Switching and Routing Concepts

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary function of a network switch?

  • To provide network security and device identification.
  • To transmit received messages only to the intended device. (correct)
  • To broadcast messages to all connected devices.
  • To filter data based on IP addresses.

What is a characteristic of a switch when compared to a network hub?

  • A switch breaks up the network into collision domains. (correct)
  • A switch is less 'intelligent' than a hub.
  • A switch shares bandwidth across all ports.
  • A switch transmits messages out of every port.

What is the role of Application Specific Integrated Circuits (ASICs) in a network switch?

  • To assist in making filtering decisions. (correct)
  • To facilitate remote management.
  • To store the operating system.
  • To provide a direct console interface.

What is the purpose of the console port on a network switch?

<p>To provide direct local access for initial configuration. (A)</p> Signup and view all the answers

Which type of memory stores the operating system (OS) in a network switch?

<p>Flash memory (B)</p> Signup and view all the answers

Which memory type stores the startup configuration file in a network switch?

<p>NVRAM (A)</p> Signup and view all the answers

What is the primary function of the Spanning Tree Protocol (STP)?

<p>To discover and prevent physical loops in the network topology. (B)</p> Signup and view all the answers

What does LLDP (Link Layer Discovery Protocol) primarily facilitate in a network?

<p>Network management and monitoring by advertising device data and configurations. (A)</p> Signup and view all the answers

What is the primary function of address learning in a Layer 2 switch?

<p>To learn and store the MAC addresses of connected devices. (B)</p> Signup and view all the answers

What happens when a switch receives a frame with a destination MAC address not listed in its MAC address table?

<p>The switch floods the frame out of all ports except the receiving port. (A)</p> Signup and view all the answers

What problems can multiple network loops cause in a switched network?

<p>Broadcast storms and MAC address table instability. (B)</p> Signup and view all the answers

Which switching method stores the entire frame, checks for errors, and then forwards the frame?

<p>Store-and-Forward Switching. (D)</p> Signup and view all the answers

Why are VLANs used in larger networks?

<p>To segment networks into smaller broadcast domains for traffic management and security. (A)</p> Signup and view all the answers

Which of the following is a benefit of implementing VLANs?

<p>Increases security by limiting which devices receive certain broadcast frames. (A)</p> Signup and view all the answers

How are VLANs identified on a network?

<p>By a number, such as VLAN 10. (B)</p> Signup and view all the answers

What is the purpose of VLAN trunking?

<p>To carry multiple VLANs over a single physical link between network devices. (D)</p> Signup and view all the answers

What is the function of a management VLAN?

<p>To manage and monitor network devices. (B)</p> Signup and view all the answers

What should be avoided when configuring a management VLAN?

<p>Using VLAN 1. (D)</p> Signup and view all the answers

What action does a network router perform?

<p>It utilizes IP addresses to forward packets between different networks. (A)</p> Signup and view all the answers

What internal component do routers and switches have in common?

<p>Flash Memory. (A)</p> Signup and view all the answers

Which type of router directs packets between hosts in one LAN and hosts in another LAN, connecting a LAN with the Wide Area Network (WAN)?

<p>Border. (C)</p> Signup and view all the answers

What challenge is addressed by having connectivity in internetworking?

<p>Supporting communication between very different technologies. (B)</p> Signup and view all the answers

Which of the following describes a broadcast domain?

<p>A portion of a network where all devices can receive a broadcast from any other device. (A)</p> Signup and view all the answers

What process is used by routers to share information for data transmission across a network?

<p>Routing Protocol. (D)</p> Signup and view all the answers

Which protocol helps in mapping IP network addresses to MAC addresses?

<p>ARP (Address Resolution Protocol). (B)</p> Signup and view all the answers

What kind of message is sent to other routers to inform them of the state of the sender’s links?

<p>Multicast (link-state advertisement). (A)</p> Signup and view all the answers

A network administrator configures a static route on a router. What is the primary characteristic of this route?

<p>It remains unchanged unless manually altered by the administrator. (D)</p> Signup and view all the answers

What is the purpose of a default route?

<p>To provide a path for packets when no other route is known. (A)</p> Signup and view all the answers

What is the primary role of a routing protocol?

<p>To exchange information between routers in order to build and maintain routing tables. (D)</p> Signup and view all the answers

Which of the below choices is considered an interior gateway protocol?

