1/172
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
ROUTER
If we have traffic that needs to go from one network to another network, this makes the decision as to how we're going to forward that traffic.
SWITCHES
These can interconnect devices within the same network. These devices might be PCs, printers, servers, wireless access points, surveillance cameras, and the list goes on.
Security Appliances
Devices designed to protect networks from threats by blocking unauthorized access and ensuring data integrity. They include firewalls, intrusion detection systems, and antivirus solutions. These help safeguard networks from threats and unauthorized access.
Wireless Devices
They extend the reach of our networks, enabling wireless operation for devices. Their key role is promoting mobility and flexibility within network environments
Endpoints & Servers
These are where users access resources—whether from a server or another user/device. Examples include: PCs, mobile devices, file servers, and peer devices.
Cisco Catalyst Center
Represents the future of enterprise networking with Cisco hardware. This tool helps streamline administrative tasks and improves operational efficiency. It allows for centralized management of network resources and leverages AI for enhanced performance and security.
Virtualized Devices
Showcase the power of software-based networking.
Benefits: Flexibility, Scalability, Reduced reliance on physical hardware.
They allow networks to adapt quickly to changing demands. Virtualized devices use software to create network environments, enabling efficient resource utilization and rapid deployment. They enhance flexibility and scalability while minimizing dependence on physical infrastructure.
TCP and UDP
Both are core transport protocols for transmitting data across networks
Transmission Control Protocol
Reliable, connection-oriented (e.g., file transfers, web traffic)
User Datagram Protocol
Fast, connectionless, less overhead (e.g., video streaming, gaming) Understanding when to use each protocol is critical for performance and reliability.
Media Access Control (MAC) Address
48-bit identifier that is burned into the network interface card by the manufacturer.
Flooding
Occurs when a switch sends a copy of a frame out of all ports except the pot on which the frame was recieved.
IDS sensor
An Intrusion Detection System sensor monitors network traffic for suspicious activity and policy violations, alerting administrators of potential security breaches.
Firewall
A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
IPS
An Intrusion prevention system sensor that actively monitors network traffic and can take actions to block or mitigate detected threats.
Host-based firewall
A security solution that monitors and controls incoming and outgoing network traffic on a single device, often used to protect individual computers or servers.
Packet-filtering firewall
A type of firewall that controls network traffic based on predetermined rules and filters packets based on their source and destination IP addresses, protocols, and ports.
Stateful Firewall
A firewall that maintains records of all active connections and makes decisions based on the context of the traffic, allowing for more sophisticated control compared to packet-filtering firewalls.
Next Generation Firewall (NGW/Layer 7 Firewall)
A firewall that goes beyond traditional filtering by inspecting the payload of packets and applications, providing advanced features like intrusion prevention, deep packet inspection, and application awareness.
Wireless Access Point (WAP)
Not to be confused with Wireless Routers. A device that allows wireless devices to connect to a wired network using Wi-Fi or other standards, enabling access to the network and internet.
SSID (Service Set Identifier)
The name of a wireless network, allowing devices to identify and connect to specific networks within a range.
Endpoints and servers
Also known as Client-Server Architecture. This architecture refers to the model in which client devices, or endpoints, make requests to servers that provide data or services. It facilitates communication and resource sharing over a network.
Peer-to-Peer Architecture
Direct resource sharing among devices without central server; enables decentralized communication and collaboration.
Cisco Catalyst Center
An appliance that provides a graphical interface and a programming interface to design your network, add and configure devices, monitor, and troubleshoot your network.
As a network administrator, you have a packet that needs to be routed to a specific network. How does a router determine the appropriate interface to forward this packet?
Through the packet’s destination IP address.
Imagine you are troubleshooting a newly installed Ethernet switch. You notice that frames from a device are being flooded to all ports. What is the likely reason for this behavior?
The destination MAC address is not yet learned
What is the primary function of an Intrusion Prevention System (IPS) sensor in network security?
Analyzing and blocking potential threats
What characterizes an ad hoc wireless LAN?
Involves direct communication between wireless clients
What is the key difference between client-server and peer-to-peer architectures?
Client-server architecture uses a server for resource sharing
You are designing a network using Cisco Catalyst Center. Which of the following tasks can you perform with this tool?
Mapping out network topology and allocating IP addresses.
