Professional Documents
Culture Documents
1. Explain Routing.
Routing is basically a process of establishing the routes that data packets take on their way to
the destination. It is a process of selecting a path across one or more networks to move a data
packet from source to destination. Routing is generally performed in many types of networks
such as circuit-switched networks, computer networks, etc. It is considered as one of the most
essential features in a network and is done by a device called routers.
In the above diagram, the data packet moves from Computer A to Computer B. There are two
paths available:
It depends upon network routers to make a choice whether to pass through 1st or 2nd. The 1st
one is a long path but might be faster at forwarding packets whereas the 2nd one is a shorter
path. These are the kinds of choices that routers have to make constantly.
Data packet is a unit of data that is made into a single package for transmission over a network.
They are also referred to as a network layer package and are also used by IP protocol as they
contain the IP information which is attached to each packet. They contain much essential
information like email messages, website data, and VoIP (Voice-over-IP) calls. Each data packet
has a unique numeric identification number that defines the packet number and order.
Router is a networking device that is used to forward data packets along with a network from
source to destination. The devices are specially designed to receive, analyse, and forward data
packets between computer networks. It examines a destination IP address of a data packet and
uses its headers and routing table to determine the best way or route for transferring the
packets. There are some popular companies that develop routers like HP, Juniper, Nortel, Cisco,
etc.
Functions of Routers:
Static Route: This route is also known as a non-adaptive route. It is either directly configured on
an active interface of the router or manually added to the routing table by an administrator.
Default Route: In this, the router is configured to send all packets towards a single router, and
it does not matter whether or not it belongs to a specific network. It is especially used when
networks deal with a single exit point.
Dynamic Route: This route is also known as the adaptive route. It makes automatic adjustments
of the routes as per the current state of the route in the routing table and also uses routing
protocols to find network destinations.
Switching is a process in computer networks that enable us to interconnect links to form a larger
network. It works at the DLL frame and uses hardware address or mac address of devices on LAN
(Local Area Network) to segment a network.
6. Name two ports of Switches.
Access Port: It connects network hosts to a single VLAN and only carries the traffic of one VLAN.
In this, traffic is sent and received in native format without any VLAN tagging. Access ports are
basically used to connect switch ports with computers with a minimum of 10 Mbps speed.
Trunk Port: It generally connects to another switch and is able to interact with several other
VLANs. By default, it is a member of all VLANs in the VLAN database. The trunk port is basically
used for multiple connections between the switch to switch and switch to routers.
There are basically two different IPX access lists as given below:
Extended: Uses source and destination IP addresses, protocol, socket, and port when fileting a
network.
8. What is the main objective of Data Link Layer and Transport Layer?
Data Link Layer: It is the 2nd layer of the OSI model which is generally responsible for
transferring the datagram across an individual link. It is considered one of the most complicated
layers and also has complex functionalities and liabilities. It also ensures that the appropriate
physical protocol is assigned to the data.
Transport Layer: It is the 4th layer of the OSI model which is responsible for providing
transparent transfer of data among end-users, thus providing reliable data transfer services to
the top layers. Its main objective is to deliver the entire message from source to destination.
9. What do you mean by 100BaseFX?
100BaseFX is basically an Ethernet media standard for Ethernet over fiber optic cables, rather
than twisted-pair cables. It is a version of Fast Ethernet that makes use of fiber optic cables as
the main transmission medium. Here, 100 refers to 100Mbps data speed that means it carries
data traffic at 100 Mbps in LAN.
10. Name the LAN Switching method that is mostly used in CISCO Catalyst 5000?
Store and forward switching method is mostly used by CISCO Catalyst 5000 because it stores the
entire frame to its buffers and executes a CRC check before deciding whether to forward that
data frame or not.
11. Name different memories that are used in CISCO routers.
NVRAM (Non-volatile RAM): It is used to store startup configuration files. It also retains its
content even after a device is restarted or powered down.
DRAM (Dynamic Random-Access Memory): It is used to store configuration files that are
being executed. It loses its content when a device is restarted.
ROM (Read Only Memory): It is used to store a bootstrap program that initializes a boot
process. It also runs and maintains instructions for POST diagnostics.
Flash Memory: It is used to store CISCO IOS. It can also be used to store other files such as
backup configuration files.
Tracert: It is a Command Prompt command that is used to show various details about the path
that a packet takes from the source computer to the specified destination computer. It only uses
ICMP (Internet Control Message Protocol) echo requests. It can be used on a PC. This command
is generally used in Windows NT-based OS.
