MIDTERM EXAM Flashcards

1
Q

VLSM

A

Variable Length Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a technique used in IP network design to create subnets with different subnet masks.

A

VLSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIDR

A

Classless Inter-Domain Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It uses super netting, and has a bunch of contiguous classful network that is addressed as a single network

A

CIDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A comman used to open a rip route

A

router rip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • It has a classful distance vector routing protocol.
  • It does not support VLSM
  • it does not support discontinued subnet mask;
  • Routing Updates has broadcast
  • It does not support CIDR
A

RIPv1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Classless distance vector protocol
  • Has the enhancements of RIPv1 features.
  • Next hop is included in updates.
  • Route updates are multicast. - - Use of authenticationis an option.
  • It has Two Extensions.
A

RIPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The 2 Extensions of RIPv2

A

1st: Subnet Mask Field
2nd: Next Hop Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Similarities of RIPv1 and RIPv2

A
  1. Use timers, preventing loops.
  2. Use of Split Horizon with poison reverse.
  3. Uses trigger updates. Max HOP count 15.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It uses a virtual interface and doesn’t need configuration. Serves as exit interface for static routes.

A

Null Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Null Interface Supernet Static route

A

ip route (ip add) (snm) (Null0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In RIPv1 verifying/testing connectivity

To show a brief routing table of interface

A

show ip int brief

sh ip int br

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Ripv1 verifying/testing connectivity

Comman to send packets. To check if a remote host can be reached and measures the round-trip time for packets sent from the device to a destination device

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In RIPv1 verifying/testing connectivity

comman to identify the path used by a packet to reach its target

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In RIPv1 verifying/testing connectivity

Comman used to examine contents of route updates; to display information on Routing Information Protocol (RIP) routing transactions

A

debug ip rip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The common commands used in RIPv1

A
  • show ip int brief
  • ping
  • traceroute
  • debug ip rip
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A comman used to enable RIPv2

A

version 2

Used after command ‘router rip’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RIPv2

A comman to verify ripv2 config: is used when a dynamic routing protocol is being run on the device.

A

show ip protocols

sh ip pro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Comman to disable auto-sum; and is used to advertise and carry subnet routes in BGP; an explicit network command.

A

no auto-summary

no auto-sum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RIPv2

Used to examine contents of route updates; to display information on Routing Information Protocol (RIP) routing transactions.

A

debug ip rip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RIPv2

Coomands to to verify that supernets are able to send/receive updates

A
  • show ip route
  • debug ip rip
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Common Commands used in RIPv2

A
  • version 2
  • sh ip protocols
  • no auto-summary
  • debug ip rip
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RIP

A

Routing Information Protocol v1/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

OSPF

A

Open Shortest Path First

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IS-IS

A

Intermediate System - Intermediate System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Types of routing protocol that can use authentication

A
  • RIPv2
  • EIGRP
  • Routing Protocol
  • OSPF
  • IS-IS
  • BGP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Level 1 has:

A
  • classful network
  • the ultimate route that has exit interface and ip address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Inside Level 1 is the:

A

parent route that is not the ultimate route because it has child routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Level 2 has:

A

Child Route
* it is considered as ultimate route
* contains next hop address and exit interface

32
Q

5 Steps for Subnetting

A
  1. Identify Subnet Mask and note Default Subnet Mask
  2. Convert Default Subnet Mask into Binary
  3. Get Number of Host(Given). Find Subnet Generator(SG). Determine Octet Position.
  4. Generate New Subnet
  5. Use SG to generate the subnet range(Subnets) in appropriate octet position.
33
Q

Class A

A
network:8 bit|host:24 bit
Deafult SNM:255.0.0.0
34
Q

Class B

A
network:16 bit|host:16 bit
Deafult SNM:255.255.0.0
35
Q

Class C

A
network:24 bit|host:8 bit
Deafult SNM:255.255.255.0
36
Q

Translate: 255.255.255.0

BIT Translation

A

256|128|64|32|16|8|4|2|1

Translaion: 1111111.11111111.1111111.0

37
Q

1111111.11111111.1111111.0 <30 Hosts>

How to Identify SG? + new Subnet Mask

A

Convert Number of host required into binary and count how many bits is used.

Count the bits of Host, from right to left, andd 1s after the bits of the host.

Where the first 1 from right to left, is the SG.

Host 30 = 11110 = 5bits
11111111.11111111.11111111.11100000
SG = 32

38
Q

11111111.11111111.11111111.11100000

SG = 32

How to Identify Octet Position?

A

Identify the Octet position from where the SG is found.

