networking question 8

Upload: vjnrkz

Post on 04-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Networking Question 8

    1/7

    Q:What is Networking?

    Inter connection between the two or more computers is called the

    networking. Using three types of network are Intranet, Internet and Extranet(Eg. LAN, WAN & MAN)

    Q:What is Bandwidth?

    Every line has an upper limit and a lower limit on the frequency of signals itcan carry. This limited range is called the bandwidth. Every line has acapacity of transmission of data, The maximum amount of data that can betransferred in a single line is called Bandwidth.

    Q:What is VLAN?

    VLAN Stand for Virtual Local Area Network. It is a logical grouping of networkusers and resources connected to administratively defined ports on a switch.

    Uses of VLAN are as follows:-

    1. It is securied connection.

    2. It increases flexibility.

    3. It creates separate broadcast domain.

    Q:What is CIDR?

    CIDR Stands for classless inter domain routing. It helps in preventing thewasting of IP address and nowadays we are facing the shortage of the IP

    address.So this CIDR helps to prevent the waste of IP address.Shortly IPV6will come into exist.

    Q:What is VLSM?

    VLSM stands for Variable length subnet mask, when try to separate a majorsubnet into minor ones, then that process is called VLSM. We can subnet invarious lengths.

    Eg: 1.1.1.0-/24 can be separated into 1.1.1.0-/30 and 1.1.1.4-/28

    Q:What is unicast?

    Unicast is one type of transmission in which information is sent from onehost to another host (i.e Source to Destination). In another words, Unicast

    transmission is between one-to-one nodes

    Unicast ---> A transmission to a single interface card.

    Q:What is Multicast?

  • 8/13/2019 Networking Question 8

    2/7

    Multicast is such differ from Unicast. It is another type of transmission orcommunication in which there may be more than host and the informationsent is meant for a set of host.(i.e one source to group of destination

    Multicast ---> A transmission to a group of interface cards on the network.

    Q:What is Broadcast?

    Broadcast is one type of transmission in which information is transfer fromjust one host but is received by all the host connected to the network. (i.e

    one source to all destination)

    Broadcast ---> A transmission to all interface cards on the network.

    Q:What is ACL?

    ACL stands of Access Control List, It is packet filtering method, which filter

    the IP packets based on source and destination address. It is set of rules orcondition that permit or deny the ip packets.

    Cisco ACLs are divided into types.1. Standard ACL &2. Extended ACL.

    Standard ACL - Standard IP Access Lists ranging in number from 1 to 99.Standard ACL control the traffic based on the source IP address only.

    Extended ACL - Extended IP Access Lists ranging in number from 100 to 199.Extended ACL control the traffic based on the source IP address, destinationIP address, source port number and destination port number.

    Q:What is CEF?

    Cisco Express Forwarding (CEF) is an advanced layer 3 switching technologyused mainly in large core networks or the Internet to enhance the overallnetwork performance.

    CEF is mainly used to increase packet switching speed by reducing theoverhead and delays introduced by other routing techniques. CEF consists oftwo key components: The Forwarding Information Base (FIB) andadjacencies. The FIB is similar to the routing table generated by multiplerouting protocols, maintaining only the next-hop address for a particular IP-route.

    The adjacency maintains layer 2 or switching information linked to aparticular FIB entry, avoiding the need for an ARP request for each tablelookup. There are five types of adjacencies:

  • 8/13/2019 Networking Question 8

    3/7

    1. Null adjacency.

    2. Punt adjacency.

    3. Glean adjacency.

    4. Discard adjacency.

    5. Drop adjacency.

    Q:What is CDP?

    CDP Stand for Cisco Discovery Protocol, It's a Layer 2 protocol and used tocheck the availability of neighbouring Cisco devices. It can give you all thedetails of the neighbours. CDP provides network device inventory,

    connectivity information, and IP next hop information. CDP Version-2(CDPv2) is the most recent release of the protocol and provides moreintelligent device tracking features.

    Sending CDP packets every 60 seconds and

    Hold time is 180 seconds.

    Q:What is SNMP?

    The Simple Network Management Protocol (SNMP) is an application layer

    protocol (Layer 1) that facilitates the exchange of management informationbetween network devices. It is part of the Transmission ControlProtocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables networkadministrators to manage network performance, find and solve networkproblems, and plan for network growth.

    What is RIP and difference between Rip V1 & Rip V2?RIP Stands for Routing information protocol. It is also called distance vectorrouting protocol. It is open standard for any vendor use. It uses metric ashop count (max hop count 15) AD 120. It sends periodic update for every 30

    sec. It is used for small network.