Traceroute: As the name suggests, it is a command that is used to trace the records of the path
that a packet takes from the source computer to the specified destination computer. It uses UDP
(User Datagram Protocol) echo requests. Traceroute command can be used on a router or switch.
This command is generally used in UNIX OS.
HDLC (High-Level Data Link Control) is a group of communication protocols that usually
provides reliable delivery of data frames over communication or network link. It is a proprietary
protocol for CISCO and is the default encapsulation operated within CISCO routers. It also
ensures the error-free transmission of data and can provide both connection-oriented and
connectionless services.
DLCI (Data Link Connection Identifier) is basically a frame relay 10-bit-wide link-local virtual
circuit normally assigned by frame relay service to uniquely identify each virtual circuit that is
present on the network. It simply identifies which logical circuit the data travels over.
15. Name router command that is used to display RAM content and NVRAM
Content.
The router command that is used to display RAM content is “Show run/show running-config",
and the router command that is used to display NVRAM content is “Show start/show start-
config".
16. What do you mean by Frame relay?
Frame relay is basically a packet switching technology typically used to transfer data between
geographically separated LANs or across WANs. It simply provides connection-oriented
communication by developing and maintaining virtual circuits. It is cost-effective technology and
is generally used to join two or more routers with a single interface. It works on the data link
layer and physical layer of the OSI model.
Half Duplex: Each station can transmit and receive in Half-duplex mode, however not
simultaneously. At the point when one device is sending, the other can just receive, and the
other way around. The half-duplex mode is utilized in situations where there is no requirement
for communication both ways simultaneously. The whole limit of the channel can be used for
every direction.
Full Duplex: Both stations can send and receive all the while in full-duplex mode. Signals that
are going in one direction share the capacity of the connection with signals going another way
IN this type of mode. This sharing can happen in two ways:
Either the connection should contain two truly separate transmission ways, one for sending
and the other for receiving.
The capacity is split between signals going in two ways.
Full-duplex mode is utilized when communication both ways are required constantly. The limit or
capacity of the channel, anyway, should be split between the two directions.
MTU (Maximum Transmission Unit) is considered the largest size frame or packet that a
network-connected device will accept. Its default size is 1500 bytes which is the largest Ethernet
standard unit. TCP (Transmission Control Protocol) generally uses MTU to determine the
maximum size of each packet in any transmission.
Straight Cable: These cables are used to connect different group devices. It is especially used in
LAN to connect different devices such as computers to a network hub like a router, PC and
switch, router and switch, etc. Its ultimate goal is to connect a host to the client.
Cross Cable: These cables are used to connect the same group of devices. It is considered one of
the most commonly used cable formats for network cables. It is especially used when two similar
devices need to be connected. Cross cables are also known as cross-wired cables.
Rollover Cable: These cables are used to connect the console port of the computer. This cable is
specially designed flat to help distinguish it from other types of cables. It generally allows
programmers to connect to network devices and can also manipulate the programming
whenever needed. Rollover cables are also known as Yost cable, Cisco cable, or a Console cable.
Network latency basically represents the delay in communication over a network. It simply refers
to the performance of one device when it communicates with another. It is the time taken for
some data to go from the source to its destination across the network. Network latency can be
affected by bandwidth speed, cabling, network card performance, and congestion.
User Mode: User mode is generally used to view the configurations of the routers. It allows us to
view basic system information, check router status, connect to remote devices, etc. User mode is
mostly used to perform regular tasks on the router when we are using a Cisco router.
Privileged Mode: Privileged mode is generally used to view all the configurations on the router.
It allows you to change configurations that are less important. Privileged mode is mostly used to
perform high-level tasks on the routers such as making configurations and debugging.
In terms of networking, the window is the number of segments that are allowed to be transferred
from the source to the destination before any acknowledgment is sent.
LLC (Logical Link Control) is basically the upper sublayer of the data link layer and acts as an
interface between the network layer and MAC sublayer of the data link layer of the OSI model.
This sublayer provides the logic for data link as it controls the synchronization, flow control,
multiplexing, and also error checking functions of the data link layer. It simply provides optional
services to an application developer.
24. What do you mean by EIGRP? Mention some metrics of EIGRP Protocol.
EIGRP (Enhanced Interior Gateway Routing Protocol) is referred to as Cisco's IGP (Interior
Gateway Protocol) that is used on a computer network especially for automating routing
decisions and configurations. This protocol is suited for different topologies and media. It is
mostly used on a router to share routes with other routers within the same autonomous system.