<p>RIP (Routing Information Protocol). (A)</p> Signup and view all the answers

Compared to distance vector protocols, what is generally true about Link State algorithms?

<p>Less prone to routing loops. (B)</p> Signup and view all the answers

What is a Security Technical Implementation Guide (STIG)?

<p>A method for standardized secure installation and maintenance of software and hardware. (A)</p> Signup and view all the answers

What does a network that utilizes a dynamic IP addresses use to be assigned normally?

<p>Dynamic Host Protocol (DHCP). (D)</p> Signup and view all the answers

What is the purpose of Core layer in Cisco's hierarchical internetworking model?

<p>To transport large volumes of traffic reliably and quickly. (B)</p> Signup and view all the answers

In Cisco's hierarchical model, at what layer are tools implemented such as access lists, packet filtering, queuing, security and network policies, including address translation and firewalls?

<p>At the Distribution Layer (B)</p> Signup and view all the answers

What is the primary function of the Access Layer in Cisco's three-layer hierarchical model?

<p>To ensure that frames are delivered to end user computers, is the aggregation point. (B)</p> Signup and view all the answers

What is the purpose of dividing a network into subnets?

<p>To divide network into smaller logical divisions. (D)</p> Signup and view all the answers

What element of an IP address is used to create subnets?

<p>By borrowing bits from the Host Portion of the ip address. (D)</p> Signup and view all the answers

What is a CIDR prefix?

<p>The number of bits used for the Network ID. (A)</p> Signup and view all the answers

What does VLSM (Variable Length Subnet Masking) enable in IP addressing?

<p>Allow multiple IP subnets on a single network. (D)</p> Signup and view all the answers

What is the primary purpose of a network physical diagram?

<p>To visually depict the placement and arrangement of network components and cabling. (A)</p> Signup and view all the answers

What does a network logical diagram typically show?

<p>Subnets, network devices, and routing protocols. (C)</p> Signup and view all the answers

In a troubleshooting process, what is usually true of who discovers a problem, and who solves it?

<p>It's usually never the same person. (D)</p> Signup and view all the answers

When troubleshooting a network using the divide-and-conquer method, what is the expected result?

<p>Accelerated ability to isolate network solutions and eliminate OSI. (B)</p> Signup and view all the answers

What benefit does a switch provide by breaking up a network into collision domains?

<p>It increases the dedicated bandwidth available to each port. (A)</p> Signup and view all the answers

What is indicated when a switch can receive, process, and apply an update in a minimum time?

<p>Low Latency (B)</p> Signup and view all the answers

What security measure must be implemented on a console port according to DoD policy?

<p>Password protection to prevent unauthorized configuration changes (C)</p> Signup and view all the answers

What does it mean if a switch is using the store-and-forward switching method?

<p>The switch stores the entire frame and checks for errors before forwarding. (B)</p> Signup and view all the answers

A switch's MAC address table is quickly changing. What is this known as, and why does it happen.

<p>Thrashing because the switch is receiving conflicting information about where devices are located (C)</p> Signup and view all the answers

What problems can a broadcast storm cause in a Layer 2 network?

<p>All of the above (D)</p> Signup and view all the answers

Which of the following accurately describes the function of VLANs?

<p>VLANs logically group network devices into a single broadcast domain. (B)</p> Signup and view all the answers

Upon creating a VLAN on a Cisco switch, which VLAN is created by default?

<p>VLAN 1 (D)</p> Signup and view all the answers

What happens to a VLAN tag when a frame is placed on an access port that belongs to only one VLAN?

<p>The VLAN tag is removed. (C)</p> Signup and view all the answers

When configuring a management VLAN, what should a network administrator avoid?

<p>Using VLAN 1 as the management VLAN to simplify configuration (C)</p> Signup and view all the answers

What is the role of exterior routers?

<p>Directs packets between hosts in one LAN and hosts in another LAN, acting as border routers or gateways (D)</p> Signup and view all the answers

What are the key components of an Autonomous System (AS)?

<p>A connected group of one or more IP prefixes with a single, clearly defined routing policy (D)</p> Signup and view all the answers

What happens when a router receives a packet for which it does not have a corresponding entry in its routing table?

<p>The router discards or drops the packet. (C)</p> Signup and view all the answers

Which protocol helps routers inform each other of the state of the router's links?

