Professional Documents
Culture Documents
CCNA 3 Study Guide Answers-All
CCNA 3 Study Guide Answers-All
0
MODULE 1 STUDY GUIDE
OSPF
RIP v. 2
EIGRP
IS-IS
Subnetting a subnet
It’s the same thing as route summarization; it’s a way to summarize more
than 1 route with one route entry in a router’s routing table.
Make sure your VLSM routes are not distant from each other. This way
routes can be aggregated into one route in the routing table.
No. It still has many of the same characteristics of RIP v. 1, including hop
count max of 16.
Router(config)#router rip
Router(config-router)#version 2
Router (config-router)#network [attached network(s)]
or
Router(config)#router rip ver 2
11. What show commands can you use to ensure that RIP v. 2 has started running?
show ip route
show ip protocols
12. What is the command to flush (clear) the routing table to force an update?
clear ip route *
13. What will you see if you use the debug ip rip command?
You’ll see all the RIP updates as they are sent and received by the router.
Add “no” to the same command you used to turn it on, or you can use the
“no debug all” to turn off all debugging.
15. What are the three (3) ways that routers learn about routes (networks)? Briefly
explain each one.
16. What are the two commands that can be used to enter a default route?
1. What are the two main ways of classifying dynamic IGP routing protocols?
Distance-vector
Link-state
2. Which ones are also known as “shortest path first” protocols? Why?
Link-state, because that’s exactly what they do: they look for the shortest
path to the destination (regardless of whether or not this is the BEST path).
Link state protocols use them to make sure a link is still active. They’re
very small packets.
7. How does a link state protocol build its topological database? What kind of
information is in it?
It’s a database of the entire topology of the network and includes each link and
how to reach it. It’s built by using the LSAs that have been received by the router.
9. What is the DR and the BDR in an OSPF network? What do they do?
10. What is the multicast address used by the DR to send out LSAs to all other
OSPF routers? For LSAs just to other designated (and backup) routers?
224.0.0.5
224.0.0.6
A hello packet is the way OSPF routers make sure that a link is still active.
224.0.0.5 is the address used so that all links are checked, not just DRs and
BDRs.
10 seconds
Area 0 (zero)
17. What does an OSPF router use for its router ID? How can you force a different
ID?
It uses the highest active IP address on any of the interfaces (where OSPF
is running). If you want to change the ID, set a Loopback interface with a
higher IP address so it will be forced to be the ID.
Router(config)int Loopback[No.]
Router(config-if) ip addr [IP number] [subnet mask]
255.255.255.255
22. Why must you set the bandwidth on an interface running OSPF? What is the
default bandwidth? How can you change it?
Cost (the default metric of OSPF) uses bandwidth to determine the best
route. The default is 1.544 Mbps. You can change it with the command:
They exchange passwords that only other OSPF routers will know. Use the
commands below to set authentication:
25. What is the relationship between the “hello” packet interval and the “dead”
interval? What is meant by the “dead” interval?
The dead interval is 4 times the hello interval (e.g., hello is 10 seconds, so
dead is 40 seconds).
The dead interval is the time used to determine that a link is down, or dead.
In other words, if a hello isn’t received from a link for the space of 4 times
the normal hello interval, it’s considered dead.
27. What is the best way to define a default route on an OSPF router?
28. How can you make sure that this information is propagated to other routers in the
area?
Router(config-router)#default-information originate
29. List some of the show commands you can use to make sure that OSPF is
functioning correctly.
Show ip route
Show ip protocol
Show ip ospf interface
Show ip ospf
Show ip ospf neighbor [detail] (shows neighbor database)
Show ip ospf database (shows topological database)
EIGRP supports VLSM and CIDR, it has faster convergence times, it’s more
scalable, and handles routing loops better than IGRP does.
3. Can IGRP and EIGRP routers “talk” to each other? Why or why not?
4. List the three tables that EIGRP maintains and briefly describe each one.
Topology – lists all routing tables in the AS; all learned routes are in this
table
Neighbor – lists adjacent routers, their addresses and interfaces
Routing – lists best route to each destination network
5. List the five pieces of information found in the topology table and briefly describe
each one.
The successor route is the route in the routing table; in other words, the
route considered the best to the destination. The feasible successor is the
back-up route, or the next-best route.
What are the five EIGRP packet types? Briefly describe each one.
If you do not want to summarize routes, what is the command to turn it off? Why
might you not want to summarize (aggregate) routes?
router(config-router)#no auto-summary
If you have discontiguous subnets (subnets not right beside each other in
the numbering scheme), route summarization probably won’t work right.