    Rip V1

    1. It is a Class full Protocol.2.Classful Protocol: - Supports networkswith same Subnet Mask3.RIPV1 uses Broadcast Address4.RIPV1 Universal Broadcast(255.255.255.255)

    5. RIPV1 does not VLSM.

    Rip V2

    1. It is a Classless Protocol.2.Classless Protocol: - Supports subnettednetworks; It carries the information of subnmask3.RIP V2 uses Multicast Address4. RIPV2 uses Multicast (224.0.0.9).

    5.RIPV2 supports VLSM

  • 8/13/2019 Networking Question 8

    4/7

    What is EIGRP?

    EIGRP stands for Enhanced Interior Gateway Routing Protocol, it is alsocalled balanced hybrid routing protocol or advanced distance vector routingprotocol. Hello packets for every 5 sec, hold time 15 sec. It support forVLSM, the multicast address is 224.0.0.10. It maintain neighbour table,

    topology table & routing table

    1. Neighbour directly connected neighbour (feasible successor)2. Topology all path reach to destination (feasible successor)3. Routing best path (successor)

    DUAL: Diffusion update algorithm

    1. Successoris available in routing table2. If successor failed means it will take the feasible successor

    DUAL Parameter

    1. A.D = Advertised distance (Reported Distance)2. F.D = Feasible distance

    Reported Distance: The metric for a route advertised by a neighbourFeasible distance: The distance advertised by a neighbour plus the cost toget to that neighbour

    What is OSPF?

    Open Shortest Path First (OSPF) is a dynamic routing protocol for use inInternet Protocol (IP) networks. OSPF is designated by the InternetEngineering Task Force (IETF). Specifically, it is a link-state routing protocoland falls into the group of interior gateway protocols, operating within anautonomous system (AS). Unlimited router can be used. CPU usage will be

    high, to reduce the CPU Usage using area.

    What are the areas in OSPF?

    The backbone area, which is also referred to as Area 0. All other areasmust connect to the backbone area. Hence, this area is obligatory.

    An ordinary or standard area, which is an area that connects to thebackbone (Area 0) and is treated as a separate entity. All routers in a

    standard area have the same topological database, but their routing tableswill be based on the routers position in the standard area and will thus be

  • 8/13/2019 Networking Question 8

    5/7

    unique to the router.

    A stub area, which is an area that does not accept external summaryroutes. A router within a stub area can only see outside the autonomoussystem if a default route has been configuration for it.

    A totally stubby area, which is similar to a stub area. In this area, thedefault route must be configured as 0.0.0.0. This type of area is useful forremote sites that have few networks and limited connectivity with the rest ofthe network and is a Cisco proprietary solution.

    A not so stubby area (NSSA), which is a stub area that can receive

    external routes but will not propagate those external routes into thebackbone area.

    What are the network types in OSPF?

    1.Non broadcast- This is the default on frame relay networks has aDR/BDR election. Neighbor command needed to establish adjacency.

    2. Broadcast- This is the default on Ethernet/broadcast networks. Doeshave DR/BDR election.

    3. Point-to-point- No DR/BDR election. This one is pretty self

    explanatory.

    4. Point-to-multipoint- Does not have a DR/BDR election. Solves somedesign issues with the next hop processing for NONBROADCAST. Treats as acollection of P2P links.

    5. Point-to-multipoint non broadcast- Same as P2M but does not usepseudo broadcast. Must statically define neighbors.

    6. Loopback -OSPF treats these as stub hosts. (/32)

    What are BGP and their attributes?

    The Border Gateway Protocol (BGP) is an inter autonomous system routingprotocol. An autonomous system is a network or group of networks under acommon administration and with common routing policies. BGP is used toexchange routing information for the Internet and is the protocol usedbetween Internet service providers (ISP). Customer networks, such asuniversities and corporations, usually employ an Interior Gateway Protocol(IGP) such as RIP or OSPF for the exchange of routing information withintheir networks. Customers connect to ISPs, and ISPs use BGP to exchangecustomer and ISP routes. When BGP is used between autonomous systems(AS), the protocol is referred to as External BGP (EBGP). If a service provider

  • 8/13/2019 Networking Question 8

    6/7

    is using BGP to exchange routes within an AS, then the protocol is referred toas Interior BGP (IBGP).

    BGP Attributes are

    1. Weight 5. AS_path

    2. Local preference 6. Nexthop

    3. Multi-exit discriminator 7.Community

    4.Origin

    What is PPPoE?

    Point to Point Protocol over Ethernet (PPPoE) is network protocols that allowdata communication between two network entities or points, which supportsnetwork layer protocols including IPv4 and IPv6. PPP supports three types ofuser authentication protocols that provide varying levels of security.