You are setting up a virtual environment and need to choose a hypervisor. If you require running the hypervisor directly on the server's hardware without a host operating system, which type of hypervisor should you select?
Type 1: Native or Bare metal Hypervisor
What is the purpose of the three-way handshake in the TCP protocol?
To establish a connection between two devices.
Full Mesh Architecture
A network topology where every node is directly connected to every other node. Not scalable for large systems due to the exponential growth of required links.
3 tier architecture
A scalable network design model that includes the access layer, distribution layer, and core layer.
Access Layer
The layer where end devices (e.g., PCs, printers, wireless access points) connect to the network, typically through layer 2 switches in wiring closets.
Distribution Layer
The intermediate layer that aggregates access layer switches from different floors or areas and connects to the core layer. Often uses multilayer switches.
Core Layer
The backbone of the network providing high-speed interconnectivity between distribution layers in various buildings.
Collapse Core Architecture
A simplified network design where the distribution and core layers are merged, often used when there are only a few buildings to connect.
EtherChannel (Port Aggregation)
A method of combining multiple physical links into a single logical link to increase bandwidth and provide redundancy between switches.
Layer 2 Switch
A switch that operates at the data link layer of the OSI model and forwards frames based on MAC addresses.
Lauyer 3 Switch
A switch that operates at the network layer of the OSI model, capable of routing packets based on IP addresses.
Multilayer Switch
A switch that performs functions at multiple layers of the OSI model, typically both Layer 2 (switching) and Layer 3 (routing).
Wiring Closet
A small room or cabinet containing network equipment such as switches, typically one per floor in a building.
Fiber Optic Connection
High-speed transmission medium used to connect buildings across a campus due to its long-distance and high-bandwidth capabilities.
Scalability
The ability of a network to grow and support more devices or buildings without significant redesign.
Redundancy
The inclusion of extra components or links to ensure network reliability in case of failure.
Campus Network
A network infrastructure that interconnects buildings within a limited geographical area like a corporate or university campus.
High-End Switches
Powerful and expensive switches used at the core layer to ensure high-speed data transfer and low latency.
n(n-1)/2 Formula
A formula to calculate the number of links in a full mesh network, where n is the number of nodes or buildings.
Logical Link
A virtual connection formed by combining multiple physical connections, often using technologies like EtherChannel.
Top-of-Rack (ToR) Switch
Switches installed at the top of a server rack in a data center, connecting directly to all servers in that rack.
Data Center
A facility used to house computer systems and associated components like servers, storage systems, and networking equipment.
Spine-Leaf Topology
A modern data center network design where every leaf switch connects to every spine switch, minimizing latency and bottlenecks.
Leaf Switch
A switch at the access layer in a spine-leaf topology that connects directly to devices such as servers, firewalls, and spine switches.
Spine Switch
A high-performance switch in a spine-leaf network topology that connects only to leaf switches, ensuring consistent performance and equal access across the network.
Node (Data Center Context)
Any device or endpoint connected to a network such as a server, firewall, load balancer, or router.
Application Centric Infastructure (ACI)
Cisco’s collection of Software Defined Networking (SDN) solutions for data center environments
Solid Line (WAN)
represents a connection that is always up
Dotted Line (WAN)
represents a connection that can be brought up by demand
What is a primary advantage of using a three-tier architecture for interconnecting buildings on a corporate campus?
It enhances the scalability by allowing easy addition of new buildings through a structured heiarchy
What distinguishes Top-of-Rack (ToR) switches in a spine-leaf data center architecture?
They act as leaves, connecting both to servers within the rack and spine switches.
What are the two main types of copper cables out there?
Coaxial cables and Twisted Pair Cabling
Electromagnetic Interference (EMI)
Occurs when radio waves are picked up by or radiated by a cable carrying another signal, resulting in signal degradation
Impedance
A circuit’s opposition to current flow (measured in Ohms), which can have resistive, capacitive, or inductive components
Cable: RG-59 and RG-6
Connector: F-Type
Common use: TV Cable and Modem
Impedance: 75 Ohms
Cable: RG-58
Connector: BNC (Bayonet Neill Concelman)
Common Use: 10Base2
Impedance: 50 Ohms
Connector: RG-8/U
Connector: Amphenol N-type
Common Use: 10BASE5
Impedance: 50 Ohm
Unshielded Twisted Cabling (UTP)
Twisting pairs of wires helps reduce EMI
It does not add any additional EMI Sheilding (i.e. wrapping it in foil)
Sheilded Twisted Pair Cabling (STP)
For additional EMI protection, these are wrapped together with foil.
