Routing and Switching Flashcards

1
Q

a network or segment where a collision can occur. nodes contend for access to the same physical medium.

A

Collision Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples where collision domains occur

A
  • on a logical bus, where the transmission of a single node is heard by all nodes.
  • a hub creates a single collision domain, because all nodes hear all transmissions from other nodes.
  • A coax bus is a single collision domain because the transmission of one node fills the entire medium, potentially colliding with other nodes that try to transmit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the process of dividing up a network by using switches so that only two nodes exist in each collision domain. Each port on a switch belongs to a separate collision domain because it forwards traffic only to the connected node.

A

Microsegementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a network or segment where any node connected to the network can directly transmit to any other node in the area without a central routing device.

A

Broadcast Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a Layer 2 (Data Link Layer) protocol used to prevent switching loops in switches that support this protocol. Whenever there are redundant paths between switches, where either two switches are connected using two different links or a ring of switches is connected to each other, a switching loop will occur. this protocol prevents switching loops and broadcast storms because switches use it to determine if there are any redundant links that may cause a loop. The switch will temporarily block its redundant link, thus eliminating the possibility of a loop.

A

Spanning Tree Protocol (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

replaces spanning tree protocol (STP) its process only takes 20 seconds compared to 50 seconds with (STP).

A

Rapid Spanning Tree Protocol (RSTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

another replacement for STP

A

Shortest Path Bridging (SPB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The MAC Address Table process:

(The ARP table is used to resolve the IP address to the MAC address. If the address is on another network, ARP resolves to the gateway MAC address)

A
  1. When the switch receives traffic from a device, the switch creates an entry in the MAC address table for the device that sent the traffic.
  2. The switch then looks up the destination MAC address in the table, and if it is a known MAC address, it sends the data to the destination.
  3. If the destination MAC address is not found in the table, the switch floods all of the ports except the port from which the data was sent.
  4. If the receiving MAC address accepts the data, the newly found MAC address is added to the table. The table keeps the addresses for a pre-determined time, typically five minutes, before entries are removed from the table.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In this type of network, data to be transmitted is broken into packets that move in sequence through the network. Each packet takes the best route available at any given time, rather than following an established circuit path. Each data packet contains all of the routing and sequencing information required to transmit it from one endpoint to another, after which the data is reassembled.

A

Packet Switched Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

one endpoint creates a single connection to the other endpoint. used in telephony networks.

A

Circuit-Switched Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a centralized switch is used to connect and manage switches that have been deployed remotely in a hierarchical configuration.

A

Distributed Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the process of selecting the best route for transferring a packet from a source to its destination on a network. The action of forwarding a packet from one router to the next is called a hop. Routers make forwarding decisions based on Layer 3 network addresses, typically IP’s.

A

Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Routing Process:

A
  1. A router receives data and reads its destination IP address.
  2. The router reads its routing table, which lists the locations of other routers on the network
  3. Once it decides on a route, it removes the old destination MAC address and attaches the MAC address of the next hop in the data’s path. The packet’s ultimate destination IP address never changes. By enabling the router to change the destination MAC address, the data moves through multiple local networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The IP Data Packet Delivery Process:

A
  1. Either the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP) prepares the data payload. If necessary, name resolution has already taken place.
  2. The Transport-layer protocol (TCP or UDP) passes the segment/datagram to IP.
  3. IP encapsulates the segment/datagram into an IP packet that includes the source and destination IP addresses.
  4. IP passes the packet to the Network Interface layer for Layer 2 addressing and transmission.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Local and Remote Delivery Process:

A
  1. The node applies the subnet mask to its own IP address to determine its own network ID.
  2. It then applies the subnet mask to the packet’s destination address to determine the destination network ID.
  3. Once the node has applied the subnet mask, it compares the two network IDs.
    a. ) If they are the same, then the two nodes are on the same subnet, and the node can deliver the packet.
    b. If the two networks are different, then the two nodes are remote to each other, and the data is routed to the remote network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Default Routing Table Entry for:

Default Gateway

A

Destination: 0.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Default Routing Table Entry for:

Local Loopback

A

Destination: 127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Default Routing Table Entry for:

Local Subnet

A

Destination: network portion of local IP address plus host address of all 0s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Default Routing Table Entry for:

Network Interface

A

Destination: local IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Default Routing Table Entry for:

Subnet Broadcast

A

Destination: 224.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Default Routing Table Entry for:

Internetwork Broadcast Address

A

Destination: 255.255.255.255

22
Q

Routing Table Commands

route print

A

Displays the routing table entries

23
Q

Routing Table Commands

route add

A

Adds static entries

24
Q

Routing Table Commands

route delete

A

Removes static entries

25
Q

Routing Table Commands

route change

A

Modifies an existing route

26
Q

Routing Table Commands

route -p

A

makes route persistent across reboots, when used with add command

27
Q

Routing Table Commands

route -f

A

Clears a routing table of all entries

28
Q

used on packet-switched networks to automatically calculate route costs and routing table entries. Routers calculate the direction and distance between any two points and route packets based on their calculation of the fewest number of hops. Better for smaller networks. Gets info from local networks.

A

Distance-vector routing

29
Q

floods routing information to all routers within a network. It attempts to build and maintain a more complex route database with more information about the network. Routers can exchange information about a route such as its quality, bandwidth and availability. Gets updates from everyone through hello packets. Decisions based on more than just # of hops.