List some of the show commands you can use to verify that EIGRP is running
correctly.
show ip route
show ip eigrp
show ip protocol
show ip eigrp neighbor [details]
show ip eigrp interface
show ip eigrp topology
show ip eigrp traffic
Which table built by EIGRP is considered the most important? List the fields of
information contained in this table and briefly describe each one.
2. What networking device can help cut down or even eliminate collisions on an
Ethernet network? Why?
Item Layer
Router 3
Switch 2
Bridge 2
Passive hub 1
Active hub 1
Transceiver 1
IP address 3
MAC address 2
Packets 3
Frames 2
Data segments 4
Repeater 1
Ethernet
A device can either transmit or receive, but not both at the same time.
It is the delay the time a frame or a packet takes to travel from the source
station to the final destination. Latecncy is is inherent in different types of
networks and networking devices.
First, there is the time it takes the source NIC to place voltage pulses on
the wire and the time it takes the receiving NIC to interpret these pulses.
This is sometimes called NIC delay, typically around 1 microsecond for a
10BASE-T NIC.
Second, there is the actual propagation delay as the signal takes time to
actually travel along the cable. Typically, this is about .556 microseconds
per 100 m for Cat 5 UTP. Longer cable and slower nominal velocity of
propagation (NVP) results in more propagation delay.
Third, latency is added according to which networking devices, whether
they are Layer 1, Layer 2, or Layer 3, are added to the path between the two
communicating computers. The actual transmission time, the duration of
time to actually send the bits, must also be included in understanding
timing on networks.
It is defined as the basic unit of time in which one bit can be sent.
12. What is meant by “full duplex” technology? Which Ethernet connections can take
advantage of it? What does it take in order to create a full duplex network?
It means that a device can both send and receive at the same time.
Ethernet 10BASE-T, 100BASE-TX, or 1000BASE-Fx can use full duplex.
A dedicated port on a switch that can support full duplex is required for
each node
13. How many wires does it take to make a full-duplex cable? How much of the
bandwidth is available on a full-duplex network?
it takes two pairs for full duplex. 100% of the bandwidth in both directions
is available on full duplex because there is one pair of wires for sending
and another for receiving data.
Yes, switches introduce less latency onto the network. They only add 10-
30% latency; routers add 20-30% latency. However, switches only can
segment at Layer 2 to create separate collision domains; routers can
segment at Layer 3 (networks) and can subnet in separate networks.
16. Are there more or fewer collision domains in a microsegmented LAN? Why?
20. Where does a switch store destination and transmission data? Describe the
difference between the two main types.
21. What are the two switching methods? What are the main differences between the
two?
Fast Forward – only reads the destination MAC address and immediately
starts forwarding the frame
Fragment Free – makes sure there area at least 64 bytes of data to send
before forwarding the frame (anything less than 64 bytes is a fragment)
23. What are the two main reasons to use of Ethernet switches in a network?
24. What are the three main frame transmission modes used by Ethernet switches?
Cut Through
Store and Forward
Fragment Free
Adaptive cut-through – With this mode, the switch uses cut-through until it
detects a given number of errors. Once the error threshold is reached, the
switch changes to store and forward mode. This method is sometimes
referred to as Error sensing
26. What does a bridge use to forward data packets? How does it learn this information?
27. How does a switch learn MAC addresses? What happens when a switch adds a new
MAC address to its table?
Switches learn MAC addresses from incoming packets. They add these
addresses to their MAC tables so they can remember which segment hosts
which nodes. Each new address is time stamped so the switch can
determine which address are still good and which are old.
To take out and process the address information from incoming data
packets
To compare the destination address with a table of addresses stored within
it
30. Can switches filter broadcast or multicast frames? Why or why not?
Most Ethernet switches can filter broadcast and multicast frames, because
today, they are able to filter according to the network-layer protocol.
FF:FF:FF:FF:FF:FF
33. What are the four components that make up a successful network design? Briefly
describe each one.
Functionality – The network must work. The network must allow users to
meet their job requirements. The network must provide user-to-user and
user-to-application connectivity with reasonable speed and reliability.
Scalability – The network must be able to grow. The initial design should
grow without any major changes to the overall design.
Adaptability – The network must be designed with a vision toward future
technologies. The network should include no element that would limit
implementation of new technologies as they become available.
Manageability – The network should be designed to facilitate network
monitoring and management to ensure ongoing stability of operation.
34. To maximize bandwidth and availability of resources, what should you consider
when designing a LAN?