SG is found in Octet 4

39
Q

11111111.11111111.11111111.11100000

How to Generate New Subnet Mask

A

Translate Binary into Decimals

255.255.255.224

40
Q

Roots of EIGRP: IGRP

A

Developed in 1985 to overcome RIPv1’s limited hop count

41
Q

Metrics used by IGRP

A
  • Bandwidth (used by default)
  • Delay (used by default)
  • Reliability
  • Load
42
Q

EIGRP Message Format

A
  • Data link frame header
  • IP packet header
  • EIGRP packet header
  • Type/Length/Field
43
Q

What is PDM?

EIGRP uses PDM to route several different protocols i.e. IP, IPX & AppleTalk

A

Protocol Dependent Modules

44
Q

Used by EIGRP to transmit and receive EIGRP packets

A

Reliable Transport Protocol (RTP)

45
Q

EIGRP’s 5 Packet Types

A
  • Hello packets
  • Update packets
  • Query packets
  • Reply packets
  • Acknowledgement packets
46
Q

Used to discover & form adjacencies with neighbors

A

Hello packets

47
Q

Used to propagate routing information

A

Update packets

48
Q
  • Used by DUAL for searching for networks
  • Can use Unicast or Multicast
A

Query packets

49
Q

Can use Unicast only

A

Reply packets

50
Q

Used to acknowledge receipt of update, query & reply packets

A

Acknowledgement packets

51
Q

has the purpose to discover & establish adjacencies with neighbor routers

A

Hello Protocol

52
Q

Characteristics of hello protocol

A

– Time interval for sending hello packet
* Most networks it is every 5 seconds
* Multipoint non broadcast multi-access networks
- Unicast every 60 seconds

–Holdtime
* Default holdtime
- 3 times hello interval

53
Q

EIGRP only sends update when there is a ____

A

change in route status

54
Q

A ____ includes only the route information that has changed – the whole routing table is NOT sent

A

Partial update

55
Q

When a route changes, only those devices that are impacted will be notified of the change

A

Bounded updates

56
Q

TRUE or FALSE

EIGRP’s use of partial bounded updates minimizes use of bandwidth

A

True

57
Q

What is DUAL?

DUAL is EIGRP’s primary method for preventing routing loops

A

Diffusing Update Algorithm

58
Q

What is AD?

AD, is defined as the trustworthiness of the source route

A

Administrative Distance

59
Q

EIGRP default administrative distances

A
  • Summary routes = 5
  • Internal routes = 90
  • Imported routes = 170
60
Q

This is a collection of networks under the control of a single authority

A

Autonomous System (AS) & Process IDs

61
Q

TRUE or FALSE

EIGRP autonomous system number actually functions as a process ID

A

True

62
Q

Command used to create a router eigrp

A
Router(config)#router eigrp ?

where ‘?’ must be a number. e.g. router eigrp 1

63
Q

Commands to:
- Enables interfaces to transmit & receive EIGRP updates
- Include network or subnet in EIGRP updates

A

network network-address

e.g. #network 172.16.0.0

64
Q

This command is used when you want to configure EIGRP to advertise specific subnets

A

The** network Command** with a Wildcard Mask
e.g.
Router(config-router)#network network-address [wildcard-mask]

network 192.168.10.8 0.0.0.3

65
Q

Command used to view neighbor table and verify that EIGRP has established adjacencies with neighbors is

A

show ip eigrp neighbors

66
Q

EIGRP

command is also used to verify that EIGRP is enabled

A

show ip protocols & show ip route (Denoted as “D”)

67
Q

EIGRP Composite Metric & the K Values

EIGRP uses the following values in its composite metric

A
  • Bandwidth
  • delay
  • reliability
  • load
68
Q

EIGRP Composite Metric & the K Values

The composite metric used by EIGRP

A

Formula used has values K1 K5
(Auotomatically) K1 & K3 = 1
(Auotomatically) all other K values = 0

69
Q

EIGRP Composite Metric & the K Values

Default Composite Formula

A

metric = [k1 * bandwidth]+[k3 * delay]

70
Q

EIGRP Composite Metric & the K Values

Complete Composite Formula

Not used if K Metric is 0.

A

metric = [k1 * bandwidth + (K2 * bandwidth/(256-load) + K3 * delay] * K5/reliability + K4)]

71
Q

K1

A

Bandwidth = 1

72
Q

K2

A

Load = 0

73
Q

K3

A

Delay = 1

74
Q

K4

A

Reliability = 0

75
Q

K5

A

Reliability = 0

76
Q

EIGRP Metric Calculation

Verify K Values

A

sh ip protocols

77
Q

EIGRP Metric Calculation

Command to view metrics

A

show interfaces