Download Describe the characteristics of each of the following routing

Document related concepts

Zero-configuration networking wikipedia , lookup

Cisco Systems wikipedia , lookup

Transcript
Discovery 2 - Review
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
1
Question #1
Define and give examples of the following:
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
2
IGP protocols
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3
IGP protocols
Interior Gateway Protocols
RIP (V1 and 2)
EIGRP (IGRP)
OSPF
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
4
EGP protocols
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
5
EGP protocols
Exterior Gateway Protocols
BGP - facilitates the exchange of routing information
between different autonomous systems
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
6
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
7
Static Routing
Routers manually configured
ip route 192.168.40.0 255.255.255.224 s0/0/0
or
ip route 192.168.40.0 255.255.255.224 192.168.1.1
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
8
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
9
Dynamic Routing
router rip
version 2
network 192.168.1.0
network 172.16.0.0
network 10.0.0.0
It is automatically updated and maintained by routing
protocols.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
10
Describe the characteristics of each of
the following routing protocols.
RIP
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
11
Describe the characteristics of each of
the following routing protocols.
RIP
Distant Vector Routing Protocol
Has a hop count limit of 15
Version 1 - Does not include subnet mask
information in routing updates
Sends routing table contents every 30 seconds
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
Describe the characteristics of each of
the following routing protocols.
EIGRP
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
13
Describe the characteristics of each of
the following routing protocols.
EIGRP
Cisco-proprietary
Enhanced distance vector routing protocol
Uses a variety of metrics
224 hop count limit
topology and neighbor table
DUAL – Diffused Update Algorithm
Builds topology table based on advertisements
Little information about distant networks and
none about distant routers
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14
Describe the characteristics of each of
the following routing protocols.
OSPF
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
15
Describe the characteristics of each of
the following routing protocols.
OSPF
Maintains a full database of distant routers and
the methods by which they are interconnected
Does not send periodic updates of the entire
routing table
Provides fast convergence and route
authentication
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
16
Describe the characteristics of each of
the following routing protocols.
BGP
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
17
Describe the characteristics of each of
the following routing protocols.
BGP
Border Gateway Protocol
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
18
Fill in the blank - Network devices installed
at the customer location are called _______
_________ __________and include
devices such as routers, modems, and
switches.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
19
Fill in the blank - Network devices installed
at the customer location are called
Customer Premise Equipment and include
devices such as routers, modems, and
switches.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
20
Define the following routing table terms:
Administrative distance –
Vector –
Metric –
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
21
Define the following routing table terms:
Administrative distance - trustworthiness – RIP 120,
EIGRP 90, OSPF 110
Vector – Direction
Metric – Calculation based on algorithm
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
22
Define
Static NAT -
Dynamic NAT PAT -
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
23
Define
Static NAT - allows hosts on the public network to access
selected hosts on a private network. A one-to-one mapping is
created between an inside local and outside global address.
Dynamic NAT - allows hosts on a private network that have
private IP addresses to access a public network, such as the
Internet. Occurs when a router assigns an outside global
address from a pre-defined address, or pool of addresses, to
an inside private network device.
PAT - When an organization has a very small registered IP
address pool, or perhaps even just a single IP address, it can
still enable multiple users to simultaneously access the public
network with a mechanism called NAT overload, or Port
Address Translation (PAT). PAT translates multiple local
addresses to a single global IP address
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
24
What subnet mask is needed to support up to 30 hosts?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
25
What subnet mask is needed to support up to 30 hosts?
255.255.255.224
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
26
What is the broadcast address for 192.168.1.64/27?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
27
What is the broadcast address for 192.168.1.64/27?
192.168.1.95
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
28
If an enable password is configured and an enable secret
password is configured. Which will be used? What are the
commands for enabling secret?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
29
If an enable password is configured and an enable secret
password is configured. Which will be used? What are the
commands for enabling secret?
enable secret will be used
enable password passw0rd1
enable secret passw0rd2
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
30
What command creates a default route?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
31
What command creates a default route?
ip route 0.0.0.0 0.0.0.0 serial 0/0/0 (exit interface)
ip route 0.0.0.0 0.0.0.0 192.168.1.1 (next hop)
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
32
What is the default “layer 2” encapsulation on a Serial line?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
33
What is the default “layer 2” encapsulation on a Serial line?
hdlc
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
34
What addresses does a switch use?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
35
What addresses does a switch use?
