1) What is Routing?
Routing is the process of finding a
path on which data can pass from source to destination. Routing is done by a
device called routers, which are network layer devices.
2) What is the purpose of the Data
Link?
The job of the Data Link layer is to
check messages are sent to the right device. Another function of this layer is
framing.
3) What is the key advantage of
using switches?
When a switch receives a signal, it
creates a frame out of the bits that was extracted from that signal. With this
process, it gains access and reads the destination address, after which it
forwards that frame to the appropriate port. This is a very efficient means of
data transmission, instead of broadcasting it on all ports.
4) When does network congestion occur?
Network congestion occurs when too
many users are trying to use the same bandwidth. This is especially true in big
networks that do not resort to network segmentation.
5) What is a Window in networking
terms?
A Window refers to the number of
segments that is allowed to be sent from source to destination before an
acknowledgement is sent back.
6) Does a bridge divide a network
into smaller segments?
Not really. What a bridge actually
does is to take the large network and filter it, without changing the size of
the network.
7) Which LAN switching method is
used in CISCO Catalyst 5000?
This model uses the
Store-and-forward switching method. It stores the entire frame to its buffers
and performs a crc check before deciding whether or not to forward that data
frame.
8 ) What is the role of the LLC
sublayer?
The LLC sublayer, short for Logical
Link Control, can provide optional services to an application developer. One
option is to provide flow control to the Network layer by using stop/start
codes. The LLC can also provide error correction.
9) How does RIP differ from IGRP?
RIP relies on the number of hops in
order to determine the best route to a network. On the other hand, IGRP takes
consideration many factors before it decides the best route to take, such as
bandwidth, reliability, MTU and hop count.
10) What are the different memories
used in a CISCO router?
– NVRAM stores the startup
configuration file
– DRAM stores the configuration file that is being executed
– Flash Memory – stores the Cisco IOS.
– DRAM stores the configuration file that is being executed
– Flash Memory – stores the Cisco IOS.
11) What is BootP?
BootP is a protocol that is used to
boot diskless workstations that are connected to the network. It is short for
Boot Program. Diskless workstations also use BootP in order to determine its
own IP address as well as the IP address of the server PC.
12) What is the function of the
Application Layer in networking?
The Application Layer supports the
communication components of an application and provides network services to
application processes that span beyond the OSI reference model specifications.
It also synchonizes applications on the server and client.
13) Differentiate User Mode from
Privileged Mode
User Mode is used for regular task
when using a CISCO router, such as to view system information, connecting to
remote devices, and checking the status of the router. On the other hand,
privileged mode includes all options that are available for User Mode, plus
more. You can use this mode in order to make configurations on the router,
including making tests and debugging.
14) What is 100BaseFX?
This is Ethernet that makes use of
fiber optic cable as the main transmission medium. The 100 stands for 100Mbps,
which is the data speed.
15) Differentiate full-duplex from
half-duplex.
In full-duplex, both the
transmitting device and the receiving device can communicate simultaneously,
that is, both can be transmitting and receiving at the same time. In the case
of half-duplex, a device cannot receive while it is transmitting, and vice
versa.
16) What is MTU?
MTU stands for Maximum Transmission
Unit. It refers to the maximum packet size that can be sent out onto the data
line without the need to fragment it.
17) How does cut-through LAN
switching work?
In Cut-Through LAN switching, as
soon as the router receives the data frame, it will immediately send it out
again and forward it to the next network segment after reading the destination
address.
18) What is latency?
Latency is the amount of time delay
that measures the point from which a network device receives a data frame to
the time it sends it out again towards another network segment.
19) Utilizing RIP, what is the limit
when it comes to number of hops?
The maximum limit is 15 hop counts.
Anything higher than 15 indicates that the network is considered unreachable.
20) What is a Frame Relay?
Frame Relay is a WAN protocol that
provides connection-oriented communication by creating and maintaining virtual
circuits. It has a high performance rating and operates at the Data Link and
Physical Layers.
21) How do you configure a Cisco
router to route IPX?
The initial thing to do is to enable
IPX routing by using the “ipx routing” command. Each interface that is used in
the IPX network is then configured with a network number and encapsulation
method.
22) What are the different IPX
access lists?
There are two access lists: Standard
and Extended. Standard Access List can only filter the source or destination IP
address. An Extended Access List uses the source and destination IP addresses,
port, socket and protocol when filtering a network.
23) Explain the benefits of VLANs.
VLANs allow the creation of
collision domains by groups other than just physical location. Using VLANs, it
is possible to establish networks by different means, such as by function, type
of hardware, protocol, among others. This is a big advantage when compared to
conventional LANs wherein collision domains are always tied to physical
location.
24) What is subnetting?
Subnetting is the process of
creating smaller networks from a big parent network. Being a part of a network,
each subnet is assigned some additional parameters or identifier to indicate
its subnet number.
25) What are the advantages of a
layered model in the networking industry?
A layered network offers many
advantages. It allows administrators to make changes in one layer without the need
to make changes in the other layers. Specialization is encouraged, allowing the
network industry to make progress faster. A layered model also lets
administrators troubleshoot problems more efficiently.
