Podcast
Questions and Answers
What is the primary function of a network switch?
What is the primary function of a network switch?
- To provide network security and device identification.
- To transmit received messages only to the intended device. (correct)
- To broadcast messages to all connected devices.
- To filter data based on IP addresses.
What is a characteristic of a switch when compared to a network hub?
What is a characteristic of a switch when compared to a network hub?
- A switch breaks up the network into collision domains. (correct)
- A switch is less 'intelligent' than a hub.
- A switch shares bandwidth across all ports.
- A switch transmits messages out of every port.
What is the role of Application Specific Integrated Circuits (ASICs) in a network switch?
What is the role of Application Specific Integrated Circuits (ASICs) in a network switch?
- To assist in making filtering decisions. (correct)
- To facilitate remote management.
- To store the operating system.
- To provide a direct console interface.
What is the purpose of the console port on a network switch?
What is the purpose of the console port on a network switch?
Which type of memory stores the operating system (OS) in a network switch?
Which type of memory stores the operating system (OS) in a network switch?
Which memory type stores the startup configuration file in a network switch?
Which memory type stores the startup configuration file in a network switch?
What is the primary function of the Spanning Tree Protocol (STP)?
What is the primary function of the Spanning Tree Protocol (STP)?
What does LLDP (Link Layer Discovery Protocol) primarily facilitate in a network?
What does LLDP (Link Layer Discovery Protocol) primarily facilitate in a network?
What is the primary function of address learning in a Layer 2 switch?
What is the primary function of address learning in a Layer 2 switch?
What happens when a switch receives a frame with a destination MAC address not listed in its MAC address table?
What happens when a switch receives a frame with a destination MAC address not listed in its MAC address table?
What problems can multiple network loops cause in a switched network?
What problems can multiple network loops cause in a switched network?
Which switching method stores the entire frame, checks for errors, and then forwards the frame?
Which switching method stores the entire frame, checks for errors, and then forwards the frame?
Why are VLANs used in larger networks?
Why are VLANs used in larger networks?
Which of the following is a benefit of implementing VLANs?
Which of the following is a benefit of implementing VLANs?
How are VLANs identified on a network?
How are VLANs identified on a network?
What is the purpose of VLAN trunking?
What is the purpose of VLAN trunking?
What is the function of a management VLAN?
What is the function of a management VLAN?
What should be avoided when configuring a management VLAN?
What should be avoided when configuring a management VLAN?
What action does a network router perform?
What action does a network router perform?
What internal component do routers and switches have in common?
What internal component do routers and switches have in common?
Which type of router directs packets between hosts in one LAN and hosts in another LAN, connecting a LAN with the Wide Area Network (WAN)?
Which type of router directs packets between hosts in one LAN and hosts in another LAN, connecting a LAN with the Wide Area Network (WAN)?
What challenge is addressed by having connectivity in internetworking?
What challenge is addressed by having connectivity in internetworking?
Which of the following describes a broadcast domain?
Which of the following describes a broadcast domain?
What process is used by routers to share information for data transmission across a network?
What process is used by routers to share information for data transmission across a network?
Which protocol helps in mapping IP network addresses to MAC addresses?
Which protocol helps in mapping IP network addresses to MAC addresses?
What kind of message is sent to other routers to inform them of the state of the sender’s links?
What kind of message is sent to other routers to inform them of the state of the sender’s links?
A network administrator configures a static route on a router. What is the primary characteristic of this route?
A network administrator configures a static route on a router. What is the primary characteristic of this route?
What is the purpose of a default route?
What is the purpose of a default route?
What is the primary role of a routing protocol?
What is the primary role of a routing protocol?
Which of the below choices is considered an interior gateway protocol?
Which of the below choices is considered an interior gateway protocol?
Compared to distance vector protocols, what is generally true about Link State algorithms?
Compared to distance vector protocols, what is generally true about Link State algorithms?
What is a Security Technical Implementation Guide (STIG)?
What is a Security Technical Implementation Guide (STIG)?
What does a network that utilizes a dynamic IP addresses use to be assigned normally?
What does a network that utilizes a dynamic IP addresses use to be assigned normally?
What is the purpose of Core layer in Cisco's hierarchical internetworking model?
What is the purpose of Core layer in Cisco's hierarchical internetworking model?