<p>Link State Advertisement (D)</p> Signup and view all the answers

What is the main difference in Layer 2 MAC addresses and Layer 3 IP Addresses?

<p>The Layer 2 Data Link (MAC) addresses are changed (source and destination) but its Network Layer (IP) protocol addresses (source and destination) remain constant. (B)</p> Signup and view all the answers

What action does the receiving host, of fragmented IP packets, take upon receiving the packets to be assembled?

<p>At the receiving computer, all packets are identified as belonging to the same group by the common identifier number, organized packets in the correct order, receiving the last fragment, and knowing how large the total message is until it has the packet containing the 'last fragment' flag. (C)</p> Signup and view all the answers

When address resolution cannot find the destination host's MAC address, what is the process of finding that device?

<p>An ARP request is broadcast into the LAN to learn the MAC address of the destination host (A)</p> Signup and view all the answers

When configuring dynamic routes (routing protocols), what networks do you configure?

<p>They must be directly connected to the router that you are configuring. (C)</p> Signup and view all the answers

How do dynamic routing algorithms adjust to network changes?

<p>By analyzing incoming routing status messages and recalculating routes as needed (B)</p> Signup and view all the answers

What does path length refer to in the context of routing metrics?

<p>The most common routing metric; path length is the sum of the number of passes (hops) through internetworking devices (A)</p> Signup and view all the answers

What is the key difference between distance vector and link-state routing algorithms?

<p>Distance vector algorithms build a complete topological map of the routing area in memory, while link-state algorithms only notify about directly connected links. (B)</p> Signup and view all the answers

What is one of the limiting factors of Interior Gateway RIouting Protocol (IGRP)

<p>limited to 15 hop counts (A)</p> Signup and view all the answers

What is a solution OSPF provides to address RIP's inability to handle routing?

<p>Provides a link-state solution (C)</p> Signup and view all the answers

Why is a hierarchical architecture needed for multi area OSPF?

<p>Multi-area OSPF must be built within a hierarchical structure, unlike RIP that will not have an address space appropriate for the other connecting areas. (C)</p> Signup and view all the answers

What is a balanced hybrid protocol and how is it used?

<p>EIGRP is often referred to as balanced hybrid because it combines the advantages of link state protocols with those of distance vector protocols. (C)</p> Signup and view all the answers

According to Cisco's hierarchical internetworking model, that is for network design, what problems are addressed?

<p>It breaks the complex problem of network design into smaller, more manageable problems. (D)</p> Signup and view all the answers

If tolerance is needed, what should be a focus on the core layer?

<p>Fault tolerance at this layer is essential through redundancy. Since core layer has traffic, speed and latency are major concerns. (B)</p> Signup and view all the answers

What functions do the distribution layer provide?

<p>Providing routing, filtering, WAN access, and determining how packets can access the core. (B)</p> Signup and view all the answers

What should be included in the functions of an access layer?

<p>Switched bandwidth devices (D)</p> Signup and view all the answers

In IP addressing, what does subnetting a network involve?

<p>Dividing the network into smaller logical portions called subnets (B)</p> Signup and view all the answers

If creating 2 new bits to be borrowed, what occurs with address/subnet assignments.

<p>You borrow from the host assignment so to have a subnet requires you make changes to the original and new. (C)</p> Signup and view all the answers

In CIDR IP addresses, what is "supernetting"?

<p>Applying subnet principles to larger networks (D)</p> Signup and view all the answers

What is the effect of only allowing a single subnet mask, like RIP 1.

<p>Making it impossible to get the full benefit of VLSM. (C)</p> Signup and view all the answers

What is shown on the physical network diagram?

<p>The actual physical arrangement of the components that make up the network cabling. (A)</p> Signup and view all the answers

How do you isolate a problem when implementing a troubleshooting methodology?

<p>By utilizing Bottom-up, Top-down and divide/conquer. (A)</p> Signup and view all the answers

What is the primary reason for implementing redundancy at the core layer of a network?

<p>To provide fault tolerance and ensure uninterrupted service. (B)</p> Signup and view all the answers

In the context of a network, what does the term 'gateway' generally refer to in contemporary usage?

<p>A device that converts information or data between different protocols or formats. (A)</p> Signup and view all the answers

Which characteristic of distance vector routing algorithms causes the transmission of the entire routing table?