Sometimes wrapped with metal braiding for more protection.
Supports higher data rates.
More expensive
Plenum Rated cabling
Area of building used by HVAC for air flow
Plenum Area Cabling will not emit toxic fumes in the presence of heat.
RJ-45
Commonly used on Ethernet Cables
8 positions with 8 conductors
RJ-11
Commonly used on telephones and fax machines.
6 positions with 2 conductors
RJ-14
Commonly used on telephones and fax machines.
6 positions with 4 conductors.
What Ethernet standards does Category 3 cabling support?
10BASE-T and 100BASE-T4
What is the distance limitation for Category 3 cabling?
100 meters
What Ethernet standards does Category 5 cabling support?
100BASE-TX and 1000BASE-T
What is the distance limitation for Category 5 cabling?
100 Meters
What Ethernet standards does Category 5e cabling support?
1000BASE-TX and 1000BASE-T
What is the distance limitation for Category 5e cabling?
100 meters
What Ethernet standards does Category 6 cabling support?
1000BASE-T, 5GBASE-T, and 10GBASE-T
What is the distance limitation for Category 6 cabling?
100 meters (55m for 10GBASE-T)
What Ethernet standards does Category 6a cabling support?
1000BASE-T, 5GBASE-T, and 10GBASE-T
What is the distance limitation for Category 6a cabling?
100 meters
What Ethernet standards does Category 7 cabling support?
5GBASE-T, 10GBASE-T, and POTS/CATV/1000BASE-T
What is the distance limitation for Category 7 cabling?
100 Meters
What Ethernet standards does Category 8 cabling support?
25GBASE-T and 40GBASE-T
What is the distance limitation for Category 8 cabling?
30 to 36 meters (intended for data centers)
You are configuring a home entertainment system and need to choose the appropriate coaxial cable for connecting to your television and also to your cable modem. Which of the following cable types should you consider for optimal performance given the electrical characteristics mentioned?
RG-6, as it has better electrical characteristics than RG-59, which is an older standard. RG-58 and RG-8/U are used for different applications, such as networking in older 10BASE2 and 10BASE5 networks. Also, RG-58 and RG-8/U cables have a different impedance (i.e., 50 Ohms) as compared to RG-59 and RG-6 cables (i.e., 75 Ohms).
You are installing a network in an office environment with a significant amount of electromagnetic interference (EMI). Which type of twisted pair cabling should you choose to ensure the best protection against EMI?
STP
A network engineer is tasked with upgrading the company's network infrastructure to support 1 gigabit per second data transmission over a maximum distance of 100 meters. Which category of twisted pair cabling should the engineer choose to ensure compatibility with the 1000BASE-T standard, while minimizing cost of the cabling?
5e
You are tasked with connecting two PCs directly to facilitate a file transfer without using a switch or router. What type of Ethernet cable should you use to ensure the PCs can communicate effectively?
Crossover Ethernet Cable
When considering the installation of a fiber optic network that spans a long distance, which type of fiber optic cabling would you choose to minimize data corruption due to multimode delay distortion?
SMF
In setting up a high-density fiber network panel, which connector would you choose to maximize port density?
MTRJ Connector
A network administrator is tasked with implementing a fiber optic network to interconnect several buildings on a university campus, where the maximum distance between any two buildings does not exceed 220 meters. Also, the fiber network must support a speed of 1 gigabit per second. Which of the following Ethernet standards should the administrator choose to ensure compatibility, while minimizing cost?
1000BASE SX
A network designer is planning to deploy IP cameras and wireless access points in a new office building. To simplify the installation and reduce the need for additional power outlets, which technology should be utilized to power these devices over the Ethernet infrastructure?
Power over Ethernet
A network engineer notices an increasing number of input/output errors on router interfaces. What could be a potential cause for these errors?
Duplex Mismatch
What do the first 3 numbers (9 digits) in an ipv4 address represent
The Network
What do the first 3 digits in an ipv4 address represent
the host
Benefits of Network Programmability
Network Management, Agility, Cost, Security
How do you read an 8 bit binary number?
128 64 32 16 8 4 2 1