In Cisco's hierarchical model, at what layer are tools implemented such as access lists, packet filtering, queuing, security and network policies, including address translation and firewalls?
In Cisco's hierarchical model, at what layer are tools implemented such as access lists, packet filtering, queuing, security and network policies, including address translation and firewalls?
What is the primary function of the Access Layer in Cisco's three-layer hierarchical model?
What is the primary function of the Access Layer in Cisco's three-layer hierarchical model?
What is the purpose of dividing a network into subnets?
What is the purpose of dividing a network into subnets?
What element of an IP address is used to create subnets?
What element of an IP address is used to create subnets?
What is a CIDR prefix?
What is a CIDR prefix?
What does VLSM (Variable Length Subnet Masking) enable in IP addressing?
What does VLSM (Variable Length Subnet Masking) enable in IP addressing?
What is the primary purpose of a network physical diagram?
What is the primary purpose of a network physical diagram?
What does a network logical diagram typically show?
What does a network logical diagram typically show?
In a troubleshooting process, what is usually true of who discovers a problem, and who solves it?
In a troubleshooting process, what is usually true of who discovers a problem, and who solves it?
When troubleshooting a network using the divide-and-conquer method, what is the expected result?
When troubleshooting a network using the divide-and-conquer method, what is the expected result?
What benefit does a switch provide by breaking up a network into collision domains?
What benefit does a switch provide by breaking up a network into collision domains?
What is indicated when a switch can receive, process, and apply an update in a minimum time?
What is indicated when a switch can receive, process, and apply an update in a minimum time?
What security measure must be implemented on a console port according to DoD policy?
What security measure must be implemented on a console port according to DoD policy?
What does it mean if a switch is using the store-and-forward switching method?
What does it mean if a switch is using the store-and-forward switching method?
A switch's MAC address table is quickly changing. What is this known as, and why does it happen.
A switch's MAC address table is quickly changing. What is this known as, and why does it happen.
What problems can a broadcast storm cause in a Layer 2 network?
What problems can a broadcast storm cause in a Layer 2 network?
Which of the following accurately describes the function of VLANs?
Which of the following accurately describes the function of VLANs?
Upon creating a VLAN on a Cisco switch, which VLAN is created by default?
Upon creating a VLAN on a Cisco switch, which VLAN is created by default?
What happens to a VLAN tag when a frame is placed on an access port that belongs to only one VLAN?
What happens to a VLAN tag when a frame is placed on an access port that belongs to only one VLAN?
When configuring a management VLAN, what should a network administrator avoid?
When configuring a management VLAN, what should a network administrator avoid?
What is the role of exterior routers?
What is the role of exterior routers?
What are the key components of an Autonomous System (AS)?
What are the key components of an Autonomous System (AS)?
What happens when a router receives a packet for which it does not have a corresponding entry in its routing table?
What happens when a router receives a packet for which it does not have a corresponding entry in its routing table?
Which protocol helps routers inform each other of the state of the router's links?
Which protocol helps routers inform each other of the state of the router's links?
What is the main difference in Layer 2 MAC addresses and Layer 3 IP Addresses?
What is the main difference in Layer 2 MAC addresses and Layer 3 IP Addresses?
What action does the receiving host, of fragmented IP packets, take upon receiving the packets to be assembled?
What action does the receiving host, of fragmented IP packets, take upon receiving the packets to be assembled?
When address resolution cannot find the destination host's MAC address, what is the process of finding that device?
When address resolution cannot find the destination host's MAC address, what is the process of finding that device?
When configuring dynamic routes (routing protocols), what networks do you configure?
When configuring dynamic routes (routing protocols), what networks do you configure?
How do dynamic routing algorithms adjust to network changes?
How do dynamic routing algorithms adjust to network changes?
What does path length refer to in the context of routing metrics?
What does path length refer to in the context of routing metrics?
What is the key difference between distance vector and link-state routing algorithms?
What is the key difference between distance vector and link-state routing algorithms?
What is one of the limiting factors of Interior Gateway RIouting Protocol (IGRP)
What is one of the limiting factors of Interior Gateway RIouting Protocol (IGRP)
What is a solution OSPF provides to address RIP's inability to handle routing?
What is a solution OSPF provides to address RIP's inability to handle routing?