35. What are the two main groups of servers? Give some examples of each would do
and would be located.
36. What are the steps you should follow in order to create a successful network
design?
39. What are MDFs and IDFs? What would you find in them?
40. What is the difference between horizontal cabling and vertical cabling?
Horizontal cabling runs from the workareas to the DF; backbone cabling is
the main cable running from floor-to-floor carrying the majority of the data
to the major networking devices (switches and routers).
41. List some of the documents you should create as you design and build your network.
43. What layer of the OSI model do access switches run at? What are they designed to
do? List a few of the Cisco models.
They run at Layer 2 (although they have some Layer 3 characteristics) and
their main purpose is to allow end users into the network. Some of the
Cisco models are 1900 series, 2950 series, 4000 series, and 5000 series.
44. What layer of the OSI model do distribution switches run at? What are they designed
to do? List a few of the Cisco models.
Switches in this layer operate at Layer 2 and Layer 3 and they aggregate the
wiring closet connections, define broadcast/multicast domains, allow Virtual
LAN (VLAN) routing, create any media transitions that need to occur, and add
security to the network. Some of the models are 2926G, 5000 series, and 6000
series.
45. What layer of the OSI model do core switches run at? What are they designed to
do? List a few of the Cisco models.
Core switches are designed to use Layer 2 or Layer 3 switching and switch
packets as fast as possible and do not perform any packet manipulation, such
as access list filtering, which would slow down the network. An example of a
core switch is an ATM switch. Some of the models include Catalyst 6500
series, Catalyst 8500 series, IGX 8400 series, and Lightstream 1010.
Roll over cable into the console port. You normally use a HyperTerminal or
Telnet session from a PC to see what is happening on the device.
There is none. You simply plug in the switch to the power source.
6. What does CLI stand for? How does it differ on a Cisco switch from a
router?
Command line interface. It doesn’t differ very much—they both use the
Cisco IOS; the only thing that’s a little different is the particular command
set available on each.
User EXEC
Enable/privileged EXEC
Global configuration EXEC
Particular configuration EXEC (e.g., interface, line, etc.)
Remove any existing VLAN information by deleting the VLAN database file
VLAN.dat from the flash directory
Erase the back up configuration file startup-config
Reload the switch
Command Purpose
Switch#show mac-address-table Displays the MAC table
Switch#clear mac-address-table Clears all entries out of the MAC table
and forces it to rebuild itself
Switch(config)#mac-address-table static To set a static MAC address in the MAC
[mac address of host] interface [type] table
[number] vlan [number or name]
Switch#show port security Display switch security on ports
It may cause broadcast storms, multiple frame copies, and MAC address
table instability problems. It is possible for switches to learn the wrong
information. A switch can learn that a MAC address is on a port when it is
not really on that port.
4. What is the IEEE standard for Spanning Tree? What does it specify
802.1d; It specifies that the STP (spanning tree protocol) use the Spanning
Tree Algorithm (STA) to construct a loop free shortest path network.
Shortest path is based on cumulative link costs. Link costs are based on
the speed of the link.
5. What are BPDUs? What information contained in these BPDUs allow the
switch to create the loop-free topology?
The message that a switch sends allowing the formation of a loop free
logical topology is called a Bridge Protocol Data Unit (BPDU).
Select a single switch that will act as the root of the spanning tree
Calculate the shortest path from itself to the root switch
For each LAN segment, designate one of the switches as the closest one to
the root. This bridge is called the “designated switch.” The designated
switch handles all communication from that LAN towards the root bridge.
Each non-root switch chooses one of its ports as its root port. This is the
interface that gives the best path to the root switch.
Select ports that are part of the spanning tree, the designated ports. Non-
designated ports are blocked.
7. Which switch will become the root bridge in a network running STP?
Every 2 seconds
9. What are the five STP states? Briefly describe each one.
blocking state - ports can only receive BPDUs; data frames are discarded
and no addresses can be learned
listening state - switches determine if there are any other paths to the root
bridge (called the forward delay)
learning state - user data is not forwarded, but MAC addresses are learned
from any traffic that is seen (also called the forward delay)
forwarding state - user data is forwarded and MAC addresses continue to
be learned; BPDUs are still processed
disabled state - occurs when an administrator shuts down the port or the
port fails
When all the switch and bridge ports are in either the forwarding or blocked
state
3. How does a switch that has multiple VLANs on it switch frames that come into it?
The switch maintains a separate bridging table for each VLAN, so if a frame
comes in on a port in VLAN 1 the switch searches the bridging table for
VLAN 1
When the frame is received, the switch adds the source address to the
bridging table if it is currently unknown.