Source and Destination MAC
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
36
What are the results of a ping command and a traceroute
command?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
37
Describe the router’s process for loading a start-up config file.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
38
Describe the router’s process for loading a start-up config file.
NVRAM
TFTP Server
Console – start-up
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
39
Write a static route to the network 192.168.4.0/24 if the next hop
is 10.1.1.2/30
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
40
Write a static route to the network 192.168.4.0/24 if the next hop
is 10.1.1.2/30
ip route 192.168.4.0 255.255.255.0 10.1.1.2
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
41
Describe the process of an ICMP ping.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
42
Describe the process of an ICMP ping.
Sends an ICMP echo request packet to the destination address
Destination sends an echo reply.
Tests the connectivity of an IP address
Depends on IP to function and work
Measures time that elapses between when the request packet is sent and
the response packet is received
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
43
Describe the uses of a straight through, crossover and console
cables.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
44
Describe the uses of a straight through, crossover and console
cables.
Straight-through - Connects dissimilar devices, such as a
switch and a computer, or a switch and a router.
Crossover - Connects similar devices, such as two switches or
two computers.
Console (or Rollover) - Connects a computer to the console
port of a router or switch to do initial configuration.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
45
Define the characteristics of TCP and UDP.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
46
Define the characteristics of TCP and UDP.
UDP is a very simple protocol
connectionless
unreliable delivery protocol – no guarantee message has
been received by destination host
does not provide sophisticated retransmission, sequencing,
and flow control mechanisms of TCP
lower overhead
Presentation_ID
Application Layer protocols that do use UDP include:
Domain Name System (DNS)
Simple Network Management Protocol (SNMP)
Dynamic Host Configuration Protocol (DHCP)
RIP routing protocol
Trivial File Transfer Protocol (TFTP)
Online games
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
47
Define the characteristics of TCP and UDP.
TCP
Uses a flow control mechanism
Uses windowing
Provides acknowledgment of receipt of data
Guarantees the sequential arrival of data packets
Verification process adds more transmissions during the file
transfer
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
48
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
49
Describe the speed of the following WAN connections: T3, T1,
DSL, Cable Modem
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
50
Describe the speed of the following WAN connections: T3, T1,
DSL, Cable Modem
T3 - 44.736Mbps
T1 - 1.544Mbps
DSL – 128Kbps
Cable - 128Kbps
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
51
Define the following WAN connections: point-to-point, circuitswitched, packet-switched.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
52
Define the following WAN connections: point-to-point, circuitswitched, packet-switched.
Point-to-Point - dedicated circuit with fixed bandwidth available
at all time, often called leased lines, example of a point-topoint WAN connection is a T1 or E1 link
Circuit-Switched - functions similarly to the way a phone call is
made over a telephone network, example of a circuit-switched
WAN connection is an ISDN or dialup connection
Packet-Switched - networks have connections into a switched
network, many customers share the network, each customer
has its own virtual circuit, a logical path between the sender
and receiver, example is Frame Relay
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
53
What are the purpose of the following protocols:
Syslog –
SNMP –
HTTP –
FTP –
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
54
What are the purpose of the following protocols:
Syslog – logs system events, system comprised of syslog
servers and clients
SNMP – network management protocol that enables
administrators to gather data about the network and
corresponding devices, four main components (management
station, agent, information base, management protocol)
HTTP – Hypertext Transfer Protocol – used to transfer or
convey information on the World Wide Web
FTP – File Transfer Protocol
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
55
Describe an SLA?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
56
Describe an SLA?
Service Level Agreement – documents the expectations and
obligations of both parties
Outlines the management, monitoring, and maintenance of a
network.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
57
Describe encapsulation using the OSI model.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
58
Describe encapsulation using the OSI model.