<p>To allow neighbor routers to build their routing tables. (C)</p> Signup and view all the answers

A network engineer is tasked with segmenting a network for both security and performance reasons. Which technology would best suit these goals?

<p>Configuring VLANs on network switches. (D)</p> Signup and view all the answers

Your organization needs a routing protocol that can quickly adapt to network changes and supports VLSM. Which interior gateway protocol would be MOST suitable?

<p>Open Shortest Path First (OSPF). (D)</p> Signup and view all the answers

What is the primary advantage of using CIDR (Classless Inter-Domain Routing) over traditional classful addressing?

<p>It allows for more efficient allocation of IP addresses. (C)</p> Signup and view all the answers

What is the primary limitation of using the RIPv1 routing protocol in modern networks?

<p>It has a limited hop count and does not support variable length subnet masking (VLSM). (D)</p> Signup and view all the answers

How does the 'divide-and-conquer' method assist in network troubleshooting?

<p>It quickly isolates the problem area by eliminating large sections of the network. (D)</p> Signup and view all the answers

In hierarchical network design, where is policy implementation, such as access lists and firewalls for WAN access, commonly applied?

<p>At the distribution layer. (D)</p> Signup and view all the answers

What is a distinguishing characteristic of a network with a large number of devices that is effectively subnetted with VLSM?

<p>Each subnet can be assigned a different subnet mask based on its host requirements. (B)</p> Signup and view all the answers

When troubleshooting a network connectivity issue, which action typically yields the most reliable initial information?

<p>Gathering details about the problem from the person experiencing it. (D)</p> Signup and view all the answers

Routers populate the routing table by learning paths to network destination from what?

<p>Static routes, default routes or dynamic routes. (A)</p> Signup and view all the answers

What network environment are Static Routes suited?

<p>Where network traffic is relatively predictable and where network design is relatively simple. (B)</p> Signup and view all the answers

Which component is more utilized to provide better routing from source to the destination?

<p>Routing Protocols. (B)</p> Signup and view all the answers

What is the purpose of the Broadcast storms?

<p>Also known as a network storm, occurs when a network system is overwhelmed by the continuous multicast of broadcast traffic. (D)</p> Signup and view all the answers

What is the advantage that OSPF has that RIP Does Not?

<p>Hierarchical. (A)</p> Signup and view all the answers

If implementing logical security with a password on the system, what should be used?

<p>Encryption. (A)</p> Signup and view all the answers

What are advanced STIG's designed to accomplish?

<p>Cover the design of a corporate network covering configurations of routers, firewalls, domain name servers and switches. (B)</p> Signup and view all the answers

If a dynamic IP address is being used currently, and not used, what happens generally?

<p>It can be automatically assigned to a different device. (D)</p> Signup and view all the answers

Flashcards

Network Switch

Hardware based, uses ASICs to filter traffic.

Switch Performance

Hardware-based bridging using ASICs for internal connections.

Console Port

Direct local access to configure a switch.

Network Interfaces

End devices connect to these ports.

Signup and view all the flashcards

Internal Components

Flash memory, ROM, NVRAM, and RAM.

Signup and view all the flashcards

Point-to-Point Protocol (PPP)

Establishes direct communication between two network devices.

Signup and view all the flashcards

Spanning Tree Protocol (STP)

Loop prevention protocol.

Signup and view all the flashcards

IEEE 802.1D

Standardized Ethernet MAC Bridges.

Signup and view all the flashcards

Unidirectional Link Detection (UDLD)

Causes a switch to shut down its port.

Signup and view all the flashcards

Link Layer Discovery Protocol (LLDP)

Allows devices to advertise data and layer-2 configurations.

Signup and view all the flashcards

Cisco Discovery Protocol (CDP)

Cisco proprietary protocol for sharing information between devices.

Signup and view all the flashcards

Essential Switch Functions

Segments network into multiple collision domains by forwarding frames.

Signup and view all the flashcards

Address Learning

Switch learns MAC addresses connected to its ports.

Signup and view all the flashcards

Forward/Filter Decision

Using MAC address table to forward and filter frames.

Signup and view all the flashcards

Loop Avoidance

Having more than one path to a destination device.

Signup and view all the flashcards

Broadcast Storms

A network system is overwhelmed by multicast traffic.

Signup and view all the flashcards

Multiple Frame Copies

Device receives multiple copies of the same information.