Why is a hierarchical architecture needed for multi area OSPF?
Why is a hierarchical architecture needed for multi area OSPF?
What is a balanced hybrid protocol and how is it used?
What is a balanced hybrid protocol and how is it used?
According to Cisco's hierarchical internetworking model, that is for network design, what problems are addressed?
According to Cisco's hierarchical internetworking model, that is for network design, what problems are addressed?
If tolerance is needed, what should be a focus on the core layer?
If tolerance is needed, what should be a focus on the core layer?
What functions do the distribution layer provide?
What functions do the distribution layer provide?
What should be included in the functions of an access layer?
What should be included in the functions of an access layer?
In IP addressing, what does subnetting a network involve?
In IP addressing, what does subnetting a network involve?
If creating 2 new bits to be borrowed, what occurs with address/subnet assignments.
If creating 2 new bits to be borrowed, what occurs with address/subnet assignments.
In CIDR IP addresses, what is "supernetting"?
In CIDR IP addresses, what is "supernetting"?
What is the effect of only allowing a single subnet mask, like RIP 1.
What is the effect of only allowing a single subnet mask, like RIP 1.
What is shown on the physical network diagram?
What is shown on the physical network diagram?
How do you isolate a problem when implementing a troubleshooting methodology?
How do you isolate a problem when implementing a troubleshooting methodology?
What is the primary reason for implementing redundancy at the core layer of a network?
What is the primary reason for implementing redundancy at the core layer of a network?
In the context of a network, what does the term 'gateway' generally refer to in contemporary usage?
In the context of a network, what does the term 'gateway' generally refer to in contemporary usage?
Which characteristic of distance vector routing algorithms causes the transmission of the entire routing table?
Which characteristic of distance vector routing algorithms causes the transmission of the entire routing table?
A network engineer is tasked with segmenting a network for both security and performance reasons. Which technology would best suit these goals?
A network engineer is tasked with segmenting a network for both security and performance reasons. Which technology would best suit these goals?
Your organization needs a routing protocol that can quickly adapt to network changes and supports VLSM. Which interior gateway protocol would be MOST suitable?
Your organization needs a routing protocol that can quickly adapt to network changes and supports VLSM. Which interior gateway protocol would be MOST suitable?
What is the primary advantage of using CIDR (Classless Inter-Domain Routing) over traditional classful addressing?
What is the primary advantage of using CIDR (Classless Inter-Domain Routing) over traditional classful addressing?
What is the primary limitation of using the RIPv1 routing protocol in modern networks?
What is the primary limitation of using the RIPv1 routing protocol in modern networks?
How does the 'divide-and-conquer' method assist in network troubleshooting?
How does the 'divide-and-conquer' method assist in network troubleshooting?
In hierarchical network design, where is policy implementation, such as access lists and firewalls for WAN access, commonly applied?
In hierarchical network design, where is policy implementation, such as access lists and firewalls for WAN access, commonly applied?
What is a distinguishing characteristic of a network with a large number of devices that is effectively subnetted with VLSM?
What is a distinguishing characteristic of a network with a large number of devices that is effectively subnetted with VLSM?
When troubleshooting a network connectivity issue, which action typically yields the most reliable initial information?
When troubleshooting a network connectivity issue, which action typically yields the most reliable initial information?
Routers populate the routing table by learning paths to network destination from what?
Routers populate the routing table by learning paths to network destination from what?
What network environment are Static Routes suited?
What network environment are Static Routes suited?
Which component is more utilized to provide better routing from source to the destination?
Which component is more utilized to provide better routing from source to the destination?
What is the purpose of the Broadcast storms?
What is the purpose of the Broadcast storms?
What is the advantage that OSPF has that RIP Does Not?
What is the advantage that OSPF has that RIP Does Not?
If implementing logical security with a password on the system, what should be used?
If implementing logical security with a password on the system, what should be used?
What are advanced STIG's designed to accomplish?
What are advanced STIG's designed to accomplish?
If a dynamic IP address is being used currently, and not used, what happens generally?
If a dynamic IP address is being used currently, and not used, what happens generally?
Flashcards
Network Switch
Network Switch
Hardware based, uses ASICs to filter traffic.
Switch Performance
Switch Performance
Hardware-based bridging using ASICs for internal connections.
Console Port
Console Port
Direct local access to configure a switch.