26) Why is UDP lease favored when
compared to TCP?
It’s because UDP is unreliable and
unsequenced. It is not capable of establishing virtual circuits and
acknowledgements.
27) What are some standards
supported by the Presentation layer?
Presentation layer supports many
standards, which ensures that data is presented correctly. These include PICT,
TIFF and JPEG for graphics, MIDI, MPEG and QuickTime for Video/Audio.
28) What’s the simplest way to
remotely configure a router?
In cases when you need to configure
a router remotely, the most convenient is to use the Cisco AutoInstall
Procedure. However, the router must be connected to the WAN or LAN through one
of the interfaces.
29) What does the show protocol
display?
– routed protocols that is
configured on the router
– the address assigned on each interface
– the encapsulation method that was configured on each interface
– the address assigned on each interface
– the encapsulation method that was configured on each interface
30) How do you depict an IP address?
It can be done in three possible
ways:
– using Dotted-decimal. For example: 192.168.0.1
– using Binary. For example: 10000010.00111011.01110010.01110011
– using Hexadecimal. For example: 82 1E 10 A1
– using Dotted-decimal. For example: 192.168.0.1
– using Binary. For example: 10000010.00111011.01110010.01110011
– using Hexadecimal. For example: 82 1E 10 A1
31) How do you go to privileged
mode? How do you switch back to user mode?
To access privileged mode, you enter
the command “enable” on the prompt. In order to get back to user mode, enter
the command “disable”
32) What is HDLC?
HDLC is short for High Level Data
Link Control protocol, and is a propriety protocol of CISCO. It is the default
encapsulation operated within CISCO routers.
33) How are internetworks created?
Internetworks are created when networks
are connected using routers. Specifically, the network administrator assigns a
logical address to every network that connects to the router.
34) What is Bandwidth?
Bandwidth refers to the transmission
capacity of a medium. It is a measure of how much volume a transmission channel
can handle, and is measured in Kbps.
35) How does Hold-downs work?
Hold-downs prevent regular update
messages from reinstating a downed link by removing that link from update
messages. It uses triggered updates to reset the hold-down timer.
36) What are packets?
Packets are the results of data
encapsulation. These are data that has been wrapped under the different
protocols of the OSI layers. Packets are also referred to as datagrams.
37) What are segments?
Segments are sections of a data
stream that comes from the upper OSI layers and ready for transmission towards
the network. Segments are the logic units at the Transport Layer.
38) Give some benefits of LAN
switching.
– allows full duplex data
transmission and reception
– media rate adaption
– easy and efficient migration
– media rate adaption
– easy and efficient migration
39) What is Route Poisoning?
Route Poisoning is the process of
inserting a table entry of 16 to a route, making it unreachable. This technique
is used in order to prevent problems caused by inconsistent updates on a route.
40) How do you find valid hosts in a
subnet?
The best way to go about this is to
use the equation 256 minus the subnet mask. The hosts that are considered valid
are those that can be found between the subnets.
41) What is DLCI?
DLCI, or Data Link Connection
Identifiers, are normally assigned by a frame relay service provider in order
to uniquely identify each virtual circuit that exists on the network.
42) Brielfly explain the conversion
steps in data encapsulation.
From a data transmitter’s point of
reference, data from the end user is converted to segments. Segments are then
passed on to the other layers and converted into packets or datagrams. These
packets are then converted into frames before passing on to the network
interface. Finally, frames are converted to bits prior to actual data
transmission.
43) What are the different types of
passwords used in securing a CISCO router?
There are actually five types of
passwords that can be used. These are enable secret, enable, virtual terminal,
console, and auxiliary.
44) Why is network segmentation a
good idea when managing a large network?
For a network administration,
segmenting a network would help ease network traffic and ensures that high
bandwidth is made available at all times for all users. This translates to
better performance especially for a growing network.
45) What are the things that can be
accessed in a CISCO router’s identifying information?
The hostname and the Interfaces. The
hostname is the name of your router. The Interfaces are fixed configurations
that refer to the router ports.
46) Differentiate Logical Topology
from Physical Topology
Logical Topology refers to the
signal path through the physical topology. Physical Topology is the actual
layout of the network medium.
47) What causes a triggered update
to reset the router hold-down timer?
This may happen when the hold-down
timer has already expired, or when the router received a processing task that
incidentally was proportional to the number of links in the internetwork.
48) In configuring a router, what
command must be used if you want to delete the configuration data that is
stored in the NVRAM?
A. erase running-config
B. erase startup-config
C. erase nvram
D. delete nvram
Correct Answer: B. erase startup-config
B. erase startup-config
C. erase nvram
D. delete nvram
Correct Answer: B. erase startup-config
49) Referring to the commands shown,
what command must next be used on the branch router prior to traffic being sent
to the router router?
Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit
Correct Answer: (config-if)#
dialer-group 1
50) When configuring a router
utilizing both physical and logical interfaces, what factor must be considered
in determining the OSPF router ID?
A. The highest IP address of any
physical interface.
