3A Flashcards

1
Q

A ______ is a Layer 3 networking device that uses IP addressing to forward packets between networks.

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A router connects ____ or ____ lines from different networks.

A

two or more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a packet comes into a router, the router reads the __ _______ to determine the destination network. The router then uses the
information in its routing table or routing policy to direct the packet to its next destination.

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Routers in different networks can be connected to create an ____________.

A

internetwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Router components can be categorized as either ______ or ______.

A

external or internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is important to note that the internal components and memory hierarchy of a router are the same as that of a _______.

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The external components are the _____ _____ to the router.

A

physical connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three external components of the router?

A

a console port, an auxiliary port, and network interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The following describes what external component of a router?

This port allows you to configure the router locally by providing direct access to the router using a computer running terminal emulation software. Neither the port nor the router must be configured to use the console port. In fact, this is where you would connect if you were initially configuring a “blank” router.

A

Console Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The following describes what external component of a router?

The ____ ____, allows you to configure the router remotely using a modem. This port must be configured before you can use it. You can configure this port thru the console port or any of its network interfaces. You will probably not use this port in the field. This port should be disabled for security reasons.

A

Auxillary port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The following describes what external component of a router?

A router can be configured over any of its ____ _____. The router’s ____ ____ are located on the motherboard or on separate interface modules. You configure Ethernet or Token Ring interfaces to allow connection to a LAN. The synchronous serial interfaces are configured to allow connection to WANs. Configuration information can be supplied using Trivial File Transfer Protocol (TFTP) servers, virtual terminals, Cisco’s Security Device Manager, or network management stations.

A

Network Interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four internal components of a router?

A

ROM, flash memory, NVRAM, and RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The following describes what internal component of a router?

This is where the diagnostic and boot up routines are stored.

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The following describes what internal component of a router?

Manufacture memory that holds the Internetwork Operating Systems (IOS)

A

Flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The following describes what internal component of a router?

_____ is used to store the startup-configuration file

A

NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The following describes what internal component of a router?

The ___ is the working memory for the router. It contains the running- configuration file, a copy of the IOS, the routing tables, and any associated data required by the routing process

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The following describes what process?

When a router is powered on, it will go through a process like that of a computer. First, the router runs the bootstrap program from the ROM and tests the hardware interfaces to verify they are operational. Once this is done, the IOS is loaded from the FLASH memory into the RAM. Next, the router copies the startup-configuration file from the NVRAM into the RAM where it becomes the running- configuration. This is where the router stores the current configuration settings while powered on. Any changes to the running-configuration file are volatile. This means that if the router is turned off without copying the running-configuration file to the NVRAM, then all configuration changes will be
lost.

A

Router Start Up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A router in a LAN is called an _______ router.

A

interior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An ________ router directs packets between hosts in one LAN and hosts in another LAN.

A

exterior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Routers connect a LAN with the Wide Area Network (WAN) they are called ____ routers or _____.

A

border routers or gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Internet routing devices traditionally have been called _______.

A

gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Within the routing world, a gateway refers to routers that perform ______ _______ functions between machines or networks.

A

routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Gateways may be within or between ______ ______.

A

autonomous systems (AS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An ______ ______ is defined by RFC 1930 as “An __ is a connected group of one or more IP prefixes run by one or more network operators which has a SINGLE and CLEARLY DEFINED routing policy”.

A

Autonomous System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An example of an Autonomous System is…?

A

internal networks within an AFB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the three types of gateways?

A

Interior, Exterior and Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

_____ ______ Routers are used for information exchange within Autonomous Systems and use a variety of Interior Gateway Protocols (IGPs) to accomplish this purpose.

A

Interior Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some examples of interior gateways?

A

Common examples are Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

_____ _____ Routers move information between Autonomous Systems and use Exterior Gateway Protocols (EGPs).

A

Exterior Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

____ _____ _____ is an example of an exterior gateway protocol.

A

Border Gateway Protocol (BGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The following describes what kind of gateway?

A _____ gateway (router) is defined as an IP address on a Layer 3 network device that serves as an access point to or from a network. It also refers to a setting that is configured on hosts to provide them
with a path to leave a LAN so they may transmit traffic to a remote network. The _____ gateway address is the nearest router interface on a subnet. A host or network device would utilize the IP address of the router interface associated with its own subnet as its ____ gateway

A

Default Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the four common challenges that occur with internetworking?

A

Connectivity, Reliability, Network Management, and Flexibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

_____ and _____ are two of the primary devices used to address and overcome some of these internetworking challenges.

A

Routers and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Routers and switches are used to segment a network into separate
_______ domains and separate ______ domains.

A

Broadcast domains and Collision domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A ______ ______ is defined as a portion of a network, limited by its router connection to a specific group of host computers in a common LAN segment.