Application – DATA – initiates the process
Presentation – DATA – Format, encode, encrypt, compress
Session – DATA – Establishes and monitors session with
destination
Transport – SEGMENT – Add TCP/UDP port numbers
Network – PACKETS – Assign IP (logical) Addresses
Data Link – FRAMES – Adds hardware addresses (MAC)
Physical – BITS – Generate signals and timing
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
59
What are some of the common protocols and technologies that
operate at layer 2.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
60
What are some of the common protocols and technologies that
operate at layer 2.
.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
61
What are some of the common protocols and technologies that
operate at layer 2.
Ethernet, HDLC, PPP, Frame-Relay
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
62
Write the configuration for a dhcp pool called exampool. The
network that is to used for DHCP is the 192.168.10.0 / 24. The
router has an ip address of 192.168.10.1 and the dns server is
192.168.10.2.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
63
Write the configuration for a dhcp pool called exampool. The
network that is to used for DCHCP is the 192.168.10.0 / 24. The
router has an ip address of 192.168.10.1 and the dns server is
192.168.10.2.
ip dhcp pool exampool
network 192.168.10.0 255.255.255.0
dns-server 192.168.10.2
default-router 192.168.10.1
ip dhcp excluded-address 192.168.10.1 192.168.10.2
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
64
What is the function of the “service password-encryption”
command?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
65
What is the function of the “service password-encryption
command?
Prevents passwords in configuration files from being easily
read
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
66
Explain how FTP works.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
67
Explain how FTP works.
Passes control information on port 21
Transfer segments on port 22 closes connection automatically
when the file transfer is complete
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
68
What does AAA stand?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
69
What does AAA stand?
Explain the purpose of each A.
Authentication, Authorization, Accounting
prevents unauthorized access to a network
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
70
What purpose does a server running the RADIUS protocol have?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
71
What purpose does a server running the RADIUS protocol have?
Authentication databases are typically stored on servers that
use the Radius protocols
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
72
How does DNS work?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
73
How does DNS work?
DNS relies on the hierarchy of decentralized servers to maintain
records.
The root DNS server may not know exactly where the host H1.cisco.com is
located, but it does have a record for the .com top-level domain. Likewise, the
servers within the .com domain may not have a record for H1.cisco.com either,
but they do have a record for the cisco.com domain. The DNS servers within
the cisco.com domain do have the record for H1.cisco.com and can resolve the
address.
The root servers maintain records about how to reach top-level
domain servers.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
74
How does DNS work?
Resource Record - data record in the database file of a DNS
zone
Domain Name System Servers – maintain the databases
Resolver – When a domain name is used, the resolver queries
the DNS server to translate that name of an IP address
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
75
Explain the 3 troubleshooting methods.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
76
Explain the 3 troubleshooting methods.
Top-down
Bottom-up
Divide and conquer
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
77
Explain Distant Vector
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
78
Explain Distant Vector
The distance vector algorithm evaluates the route information
it receives from other routers using two basic criteria:
Distance - How far away is the network from this router?
Vector - In which direction should the packet be sent to
reach this network?
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
79
Why might a serial connection appear – STATUS UP and
PROTOCOL DOWN
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
80
Why might a serial connection appear – STATUS UP and
PROTOCOL DOWN
Serial connections may experience problems caused by packet
errors, configuration errors, or mismatches in encapsulation and
timing. Because serial WAN connections usually rely on a
CSU/DSU or modem for timing, these devices must be considered
when troubleshooting.
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
81
Explain the results of the following Show/Debug commands:
Show ip protocols –
Show ip route –
Debug ip rip –
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
82
Explain the results of the following Show commands:
Show ip protocols – verifies routing protocol configured and
what networks are being advertised
Show ip route – shows the routing table
Debug ip rip – observe the networks advertised and the routing
updates as they are sent and received
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
83
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
84
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
85
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
86
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
87
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
88
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
89
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
90
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
91
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
92
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
93
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
94
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
95
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
96
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
97
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
98
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
99
Q and A
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
100
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
101
Presentation_ID
© 2009 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
102