Network Interfaces
Network Interfaces
Signup and view all the flashcards
Internal Components
Internal Components
Signup and view all the flashcards
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Signup and view all the flashcards
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Signup and view all the flashcards
IEEE 802.1D
IEEE 802.1D
Signup and view all the flashcards
Unidirectional Link Detection (UDLD)
Unidirectional Link Detection (UDLD)
Signup and view all the flashcards
Link Layer Discovery Protocol (LLDP)
Link Layer Discovery Protocol (LLDP)
Signup and view all the flashcards
Cisco Discovery Protocol (CDP)
Cisco Discovery Protocol (CDP)
Signup and view all the flashcards
Essential Switch Functions
Essential Switch Functions
Signup and view all the flashcards
Address Learning
Address Learning
Signup and view all the flashcards
Forward/Filter Decision
Forward/Filter Decision
Signup and view all the flashcards
Loop Avoidance
Loop Avoidance
Signup and view all the flashcards
Broadcast Storms
Broadcast Storms
Signup and view all the flashcards
Multiple Frame Copies
Multiple Frame Copies
Signup and view all the flashcards
Multiple Loops
Multiple Loops
Signup and view all the flashcards
Store-and-Forward Switching
Store-and-Forward Switching
Signup and view all the flashcards
Cut-Through Switching
Cut-Through Switching
Signup and view all the flashcards
Fragment-Free Switching
Fragment-Free Switching
Signup and view all the flashcards
VLAN
VLAN
Signup and view all the flashcards
Increased Security (VLAN)
Increased Security (VLAN)
Signup and view all the flashcards
No Geographic Barrier (VLAN)
No Geographic Barrier (VLAN)
Signup and view all the flashcards
VLAN Trunking
VLAN Trunking
Signup and view all the flashcards
Inter-Switch Link (ISL)
Inter-Switch Link (ISL)
Signup and view all the flashcards
IEEE 802.1q
IEEE 802.1q
Signup and view all the flashcards
Management VLANs
Management VLANs
Signup and view all the flashcards
Network Router
Network Router
Signup and view all the flashcards
External Components (Router)
External Components (Router)
Signup and view all the flashcards
Internal Components (Router)
Internal Components (Router)
Signup and view all the flashcards
Gateways
Gateways
Signup and view all the flashcards
Gateways (Routing)
Gateways (Routing)
Signup and view all the flashcards
Autonomous System (AS)
Autonomous System (AS)
Signup and view all the flashcards
Interior Gateway Routers
Interior Gateway Routers
Signup and view all the flashcards
Exterior Gateway Routers
Exterior Gateway Routers
Signup and view all the flashcards
Connectivity (Internetworking)
Connectivity (Internetworking)
Signup and view all the flashcards
Reliable Service (Internetworking)
Reliable Service (Internetworking)
Signup and view all the flashcards
Network Management (Internetworking)
Network Management (Internetworking)
Signup and view all the flashcards
Flexibility (Internetworking)
Flexibility (Internetworking)
Signup and view all the flashcards
Network Segmentation
Network Segmentation
Signup and view all the flashcards
Broadcast Domain
Broadcast Domain
Signup and view all the flashcards
Protocols
Protocols
Signup and view all the flashcards
Physical Addressing
Physical Addressing
Signup and view all the flashcards
Network Addressing
Network Addressing
Signup and view all the flashcards
Path Determination
Path Determination
Signup and view all the flashcards
Packet Switching
Packet Switching
Signup and view all the flashcards
Routed Protocols
Routed Protocols
Signup and view all the flashcards
Internet Protocol (IP)
Internet Protocol (IP)
Signup and view all the flashcards
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP)
Signup and view all the flashcards
Hello Protocol
Hello Protocol
Signup and view all the flashcards
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Signup and view all the flashcards
Study Notes
- This study guide covers switching and routing concepts, including LAN technologies, VLANs, and routing protocols.
- It includes lab demonstrations and practical applications for configuring and troubleshooting network devices.
Philosophy of Training
- The 81st Training Group emphasizes individual development, recognizing the worth and potential of each student.
- It supports professional development and innovation in teaching methods.
Switching and Routing Overview
- It serves as course material for switching and routing.
