Chapter 6 - Network Layer Flashcards

1
Q

What are the basic processes of the Network layer?

A

Addressing end devices, encapsulation, routing and de-encapsulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the addressing end devices process do?

A

End devices need to be configured with a unique IP address for identification on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the encapsulation process do?

A

The network layer encapsulates the protocol data unit (PDU) from the transport layer into a packet. This process adds IP header information like the IP addresses of the source and destination devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the routing process do?

A

It directs packets to a destination host on another network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the routers role in the routing process?

A

To travel to other networks a packet must be processed by a router. The routers role is to select the best path and direct packets toward their destination in a process called routing. A packet may cross many intermediary devices before reaching the destination host. Each router a packet crosses to get to its destination is called a hop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the de-encapsulation process do?

A

When a packet arrives at the network layer of the destination host, the host checks the IP header. If the destination IP in the header matches it’s own then it removes the IP header from the packet. Once de-encapsulated the layer 4 PDU is passed up to the appropriate service at the transport layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the commonly implemented network layer protocols?

A

Internet Protocol version 4 (IPv4)

Internet Protocol version 6 (IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does transport layer encapsulation do?

A

It adds a segment header so that the segments of data can be reassembled at the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does network layer encapsulation do?

A

The transport layer encapsulation is encapsulated further by adding a header so packets can be routed through complex networks and reach their destination. In TCP/IP based networks the network layer PDU is the IP packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the benefit of encapsulating data layer by layer?

A

It enables the services at each layer to develop and scale without affecting the other layers. For instance the transport layer segments can be packaged by IPv4, IPv6, or any other network protocols that may be developed in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of IP?

A

IP was designed as a protocol with low overhead, it provides only the functions that are necessary to send a packet from source to destination. The characteristics of IP are:
Connectionless, best effort, and medium independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the connectionless aspect of IP mean?

A

No dedicated end-to-end connection is created before the data is sent. IP requires no initial exchange of control information to establish an end-to-end connection before forwarding packets. IP also does not need to add additional fields to the header in order to maintain an established connection. This helps greatly cut down on the overhead of IP. However this also means that senders are unaware whether destination devices are present and functional when sending packets. They are also not aware if the destination receives the packet, or if they were able to access and read the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the best effort aspect of IP mean?

A

The IP protocol does not guarantee that all delivered packets are received. This makes the IP protocol inherently unreliable. IP does not have the ability to manage and recover undelivered or corrupt packets. This is because IP packets contain no information that can be processed to inform the sender whether delivery was successful. Other layers are responsible for ensuring data integrity, which allows IP to function very efficiently. In TCP/IP the transport layer is responsible for reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the media independent aspect of IP mean?

A

IP operates independently of the media that carry the data at lower layers of the protocol stack. IP packets can be communicated as electronic signals over copper cable, as optical signals over fiber, or wirelessly as radio signals. The data link layer is responsible for taking an IP packet and preparing it for transmission, which means IP packets are not limited to any particular medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What aspect of the media does the network layer consider?

A

Although the network layer is media independent, it is responsible for the maximum size of the PDU that each medium can transport. This characteristic is referred to as the maximum transmission unit (MTU). The establishment of the maximum packet size is part of the control communication between the network layer and the data link layer. The data link layer passes the MTU value up to the network layer, and the network layer determines how large packets can be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the router’s goal when a destination has a smaller MTU than a source medium?

A

It splits up the packet into smaller pieces. This process is called fragmenting the packet or fragmentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some significant fields in the IPv4 packet? What information do they carry?

A

Version - Contains a 4-bit binary number set to 0100 that identifies this as an IP version 4 packet
Differentiated Services or DiffServ (DS) - Formerly called the Type of Service (ToS) field, it’s an 8-bit field used to determine the priority of each packet. The 6 most significant bits are Differentiated Services Code Point (DSCP) and the last two bits are the Explicit Congestion Notification (ECN) bits.
Time-to-Live (TTL) - Contains an 8-bit binary value that is used to limit the lifetime of the packet. The packet sender sets the initial TTL value, and it is decreased by one each time the packet is processed by a router. If the TTL field decrements to 0, the router discards the packet and sends an Internet Control Message Protocol (ICMP) Time exceeded message to the source IP address. This field is important because it eliminates packets that may be caught in a loop, so that they don’t continue on forever.
Protocol - Used to identify the next level protocol. This 8-bit binary value indicates the data payload type that the packet is carrying enabling the network layer to pass the data to the appropriate upper-layer protocol. Common values include ICMP (1), TCP (6), and UDP (17).
Source IPv4 Address - Contains a 32-bit value that represents the source IPv4 address of the packet. The source IPv4 is always a unicast address.
Destination IPv4 Address- Contains a 32-bit value that represents the destination IPv4 address of the packet. This can be a unicast, multicast or broadcast address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What fields are used to identify and validate the packet?