    1. PAP 2. CHAP 3. EAPPAP CHAP

    1. Clear text 1. Encrypted

    2. Less secure 2. High secure3. Two way handshakemethod 3. Three way handshake method

    Auth. Request ChallengeAuth. Acknowledgment Response

    Success4. No periodic Check up 4. Periodical Check up

    Extensible Authentication Protocol (EAP) is most commonly used forauthentication on wireless networks

    What are the timers for dynamic routing protocol?

    Rip IGRP EIGRP OSPFHello None None 60 sec 10 sec

    Update timers 30 sec 90 secDead timers 180 sec 3*hello 3*hello 4*hello

    What is the AD Value for Dynamic routing protocols?

    Rip IGRP EIGRP OSPF BGP

    AD 120 100 90 110 20

  • 8/13/2019 Networking Question 8

    7/7

    CCNA Overview !

    ROUTING

    RIPo RIP.V1 & RIP.V2

    EIGRPo Routing Table, RD &

    FD OSPF

    o Areao Network typeo DR BDR

    BGP

    SWITCHING

    VLAN VTP STP

    o Types of STP Ether Channel Port Security ACL

    WAN TECHNOLOGY

    HDLC PPP MPLS Frame Relay

    OTHERS

    IP Addressing Subnetting SNMP VLSM CIDR HSRP CDP CEF IP Sec

    http://www.techiebird.com/netrip.htmlhttp://www.techiebird.com/neteigrp.htmlhttp://www.techiebird.com/netospf.htmlhttp://www.techiebird.com/netospf.htmlhttp://www.techiebird.com/netbgp.htmlhttp://www.techiebird.com/netvlan.htmlhttp://www.techiebird.com/netvlan.htmlhttp://www.techiebird.com/netvtp.htmlhttp://www.techiebird.com/netstp.htmlhttp://www.techiebird.com/netethchn.htmlhttp://www.techiebird.com/netethchn.htmlhttp://www.techiebird.com/netportsec.htmlhttp://www.techiebird.com/netacl.htmlhttp://www.techiebird.com/nethdlc.htmlhttp://www.techiebird.com/nethdlc.htmlhttp://www.techiebird.com/netppp.htmlhttp://www.techiebird.com/netppp.htmlhttp://www.techiebird.com/netmpls.htmlhttp://www.techiebird.com/netmpls.htmlhttp://www.techiebird.com/netframerelay.htmlhttp://www.techiebird.com/netframerelay.htmlhttp://www.techiebird.com/networkclass.htmlhttp://www.techiebird.com/networkclass.htmlhttp://www.techiebird.com/networksubnet.htmlhttp://www.techiebird.com/networksubnet.htmlhttp://www.techiebird.com/netsnmp.htmlhttp://www.techiebird.com/netsnmp.htmlhttp://www.techiebird.com/netvlsm.htmlhttp://www.techiebird.com/netvlsm.htmlhttp://www.techiebird.com/netcidr.htmlhttp://www.techiebird.com/netcidr.htmlhttp://www.techiebird.com/nethsrp.htmlhttp://www.techiebird.com/nethsrp.htmlhttp://www.techiebird.com/netcdp.htmlhttp://www.techiebird.com/netcdp.htmlhttp://www.techiebird.com/netcef.htmlhttp://www.techiebird.com/netcef.htmlhttp://www.techiebird.com/netipsec.htmlhttp://www.techiebird.com/netipsec.htmlhttp://www.techiebird.com/netipsec.htmlhttp://www.techiebird.com/netcef.htmlhttp://www.techiebird.com/netcdp.htmlhttp://www.techiebird.com/nethsrp.htmlhttp://www.techiebird.com/netcidr.htmlhttp://www.techiebird.com/netvlsm.htmlhttp://www.techiebird.com/netsnmp.htmlhttp://www.techiebird.com/networksubnet.htmlhttp://www.techiebird.com/networkclass.htmlhttp://www.techiebird.com/netframerelay.htmlhttp://www.techiebird.com/netmpls.htmlhttp://www.techiebird.com/netppp.htmlhttp://www.techiebird.com/nethdlc.htmlhttp://www.techiebird.com/netacl.htmlhttp://www.techiebird.com/netportsec.htmlhttp://www.techiebird.com/netethchn.htmlhttp://www.techiebird.com/netstp.htmlhttp://www.techiebird.com/netvtp.htmlhttp://www.techiebird.com/netvlan.htmlhttp://www.techiebird.com/netbgp.htmlhttp://www.techiebird.com/netospf.htmlhttp://www.techiebird.com/neteigrp.htmlhttp://www.techiebird.com/netrip.html