Section 2: Network Implementation Flashcards
What is static routing, and what are its key characteristics?
Definition: Manually set routes that don’t change unless updated.
Key Characteristics:
* Manual Entry: Configured directly on the router.
* Low Overhead: No extra CPU or bandwidth needed.
* Consistent Paths: Provides consitent and predictable routes.
What are the pros, cons, and common use cases for static routing?
Pros: Simple, resource-efficient, secure.
Cons: Not scalable, needs manual updates, no auto reouting if an outage occurs.
Use Cases: Small networks, stub networks, controlled paths for security.
What are BGP, EIGRP, and OSPF, what do they stand for and what are they used for?
BGP (Border Gateway Protocol) :
* Connects large networks (e.g., ISPs) on the internet.
* Uses AS numbers and chooses the shortest path for routing.
EIGRP (Enhanced Interior Gateway Routing Protocol) :
* A Cisco-specific protocol for fast routing within a single organization.
* Uses bandwidth and delay to pick the best path, adapts quickly to changes.
OSPF (Open Shortest Path First) :
* A link-state protocol used for finding the best route inside a large network.
* Uses the Shortest Path First (SPF) algorithm and divides the network into areas for efficiency.
What is dynamic routing, and what are its key characteristics?
Definition: Routes are automatically learned and updated using routing protocols.
Key Characteristics:
* Automated Updates: Routes change based on network status.
* Scalable: Handles large and complex networks easily.
* Protocols Used: OSPF, EIGRP, and BGP
What are the pros, cons, and common use cases for dynamic routing?
Pros: Adapts to changes, reduces manual effort, scales well.
Cons: Higher CPU and bandwidth use, more complex setup.
Use Cases: Large, changing networks; environments needing fast failover and adaptation.
What is route selection, and what factors influence it?
Route Selection: Choosing the best path when multiple routes are available.
Key Factors:
* Administrative Distance (AD): Trust level of the route source.
* Prefix Length: The most specific (longest) match is preferred.
* Metric: Value used to determine the best path.
What are FHRP, VIP, and subinterfaces in networking?
FHRP (First Hop Redundancy Protocol): Provides backup gateways for failover. Ensures a backup router is ready to take over if the main router goes down.
Virtual IP (VIP): A shared IP address used by multiple devices for redundancy.
Subinterfaces: Creates virtual interfaces on a single physical port, allowing it to handle traffic from multiple VLANs.
What is VLAN?
Virtual Local Area Network
A VLAN divides a network into smaller, separate sections to isolate traffic, improve security, and reduce congestion, even if devices share the same physical switch.
What are Native VLANs and Voice VLANs?
Native VLAN: Handles untagged traffic on a trunk port (default is VLAN 1).
Voice VLAN: Dedicated VLAN for VoIP traffic, prioritizing voice data for quality.
What is 802.1Q tagging, and why is it used?
802.1Q tagging adds a VLAN identifier to Ethernet frames, ensuring that traffic on trunk ports is assigned to the correct VLAN.
What is an SVI and what does it do?
Switch Virtual Interface
An SVI is a virtual interface on a switch used to manage VLANs and provide Layer 3 IP communication for devices within or between VLANs.
What is a VLAN Database?
VLAN database is simply a collection of information about all the VLANs configured on a switch. It typically includes -
* VLAN ID
* VLAN Name
* Associated Ports
What are link aggregation and duplex settings?
Link Aggregation: Combines multiple physical links for more bandwidth and redundancy.
Duplex: Controls data flow; half-duplex allows one-way at a time, full-duplex allows simultaneous two-way communication.
What are MTU and Jumbo Frames?
MTU (Maximum Transmission Unit):
The largest packet size that can be transmitted (default: 1500 bytes).
Jumbo Frames:
Larger frames (e.g., 9000 bytes) used for high-speed networks to reduce overhead.
What is STP?
Spanning Tree Protocol
STP prevents network loops by ensuring only one active path exists between switches.