The destination is checked so a forwarding decision can be made.
For learning and forwarding the search is made against the address table
for that VLAN only.
4. What are the three main ways that VLANs are organized?
6. What are the three basic models for determining and controlling how a packet gets
assigned to a VLAN?
Port-based VLANS.
MAC address based VLANs.
Protocol based VLANs
A VLAN ID is inserted into it before the frame is transmitted onto the link
between the VLANs.
8. What is the most used frame tagging option used in switching? What is special
about this?
9. How can you make an ATM network look like an Ethernet network?
Fast Ethernet Inter-Switch Link (ISL), which is used to carry multiple VLAN
information between the wiring closets and the distribution layer switches.
13. What is meant by a static VLAN? What are some advantages/disadvantages of this
method?
15. Complete the table for the commands used to configure a VLAN on a 2900 series
Catalyst switch.
Command Purpose
Switch#show version Displays the version of IOS running on the
switch
Switch#vlan database Enter the VLAN configuration mode
Switch(vlan)#vlan [vlan number] Assign a number to the VLAN to create
Switch(config)#interface [type] [port] Identify which interface to assign VLAN to
Switch(config-if)#switchport access vlan Assign VLAN to one or more interfaces
[vlan number]
Switch#show vlan [brief] Verify VLAN assignment(s)
Switch#show vlan id [vlan number] Verify VLAN assignment
Switch#show running-config Display the switch’s configuration file
Switch(vlan)#no vlan [vlan number] Delete a VLAN
Switch#show spanning-tree Display the spanning tree topology known
to the router
Switch#debug sw-vlan packets Display general information about VLAN
packets that the router received but is not
configured to support
16. What are the steps you should follow to troubleshoot problems with your VLANs?
The purpose of a trunk is to save ports when creating a link between two
devices implementing VLANs, typically two switches.
3. What are trunking protocols designed to do? What are the two types of trunking
mechanisms? Which has become the standard? Why?
5. What is the first step you must perform on a switch before starting trunking?
Configure the port first as a trunk and then specify the trunk encapsulation
Command Purpose
Switch(config-if)#switchport mode trunk Turns on trunking mode
Switch(config-if)#switchport trunk Specifies encapsulation type on port with
encapsulation [dot1q | isl] either 802.1a or ISL
Switch#show port capabilities Displays what the port can do, including
what encapsulation the port can support
Switch#show trunk [mod_num/port_num] Displays if trunking has been configured
and the settings
Switch#erase startup-configuration Clears NVRAM of any saved configuration
files
Switch(vlan)#vtp v2-mode Sets the VTP version to Version 2
Switch(vlan)#vtp domain [name] Creates a management domain
Switch#show vtp status Displays VTP configuration and status
Switch(vlan)#vtp [client | server | transparent] Sets the correct mode of the switch
Switch#show vtp counters Displays statistics about advertisements
sent and received on the switch
Router(config)#interface fastethernet [port- Identifies which port and/or subinterface
number.subinterface-number] you wish to configure
Router(config-if)#encapsulation dot1q [vlan- Set encapsulation for 802.1q on an
number] interface
Router(config-if)#ip address [ip-address] Sets the IP address on an interface
[subnet-mask]
7. What does it mean if the trunking mode has been set to “negotiate”?
Puts the port into permanent trunking mode but prevents the port from
generating Dynamic Trunking Protocol (DTP) frames. You must configure
the neighboring port manually as a trunk port to establish a trunk link.
11. What are the three modes that switches can work in when running VTP? Briefly
describe each one.
Server - can create, modify, and delete VLAN and VLAN configuration
parameters for the entire domain. VTP servers send VTP messages out to
all trunk ports.
Client - cannot create, modify, or delete VLAN information. VTP clients do
process VLAN changes and send VTP messages out to all trunk ports.
Transparent - forward VTP advertisements such as version 2, but ignore
information contained in the message. A transparent switch will not modify
its database when updates are received, nor will the switch send out an
update indicating a change in its VLAN status. Except for forwarding VTP
advertisements, VTP is disabled on a transparent switch.
Advertisement requests
Summary advertisements
Subset advertisements
15. What are the two versions of VTP available now? Which is the default version? Are
they interoperable?
A trunk line, which can support multiple VLANs, is the physical connection
to a router. This topology is called a router on a stick because there is a
single connection to the router. However, there are really multiple logical
connections between the router and the switch, based on how many
VLANs run through the trunk.