A

Broadcast Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Routers break up _____ ______.

A

Broadcast Domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Communications between devices on the broadcast domain are via…?

A

Data Link Layer addresses (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

All hosts in the broadcast domain share a common limited or local broadcast scheme of 255.255.255.255. A local broadcast generated by a host will be received by all computers on the network segment.
All hosts in the broadcast domain also share a common logical Network Layer addressing scheme (directed broadcast) also called a ______.

A

subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The router, when properly configured, will be able to send packets to a specific subnet and host. This is possible once the router learns the necessary addresses and places the addresses in its routing table.
This is accomplished in one of two ways…?

A

First, routers are configured with IP addresses and subnet masks on their interfaces which the router uses to extract the subnet address and place it in the routing table.

Second, routers can learn about other distant subnets from other network routers. These learned networks are also placed into the routing table.

40
Q

Actual communication across an internetwork is made possible by using communication ________.

A

protocols

41
Q

In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers and other network entities ____ _____ over a network medium.

A

exchange information

42
Q

The Internet protocols is also called?

A

TCP/IP Protocol Suite

43
Q

The Internet protocols are the world’s most popular open-
system (nonproprietary) protocol suite because…?

A

they can be used to communicate across any set of interconnected networks and are equally well suited for LAN and WAN communications.

44
Q

The Internet protocols consist of a suite of communication protocols, of which the two best known are…?

A

Transmission Control Protocol (TCP) and the Internet Protocol (IP)

45
Q

What are the two types of addressing used in networks?

A

Physical addressing and network addressing

46
Q

Physical addressing is also known as?

A

MAC address

47
Q

Network addressing is also known as?

A

logical or virtual address

48
Q

Hosts generally have only ___ physical network connection, and thus have only ___ MAC address.

A

one

49
Q

Routers and other internetworking devices typically have _______ physical network connections and therefore also have _____ MAC addresses.

A

multiple

50
Q

The physical or MAC address is used to send information from one ___ _ interface to another ____ _ interface.

A

layer 2

51
Q

Network or logical addresses are used to send information from one _____ to another ______.

A

network

52
Q

Routers work primarily in _______ of the OSI model and provide routing and related functions that enable multiple networks to be combined into an internetwork.

A

Layer 3 (Network Layer)

53
Q

_____ and _____ are types of logical addresses.

A

IPV4 and IPV6

54
Q

The logical addresses are not ________ to a device. Typically, a logical address it is based on network characteristics such as a segment or VLAN.

A

permanent

55
Q

____ _____ is when a router determines the optimal path (network) for a packet to travel.

A

Path Determination

56
Q

What kind of messages are sent to acquire path-determination information?

A
  1. A broadcast (routing update message) is one such message that generally consists of sending a whole routing table to all directly
    connected neighbor routers.
  2. A multicast (link-state advertisement) is another example of a message sent between routers throughout the network to inform other routers of the state of the sender’s links.
57
Q

During packet switching, If the router does not know how to forward the packet, what will occur?

A

it usually will discard the packet.

58
Q

During packet switching, If the router knows how to forward the packet, what occurs next?

A

Itt changes the source MAC addresses to that of its outbound interface and changes the destination MAC address to the next hop input interface and transmits the packet.

59
Q

As the packet moves through the internetwork, its Layer 2 Data Link (MAC) addresses are _____ (source and destination) but its Network Layer (IP) protocol addresses (source and destination) remain ______

A

changed
constant

60
Q

What are the reasons why a packet can be discarded?

A
  1. If a packet arrives at a router and the router does not have a listing in its routing table that can be used to forward the packet
  2. A packet is automatically discarded if the version number in the packet header is wrong.
  3. If a packet’s time to live (TTL) counter expires while it is being routed through the network, it is discarded.
  4. A packet can be discarded if there is a bit error during transmission and the checksum (CRC) is incorrect. A packet can be discarded if the Department of Defense security bits are set, and the computer is not authorized to receive the packet.
  5. If the packet must be fragmented to be sent across a connection and the “allow fragmentation flag” has not been set.
61
Q

Network problems can also cause a packet to be destroyed. There are two main causes for this: a congested router that does not have the space in its buffers to handle the packet and it discards it, or…?

A

temporary unusable connection to the receiving computer

62
Q

Routed protocols are commonly called?

A

Network Protocols

63
Q

The following describes what?

_____ ____ are standalone protocols or protocols within a protocol suite that are responsible for providing the logical addressing that router uses to determine where to send the data packet on its way to the destination network.

A

Routed Protcols

64
Q

What are some examples of routed protocols?

A

Examples of such protocol suites are the Internet Protocols (TCP/IP), DECnet, AppleTalk, Novell NetWare now called OES (Open Enterprise Server), and others.