A

The Internet Header Length (IHL), Total Length, and Header Checksum fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What fields are used to reorder a fragmented packet?

A

The Identification, Flags, and Fragment Offset fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some limitations of IPv4?

A

IP Address Depletion - IPv4 has a limited amount of unique public IPv4 addresses available. There are approximately 4 billion, but the increasing number of new IP-enabled devices, always on connections, and the potential growth of less developed regions have increased the need for more addresses.
Internet Routing Table Expansion - A routing table is used by routers to make best path determinations. As the number of servers with internet access increase, so do the number of network routes. These routes consume a great deal of memory and processor resources on internet routers.
Lack of end-to-end connectivity - Network Address Translation (NAT) is a technology commonly implemented within IPv4 networks. NAT provides a way for multiple devices to share a single public IPv4 address. However, because the public IPv4 address is shared, the IPv4 address of an internal network host is hidden. This can be problematic for technologies that require end-to-end connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does IPv6 improve upon IPv4?

A

Increased address space - IPv6 addresses are based on 128-bit hierarchical addressing as opposed to IPv4 with 32-bits. The number of IP addresses is about 340 undecillion addresses, roughly equivalent to the number of grains of sand on earth.
Improved Packet Handling - The IPv6 header has been simplified with fewer fields.
Eliminates the need for NAT - With such a large number of public IPv6 addresses, NAT between a private IPv6 address and a public IPv6 is not needed. This avoids some of the NAT-induced application problems experienced by applications requiring end-to-end connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does IPv6 simplify the IPv4 header?

A

The IPv4 header consists of 20 octets (up to 60 bytes if the option field is used) and 12 basic header fields, not including the Options field and the Padding field. In contrast the simplified IPv6 header consists of 40 octets (largely due to the length of the source and destination IPv6 addresses) and 8 header fields (3 IPv4 basic header fields and 5 additional header fields).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the advantages of the new IPv6 header field?

A
  • Simplified Header format for efficient packet handling.
  • Larger payload for increased throughput and transport efficiency.
  • Hierarchical network architecture for routing efficiency.
  • Auto-configuration for addresses
  • Elimination of need for network address translation (NAT) between private and public addresses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the significant fields in the IPv6 header?

A

Version - This field contains a 4-bit binary value set to 0110 that identifies this as an IP version 6 packet.
Traffic Class - This 8-bit field is equivalent to the IPv4 Differentiated Services (DS) field.
Flow Label - This 20-bit field suggests that all packets with the same flow label receive the same type of handling by routers.
Payload Length - This 16-bit field indicates the length of the data portion or payload of the IPv6 packet.
Next Header - This 8-bit field is equivalent to the IPv4 Protocol field. It indicates the data payload type that the packet is carrying, enabling the network layer to pass the data to the appropriate upper-layer protocol.
Hop Limit - This 8-bit field replaces the IPv4 TTL field. This value is decremented by a value of 1 by each router that forwards the packet. When the counter reaches 0, the packet is discarded, and an ICMPv6 Time Exceeded message is forwarded to the sending host, indicating that the packet did not reach its destination because the hop limit was exceeded.
Source IPv6 Address - This 128-bit field identifies the IPv6 address of the sending host.
Destination IPv6 Address - This 128-bit field identifies the IPv6 address of the receiving host.
Extension Headers (EH) - Provide optional network layer information. Not required, but EHs are used for fragmentation, security, to support mobility and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Where can a host send packets to?

A

Itself - A host can ping itself by sending a packet to a special IPv4 address of 127.0.0.1, which is referred to as the loopback interface. Pinging the loopback interface tests the TCP/IP protocol stack on the host.
Local Host - A host on the same local network as the sending host. The hosts share the same network address.
Remote Host - A host on a remote network. The hosts do not share the same network address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What determines whether a packet is destined for a local host or remote host?

A

The IPv4 address and subnet mask combination of the source device compared to the IPv4 address and subnet mask of the destination device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the default gateway?