A

Link-state routing

30
Q

a self-contained network or group of networks governed by a single administration

A

Autonomous System (AS)

31
Q

Autonomous System (AS) play the following three different roles:

A
  • Interior router- Interior routers use IGP’s. Internal networks only.
  • Exterior router- Exterior routers use EGP’s. Operate on the Internet backbone.
  • Border or edge router- Have an interface to the internal network and an interface to the internet
32
Q

uses routing table entries that were entered manually by the network administrator. routes do not change unless the network administrator changes them. routes remain in a routing table, and traffic is forwarded regardless of whether the destination is active or inactive. It is useful in small networks where there are no redundant routes and the topology will not change.

A

Static Routing

33
Q

Routers calculate the direction and distance between any two points and route packets based on their calculation of the fewest number of hops. Basically, means “how far” and “in what direction”

A

Distance-Vector Routing protocols

34
Q

Process for Distance-Vector Routing protocols:

A
  1. Each router passes a copy of its routing table to its neighbors and maintains a table of minimum distances to every node.
  2. The neighbors add the route to their own tables, incrementing the metric to reflect the extra distance to the end network. The distance is given as a hop count; the vector component specifies the address of the next hop.
  3. When a router has two routes to the same network, it selects the one with the lowest metric, assuming that it is faster to route through fewer hops.
35
Q

Easy to configure, best deployed in small networks with fewer numbers of routers. very stable, but convergence is slow. prone to count-to-infinity loops. uses a simple hop count to determine the best path.

A

Routing Information Protocol (RIP)

36
Q

RIP for IPv6. Classless routing protocol.

A

RIPng

37
Q

Flood routing information to all routers to build and maintain a more complex network route database. Routers can exchange information about a route, such as its quality, bandwidth, and availability. Routers update only when one of their links changes state except for a periodic “hello” packet to assure their neighbor routers are still functioning on the network. algorithms broadcast small updates and converge quickly, a feature that makes them less prone to routing loops. More expensive to implement and require more power and memory.

A

Link-State Routing protocols

38
Q

protocol that implements Link-State routing. uses a cumulative link cost to determine the best path.

A

Open Shortest Path First (OSPF)

39
Q

the period of time between a network change and when the router updates to reach a steady state once again. during this time data delivery can be unreliable, as the routing table may not be updated with the route information.

A

Route Convergence

40
Q

When you use this type of routing protocols, as the AS border or exterior, routers pass routing information from one to the next, each adds its presence to the path and forwards the route to the next autonomous system in the chain.

A

Path-Vector Routing protocols

41
Q

an example of a path-vector routing protocol

A

Border Gateway Protocol (BGP)

42
Q

maintains a topology table of the entire network, indicating possible alternate routes should the best route fail. Supports both classful and classless subnet masks. Can be used on multilayer switches. more sophisticated in that it uses five variables (bandwidth, delay, reliability, loading, and MTU) to determine the overall best path.

A

Enhanced Interior Gateway Protocol (EIGRP)

43
Q

Example of a Hybrid Routing protocol

A

Enhanced Interior Gateway Protocol (EIGRP)

44
Q

a logical grouping of ports on the switch. Nodes that plug into those ports can communicate only with nodes that belong to the same VLAN. This effectively divides a physical switch into multiple, smaller logical switches.

A

Virtual Lan (VLAN)

45
Q

Common Uses for VLANS

A
  • Traffic Management- reduces the impact of broadcasting as they will only broadcast to the ports that are part of that VLAN.
  • Security- Separated nodes into groups without needing to purchase multiple switches. Security can be applied to each VLAN.
  • Separate nodes based on traffic type and need for quality of service (QOS)- For example, it is commonplace to put all VoIP phones on their own VLAN so there is no interference coming from nodes that are sending email or downloading large files on the same network.
46
Q

What are the ways to assign VLANs

A
  • Manually configure each port on a switch to belong to a particular VLAN
  • Associate a VLAN with a node’s MAC address- a database is created ahead of time that maps the VLANs to the MAC addresses.
  • Generally, a single port on the switch can belong to only one VLAN at a time- the exceptions are ports that have been configured to be Trunk Ports to connect other switches, or ports that are configured for port mirroring.
47
Q

Ports configured to connect to other switches, or ports that are configured for port mirroring.

A

Trunk Ports

48
Q

IEEE standard that inserts a special tag in the Ethernet header identifying the VLAN for that frame. The switch at the other end of the trunk link reads that tag and forwards the frame to the appropriate VLAN. This is because trunk links carry all VLAN traffic so there must be some mechanism for identifying which frame belongs to which VLAN as it moves from switch to switch.

A

IEEE 802.1q

49
Q

can be used to connect a variety of network hardware, including switch-to-switch, server-to-switch, server-to-server, or switch-to-router. Tagged frames are configured with 802.1q encapsulation.

A

Port Tagging

50
Q

the messaging protocol that switches use to update each other’s VLAN databases. Developed by Cisco, it allows switches to quickly advertise to each other when a VLAN is created or deleted.

A

VLAN Trunking Protocol (VTP)

51
Q

This is the default mode for VTP on a switch. In this mode, a switch can modify VLANs. This information is then transmitted to all the other switches that are configured to the same group using VTP.

A

VLAN Trunking Server Mode