ITE 292 - NETWORKING CONTD

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/78

flashcard set

Earn XP

Description and Tags

SAS 11 - SAS 16

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

79 Terms

1
New cards

This field of IPv6 is a 4 bit binary value set to 0110 which identifies the packet as an IPv6 packet

Version

2
New cards

This field of IPv6 is an 8 bit field that corresponds to the IPv4 Differentiated Services(DS)

Traffic Class

3
New cards

This field of IPv6 is a 20 bit field that indicates that all packets with the same flow label are handled the same way by routers

Flow label

4
New cards

This field of IPv6 is a 16 bit field that indicates the length of the packets data portion or payload

Payload Length

5
New cards

This field of IPv6 is an 8 bit field that corresponds to the IPv4 protocol field, it specifies the type of data payload carried by the packets

Next Header

6
New cards

This field of IPv6 is the IPv4 TTL is replaced by this 8 bit field, where as it passes through each router, the value is decrement by 1 and the packet is discarded once it reaches 0

Hop Limit

7
New cards

This is when a host can ping it self for testing purposes

Loopback

8
New cards

This is a host that is connected to the same local network as the sending network

Local Host

9
New cards

This is a host on a different network

Remote network

10
New cards

This is the network device (usually a router) that sends traffic to other networks. If the source and destination hosts are on different local networks, the router directs the data out of the local network to reach the destination.

The Default Gateway

11
New cards

On windows you can display the routing table by?

route print or netstat -r

12
New cards

List the sections that would be displayed when the routing table is displayed

Interface list - List of MACs and their interface number

IPv4 Table

IPv6 Table

13
New cards

List 3 things included in the routing table

  1. Directly connected routes

  2. remote routes

  3. Default routes

14
New cards

These routes come from active router interfaces with configured IP addresses.

Directly connected routes

15
New cards

These routes come from distant networks connected to other routers, learned manually or via dynamic routing.

Remote routes

16
New cards

These routes is used when no specific route exists in the routing database; the packet is sent here.

Default routes

17
New cards

On cisco IOS, which command is used to display the routing table of IPv4

show ip route

18
New cards

These 2 routing table entries are created once the router interface is configured and activated

C and L

19
New cards

This entry identifies that the network is directly connected and the interface is configured with an IP address and activated.

C

20
New cards

This entry identifies that it is a local interface.

L

21
New cards

This entry represents the Route Source which is how the network was learned by the router. It also identifies the route as an EIGRP route

D

22
New cards

Full meaning of EIGRP

Enhanced Interior Gateway routing protocol

23
New cards

This Identifies the destination network.

10.1.1.0/24

24
New cards

This is the administrative distance for the corresponding network

90

25
New cards

This represents the metric or value assigned to reach the remote network.

2170112

26
New cards

This represents the next-hop or IP address of the next router to forward the packet.

209.165.200.226

27
New cards

This represents the route Timestamp identifies when the router was last heard from.

00:00:05

28
New cards

This represents the outgoing Interface

Serial/0/0/0

29
New cards

A router is like a computer, it requires ______, ______ and _____

CPU

Operating System

Memory

30
New cards

This network is used by teleworkers, small businesses, and branch offices.

Branch

31
New cards

This network used by large businesses, organizations, and enterprises.

Wide Area Network (WAN)

32
New cards

This network a large company that delivers network services.

Service Provider

33
New cards

The CCNA certification focuses on the ______ family of

routers.

branch

34
New cards

A_____ is used to dissipate heat from the CPU in order to keep it cool.

heatsink

35
New cards

To provide routing and switching functions, the CPU requires an ________ .

operating system

36
New cards

Full meaning of cisco IOS

Cisco Internetwork Operating System (IOS)

37
New cards

This requires constant power to store data.

Volatile Memory

38
New cards

This does not require constant power.

Non-volatile Memory

39
New cards

This is a volatile memory used to store applications, processes, and data that the CPU needs to execute.

