MIDTERM EXAM Flashcards

1
Q

VLSM

A

Variable Length Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a technique used in IP network design to create subnets with different subnet masks.

A

VLSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIDR

A

Classless Inter-Domain Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It uses super netting, and has a bunch of contiguous classful network that is addressed as a single network

A

CIDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A comman used to open a rip route

A

router rip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • It has a classful distance vector routing protocol.
  • It does not support VLSM
  • it does not support discontinued subnet mask;
  • Routing Updates has broadcast
  • It does not support CIDR
A

RIPv1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Classless distance vector protocol
  • Has the enhancements of RIPv1 features.
  • Next hop is included in updates.
  • Route updates are multicast. - - Use of authenticationis an option.
  • It has Two Extensions.
A

RIPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The 2 Extensions of RIPv2

A

1st: Subnet Mask Field
2nd: Next Hop Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Similarities of RIPv1 and RIPv2

A
  1. Use timers, preventing loops.
  2. Use of Split Horizon with poison reverse.
  3. Uses trigger updates. Max HOP count 15.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It uses a virtual interface and doesn’t need configuration. Serves as exit interface for static routes.

A

Null Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Null Interface Supernet Static route

A

ip route (ip add) (snm) (Null0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In RIPv1 verifying/testing connectivity

To show a brief routing table of interface

A

show ip int brief

sh ip int br

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Ripv1 verifying/testing connectivity

Comman to send packets. To check if a remote host can be reached and measures the round-trip time for packets sent from the device to a destination device

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In RIPv1 verifying/testing connectivity

comman to identify the path used by a packet to reach its target

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In RIPv1 verifying/testing connectivity

Comman used to examine contents of route updates; to display information on Routing Information Protocol (RIP) routing transactions

A

debug ip rip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The common commands used in RIPv1

A
  • show ip int brief
  • ping
  • traceroute
  • debug ip rip
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A comman used to enable RIPv2

A

version 2

Used after command ‘router rip’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RIPv2

A comman to verify ripv2 config: is used when a dynamic routing protocol is being run on the device.

A

show ip protocols

sh ip pro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Comman to disable auto-sum; and is used to advertise and carry subnet routes in BGP; an explicit network command.

A

no auto-summary

no auto-sum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RIPv2

Used to examine contents of route updates; to display information on Routing Information Protocol (RIP) routing transactions.

A

debug ip rip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RIPv2

Coomands to to verify that supernets are able to send/receive updates

A
  • show ip route
  • debug ip rip
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Common Commands used in RIPv2

A
  • version 2
  • sh ip protocols
  • no auto-summary
  • debug ip rip
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RIP

