N10-009-Section_2 Flashcards

1
Q

Static Route

A

A static route is a fixed route that is manually configured and persistent. Can use less CPU/Memory resources cause there is no math being done to generate the routing table. Can also be more secure cause there are no routing protocols to analyze. Can be difficult to manage on larger networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Routers�

A

Filter and forward based on IP addresses. Interconnect network IDs. Routers don�t care where a packet came from, just where its going. Routers arent tied to Ethernet, they can have Dosis, Optical, all sorts of other connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Routing Table

A

Table of info of connected network IDs and how to get to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Default Route

A

If your router doesn�t know where to route data, it will send it up to its upstream router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Upstream Router

A

ISP’s router is called the upstream router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Metric (Routing)

A

Value that gives your router a route priority when there are equal options. Example: you have 2 uplinks from different ISPs, how does your router know which one will be the primary default route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dynamic Routing

A

When routers automatically send routing tables to each other and converge on the best routs to different places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is OSPF?

A

The main IGP - Open Shortest Path First - Uses Link State Protocols - Requires a single router to be the boss router (Elected Automatically, also elects a backup boss router). Uses Area IDs to designate the territory of each router (Area IDs are not IP address, although they look similar) OSPF can get to convergence faster than RIP. OSPF will choose the fastest link with the lowest cost. (For cost, see Link-State)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is BGP?

A

Border Gateway Protocol - Hybrid protocol, has aspects of Distance Vector and Link State - Cornerstone of the Internet as it’s how ISPs talk with each other - BPG breaks the internet into ASes and routes data between them using the AS number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EIGRP

A

EIGRP (Enhanced Interior Gateway Routing Protocol) is a dynamic routing protocol developed by Cisco, designed for use in IP networks to find the best path for data transmission. EIGRP is a hybrid routing protocol, combining aspects of both link-state and distance-vector protocols, and it is considered an advanced version of the older IGRP (Interior Gateway Routing Protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 2 kinds of routing methods Dynamic Routing Protocols use?

A

Distance Vector and Link State

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Distance Vector?

A

One of the main types of Dynamic Routing Protocols Routing Methods, the grandfather. Where a router will send its entire routing table to all its neighbors for Convergence. Issues: Relies on hop count, sends routing table/info on an interval, so if something changes, it won’t update everyone else instantly. Example is RIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Link State?

A

One of the main types of Dynamic Routing Protocols Routing Methods, the more modern one. Link state routers will check in with its neighboring routers every once in a while to see if anything has changed, it will also send updates as it detects changes (advertising). Example is OSPF. Each link has a “cost” that is based on the amount of throughput, reliability and round trip time and paths are chosen with this cost in mind.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 kinds of routing scopes Dynamic Routing Protocols use?

A

IGP (Interior Gateway Protocols) and EGP (Exterior Gateway Protocols) - Protocols used to determine the most efficient path for data to travel between networks - This is a category of routing protocols, not a protocol itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is IGP?

A

IGP (Interior Gateway Protocol) - Used within a single AS - IGP Protocols can be Distance Vector or Link State - RIP, OSPF, EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is EGP?

A

EGP (Exterior Gateway Protocol) - Used between different ASes - There is only 1 EGP and that is BGP (Border Gateway Protocol) Used by ISPs to talk with other ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an AS?

A

Autonomous System - One organization that has control of their own routers - an ISP or a University

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an ASN?

A

Autonomous System Number - Every AS is assigned a number (32-bit number) - this number is used in BGP to route information back and forth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is RIP?

A

Routing Information Protocol - RIP is an IGP and a Distance Vector Protocol - RIP is where routers will exchange routing tables with each other to discover paths to other networks. RIP will use the hop count to determine the metric for each route. Max hops is 15. RIP can be slow cause there is a fixed interval for when it will exchange routing tables. RIP 2.0 can handle CIDR and has increased security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Convergence

A

Where all routing tables reflect all routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Prefix Lenths in Routing

A

The most specific entry in the routing table “wins” as the best route. So the destination 192.168.1.6 is contained within the table entry of 192.168.0.0/16, but the entry 192.168.1.6/32 is more specific so that will be the entry chosen as the route. The higher the prefix (CIDR) the more specific the route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Administrative Distances

A

What if you have two routing protocols and both know about a route to a subnet? Each routing protocol has a different metric calculation and you can’t compare metrics across routing protocols. Which one is do you trust the most? Each routing protocol within a router has an administrative distance and that determines which protocol has priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

FHRP

A

FHRP stands for First Hop Redundancy Protocol. It’s a family of protocols used in networking to provide redundancy and high availability for the default gateway in a local network. FHRP ensures that if one gateway (usually a router) fails, another can take over immediately, minimizing downtime for connected devices. The backup router will detect that the main router is no longer online and will elect itself as the active router and take over the VIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Subinterfaces