A

The network device that can route traffic to other networks. It is the router that can route traffic out of the local network. It can take data in and forward data out. A default gateway has a local IP address in the same address range as other hosts on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How does a host receive the IPv4 address of a default gateway?

A

Either dynamically from Dynamic Host Configuration Protocol (DHCP) or configured manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a default route?

A

A route or pathway you computer will take when it tries to contact a remote network. Having a default gateway configured creates a default route in the routing table of a PC.

30
Q

How do you display the host routing table on a Windows host?

A

The “route print” or “netstat -r” commands. Both commands generate the same output.

31
Q

What sections are listed when using the netstat -r command?

A

Interface List - Lists the Media Access Control (MAC) address and assigned interface number of every network-capable interface on the host, including Ethernet, Wi-Fi and Bluetooth adapters.
IPv4 Route Table - Lists all known IPv4 routes, including direct connections, local network, and local default routes.
IPv6 Route Table - Lists all known IPv6 routes, including direct connections, local network and local default routes.

32
Q

What happens when a packet arrives at the default gateway?

A

The default gateway, usually a router, looks at its routing table to determine where to forward packets.

33
Q

What kinds of routes does a router’s routing table store?

A

Directly-connected routes - These routes come from the active router interfaces. Routers add a directly connected route when an interface is configured with an IP address and is activated. Each of the router’s interfaces is connected to a different network segment.
Remote Routes - These routes come from remote networks connected to other routers. Routes to these networks can be manually configured on the local router by the network admin, or dynamically configured by enabling the local router to exchange routing information with other routers using a dynamic routing protocol.
Default Route - Like a host, routers also use a default route as a last resort if there is no other route to the desired network in the routing table.

34
Q

On a Cisco IOS router, how do you display the router’s IPv4 routing table?

A

With the command “show ip route” (This command is in the privileged exec mode, reached by the “enable” command)

35
Q

When a router interface is configured and activated, what routing table entries are automatically created?

A

C - Identifies a directly-connected network. Automatically created when an interface is configured with an IP address and activated.
L - Identifies that this is a local interface. This is the IPv4 address of the interface on the router (i.e. the connection between the router and the network).

36
Q

What are the parts of a remote network routing table entry?

A

Route Source - Part of an IPv4 routing table entry. It identifies how the network was learned by the router. Common route sources include S (static route), D (Enhanced Interior Gateway Routing Protocol or EIGRP), and O (Open Shortest Path First or OSPF)
Destination Network - Identifies the destination network
Administrative Distance - Identifies the trustworthiness of the route source. Lower values indicate increased trustworthiness.
Metric - Identifies the value assigned to reach the remote network. Lower values indicate preferred routes.
Next-hop - Identifies the IP address of the next router to forward the packet.
Route Timestamp - Identifies when the router was last heard from.
Outgoing Interface - Identifies the exit interface to use to forward a packet toward the final destination.

37
Q

What are the parts of a directly-connected routing table entry?

A

Route Source - Identifies how the network was learned by the router, commonly C or L.
Destination Network - Identifies the destination network and how it was learned (i.e. 192.168.10.0 is directly connected)
Outgoing Interface - Identifies the exit interface to use to forward a packet toward the final destination (i.e. GigabitEthernet0/0).

38
Q

What happens if a route to the destination network is not in the routing table? What is the role of the default route in this regard?

A

If the route is not in the routing table the packet is dropped. However a router can include a default route to create a Gateway of Last Resort. The default route can be manually configured or dynamically obtained.

39
Q

What are the types of businesses and networks that Cisco routers are designed to address?

A

Branch - Teleworkers, small businesses, and medium-size branch sites. Includes Cisco Integrated Service Routers (ISR) G2 (2nd generation)
WAN - Large businesses, organizations, and enterprises. Includes the Cisco Catalyst Series Switches and the Cisco Aggregation Services Routers (ASR).
Service Provider - Large service providers. Includes Cisco ASR, Cisco CRS-3 Carrier Routing System, and 7600 Series routers.

40
Q

What are the components routers require?

A
  • Central Processing Unit (CPU)
  • Operation System (OS)
  • Memory consisting of random-access memory (RAM), read-only memory (ROM), nonvolatile random-access memory (NVRAM), and flash memory.
41
Q

What are the responsibilities of the CPU and the OS of a router?

A

Devices require a CPU to execute OS instructions, such as system initialization, routing functions, and switching functions.