- Covers LAN technology and switching, VLANs, routing fundamentals, IP addressing, subnetting, network diagrams, and troubleshooting
Unit 1: LAN Technologies
- Introduces LAN technology concentrating on switching concepts.
- Includes labs to support the understanding of basic facts by providing practical applications
- Objectives include identifying relationships of switching concepts, protocols, and standards.
- Configuration and application of Security Technical Implementation Guides (STIGs) to switching devices.
Network Switch
- A switch is hardware based, using Application Specific Integrated Circuits (ASICs) for filtering decisions.
- Switches connect LAN components like computers, printers, and other switches.
- Switches use the MAC address to regulate traffic flow, improving security and network efficiency.
- Layer 2 Ethernet switches work at the Data-Link Layer of the OSI model, while multilayer switches operate across multiple layers.
- Collision domains are created by each port on a switch because the port bandwidth is not shared with other devices.
Switch Performance
- Hardware-based bridging (MAC): uses ASICs to learn and form internal connections for traffic management.
- Wire Speed: configurable to the media speed (e.g., 100 Mbps for Ethernet).
- Low Latency: processes and updates quickly.
- Low Cost: Inexpensive as relates to the number of ports.
- Broadcast Control: Segments networks if used with VLANs, but without VLANs, broadcasts reaches a Layer 3 device.
External Components
- Console Port: Enables direct, local configuration using terminal emulation software.
- Network Interfaces (Switch Ports): Connect end devices and can be used to test connectivity (Ping).
Internal Components
- Flash Memory: Stores the OS
- Read-Only Memory (ROM): Burns diagnostic and boot up routines
- RAM: Used by the switch for all its operations, and sotres the running configuration of the switch.
- NVRAM: Keeps the startup configuration and other info for long-term storage.
- Switches use MAC addresses to forward/filter Layer 2 Frames.
Layer 2 Protocols and Standards
- Point-to-Point Protocol (PPP): Establishes direct communication between two network devices.
- Spanning Tree Protocol (STP): Defined by IEEE 802.1D, prevents loops in a network.
- IEEE 802.1D: Ethernet MAC bridges standard, including bridging and STP.
- Unidirectional Link Detection (UDLD) and Loopguard: UDLD shuts down ports with hearing issues; Loopguard puts ports in an inconsistent state.
- Link Layer Discovery Protocol (LLDP): Vendor-neutral for network management, advertises data and Layer 2 configurations to adjacent nodes; stores MAC address, VLAN, etc.
- cisco Discovery Protocol (CDP): Cisco proprietary, shares information between directly connected Cisco devices.
- IEEE 802.1q: Encapsulates a VLAN frame within the standard frame header.
- ISL: Tags the frame, adding a new header and trailer; works only with Cisco devices
Layer 2 Standard Functionality
- Essential Functions: Ethernet switches segment a network into multiple collision domains by forwarding frames.
- Address Learning: Layer 2 switches learn MAC addresses of connected devices, storing them in a MAC address table (Content Addressable Memory).
- Forward/Filter Decision: Switches forward frames only to the intended interface using the MAC address table, a processes called frame filtering.
- Loop Avoidance: Prevents network wide issues by stopping transmission to avoid broadcast storms, multiple frame copies, and multiple loops
Switching Methods
- Store-and-Forward: Checks entire frame for errors before forwarding; discards bad frames with CRC.
- Cut-Through: Copies only the destination MAC address into memory, forwards bad frames.
- Fragment-Free: Hybrid of Store-and-Forward and Cut-Through that stores the first 64 bytes before forwarding.
Unit 2: VLAN Fundamentals
- Focuses on Virtual Local Area Networks (VLANs).
- Topics include VLAN functionality, benefits, switchport membership, and trunking.
- Includes labs for VLAN configuration and logical security, and applications for Security Technical Implementation Guides (STIGs).
VLAN Fundamentals
- Keep network traffic local by segmenting the network. VLANs limit broadcasts and require Layer 3 routing for inter-VLAN communication.
VLAN Benefits
- Increased Security: Security is improved as only devices in the same VLAN receive the frame.
- Flexibility and Scalability: Flexibility is added as you limit or add devices to broadcast domains.
- No Geographical Barrier: Physical location does not stop the creation of workgroups
Creating VLANs
- VLANs can span multiple switches (Access Switches (ASWs) and Distribution Switches (DSWs)).
