initial setup configurations (device naming, secure console, SSH and Telnet, save configurations).

Chapter 4: IPv4 Addressing Basics

  • IPv4 addresses are 32-bit binary numbers (composed into 4 octets, example: 192.168.1.1).
  • Address components (Network Portion, Host Portion, and Subnet Mask).

Chapter 4: Address Types

  • Unicast, Broadcast, and Multicast

Chapter 4: IPv4 Address Categories

  • Public: routable on the internet
  • Private: not routable externally

Chapter 4: Special Use Addresses

  • Loopback (127.0.0.0/8): Tests local stack
  • Link-Local (169.254.0.0/16): Autoconfigured, DHCP fails
  • Test-Net (192.0.2.0/24): Reserved for teaching

Chapter 4: IPv4 Address Classes

  • Class A, B, and C

Chapter 4: CIDR and Subnetting

  • CIDR (Classless Inter-Domain Routing)
  • Allows flexible subnetting

Chapter 4: ICMP and Connectivity Verification

  • ICMP (Internet Control Message Protocol)
  • Diagnostic tools (ping, traceroute)

Chapter 4: Testing Tools

  • Ping: Tests connectivity
  • Traceroute: Displays path and delay

Chapter 4: Conversions Between Binary and Decimal

  • Binary to Decimal (value using powers of 2)
  • Decimal to Binary (subtract largest power of 2)

Chapter 4: Practical Usage

  • Static IP: Assigned manually
  • Dynamic IP: Assigned automatically by DHCP.

Chapter 5: Subnetting

  • Subnetting: Dividing larger networks into smaller broadcast domains (subnets).
  • Improves network performance, manageability, and security by isolating devices.

Chapter 5: Principles of Subnetting

  • Network and Host Portions: Subnet mask defines how many bits are used for network and host portions.
  • Borrowed Host Bits (more bits borrowed → more subnets, fewer hosts per subnet).

Chapter 5: Formulas for Subnetting

  • Number of Subnets (2⁸, etc.)
  • Number of Hosts per Subnet (2⁵ - 2, etc.)

Chapter 5: Subnetting Examples

  • /25, /26, /27 Subnets

Chapter 5: Variable Length Subnet Masking (VLSM)

  • Efficient use of IP addresses, and hierarchical addressing and scalable network designs.
  • Addresses of different sizes.

Chapter 5: Structured Addressing

  • End-user devices (use DHCP for dynamic assignment)
  • Servers (static IP for reliability)

Chapter 5: Practical Tools for Subnetting

  • Magic Number Technique to calculate subnet ranges

Chapter 5: Address Planning

  • Assigning IP addresses logically (e.g., by location or department)
  • Separating device types in assignments.

Chapter 6: Static Routing Basics

  • Definition: Manually configured routes in the routing table
  • Advantages; Enhanced Security, resource-efficient
  • Disadvantages: Time-consuming, Error-Prone
  • Types of Static Routes (Standard, Default, and Floating)
  • Use Cases (Small networks, stub networks, handle undefined destinations)

Chapter 6: Configuring Static Routes

  • Basic commands.

Chapter 7: Dynamic Routing

  • Definition: Routing protocol automatically discovers and maintains routing information.
  • Purpose: Discover remote networks, Maintain up-to-date routing tables, Determine best paths to destinations, and adjust to network changes by finding new paths
  • Advantages: Reduced administrative overhead, automatic adaptability to topology changes; Suitable for large & complex networks
  • Disadvantages: Requires router resources, Slower convergence, increased Complexity

Chapter 7: Types of Dynamic Routing Protocols

  • Distance-Vector (RIP, EIGRP): Share routing updates, incomplete network topology view.
  • Link-State (OSPF, IS-IS): Build complete network topology maps, faster convergence.
  • Hybrid Protocols (EIGRP): Combine features of both distance-vector & link-state.

Chapter 7: Routing Protocol Classifications

  • Classful vs. Classless (RIPv1, IGRP vs. RIPv2, EIGRP, OSPF).
  • Interior Gateway Protocols (IGP) inside Autonomous Systems (RIP, EIGRP, OSPF).
  • Exterior Gateway Protocols (EGP) between Autonomous systems (BGP)

Chapter 7: Key Metrics in Routing Protocols

  • Hops, Bandwidth, Delay, Reliability, Load (determining best path)

Chapter 7: More Protocols (RIP, EIGRP, OSPF, IS-IS)

  • Their characteristics and purposes

Chapter 7: Routing Table Concepts & Lookup Process

  • Routing Types (Directly Connected, Static, Dynamically Learned Routes)
  • Lookup Process searches for longest prefix - lowest administrative distance.

Chapter 7: Administrative Distance

  • Determines routing source reliability based on a range of values (0 to 255). e.g., a directly-connected route has a distance of 0.

Chapter 7: Convergence

  • When all routers have complete & accurate routing information.
  • Different protocols (distance-vector, link-state) have differing convergence speeds. e.g., OSPF converges faster than RIP.

Chapter 8: Open Shortest Path First (OSPF)

  • Definition: A link-state routing protocol within an Autonomous System.
  • Features (Fast Convergence & Scalability, Supports VLSM & CIDR, Uses cost as a metric)
  • OSPF Operations (Link-State Advertisements (LSAs). Routers exchange this information.
  • Neighbor Adjacencies (discovery).
  • OSPF Metrics (Cost = Ref Bandwidth / Interface Bandwidth).

Chapter 8: OSPF Components

  • Router ID (RID): Unique identifier for each OSPF router (determined by highest IP address on a loopback interface or highest active physical interface).
  • OSPF Packets (Hello Packets discover neighbours & elect DR/BDR, LSUs).
  • Areas(Single Area OSPF (simplifies network design by using one area for all routers)

Chapter 8: OSPF Configuration Steps

  • Enabling OSPF on the router.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Explore the fundamentals of networks, including their types, components, and architectures in this quiz covering Chapters 1 and 2. Learn how LANs and WANs function, along with the essential devices and media that facilitate communication and data flow.

More Like This

Introduction to Networks
20 questions
Use Quizgecko on...
Browser
Browser