A

Subinterfaces are virtual interfaces created on a physical network interface card (NIC) or port on network devices like routers or layer 3 switches. These subinterfaces allow a single physical interface to handle traffic for multiple VLANs (Virtual Local Area Networks) or different network segments, enabling inter-VLAN routing, IP address segmentation, and more efficient network management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

NAT Overload / PAT

A

PAT (Port Address Translation) is a form of Network Address Translation (NAT) that allows multiple devices on a private network to share a single public IP address when accessing external resources, such as the internet. PAT works by using different port numbers to distinguish between the different connections from devices on the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Trunking

A

A trunk port moves all VLAN traffic across switches. This is done by tagging the port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

802.1Q

A

802.1Q is an IEEE standard that defines VLAN tagging for Ethernet frames, allowing multiple virtual LANs (VLANs) to coexist on a single physical network. It is commonly used in network switches to manage traffic across different segments of a network, isolating broadcast traffic and improving network security and efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Native vs Default VLAN

A

Default VLAN is the VLAN assigned to an interface by default, usually VLAN 1. a Native VLAN doesn�t add an 802.1Q header, can traverse a trunk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Layer 3 Switch

A

A switch that is able to make forwarding decisions based on IP address, like a router. This kind of switch can route between VLANs.

30
Q

SVI

A

An SVI (Switched Virtual Interface) is a logical interface on a layer 3 switch or router that allows the device to perform IP routing within a VLAN (Virtual Local Area Network). SVIs are typically used to enable communication between devices in different VLANs and allow a switch or router to act as the default gateway for devices within a VLAN.

31
Q

LAG

A

Link Aggregation / Port Bonding. Multiple interfaces acting as one large interface. Usually used to increase throughput.

32
Q

LACP

A

LACP (Link Aggregation Control Protocol) is a protocol used to combine multiple physical network links into a single logical link, known as a Link Aggregation Group (LAG), to increase bandwidth and provide redundancy. LACP is part of the IEEE 802.3ad standard and is commonly used in Ethernet networks.

33
Q

MTU

A

Maximum Transmission Unit - Ethernet is 1500 bytes - but not all protocols are limited to this

34
Q

Jumbo Frames

A

Jumbo Frames are Ethernet frames that are larger than the standard maximum transmission unit (MTU) size of 1500 bytes. The standard Ethernet frame size is typically up to 1500 bytes, but jumbo frames allow for much larger payloads, typically in the range of 9000 bytes to 9216 bytes, depending on the network equipment and configuration.

35
Q

802.1D / STP

A

Spanning Tree Protocol. A technology to prevent layer 2 loops. STP port states can be Blocking=not forwarding to prevent a loop, Listening=not forwarding and cleaning the MAC table, Learning=not forwarding and adding to the MAC table, Forwarding=data passes through normally, Disabled=admin has turned off the port.

36
Q

Root Port

A

An STP port that leads back to the root bridge/switch

37
Q

802.1w / RSTP

A

Rapid STP. Latest standard of STP. Faster convergence, old STP might take 30-50 seconds. On RSTP it could take only 6 seconds. RSTP is backwards compatible with STP.

38
Q

Band Steering

A

Band Steering is a feature used in wireless networks, particularly in dual-band Wi-Fi routers or access points (APs), to optimize the connection experience by automatically directing client devices to the most appropriate Wi-Fi frequency band (typically 2.4 GHz or 5 GHz). The goal of band steering is to improve network performance by balancing the load between the two bands, minimizing congestion, and improving overall throughput and reliability.

39
Q

802.11h

A

802.11h is an extension to the IEEE 802.11 Wi-Fi standard, specifically designed to improve the operation of wireless networks in regions where Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) are required. It was introduced to comply with regulatory requirements for 5 GHz Wi-Fi operation, especially in Europe, where Wi-Fi networks must avoid interfering with radar systems (such as weather radar or military radar) operating in the same frequency range.

40
Q

DFS

A

In wireless networking, DFS stands for Dynamic Frequency Selection. It is a mechanism used in Wi-Fi networks operating in the 5 GHz band to minimize interference with other systems, particularly radar systems that share the same frequency range.

41
Q

TPC

A

In wireless networking, TPC stands for Transmit Power Control. It is a mechanism used to regulate the transmission power of a wireless device to optimize performance and reduce interference.

42
Q

6GHz

A

GHz (Gigahertz) is a unit of frequency that represents billions of cycles per second. It is commonly used to measure the frequency of electromagnetic waves, including radio waves, and is especially relevant in fields like telecommunications, networking, and computing.