RAM

40
New cards

This is a non-volatile memory that stores critical operational instructions as well as a limited IOS.

ROM

41
New cards

This is a non-volatile memory used to store the startup configuration file permanently (startup-config).

NVRAM

42
New cards

This is a non-volatile memory used for long-term storage of the IOS and other operating system files like log or backup files.

Flash

43
New cards

List 5 types and models of router

Power supply

Cooling fan

SDRAM - Synchronous Dynamic RAM

Non volatile RAM (NVRAM)

Heat shields

CPU

Advanced Integration Module(AIM)

44
New cards

Cisco router connection has 2 categories

In-band router interfaces – LAN and WAN interfaces

Management ports – Console and AUX ports

45
New cards

List the 3 most common ways to access user EXEC mode in a Cisco router's CLI environment

Console

SSH

Telnet

46
New cards

This is a physical management port on the Cisco router that allows for out-of-band access.

Console

47
New cards

This refers to a dedicated connection that does not require network services to be configured on the router.

Out of Band

48
New cards

This is a safe way to establish a CLI connection over a network. SSH does necessitate the configuration of active networking services.

SSH

49
New cards

This is an insecure method of remotely establishing a CLI session via a network virtual interface. The connection is not secure.

Telnet

50
New cards

The router's bootup process has three major phases

  1. Run the POST and load the bootstrap program

  2. Locate and load the Cisco IOS software

  3. Locate and load the startup configuration file, or enter setup mode

51
New cards

This command displays a summary of all interfaces to ensure they are activated and operational. Look for "up" Status and "up" Protocol.

show ip interface brief

52
New cards

This command displays the contents of the RAM-stored IPv4 routing table.

show ip route

53
New cards

This command displays IPv4 statistics for all router interfaces.

show interfaces

54
New cards

This command is used to save your configuration changes.

copy running-config startup-config

55
New cards

To connect to a Layer 2 device remotely, what are the requirements

IP address

subnet mask

default gateway

56
New cards

This command is used to configure the default gateway

ip default-gateway

57
New cards

It is important to note that a switch does not

forward packets from hosts on its local network to

remote networks using the default gateway

address.

Notes

58
New cards

In an Ethernet LAN devices use broadcast to locate

  1. Other devices

  2. Services

59
New cards

_______ send out broadcast to all interfaces except the one where they are received

switches

60
New cards

2 negative impact of excessive broadcast

1, It slows down network operations

  1. It slows down devices operations

61
New cards

_____ are the smaller network spaces

Subnets

62
New cards

This reduces network traffic while improving network performance

Subnetting

63
New cards

Networks are mostly sub netted at the ____ boundary of ___/___/__-

  1. octet

  2. 8

  3. 16

  4. 24

64
New cards

_____ and ____ are the two methods for identifying the network portion

  1. Prefix Length

  2. Subnet mask

65
New cards

______ are formed from borrowing host bits for network bits

Subnets

66
New cards

The first 2 octets identify the _____

network portion

67
New cards

The last 2 octets identify the ____

host IP address

68
New cards

This technique is used to calculate subnets

Magic Number technique

69
New cards

What is the subnet value of this, 11111111.11111111.11111111.11111000

8

70
New cards

______ do not have to be equal in size as long as their address ranges do not overlap

subnets

71
New cards

Planning requires decisions on each subnet in terms of ____

Size

72
New cards

2 most important things when planning for each subnet

  1. Number of host per subnet

  2. how host address will be assigned

73
New cards

Each internetwork most have a _____

Unique address

74
New cards

This can be set through DHCP to save time and manual effort

End user clients

75
New cards

It is configured with static address, The private address is translated to public address

Servers

76
New cards

It can be set with static addresses for remote management

Intermediary devices

77
New cards

This is the router interface used to exit the network

Gateway

78
New cards

This IPv6 address is never sub netted

link-local IPv6 address

79
New cards

This IPv6 address is sub netted

IPv6 global unicast address