Signup and view all the flashcards

Multiple Loops

Loops generate throughout an internetwork.

Signup and view all the flashcards

Store-and-Forward Switching

Switches store entire frame, check error before forwarding.

Signup and view all the flashcards

Cut-Through Switching

Copies only the destination MAC address into memory.

Signup and view all the flashcards

Fragment-Free Switching

Hybrid of Store-and-Forward and Cut-Through switching.

Signup and view all the flashcards

VLAN

Logical grouping of network devices into single broadcast domain.

Signup and view all the flashcards

Increased Security (VLAN)

Every broadcast frame seen by all devices regardless of need.

Signup and view all the flashcards

No Geographic Barrier (VLAN)

Not confined to physical locations.

Signup and view all the flashcards

VLAN Trunking

Connection between network devices carrying multiple VLANs.

Signup and view all the flashcards

Inter-Switch Link (ISL)

Cisco proprietary but deprecated method for trunks

Signup and view all the flashcards

IEEE 802.1q

Open trunk standard. Encapsulates VLAN frames.

Signup and view all the flashcards

Management VLANs

Used for purposes such as telnet, SNMP, and syslog.

Signup and view all the flashcards

Network Router

Layer 3 device, forwards packets between networks using IP addresses.

Signup and view all the flashcards

External Components (Router)

Ports for local config and remote config.

Signup and view all the flashcards

Internal Components (Router)

ROM, flash memory, NVRAM, and RAM.

Signup and view all the flashcards

Gateways

Converts information or data from one protocol or format to another.

Signup and view all the flashcards

Gateways (Routing)

Refers to routers that perform routing protocol functions.

Signup and view all the flashcards

Autonomous System (AS)

Connected group of IP prefixes, has clearly defined routing policy.

Signup and view all the flashcards

Interior Gateway Routers

Routers for exchanging information within AS.

Signup and view all the flashcards

Exterior Gateway Routers

Routers that move information between AS.

Signup and view all the flashcards

Connectivity (Internetworking)

Challenge is to support communication between different technologies.

Signup and view all the flashcards

Reliable Service (Internetworking)

Maintained in any internetwork.

Signup and view all the flashcards

Network Management (Internetworking)

Must managed for centralized support and troubleshooting capabilities.

Signup and view all the flashcards

Flexibility (Internetworking)

Necessary for network expansion.

Signup and view all the flashcards

Network Segmentation

Routers and switches segment network into broadcast/collision domains.

Signup and view all the flashcards

Broadcast Domain

A portion of a network, limited by the router connection.

Signup and view all the flashcards

Protocols

Formal set of rules that govern how computers exchange information.

Signup and view all the flashcards

Physical Addressing

Used to send information from one Layer 2 interface to another.

Signup and view all the flashcards

Network Addressing

Use to send information from one network to another network.

Signup and view all the flashcards

Path Determination

When a router determines optimal path for packet travel.

Signup and view all the flashcards

Packet Switching

When host determines packet is addressed to a device on another network.

Signup and view all the flashcards

Routed Protocols

Network protocols, provides logical addressing routers use.

Signup and view all the flashcards

Internet Protocol (IP)

Network Layer protocol containing addressing and control information.

Signup and view all the flashcards

Address Resolution Protocol (ARP)

Protocol for address resolution.

Signup and view all the flashcards

Hello Protocol

Enables network devices to learn network and MAC of other devices.

Signup and view all the flashcards

Internet Control Message Protocol (ICMP)

Net Layer Internet mgmt, provides message packets to report errors.

Signup and view all the flashcards

Study Notes

  • This study guide covers switching and routing concepts, including LAN technologies, VLANs, and routing protocols.
  • It includes lab demonstrations and practical applications for configuring and troubleshooting network devices.

Philosophy of Training

  • The 81st Training Group emphasizes individual development, recognizing the worth and potential of each student.
  • It supports professional development and innovation in teaching methods.

Switching and Routing Overview

  • It serves as course material for switching and routing.
  • Covers LAN technology and switching, VLANs, routing fundamentals, IP addressing, subnetting, network diagrams, and troubleshooting

Unit 1: LAN Technologies

  • Introduces LAN technology concentrating on switching concepts.
  • Includes labs to support the understanding of basic facts by providing practical applications
  • Objectives include identifying relationships of switching concepts, protocols, and standards.
  • Configuration and application of Security Technical Implementation Guides (STIGs) to switching devices.