42
Q

What is RAM and what does it do on a router?

A

Random-access memory is volatile memory used in Cisco routers to store applications, processes, and data needed to be executed by the CPU. Cisco routers use a fast type of RAM called synchronous dynamic random access memory (SDRAM).
Uses the following applications and processes:
-The IOS image and running configuration file
-The routing table used to determine the best path to use to forward packets.
-The ARP cache used to map IPv4 addresses to MAC addresses.
-The Packet buffer used to temporarily store packets before forwarding to the destination.

43
Q

What is ROM and what does it do on a router?

A

Read-only memory is a non-volatile memory used to store crucial operational instructions and a limited IOS. Specifically, ROM is firmware embedded on an integrated circuit inside the router which can only be altered by Cisco.
ROM stores the following:
-Bootup information that provides the startup instructions
-Power-on self-test (POST) that tests all the hardware components
-Limited IOS to provide a backup version of the IOS. It is used for loading a full feature IOS when it has been deleted or corrupted.

44
Q

What is NVRAM and what does it do on a router?

A

Non-volatile random-access memory, is a non-volatile memory that is used as the permanent storage for the startup configuration file (startup-config)

45
Q

What is flash memory and what does it do on a router

A

Non-volatile computer memory used as permanent storage for the IOS and other system related files such as log files, voice configuration files, HTML files, backup configurations etc. When a router is rebooted, the IOS is copied from flash into RAM.

46
Q

What are the common hardware components on the inside of a router?

A
  • Power Supply
  • Fan
  • Heat shields for WAN interface card
  • Synchronous dynamic RAN (SDRAM)
  • Nonvolatile RAM and boot flash memory
  • CPU
  • Advanced Intergration Module (AIM) - Offloads processor-intensive functions such as encryption from the main CPU.
47
Q

What kinds of connections and ports are included on a Cisco 1941 router?

A

Enhanced High-Speed WAN Interface Card (eHWIC) Slots - Labeled as eHWIC 0 and eHWIC 1 to provide modularity and flexibility by enabling the router to support different types of interface modules, including serial, digital subscriber line (DSL), switch port, and wireless.
Auxiliary (AUX) - RJ-45 port for remote management access similar to the Console port. Now considered a legacy port as it was used to provide support for dial-up modems.
-Gigabit Ethernet - Interfaces labeled as GE0/0 and GE0/1. Typically used to provide LAN access by connecting to switches and users, or to interconnect to another router.
-Compact Flash Slots - Labeled as CF0 and CF1 to provide increased storage flash space upgradable to 4 GB compact flash card per slot. By default CF0 is populated with a 256 MB compact flash card and is the default boot location.
-Console Ports - For initial configuration and command-line interface (CLI) management access. Two ports are available; the commonly used regular RJ-45 port and a new USB Type-B (mini-B USB) connector. However, the console can only be accessed by one port at a time.
USB - Ports labeled as USB 0 and USB 1 to provide additional storage space similar to flash.

48
Q

What do LED’s indicate?

A

LEDs provide status information. An interface LED indicates the activity of the corresponding interface. If an LED is off and the interface is active, and correctly connected, this may be an indication of a problem with that interface. If an interface is very busy, its LED is always on.

49
Q

What are in-band router interfaces?

A

In-band router interfaces are the LAN (Gigabit ethernet) and WAN (eHWIC) interfaces configured with IP addressing to carry user traffic. Ethernet interfaces are the most common LAN connections, while common WAN connections include serial and DSL interfaces.

50
Q

What are management ports?

A

Management ports include the console and AUX ports which are used to configure, manage, and troubleshoot the router. Unlike LAN and WAN interfaces, management ports are not used for packet forwarding user traffic.

51
Q

What are the common ways to access user EXEC mode on a Cisco router?

A
Console - A physical management port that provides out-of-band access to a Cisco device. Out-of-band refers to access via a dedicated management channel that is used for device maintenance purposes only. 
Secure Shell (SSH) - A method for remotely establishing a secure CLI connection through a virtual interface, over a network. SSH connections require active networking services on the device including an active interface configured with an address.
Telnet - Telnet is an insecure method of remotely establishing a CLI session through a virtual interface, over a network. Unlike SSH, Telnet does not provide a securely encrypted connection. User authentication, passwords, and commands are sent over the network in plain text.
52
Q

What are the major phases to a routers boot-up process?