- Cisco switches have default VLAN 1 already created.
- VLANs are identified by number (e.g., VLAN 10), have a name (e.g., "Sales"), and then assigned a number.
VLAN Switchport Memberships
- Initially, all switch ports are assigned to default VLAN 1.
- VLAN membership indicates which VLANs are assigned to a certain physical port for traffic filtering.
- Ports not in use should be shut down and assigned to an inactive VLAN.
VLAN Trunking
- Trunk carries more than one VLAN.
- Frame Tagging: Assigns a user-defined trunking ID to each frame with ID matching VLAN of the traffic..
- Tagged Ports: Trunks.
- Untagged Ports: Access ports.
- Cisco proprietary standard for trunks (deprecated). Inter-Switch Link (ISL).
- IEEE 802.1q: Defined open standard for trunks and encapsulates a VLAN frame using a space in the standard frame header.
Management VLANs
- Best practices should be implemented.
- A process for telnet, Simple Network Management Protocol (SNMP), and syslog is maintained.
- Prune unnecessary ports from accruing access, as well as separate in-band management, device protocol, and data traffic.
Unit 3: Routing Fundamentals
- Focuses on routing fundamentals including; routing functions, algorithms for assessing metric costs.
- Includes labs for these exercises.
- Includes STIGs, Access Control List and the interior gateway protocols Routing Information Protocol (RIP) is addressed.
Network Router
- Provides understanding of Layer 3 routing concepts.
- Provides understanding of basic router configuration as pertains to network interconnection in any environment.
Router Description
- A router is a Layer 3 networking device that uses IP addressing to forward packets between networks.
- It connects two or more lines from different networks, directs packets based on its routing table.
- Router components: external (physical connections) and internal (memory hierarchy).
External Components
- Console Port: configures the router locally.
- Auxiliary Port: allows remote configuration.
- Network Interfaces: Ethernet or Token Ring for LAN, synchronous serial for WAN, and Trivial File Transfer Protocol (TFTP) severs.
Internal Components
- ROM: diagnostic and boot up routines are stored.
- FLASH: internetwork Operating Systems (IOS), Manufacture memory.
- NVRAM: saves start up configuration file.
- RAM: Contains the file, IOS, routing tables, data.
Router Start-up
- The bootstrap program is run and ROM testing is conducted.
- IOS loads to the RAM after the NVRAM is backed up
- Volatile changes are made to the running-configuration files
Types of Gateways
- Interior Router: router in a LAN called.
- Exterior Router: directs packets between hosts in one LAN and hosts on another LAN.
- Border Routers/Gateways: connects LAN with Wide Area Network (WAN).
Gateways
- A device that converts data from one protocol or format to another.
- Internet routing devices called gateways, perform routing protocol functions between machines, these gateways may be within or between autonomous systems (AS).
Autonomous System (AS)
- Defined by RFC 1930, groups IP prefixes under a single routing policy.
- Areas are controlled under routing domains which can be multiple.
Interior Gateway
- Routing Information Protocol (RIP)
- Border routers move info and use Exterior Gateway Protocols like BGP for routing between autonomous systems.
- Directs routing for local traffic and WAN bound traffic from one area in an Air Force Base.
Default Gateway
- Router defined as an IP address serves as an access point to or from a network along with a path for an LAN.
- An address nearest the router interface to transmit traffic for remote networks.
Internetworking Challenges
- Implementing a function undertaking.
- Address: Connectivity, Reliability, Network, and Manageability, and Flexibility,
Network Segmentation
- Routers and switches primary to over come challenges.
- Used to isolate and segment a network into separate; broadcast domains and collision domains.
Network Segmentation
- Broadcast Domain: where routers breakdown and direct connect to host in LAN.
- Data Link Layer sends communications to devices and host.
- A common logical Layer addressing scheme is sent to all host, aka sharing a subnet.
Protocols
- Actual communication across is possible through protocols, such as:
- Internet protocols: TCP (transmission),IP suite
- Address identifies devices or a group dependent on various schemes.