Network Switch

  • A switch is hardware based, using Application Specific Integrated Circuits (ASICs) for filtering decisions.
  • Switches connect LAN components like computers, printers, and other switches.
  • Switches use the MAC address to regulate traffic flow, improving security and network efficiency.
  • Layer 2 Ethernet switches work at the Data-Link Layer of the OSI model, while multilayer switches operate across multiple layers.
  • Collision domains are created by each port on a switch because the port bandwidth is not shared with other devices.

Switch Performance

  • Hardware-based bridging (MAC): uses ASICs to learn and form internal connections for traffic management.
  • Wire Speed: configurable to the media speed (e.g., 100 Mbps for Ethernet).
  • Low Latency: processes and updates quickly.
  • Low Cost: Inexpensive as relates to the number of ports.
  • Broadcast Control: Segments networks if used with VLANs, but without VLANs, broadcasts reaches a Layer 3 device.

External Components

  • Console Port: Enables direct, local configuration using terminal emulation software.
  • Network Interfaces (Switch Ports): Connect end devices and can be used to test connectivity (Ping).

Internal Components

  • Flash Memory: Stores the OS
  • Read-Only Memory (ROM): Burns diagnostic and boot up routines
  • RAM: Used by the switch for all its operations, and sotres the running configuration of the switch.
  • NVRAM: Keeps the startup configuration and other info for long-term storage.
  • Switches use MAC addresses to forward/filter Layer 2 Frames.

Layer 2 Protocols and Standards

  • Point-to-Point Protocol (PPP): Establishes direct communication between two network devices.
  • Spanning Tree Protocol (STP): Defined by IEEE 802.1D, prevents loops in a network.
  • IEEE 802.1D: Ethernet MAC bridges standard, including bridging and STP.
  • Unidirectional Link Detection (UDLD) and Loopguard: UDLD shuts down ports with hearing issues; Loopguard puts ports in an inconsistent state.
  • Link Layer Discovery Protocol (LLDP): Vendor-neutral for network management, advertises data and Layer 2 configurations to adjacent nodes; stores MAC address, VLAN, etc.
  • cisco Discovery Protocol (CDP): Cisco proprietary, shares information between directly connected Cisco devices.
  • IEEE 802.1q: Encapsulates a VLAN frame within the standard frame header.
  • ISL: Tags the frame, adding a new header and trailer; works only with Cisco devices

Layer 2 Standard Functionality

  • Essential Functions: Ethernet switches segment a network into multiple collision domains by forwarding frames.
  • Address Learning: Layer 2 switches learn MAC addresses of connected devices, storing them in a MAC address table (Content Addressable Memory).
  • Forward/Filter Decision: Switches forward frames only to the intended interface using the MAC address table, a processes called frame filtering.
  • Loop Avoidance: Prevents network wide issues by stopping transmission to avoid broadcast storms, multiple frame copies, and multiple loops

Switching Methods

  • Store-and-Forward: Checks entire frame for errors before forwarding; discards bad frames with CRC.
  • Cut-Through: Copies only the destination MAC address into memory, forwards bad frames.
  • Fragment-Free: Hybrid of Store-and-Forward and Cut-Through that stores the first 64 bytes before forwarding.

Unit 2: VLAN Fundamentals

  • Focuses on Virtual Local Area Networks (VLANs).
  • Topics include VLAN functionality, benefits, switchport membership, and trunking.
  • Includes labs for VLAN configuration and logical security, and applications for Security Technical Implementation Guides (STIGs).

VLAN Fundamentals

  • Keep network traffic local by segmenting the network. VLANs limit broadcasts and require Layer 3 routing for inter-VLAN communication.

VLAN Benefits

  • Increased Security: Security is improved as only devices in the same VLAN receive the frame.
  • Flexibility and Scalability: Flexibility is added as you limit or add devices to broadcast domains.
  • No Geographical Barrier: Physical location does not stop the creation of workgroups

Creating VLANs

  • VLANs can span multiple switches (Access Switches (ASWs) and Distribution Switches (DSWs)).
  • Cisco switches have default VLAN 1 already created.
  • VLANs are identified by number (e.g., VLAN 10), have a name (e.g., "Sales"), and then assigned a number.