A

1) Performing POST and load Bootstrap Program - During the Power-on self-test (POST) the router executes diagnostics from ROM on several hardware components, including the CPU, RAM, and NVRAM. After the post the bootstrap program is copied from ROM into RAM. The main task of the bootstrap is to locate the Cisco IOS and load it into RAM. This is also the step where you will see output on the screen if you have a console connection.
2) Locating and Loading the Cisco IOS - The IOS is typically stored in Flash memory and is copied into RAM for execution by the CPU. If the IOS image is not located in flash, then the router may look for it using a Trivial File Transfer Protocol (TFTP) server. If a full IOS image cannot be located a limited IOS is copied into RAM, which can be used to diagnose problems and transfer a full IOS into Flash memory.
3) Locating and loading the configuration file - The bootstrap program then copies the startup configuration file from NVRAM to RAM. This becomes the running configuration. If the startup configuration file does not exist in NVRAM, the router may be configured to search for a TFTP server. If a TFTP server is not found, the router displays the setup mode prompt.

53
Q

How do you display version information about the Cisco router? What information is displayed?

A

With the “show version” command. This displays the version of the Cisco IOS software currently running on the router, the version of the bootstrap program, and information about the hardware configuration, including the amount of system memory.

54
Q

How do you configure a router’s name?

A

With the “hostname [name]” command.

55
Q

How do you secure the user EXEC mode of a router?

A

With the commands:
line console 0
password [password]
login

56
Q

How do you secure remote Telnet/SSH access to a router?

A

With the commands:
line vty 0 15
password [password]
login

57
Q

How do you secure privileged EXEC mode on a router?

A

With the “enable secret [password]” command

58
Q

How do you secure all passwords in the config file on a router?

A

With the “service password-encryption” command

59
Q

How do you provide legal notifications to a router?

A

With the “banner motd [delimiter] [message] [delimiter]

command.

60
Q

How do you save the configuration of a router?

A

With the “copy running-config startup-config” command.

61
Q

How do you enter privileged EXEC mode on a router?

A

You type the “enable” command from user EXEC mode.

62
Q

How do you enter global configuration mode?

A

You type the “configure terminal” command from privileged EXEC mode.

63
Q

What are the interfaces the Cisco 1941 router is equipped with?

A

Two Gigabit Ethernet Interfaces - GigabitEthernet 0/0 (G0/0) and GigabitEthernet 0/1 (G0/1)
A serial WAN interface card (WIC) consisting of two interfaces - Serial 0/0/0 (S0/0/0) and Serial 0/0/1 (S0/0/1) .

64
Q

What are the commands to configure an interface and what do each do?

A

-Enter the interface configuration mode with the “interface [type and number]” command. This must be entered from the global configuration mode.
Once in the interface config mode:
-Add a description with the “description [description-text]” command. This has a 240 character limit, and is not required.
-Set the IP address with the “ip address [ipv4 address] [subnet-mask]” command
-The “no shutdown” command activates the interface and is similar to powering on the interface.

65
Q

What is the most useful command that can be used to verify interface configuration? What information is displayed?

A

The “show ip interface brief” command generates all interfaces, their IPv4 address, and their current status. The configured and connected interfaces should display a status of “up” and protocol of “up”. Anything else would indicate a problem with the configuration or cabling.

66
Q

How can you verify connectivity form the interface?

A

Using the “ping” command. Cisco routers send five consecutive pings and measure minimal, average, and maximum round trip times. Exclamation marks verify connectivity.

67
Q

What are other interface verification commands?

A

“show ip route” - Displays the contents of the IPv4 routing table stored in RAM
“show interfaces” - Displays statistics for all interfaces on the device.
“show ip interface” - Displays the IPv4 statistics for all interfaces on a router.

68
Q

How do you configure the IP address and the default gateway IP of a switch?

A

IP Address:
With the “ip address [IP address]” command.
Default Gateway IP:
With the “ip default-gateway [IP address]” command.

69
Q

T/F: Switches use their configured default gateway addresses to determine where to forward packets originating from hosts connected to the switch and destined for hosts on remote networks.

A

False. The IP address and default gateway information is only used for packets originating from the switch. Packets originating from host computers connected to the switch must already have the default gateway address configured on their host computer operating systems.

70
Q

What does a switch need to connect to is and administratively manage it over multiple networks?

A

An IPv4 address, subnet mask, and default gateway address. Note: These are not strictly required on a Layer 2 switch, only if you wish to access the switch from another network using SSH or Telnet.