Bandwidth
Load
Delay
Reliability
MTU
Maximum Transmission Unit
VLAN (Virtual Local Area Network) is basically a logical group of workstations, services, or
network devices that communicate with one another on a separate physical LAN. It improves the
network performance or applies some additional security features. It also allows several networks
to work virtually as if they were a LAN sharing a single broadcast domain.
27. What are the benefits of using VLAN?
Broadcast Domain: As the name suggests, a Broadcast domain is a logical set of reachable
computer systems without having a router. In this type of domain, traffic flows all over the
network. In this scenario, when a device sends a broadcast message, then all the other devices
present in its broadcast domain have to pay attention to it.
Collision Domain: As the name suggests, a Collision domain is a part of a network where packet
collisions can take place when being sent on a shared medium or through repeaters. In this
scenario, when a device sends a message to a network, then all other devices present in its
collision domain have to pay attention to it, whether or not it was destined for them.
Route poisoning refers to a method that prevents certain networks from sending data packets to
path destinations that have already become invalid. This method is being employed by distance
vector routing protocols like RIPv2 whenever they see any invalid route to prevent routing loops.
It is generally used to overcome large routing loops and informs all the connected routers in a
network about the path that is invalid by saying that it has a hop count that exceeds the
maximum allowable.
Static IP address: Static IP address, as the name suggests, is simply an IP address that doesn’t
change. It remains the same until the device is decommissioned or the network architecture is
changed.
Dynamic IP address: Dynamic IP address, as the name suggests, is simply an IP address that
changes over time. It is mostly used because IPv4 does not provide enough static IP addresses to
go around.
Static vs Dynamic IP address:
Network congestion is a situation that occurs when a network node is overloaded with data or
traffic and can cause a common problem for admins. It usually occurs when the network is
carrying or exchanging more data than the network devices like routers and switches can
accommodate. It is a result of an internet route becoming too full when many users try using the
same bandwidth. This condition is true in big networks that do not resort to network
segmentation.
34. What are types of passwords that can be used in CISCO routers?
Enabled: This is a global command that disables privileged execution mode. The password is
not encrypted. To change it, one can use "enable password password".
Enable Secret: In place of an enable password, this secret password is used. To change it, one
can use "enable secret password".
AUX (Auxiliary): Passwords for auxiliary ports can be set using an auxiliary password. Through
a modem, a router can be accessed via this port.
Console: Console port passwords are set using the console password.
VTY (Virtual Terminal): For Telnet sessions into the router, you will need the virtual terminal
password. Passwords can be changed at any time. You can set it up when you configure the
router from the console.
Public IP Private IP
It is mostly used within a private network or LAN to
It is used on public networks. connect securely with other devices within the same
network.
It is usually assigned by a Service
It is usually assigned by a LAN administrator.
provider or IANA.
It is generally used to communicate It is generally used to communicate within the same
outside the network. network.
It can be known by searching “what is my It can be known by typing “ipconfig” on the command
IP” on google. prompt.
Its scope is global. Its scope is local to the present network.
These come with a cost and are
These are free of cost and are used to load network OS.
controlled by ISP.
It is routable and therefore,
It is not routable and therefore, communication among
communication among different users is
different users is not possible.
possible.
Address ranges to be used by private networks are:
It can be any number not included in the Class A: 10.0.0.0 - 10.255.255.255
reserved private IP address range. Class B: 172.16.0.0 - 172.31.255.255
Example: 202.60.23.1 Class C: 192.168.0.0 - 192.168.255.255
Example: 192.168.0.3
The application layer is the topmost layer in the OSI model that is used by end-user software
such as web browsers and email clients. It is considered as the layer through which users interact.
It usually consists of some protocols that are more focused on process-to-process
communication across an IP Network. Some of its functions include:
PoE (Power on Ethernet) generally refers to a technology that allows electric power to be
carried over the Ethernet cable that carries data. It passes the electric power supply to the
network through the cable rather than the power cords and minimizes the number of wires
required to install the network.
OSPF (Open Shortest Path First) is basically a popular link-state routing protocol for IP
networks that are used to connect to a large number of networks without any limitation on the
number of hops. It determines the best route for delivering the data packets within an IP
network. It has been implemented by a wide range of network vendors such as Cisco. It works
on Dijkstra Algorithm.