Addressing
- Addresses are at respect to model data an Network Layers
- Addresses family or OSI
Physical Addressing
- A MAC address with a unique identifies Data-link
- Generally only has one network connection for a host
Network Addressing
- Network of logical addresses sends info across networks
- Work primary at Layer 3 of a model
Router Addressing
- Each interface on a device is uniquely ID'd by an MAC
- Path determination will determine optimal path router's will take
Packets Switching
- Layer determination requires resolution for any protocol addresses
- Mac will require changes for the outbound interface of the net hop.
Router Protocols
- Destines to the packets for a variety of reasons
- Router will use the listing tables that used previously to forward the packet.
- Can discorded base on a header as follow, the the version ,if life was sent short time.
Route & Protocols
- Stand alone protocols within 3
- Responsible layer protocol for the logical addresses that all routers use.
Address Protocol
- Key protocol are that works within Datalink and Network Layer that is called Address Resolution Protocol (ARP).
- ARP is implemented with protocol
Multiple Local Area Networks
- Address resolution works differently when Source Device broadcast and request.
- Routers that make all traffic destination
Hello Protocol
- Is another key Protocol that enables net devices can learn the MAC and the other network address on all the other routes.
- To identify each and every other using a process called neighbor discovery
Internet Control Message
- The protocols is LAN that sends message traffic
- The ICMPT sends a report about processing , and the source router advertisement.
- In general this is a the route is dynamic the the same,and every time.
Routing Protocols
- Can maintain tables along with what's use by them.
- What the algo is using the weigh in on a weighted area to calculate optimal paths
Routing Algorithms
- Initialize table which a
- The goals depends on affect or resources are that you using.
Distance Vector Algo
- Use approach than indicates
- Direction for the direction you're going.
Advantages
- Simple to configured and understood
- Not too much to maintain
- Lesser expenses.
DISADVANTAGES
- Limited because of the large networks.
- Subnet most the are the in the RIP1 protocol
- Updating for each broad cast with is there and what from.
Link Stay Algo
- There to short with the and path for every one available and the for new net work
Unit 4: Device Layers
- Focuses on the Cisco hierarchical design model with the core, distribution and access layers.
Hierarchical Model Layers
- Core Layer: High-speed backbone for transporting large amounts of traffic.
- Distribution Layer: Provides routing, filtering, and WAN access, determines how packets can access the core.
- Access Layer: Connects end-user computers to the network with hubs and switches.
Core Layer
- Speed: Designed with speed in mind and to eliminate traffic slowdown.
- Workgroups: No support for group work on devices can connect to the access layer.
- Scalability: Avoid expansion and upgrade to increase performance
- Redundancy: Consider high reliability, that can provide both fast and redundant such and fiber optics technology's.
- Select protocols lower for more convergence efficient layer to switching.
Distributions Layer
- Communication point between layers
- Filter and routing and WAN access
Policies
- Implement: Tools such list, filtering , queuing, security policy addresses, including walls.
Units Summary
- Examines the layers and the how that perform to do is the device that need to has or use.
Unit 5: Sub-Networks (Subnets)
- Covers subnetting, including why they're needed, how they work, and CIDR.
Subnets Overview
- Subnets are used because user programs need to talk to servers, and things that connect are referred to "hosts".
- Addresses have function of figuring and communication happens.
Subnets
- Separate and identifiable which by logically arranging connected network devices and dividing them from a network with addresses.
Of course the more bits, the less hosts
- Is what you the can on which be what means that and network the the the you want
Basic understanding
- The concept addresses must has, so you how it works
In what order, how many
With 3x8 as a basis to remember as.
Variable Length
- Subnet has VLSM if are.
- No rip address for this is has more 1 or more sub that
Planning A Simple Network
- And a with practice and a knowledge IP addresses
- Setting up subnetting and and to give a proper addre
Static vs Dynamic
- Two different of IP.
Unit 6: Network Diagrams
- covers physical logical and data flow.
Objectives
- To develop both physical, data, and logical diagrams, along with different instructors who are assisting.
Physical Drawing
- Actual physical arrangements to components, including hardware and cable.
- Layouts show plans of work floor
Physical topology
Refers of the interconnection of more, if any on network devices. This is what will be shown are on the nodes that are in contact to every others.
Star
This is what all to do with hubs as a part of any peripheral modes.
Mesh Topography
Which in case full the ,each and everyone will direct to one another.
Tree Topography
- The structure combines the has what is and bus
- The the of structure the topology which contains what a has is in it or structure with an tree
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.