B. The lowest IP address of any logical interface.
C. The middle IP address of any logical interface..
D. The lowest IP address of any physical interface.
E. The highest IP address of any interface.
F. The highest IP address of any logical interface.
G. The lowest IP address of any interface.
B. The lowest IP address of any logical interface.
C. The middle IP address of any logical interface..
D. The lowest IP address of any physical interface.
E. The highest IP address of any interface.
F. The highest IP address of any logical interface.
G. The lowest IP address of any interface.
Correct Answer: A. The highest IP
address of any physical interface.
51) Mention what is the
difference between the switch, hub, and router?
Hub
|
Switch
|
Router
|
Hub has single broadcast domain
and collision domain. Anything comes in one port is sent out to the others.
|
It is a device that filters
and forwards packets between LAN segments. Switches have single broadcast
domain and multiple collision domains. It supports any packet protocol, as
such it operates at the data link layer 2 and layer 3
|
Router is a device which
transmits data packets along networks.
|
52. Mention what is the
size of IP address?
Size of IP address is 32 bit for
IPv4 and 128 bit for IPv6.
53. Mention what does data
packets consist of?
A data packet consists of sender’s
information, recipient’s information, and the data contained. It also has
the numeric identification number that defines the packet number and
order. When data is send across the network, that information is
segmented into data packets. In short, data packets carry the information
and routing configuration for your transferred message.
54. Mention what is DHCP?
DHCP stands for Dynamic Host
Configuration Protocol. DHCP assigns an IP address automatically to a
given workstation client. You can also make static IPS for machines like
printers, servers, routers and scanners.
55. Mention what is BOOTP?
BOOTP is a computer networking
protocol used to deploy an IP address to network devices from a configuration
server.
56. Explain why is UDP lease favored
when compared to TCP?
It is because UDP is un-sequenced
and unreliable. It is not capable of creating virtual circuits and
acknowledgments
57. Mention what is the difference
between dynamic IP and static IP addressing?
Dynamically IP addresses are
provided by DHCP server and static IP address are given manually.
58. Mention what are the ranges
for the private IPS?
Ranges for private IPS are
- Class A: 10.0.0.0 – 10.0.0.255
- Class B: 172.16.0.0 – 172.31.0.0
- Class C: 192.168.0.0 – 192.168.0.255
59. In how many ways you can
access router?
You can access it in three ways
- Telnet (IP)
- AUX (Telephone)
- Console (Cable)
60. Explain what is EIGRP?
EIGRP stands for Enhanced Interior
Gateway Routing Protocol; it is a routing protocol designed by Cisco
Systems. It is availed on a router to share routes with other routers
within the same autonomous system. Unlike other routers like RIP, EIGRP only
sends incremental updates, decreasing the workload on the router and the amount
of data that needs to be transferred.
61. Mention what is the matric
of EIGRP protocol?
EIGRP protocol consists of
- Bandwidth
- Load
- Delay
- Reliability
- MTU
- Maximum Transmission Unit
62. Mention what does the clock
rate do?
Clockrate enables the routers or DCE
equipment to communicate properly.
63. Mention what command you
must use if you want to delete or remove the configuration data that is stored
in the NVRAM?
Erase startup- coding is the command
you must use if you want to delete the configuration data that is stored in the
NVRAM
64. Mention what is the difference between TCP and UDP?
TCP and UDP both are protocols for
sending files across computer network
TCP (Transmission Control Protocol)
|
UDP (User Datagram Protocol)
|
TCP is connection oriented
protocol. When connection lost during transferring files, the server would
request the lost part. While transferring a message, there is no corruption
while transferring a message
|
UDP is based on
connectionless protocol. When you send data, there is no guarantee whether
your transferred message will reach there without any leakage
|
The message will deliver in
the order it is sent
|
The message you sent may not
be in the same order
|
Data in TCP is read as a
stream, where one packet ends, and another begins
|
Packets are transmitted
individually and are guaranteed to be whole if they arrive
|
Example of TCP includes
World Wide Web, file transfer protocol, e-mail,
|
Example for UDP are VOIP
(Voice Over Internet Protocol) TFTP ( Trivial File Transfer Protocol),
|
65. Explain the difference between half-duplex and
full-duplex?
Full duplex means that the
communication can occur in both directions at the same time, while half duplex
means that the communication can occur in one direction at time.
66.Mention the conversion steps
of data encapsulation?
Conversion steps of data
encapsulation includes
- Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from the user is converted into Data
- Layer Four (Transport): Data is converted into small segments
- Layer Five (Network): Data converted into packets or datagrams and Network header is added
- Layer Six (Data Link): Datagrams or packets are built into frames
- Layer Seven (Physical): Frames are converted into bits
67. What command do we
give if router IOS is stucked?
Cntrl+Shift+F6 and X is the command
we give if router IOS is stucked.
68.Explain what is route
poisoning?
Route poisoning is a technique of
preventing a network from transmitting packets through a route that has become
invalid.
69. What route entry will
be assigned to dead or invalid route in case of RIP?
In the case of RIP table entry 16
hops will be assigned to dead or invalid route making it unreachable.
No comments:
Post a Comment