What is a channel in wireless networking?
A specific frequency range used by Wi-Fi devices for communication.
What is channel width, and how does it affect performance?
Determines the size of the frequency band (e.g., 20MHz, 40MHz);
wider channels offer higher speeds but can cause more interference.
What are non-overlapping channels, and why are they important?
Channels that do not interfere with each other; critical for reducing interference (e.g., channels 1, 6, 11 in 2.4GHz).
What are regulatory impacts in wireless networking?
They are rules like power limits and frequency usage set by governments and standards (e.g., 802.11h for DFS and TPC).
What is the role of 802.11h?
Adds dynamic frequency selection (DFS) and transmit power control (TPC) to avoid interference with radar systems.
What are the frequency options in wireless networking?
2.4GHz: Longer range, more interference.
5GHz: Higher speeds, shorter range.
6GHz: Less interference, used by Wi-Fi 6E.
What is band steering?
It automatically guides dual-band devices to the less congested 5GHz or 6GHz band for better performance.
What is SSID and what does it stand for?
Service Set Identifier
The name of a Wi-Fi network visible to users.
What is BSSID and what does it stand for?
Basic Service Set Identifier
The MAC address of a specific access point in a wireless network.
What is ESSID and what does it stand for?
Extended Service Set Identifier
A unified SSID for multiple access points in the same network.
aka the same ssid across multiple access points
What is the difference between Wi-Fi Protected Access (WPA2/WPA3) and guest network security like captive portals?
WPA2/WPA3: Encryption protocols (WPA3 offers better encryption and brute-force resistance).
WPA2 uses CCMP
WPA3 uses GCMP
Guest Networks: Separate networks for visitors, often secured by captive portals requiring login.
How does authentication differ between Pre-Shared Key (PSK) and Enterprise modes?
PSK: Shared password for all users.
Enterprise: Uses individual credentials authenticated via a RADIUS server.
What are the roles of antennas, and how do they differ?
Omnidirectional: Broadcasts in all directions.
Directional: Focuses signal in one direction for greater range.
What is the difference between autonomous and lightweight access points (APs)?
Autonomous APs: Self-managed and configured individually.
Lightweight APs: Centrally managed through a wireless LAN controller
What are the types of wireless networks?
Mesh networks: Devices form interconnected nodes for wide coverage.
Ad hoc: Peer-to-peer connections without infrastructure.
Point-to-point: Direct link between two devices.
Infrastructure: Centralized network with an access point
What are key considerations when selecting locations for IT equipment?
Ensure proper placement for accessibility, cooling, and power.
Common locations:
* IDF (Intermediate Distribution Frame): Connects user equipment to the MDF, often placed on each floor.
* MDF (Main Distribution Frame): Central hub for networking and communication equipment.
What is the standard rack size in IT installations?
Racks are typically 19 inches wide with variable heights measured in “U” (rack units, 1U = 1.75 inches).
Why is port-side exhaust/intake important in rack installations?
Ensures proper airflow for cooling; equipment should align with hot aisle/cold aisle designs.
What are the key components of cabling in installations?
Patch Panel: Organizes and connects cables from devices to switches or routers
Fiber Distribution Panel: Manages and protects fiber optic connections.
Why should equipment racks be lockable?
To prevent unauthorized access, ensuring physical security for networking and server hardware.
What are the key components of power management in IT setups?
UPS (Uninterruptible Power Supply): Provides temporary power during outages.
PDU (Power Distribution Unit): Distributes power to multiple devices in a rack.
Power Load: Total power required by equipment; must match supply capacity.
Voltage: Ensure compatible voltage levels (e.g., 120V or 240V).
What are critical environmental factors in IT installations?
Humidity: Should be controlled to avoid condensation or static.
Fire Suppression: Use systems like inert gas or dry chemical suppressors to protect equipment.
Temperature: Maintain consistent cooling (ideal: 18–27°C or 64–81°F) to prevent overheating.