65
Q

____ ____ Routed protocols are protocols that are transported or Routed over an internetwork by Routing protocols.

A

Network layer

66
Q

What are some examples of routed protocols?

A

Examples of routed protocols are IP, Internet Packet Exchange (IPX) and
AppleTalk.

67
Q

Routed protocols occur at the ____ ____ layers of the OSI reference model: which are?

A

The network, transport, session, presentation, and application layers.

68
Q

One very simplified way to look at this is that routed protocols are ______, and routing protocols deliver those messages.

A

messages

69
Q

What does IP stand for?

A

Internet Protocol

70
Q

____ ____ is a Network Layer protocol that contains addressing information and some control information that enables packets to be routed.

A

Internet Protocol (IP)

71
Q

___ is the primary routed Network Layer protocol in the Internet protocol suite.

A

IP

72
Q

Along with ___, IP represents the heart of the Internet
protocols.

A

TCP

73
Q

What are IP’s two primary responsibilities?

A
  1. Providing connectionless, best-effort delivery of packets through an internetwork based on logically assigned addresses
  2. Providing fragmentation and reassembly of packets to support data links with different maximum transmission unit (MTU) sizes.
74
Q

What does MTU stand for?

A

Maximum-transmission unit

75
Q

Packets will sometimes have to be broken down so that they do not exceed the ___ ___ ___ of the network they are being sent across.

A

maximum message size

76
Q

When the data stream is originally sent to IP from the higher layers of the OSI on the sending host, it is broken into pieces (____/____) for transmission by the Transport Layer (___ or ___).

A

segments/datagrams
TCP or UDP

77
Q

As the packet is being forwarded to its destination, further fragmentation due to network characteristics may be necessary. This is done by breaking the message into smaller size pieces for transmission and attaching a…?

A

IP header to each piece

78
Q

What does ARP stand for?

A

Address Resolution Protocol

79
Q

A key protocol that works within the Datalink and Network Layers is called…?

A

ARP

80
Q

The following describes what protocol?

It is designed for Address resolution which is the process of mapping IP network addresses to MAC addresses.

A

ARP

81
Q

_____ _____ is another key protocol that enables network devices to learn the MAC and Network Layer addresses of other network devices.

A

Hello Protocol

82
Q

The following is a process known as what?

When a new router powers up, for example, it broadcasts Hello messages onto the network. Connected routers on the network then return Hello replies. Hello messages are also sent at specific intervals to act as a keep-alive to ensure a connected router is still functional. Contained within the hello protocol packet are the Datalink and Network Layer addresses of the sending device.

A

Neighbor Discovery

83
Q

What does ICMP stand for?

A

Internet Control Message Protocol

84
Q

is a Network Layer Internet management protocol that provides message packets to report errors and other information regarding IP packet processing back to the source.

A

Internet Control Message Protocol (ICMP)

85
Q

ICMP generates several kinds of useful messages, including…?

A

Destination Unreachable, Time Exceeded, Router Advertisement, Router Solicitation, Echo Request and Echo Reply (PING).

86
Q

___ can be used to test IP through the network. ____ sends an ICMP echo request to a destination IP address. This is a Network Layer to Network Layer test; it does not check the entire protocol stack. If the destination machine receives the request, it responds with an ICMP echo reply.

A

Ping

87
Q

____ ____ are Network Layer protocols that are responsible for path determination and packet (traffic) switching.

A

Routing Protocols

88
Q

Routing protocols implement _____ _____ to build and maintain
routing tables. These protocols are used by routers to learn from other routers about available networks. They are designed to apply metric costs to the available paths to determine which path is the best to the destination network.

A

routing algorithms

89
Q

There are two ways for routing to happen, ____ or ____.

A

static or dynamic

90
Q

_____ _____ are established by the network administrator and do not change until the network administrator changes them. Information takes the same route every time.

A

Static routes

91
Q

____ ____ happens when routers learn about other networks and calculate the best path.

A

Dynamic routing

92
Q

IP routing protocols are ____. _____ routing calls for routes to be calculated automatically at regular intervals by software in routing devices.

A

dynamic

93
Q

Examples of routing protocols include what?

A
  1. Routing Information Protocol (RIP)
  2. Interior Gateway Routing Protocol (IGRP)
  3. Open Shortest Path First (OSPF)
  4. Enhanced Interior Gateway Routing Protocol (EIGRP)
  5. Border Gateway Protocol (BGP)
94
Q

IP routing specifies that IP packets travel through internetworks one ___ at a time.

A

hop

95
Q

The routers do not monitor whether the packets get to their destination, nor does IP provide for error reporting back to the source when routing anomalies occur. This task is left to ____.

A

ICMP