VLAN Switchport Memberships

  • Initially, all switch ports are assigned to default VLAN 1.
  • VLAN membership indicates which VLANs are assigned to a certain physical port for traffic filtering.
  • Ports not in use should be shut down and assigned to an inactive VLAN.

VLAN Trunking

  • Trunk carries more than one VLAN.
  • Frame Tagging: Assigns a user-defined trunking ID to each frame with ID matching VLAN of the traffic..
  • Tagged Ports: Trunks.
  • Untagged Ports: Access ports.
  • Cisco proprietary standard for trunks (deprecated). Inter-Switch Link (ISL).
  • IEEE 802.1q: Defined open standard for trunks and encapsulates a VLAN frame using a space in the standard frame header.

Management VLANs

  • Best practices should be implemented.
  • A process for telnet, Simple Network Management Protocol (SNMP), and syslog is maintained.
  • Prune unnecessary ports from accruing access, as well as separate in-band management, device protocol, and data traffic.

Unit 3: Routing Fundamentals

  • Focuses on routing fundamentals including; routing functions, algorithms for assessing metric costs.
  • Includes labs for these exercises.
  • Includes STIGs, Access Control List and the interior gateway protocols Routing Information Protocol (RIP) is addressed.

Network Router

  • Provides understanding of Layer 3 routing concepts.
  • Provides understanding of basic router configuration as pertains to network interconnection in any environment.

Router Description

  • A router is a Layer 3 networking device that uses IP addressing to forward packets between networks.
  • It connects two or more lines from different networks, directs packets based on its routing table.
  • Router components: external (physical connections) and internal (memory hierarchy).

External Components

  • Console Port: configures the router locally.
  • Auxiliary Port: allows remote configuration.
  • Network Interfaces: Ethernet or Token Ring for LAN, synchronous serial for WAN, and Trivial File Transfer Protocol (TFTP) severs.

Internal Components

  • ROM: diagnostic and boot up routines are stored.
  • FLASH: internetwork Operating Systems (IOS), Manufacture memory.
  • NVRAM: saves start up configuration file.
  • RAM: Contains the file, IOS, routing tables, data.

Router Start-up

  • The bootstrap program is run and ROM testing is conducted.
  • IOS loads to the RAM after the NVRAM is backed up
  • Volatile changes are made to the running-configuration files

Types of Gateways

  • Interior Router: router in a LAN called.
  • Exterior Router: directs packets between hosts in one LAN and hosts on another LAN.
  • Border Routers/Gateways: connects LAN with Wide Area Network (WAN).

Gateways

  • A device that converts data from one protocol or format to another.
  • Internet routing devices called gateways, perform routing protocol functions between machines, these gateways may be within or between autonomous systems (AS).

Autonomous System (AS)

  • Defined by RFC 1930, groups IP prefixes under a single routing policy.
  • Areas are controlled under routing domains which can be multiple.

Interior Gateway

  • Routing Information Protocol (RIP)
  • Border routers move info and use Exterior Gateway Protocols like BGP for routing between autonomous systems.
  • Directs routing for local traffic and WAN bound traffic from one area in an Air Force Base.

Default Gateway

  • Router defined as an IP address serves as an access point to or from a network along with a path for an LAN.
  • An address nearest the router interface to transmit traffic for remote networks.

Internetworking Challenges

  • Implementing a function undertaking.
  • Address: Connectivity, Reliability, Network, and Manageability, and Flexibility,

Network Segmentation

  • Routers and switches primary to over come challenges.
  • Used to isolate and segment a network into separate; broadcast domains and collision domains.

Network Segmentation

  • Broadcast Domain: where routers breakdown and direct connect to host in LAN.
  • Data Link Layer sends communications to devices and host.
  • A common logical Layer addressing scheme is sent to all host, aka sharing a subnet.

Protocols

  • Actual communication across is possible through protocols, such as:
  • Internet protocols: TCP (transmission),IP suite
  • Address identifies devices or a group dependent on various schemes.

Addressing

  • Addresses are at respect to model data an Network Layers
  • Addresses family or OSI

Physical Addressing

  • A MAC address with a unique identifies Data-link
  • Generally only has one network connection for a host

Network Addressing

  • Network of logical addresses sends info across networks
  • Work primary at Layer 3 of a model

Router Addressing

  • Each interface on a device is uniquely ID'd by an MAC
  • Path determination will determine optimal path router's will take

Packets Switching

  • Layer determination requires resolution for any protocol addresses
  • Mac will require changes for the outbound interface of the net hop.