43
Q

WPA2

A

WPA2 (Wi-Fi Protected Access 2) is the successor to WPA (Wi-Fi Protected Access) and was introduced in 2004 as part of the IEEE 802.11i standard. Utilizes CCMP Block Cipher mode which combines encryption with AES and CBC-MAC for its MIC (Message Integrity Check)

44
Q

WPA3

A

WPA3 (Wi-Fi Protected Access 3) is the successor to WPA2, Utilizes GCMP Block Cipher mode (Galois/Counter Mode Protocol). Still uses AES for encryption but uses GMAC (Galois Message Authentication Code) for MIC (Message Integrity Check)

45
Q

Ad hoc / IBSS

A

Ad Hoc Mode is a wireless network configuration where devices communicate directly with each other without the need for a central access point (AP). In Ad Hoc mode, devices establish a peer-to-peer network, allowing them to exchange data directly. Also called Independent Basic Service Set

46
Q

SSID

A

Service Set ID

47
Q

BSSID

A

Basic Service Set ID - the hardware address of an Access Point

48
Q

ESSID

A

Extended Service Set ID - Multiple WAPs working together with the same SSID

49
Q

Captive Portals (Wireless Security)

A

Captive Portals are a method used in network management to provide guest access to a wireless or wired network, often with the requirement for user authentication before accessing the internet or internal resources. They are commonly used in public spaces (like coffee shops, airports, hotels, etc.) or in enterprise networks to control and secure guest access.

50
Q

WEP

A

Wired Equivalent Privacy - used 64 and 128 bit keys - crackable, old

51
Q

802.11i (WiFi Security)

A

802.11 committee’s first answer to problems of WEP - took too long to come out

52
Q

WPA

A

WiFi Protected Access - Created cause 802.11i was taking too long. Uses TKIP

53
Q

TKIP

A

TKIP (Temporal Key Integrity Protocol) is a security protocol used to provide data integrity and encryption for wireless networks, particularly those based on the IEEE 802.11 standard (Wi-Fi). TKIP was designed as a replacement for WEP (Wired Equivalent Privacy), which had significant security vulnerabilities. It was introduced as part of WPA (Wi-Fi Protected Access) to enhance the security of wireless communication.

54
Q

AES

A

AES (Advanced Encryption Standard) is a symmetric encryption algorithm widely used to secure data. It replaced the older DES (Data Encryption Standard) due to its stronger security and efficiency. AES is the encryption standard endorsed by the U.S. government and is used globally in various applications, including securing communications, financial transactions, and data storage.

55
Q

Omni Antenna

A

Send out radiation pattern in the shape of a sphere

56
Q

Dipole Antenna

A

Two antennas that go opposite of each other - donut shaped pattern, goes out wide but not up and down

57
Q

Patch Antenna

A

Half of a sphere - mounted to a wall, but wont shoot through the wall

58
Q

Directional/Yagi Antenna

A

Stretched football shape, high gain, looks like a tree pointed in a direction

59
Q

Directional/Parabolic

A

Another directional antenna - used for outdoors to shoot a signal a long way, kind of dish with a pole in the middle

60
Q

SMA Connector

A

SubMiniature Version A - Antenna connector

61
Q

Normal Gain for 100-200’ - dipoles and patches

A

3-5 dBi

62
Q

Normal Gain for directional antennas

A

20-30 dBi

63
Q

Autonomous vs. Lightweight Access Points

A

In the context of wireless networking, Autonomous Access Points (APs) and Lightweight Access Points (APs) - Autonomous Aps don�t need additional software or hardware to work, this is like the Aps in your house. Lightweight, most of the intelligence is in the switch that would need to be attached. Lightweight APs are less expensive

64
Q

Infrastructure Mode

A

Infrastructure Mode is a wireless network configuration where wireless devices (clients) communicate through an access point (AP) rather than directly with each other. It is the most common setup for Wi-Fi networks, especially in enterprise and home environments, and is used to connect devices like laptops, smartphones, and tablets to a network.

65
Q

MDF

A

Main Distribution Frame. The Central point of the network. The room or area where all the runs are terminated/punchdown.

66
Q

IDF

A

Intermediate Distribution Frame. A secondary Distribution Frame that is connected to the MDF.

67
Q

Offline/Standby UPS

A

The APCs we use, least expensive, waits for power to go out, then it kicks in, there is a small gap when there is no power before the battery starts up

68
Q

Line-Interactive UPS

A

Can regulate the amount of power and increase the throughput to smoothen out brownouts

69
Q

On-line/Double-Conversion UPS

A

Always running on the battery power, and the batteries are always charging

70
Q

PDU

A

Power distribution units. Sorta like the ADJ switches we use, but smarter, the interfaces can be managed via ethernet

71
Q

Recommended Humidity for Datacenters and network equipment

A

40%-60%. Too much humidity can cause condensation, but too little can cause static discharge

72
Q

Optimal temp for Datacenters and network equipment

A

64 to 81 degrees F (17.7-27.2 C)