A

Routing Information Protocol v1/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
OSPF
Open Shortest Path First
26
IS-IS
Intermediate System - Intermediate System
27
BGP
Border Gateway Protocol
28
Types of routing protocol that can use authentication
* RIPv2 * EIGRP * Routing Protocol * OSPF * IS-IS * BGP
29
Level 1 has:
- classful network - the ultimate route that has exit interface and ip address
30
Inside Level 1 is the:
**parent route** that is not the ultimate route because it has child routes
31
Level 2 has:
**Child Route** * it is considered as ultimate route * contains next hop address and exit interface
32
5 Steps for Subnetting
1. Identify Subnet Mask and note Default Subnet Mask 2. Convert Default Subnet Mask into Binary 3. Get Number of Host(Given). Find Subnet Generator(SG). Determine Octet Position. 4. Generate New Subnet 5. Use SG to generate the subnet range(Subnets) in appropriate octet position.
33
Class A
``` network:8 bit|host:24 bit Deafult SNM:255.0.0.0 ```
34
Class B
``` network:16 bit|host:16 bit Deafult SNM:255.255.0.0 ```
35
Class C
``` network:24 bit|host:8 bit Deafult SNM:255.255.255.0 ```
36
# Translate: 255.255.255.0 BIT Translation
`256|128|64|32|16|8|4|2|1` | Translaion: 1111111.11111111.1111111.0
37
# 1111111.11111111.1111111.0 <30 Hosts> How to Identify SG? + new Subnet Mask
Convert Number of host required into binary and count how many bits is used. Count the bits of Host, from right to left, andd 1s after the bits of the host. Where the first 1 from right to left, is the SG. ## Footnote Host 30 = 11110 = 5bits 11111111.11111111.11111111.11100000 SG = 32
38
# 11111111.11111111.11111111.11100000 SG = 32 How to Identify Octet Position?
Identify the Octet position from where the SG is found. | SG is found in Octet 4
39
# 11111111.11111111.11111111.11100000 How to Generate New Subnet Mask
Translate Binary into Decimals | 255.255.255.224
40
Roots of EIGRP: IGRP
Developed in 1985 to overcome RIPv1’s limited hop count
41
Metrics used by IGRP
* Bandwidth (used by default) * Delay (used by default) * Reliability * Load
42
EIGRP Message Format
* Data link frame header * IP packet header * EIGRP packet header * Type/Length/Field
43
# What is PDM? EIGRP uses PDM to route several different protocols i.e. IP, IPX & AppleTalk
Protocol Dependent Modules
44
Used by EIGRP to transmit and receive EIGRP packets
Reliable Transport Protocol (RTP)
45
EIGRP’s 5 Packet Types
* Hello packets * Update packets * Query packets * Reply packets * Acknowledgement packets
46
Used to discover & form adjacencies with neighbors
Hello packets
47
Used to propagate routing information
Update packets
48
- Used by DUAL for searching for networks - Can use Unicast or Multicast
Query packets
49
Can use Unicast only
Reply packets
50
Used to acknowledge receipt of update, query & reply packets
Acknowledgement packets
51
has the purpose to discover & establish adjacencies with neighbor routers
Hello Protocol
52
Characteristics of hello protocol
-- Time interval for sending hello packet * Most networks it is every 5 seconds * Multipoint non broadcast multi-access networks - Unicast every 60 seconds --Holdtime * Default holdtime - 3 times hello interval
53
EIGRP only sends update when there is a ____
change in route status
54
A ____ includes only the route information that has changed – the whole routing table is NOT sent
Partial update
55
When a route changes, only those devices that are impacted will be notified of the change
Bounded updates
56
# TRUE or FALSE EIGRP’s use of partial bounded updates minimizes use of bandwidth
True
57
# What is DUAL? DUAL is EIGRP’s primary method for preventing routing loops
Diffusing Update Algorithm
58
# What is AD? AD, is defined as the trustworthiness of the source route
Administrative Distance
59
EIGRP default administrative distances
* Summary routes = 5 * Internal routes = 90 * Imported routes = 170
60
This is a collection of networks under the control of a single authority
Autonomous System (AS) & Process IDs
61
# TRUE or FALSE EIGRP autonomous system number actually functions as a process ID
True
62
Command used to create a router eigrp
``` Router(config)#router eigrp ? ``` | where '?' must be a number. e.g. router eigrp 1
63
Commands to: - Enables interfaces to transmit & receive EIGRP updates - Include network or subnet in EIGRP updates
#network network-address | e.g. #network 172.16.0.0
64
This command is used when you want to configure EIGRP to advertise specific subnets
The** network Command** with a **Wildcard Mask** e.g. Router(config-router)#network network-address [wildcard-mask] network 192.168.10.8 0.0.0.3
65
Command used to view neighbor table and verify that EIGRP has established adjacencies with neighbors is
show ip eigrp neighbors
66
# EIGRP command is also used to verify that EIGRP is enabled
show ip protocols & show ip route (Denoted as "D")
67
# EIGRP Composite Metric & the K Values EIGRP uses the following values in its composite metric
* Bandwidth * delay * reliability * load
68
# EIGRP Composite Metric & the K Values The composite metric used by EIGRP
Formula used has values K1 K5 (Auotomatically) K1 & K3 = 1 (Auotomatically) all other K values = 0
69
# EIGRP Composite Metric & the K Values Default Composite Formula
metric = [k1 * bandwidth]+[k3 * delay]
70
# EIGRP Composite Metric & the K Values Complete Composite Formula | Not used if K Metric is 0.
metric = [k1 * bandwidth + (K2 * bandwidth/(256-load) + K3 * delay] * K5/reliability + K4)]
71
K1
Bandwidth = 1
72
K2
Load = 0
73
K3
Delay = 1
74
K4
Reliability = 0
75
K5
Reliability = 0
76
# EIGRP Metric Calculation Verify K Values
sh ip protocols
77
# EIGRP Metric Calculation Command to view metrics
show interfaces