Router Protocols

  • Destines to the packets for a variety of reasons
  • Router will use the listing tables that used previously to forward the packet.
  • Can discorded base on a header as follow, the the version ,if life was sent short time.

Route & Protocols

  • Stand alone protocols within 3
  • Responsible layer protocol for the logical addresses that all routers use.

Address Protocol

  • Key protocol are that works within Datalink and Network Layer that is called Address Resolution Protocol (ARP).
  • ARP is implemented with protocol

Multiple Local Area Networks

  • Address resolution works differently when Source Device broadcast and request.
  • Routers that make all traffic destination

Hello Protocol

  • Is another key Protocol that enables net devices can learn the MAC and the other network address on all the other routes.
  • To identify each and every other using a process called neighbor discovery

Internet Control Message

  • The protocols is LAN that sends message traffic
  • The ICMPT sends a report about processing , and the source router advertisement.
  • In general this is a the route is dynamic the the same,and every time.

Routing Protocols

  • Can maintain tables along with what's use by them.
  • What the algo is using the weigh in on a weighted area to calculate optimal paths

Routing Algorithms

  • Initialize table which a
  • The goals depends on affect or resources are that you using.

Distance Vector Algo

  • Use approach than indicates
  • Direction for the direction you're going.

Advantages

  • Simple to configured and understood
  • Not too much to maintain
  • Lesser expenses.

DISADVANTAGES

  • Limited because of the large networks.
  • Subnet most the are the in the RIP1 protocol
  • Updating for each broad cast with is there and what from.
  • There to short with the and path for every one available and the for new net work

Unit 4: Device Layers

  • Focuses on the Cisco hierarchical design model with the core, distribution and access layers.

Hierarchical Model Layers

  • Core Layer: High-speed backbone for transporting large amounts of traffic.
  • Distribution Layer: Provides routing, filtering, and WAN access, determines how packets can access the core.
  • Access Layer: Connects end-user computers to the network with hubs and switches.

Core Layer

  • Speed: Designed with speed in mind and to eliminate traffic slowdown.
  • Workgroups: No support for group work on devices can connect to the access layer.
  • Scalability: Avoid expansion and upgrade to increase performance
  • Redundancy: Consider high reliability, that can provide both fast and redundant such and fiber optics technology's.
  • Select protocols lower for more convergence efficient layer to switching.

Distributions Layer

  • Communication point between layers
  • Filter and routing and WAN access

Policies

  • Implement: Tools such list, filtering , queuing, security policy addresses, including walls.

Units Summary

  • Examines the layers and the how that perform to do is the device that need to has or use.

Unit 5: Sub-Networks (Subnets)

  • Covers subnetting, including why they're needed, how they work, and CIDR.

Subnets Overview

  • Subnets are used because user programs need to talk to servers, and things that connect are referred to "hosts".
  • Addresses have function of figuring and communication happens.

Subnets

  • Separate and identifiable which by logically arranging connected network devices and dividing them from a network with addresses.

Of course the more bits, the less hosts

  • Is what you the can on which be what means that and network the the the you want

Basic understanding

  • The concept addresses must has, so you how it works

In what order, how many

With 3x8 as a basis to remember as.

Variable Length

  • Subnet has VLSM if are.
  • No rip address for this is has more 1 or more sub that

Planning A Simple Network

  • And a with practice and a knowledge IP addresses
  • Setting up subnetting and and to give a proper addre

Static vs Dynamic

  • Two different of IP.

Unit 6: Network Diagrams

  • covers physical logical and data flow.

Objectives

  • To develop both physical, data, and logical diagrams, along with different instructors who are assisting.

Physical Drawing

  • Actual physical arrangements to components, including hardware and cable.
  • Layouts show plans of work floor

Physical topology

Refers of the interconnection of more, if any on network devices. This is what will be shown are on the nodes that are in contact to every others.

Star

This is what all to do with hubs as a part of any peripheral modes.

Mesh Topography

Which in case full the ,each and everyone will direct to one another.

Tree Topography

  • The structure combines the has what is and bus
  • The the of structure the topology which contains what a has is in it or structure with an tree

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser