Nt2640

In: Science

Submitted By Crazyfolks
Words 361
Pages 2
EIGRP Vs OSPF

EIGRP - Is an advanced distance-vector routing protocol, with optimizations to minimize both the unstable route incurred after topology changes, as well as the use of bandwidth and processing power in the router. Routers supporting EIGRP will automatically redistribute route information to IGRP neighbors by converting the 32 bit EIGRP metric to the 24 bit IGRP metric.

Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a mechanism for fast convergence. IGRP is created by Cisco.

OSPF - Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF is the most widely used interior gateway protocol (IGP) in large enterprise networks. OSPF is a trusted Cisco course-plotting method that creates managing big systems achievable. OSPF represents "Open Least Route 1st. inch this smallest journey would be the one particular with the cheapest. OSPF uses a metric to look for the volume of over head it'd price tag to be able to post info spanning a presented interface. This course-plotting criterion makes use of this specific metric to choose the most efficient journey in between resource and getaway. Determining your metric, or maybe price tag, yourself can be executed simply using a basic working out.
OSPF is a standards-based routing protocol; however, different equipment manufacturers may have different interpretations of standards and implementation. Unless these differences can be understood and reconciled, the enterprise network operator will be unable to successfully integrate networks with elements from multiple vendors. It is critical for equipment manufacturers to
design…...

Similar Documents

Nt2640

...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College......

Words: 2573 - Pages: 11

Nt2640

...Unit 4 Labs [pic] Detailed Lab Step Answers: 38 Answers Step 3. | | |1 and 192.168.16.01/24 | | | | | Step 5. |Show IP route connected command/ see no connection routes | | | | | | | Step 6: |172.30.10.2 / has no IP address admin down | | | | ...

Words: 1716 - Pages: 7

Nt2640 Project Paper

...Kelly Keys NT2640 Fri. Night Project Paper 1. Routing tables and how the router will perform a route lookup: a. Routing Table Format- A routing table is used by TCP/IP network routers to calculate the destinations of messages it is responsible for forwarding. The table is a small in-memory database managed by the router's built-in hardware and software. Each IP address identifies a remote router (or other network gateway) that the local router is configured to recognize. For each IP address, the routing table additionally stores a network mask and other data that specifies the destination IP address ranges that remote device will accept. Home network routers utilize a very small routing table because they simply forward all outbound traffic to the Internet Service Provider (ISP) gateway which takes care of all other routing steps. Home router tables typically contain ten or fewer entries. By comparison, the largest routers at the core of the Internet backbone must maintain the full Internet routing table that exceeds 100,000 entries and growing as the Internet expands. b. Routing Lookup Mechanism- c. Classful vs. Classless Routing- Classful Routing, which is sometimes called a classful network. If you are using a classful routing protocol then all of your networks are in different classes and are separated by a router. Remember that the useable IPv4 address ranges are divided into classes. Class A 1-126, Class B 128-191, and Class C 192-223. So when we talk about...

Words: 3788 - Pages: 16

Nt2640 Review Questions

...1. Which of the following is true about a TCP/IP network? B. The network uses standards defined in TCP/IP RFCs. 2. Which of the following terms is not a common synonym for TCP/IP model? Ethernet and TCP/IP mapping. 3. Which of the following is typically true of a standard? A. It exists as a written document. C. It has been passed through some form of review and approval of certification process. 4. Contrast an international standard as compared to de facto standard. B. International standard documents have been reviewed more thoroughly. D. International standards typically mean that the standards groups has been authorized by many countries to create standards that apply to multiple countries. 5. Which of the following are true about the commonly used version of the TCP/IP model as shows in this chapter? C. The physical layer sits just below the data link area. D. the network layer sits in the middle of the five layers. 6. Which of these standards groups is typically the source of external LAN standards? B. IEEE. C. vendor groups 7. Which of the following is not a typical reason for a group of ten companies to start a vendor group, for the purpose of pushing a new networking technology? D. to keep intellectual property rights to the technology inside the company. 8. Which of the following is a correctly phrased statement for how to use OSI technology? B. IP is a network layer protocol. 9. Historically, which of the following models were the......

Words: 639 - Pages: 3

Nt2640 Midterm

...NTNT2640 IP Networking Midterm Люда Григорашенко Fri Apr 25 17:29:25 CDT 2014 Which two of the following are Layer 2 protocols commonly used in WANs? PPP and HDLC Which of the following describes a collision domain? Devices connected to an Ethernet hub Which of the following protocol operates at the OSI model Transport Layer?  UDP What process is used by a DNS server to add a UDP header to the contents of a DNS query response, followed by adding an IP header, and then adding a data link header and trailer is an example of what? Data Encapsulation  The term autonomous system (AS) refers to the collection of metrics for routes to a particular network. False Given the 5 bits of a subnet mask for the host portion of an IP addresses are available? 30 The interface type at the demark for a DS1/T1 circuit at is ____. RJ-48 Given the following routing table on a router, which next hop will the router select given the IP packet with the destination address of: 19.48.254.3 Router 2 Which address below belongs to the Class A network range? 126.254.1.45 Which of the following dynamic routing protocols is an exterior gateway protocol? BGP Out of the following which does a router normally use when making a decision about routing an IP packet? Destination IP Adress How many bits comprise the network portion of a Class C address? 24 A broadcast address is an address that only a single host listens to on the network. False How many usable host addresses are......

Words: 791 - Pages: 4

Nt2640

...Employ automated tools to continuously monitor workstations, servers, and mobile devices for active, up-to-date anti-malware protection with anti-virus, anti-spyware, personal firewalls, and host-based IPS functionality. All malware detection events should be sent to enterprise anti-malware administration tools and event log servers. The endpoint security solution should include zero-day protection such as network behavioral heuristics. Employ anti-malware software and signature auto-update features or have administrators manually push updates to all machines on a daily basis. After applying an update, automated systems should verify that each system has received its signature update. Configure laptops, workstations, and servers so that they will not auto-run content from USB tokens (i.e., "thumb drives"), USB hard drives, CDs/DVDs, Firewire devices, external serial advanced technology attachment devices, mounted network shares, or other removable media. If the devices are not required for business use, they should be disabled. Configure systems so that they conduct an automated anti-malware scan of removable media when it is inserted. All e-mail attachments entering the organization's e-mail gateway should be scanned and blocked if they contain malicious code or file types unneeded for the organization's business. This scanning should be done before the e-mail is placed in the user's inbox. This includes e-mail content filtering and web content filtering. Apply......

Words: 279 - Pages: 2

Nt2640 Networking Protocol Numbers

...Assignment 2: Network protocols numbers 1. What organization has been given the responsibility for assigning protocol numbers? ICANN – The Internet Corporation for Assigned Names and Numbers 2. Determine the protocol numbers for the protocol names: Protocol| Number| IPv4| 4| IPv6| 41| TCP| 6| UDP| 17| ICMP| 1| VRRP| 112| IPSEC ESP| 50| L2TP| 115| OSPF| 89| EIGRP| 88| 3. Determine the correct ICMP type based on the description provided: ICMP Message Description| Type| Code*| Echo| 8| | Echo Reply| 0| | Time Exceeded| 11| 0| Port Unreachable| 3| 3| Fragmentation Needed| 3| 4| 4. What are the valid ranges of protocol numbers? 0-65535 5. What protocol number(s) is/are specified for experimentation and testing? 253 and 254 6. What organization has been given the responsibility for assigning port numbers, sometimes referred to as “Well Known Ports or Registered Ports”? IANA 7. Determine the protocol numbers for the protocol names: Port| Application / Protocol| TCP -23| telnet| TCP -443| HTTPS| UDP -53| Domain name system| UDP -123| Network time protocol| TCP -110| Post office protocol v3| TCP -25| Simple mail transfer protocol| TCP -80| HTTP| UDP -88| kerberos| TCP -22| SSH| UDP -161| Simple network management| 8. What numeric range is commonly referred to as the “well-known ports”? 0 to 1024 9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023 10. What do you believe would......

Words: 282 - Pages: 2

Nt2640 Lab 4.1

...ICND1 Skill Builders Part 3: IP Addressing, Routing, and WANs Lab 5: Connected Routes Overview In this lab, you’ll learn how to use and interpret the show ip route connected command. You’ll begin with R1’s interfaces fully configured. R2’s interfaces are partially configured and both are shut down. You’ll bring them up and see the effects. Topology S0/0/0 R1 Fa0/0 S0/0/1 R2 Fa0/0 Fa0/11 SW1 Fa0/1 Fa0/1 SW2 Fa0/2 PC1 PC2 Figure 1 Network Topology for This Lab Detailed Lab Steps Step 1. Step 2. Connect to R1 from the simulator user interface; use password ciscopress. Enter privileged exec mode by issuing the enable command; use password ciscopress. page 1 © 2009 Pearson Education, Inc. All rights reserved. This publication is protected by copyright. Step 3. Issue the show ip route connected command and view the output. How many connected routes do you see? Which ones are they? 0 Step 4. Connect to R2 from the simulator user interface and enter privileged exec mode using the enable command. All passwords are ciscopress. Repeat Step 3 on R2. How many connected routes do you see? Which ones are they? 0 Step 5. Step 6. Use the show ip interface brief command. Is there an IP address listed for interface S0/0/1? Interface Fa0/0? yes no Routers cannot add a connected route to the routing table unless the interface is in an “up and up” state. The following steps enable R2’s two interfaces: Step 7. Move into interface...

Words: 647 - Pages: 3

Nt2640

...Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two answers.) Ethernet HTTP IP UDP SMTP TCP Which of the following protocols are examples of TCP/IP network access layer protocols? (Choose two answers.) Ethernet HTTP IP UDP SMTP TCP PPP The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what? Same-layer interaction Adjacent-layer interaction OSI model All of these answers are correct. The process of TCP on one computer marking a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of TCP segment 1 is an example of what? Data encapsulation Same-layer interaction Adjacent-layer interaction OSI model All of these answers are correct. The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header, and then adding a data link header and trailer is an example of what? Data encapsulation Same-layer interaction OSI model All of these answers are correct. Which of the following terms is used specifically to identify the entity created when encapsulating data inside data link layer headers and trailers? Data Chunk ......

Words: 323 - Pages: 2

Nt2640

...NT1430 Linux Networking STUDENT COPY: Assignment 1 for All Units Assignment 1 for All Units: Chapter Exercises (NT1430.GA1) Learning Objectives and Outcomes Each unit exercise covers the Learning Objectives and Outcomes for that unit. You can review those objectives and outcomes in your syllabus. Assignment Requirements Type out answers for the end-of-chapter exercise questions indicated in the list below for each unit. You will be graded on accuracy and completeness. Required Resources Sobell, M. G. (2012). A practical guide to Fedora and Red Hat Enterprise Linux. (6 ed.). Upper Saddle River, NJ: Prentice Hall. th Submission Requirements Submit your word-processed answers to your instructor at the beginning of the next class after the assignment. Units 1-10 Chapter Exercises Unit 1 § § § § Unit 2 § § Unit 3 § § § Unit 4 § § Sobell, Chapter 14, p. 582, Exercises 1-5 Sobell, Chapter 10, p. 403, Exercise 1 Sobell, Chapter 7, pp. 251, Exercises 1, 3, 4, 8 Sobell, Chapter 9, pp. 356, Exercises 1, 2, 3, 4, 5, 6, 8 Sobell, Chapter 9, pp. 357, Advanced Exercises 10, 11 Sobell, Chapter 5, p. 182, Exercises 1, 3, 4, 8, 10 Sobell, Chapter 6, p. 221, Exercises 1, 2, 3, 4, 6 Chapter 1, pp. 20-21, Exercises 1, 4 Chapter 2, p. 53, Exercise 1 Chapter 3, p. 86, Exercises 1, 4, 8 Chapter 11, p. 498, Exercises 1, 3, 7 © ITT Educational Services, Inc. All Rights Reserved. -118- Change Date: 05/30/2012 NT1430 Linux Networking STUDENT COPY: Assignment 1 for......

Words: 403 - Pages: 2

Nt2640 Week 4

...Chapter 11 Answer the following review questions. 1. Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? d. The password command, if it’s configured 2. An engineer had formerly configured a Cisco router to allow Telnet access so that the switch expected a password of mypassword from the Telnet user. The engineer then changed the configuration to support Secure Shell. Which of the following commands could have been part of the new configuration? C. A transport input ssh command in vty config mode 3. The following command was copied and pasted into configuration mode when a user was telnetted into a Cisco router: Banner login this is the login banner Which of the following are true about what occurs the next time a user logs in from the console? D. The banner text “Login banner configured, no text defined” is displayed. 4. Which of the following features would you typically expect to be associated with the router CLI, but not with the switch CLI? C. The ip address dhcp command 5. You just bought two Cisco routers for use in a lab, connecting each router to a different LAN switch with their Fa0/0 interfaced. You also connected the two routers’ serial interfaces using a back-to-back cable. Which of the following steps is not required to be able to forward...

Words: 1179 - Pages: 5

Nt2640 Unit 2 Discussion

...IP Addressing & Routing Activity Name: _ Overview: As part of your assigned readings and material covered in your class lectures, you have learned the basics of IP addressing and routing. This in-class exercise will reinforce those concepts by having you determine if a host is on the same subnet as another host. Then using a simple routing table, you will select the most appropriate route for the router to select given the destination IP address. Resources: Textbook Lecture materials and notes Section 1 – IP Addressing and Subnet Assignment 1. Given the IP host address of 192.168.12.233 with the default class mask, which other host is on my directly connected network? a. 192.168.14.234 b. 192.168.11.230 c. 192.168.12.1 d. 192.168.12.257 e. None of the above 2. Given the IP host address of 10.28.2.45 with the default class mask, which other host is on my directly connected network? f. 10.29.2.48 g. 10.28.244.254 h. 10.1.34.44.89 i. 10.238.1.54 j. All of the above 3. Given the IP host address of 172.16.200.93 with the default class mask, which other host is on my directly connected network? k. 172.16.4.94 l. 172.15.3.66 m. 172.18.5.111 n. 172.45.100.230 o. All of the above 4. Given the IP host address of 129.01.20.43 with the default class mask, which other host is on my directly connected network? p. 129.02.88.122 q....

Words: 632 - Pages: 3

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network,......

Words: 22068 - Pages: 89

Nt2640 Cisco Routers

...NT2640 Cisco Routers Richard P Walsh 11/24/2015 Cisco routers come in various series and models. Each series and model has different purposes and performance levels for the tasks required of them. For the purpose of this report, I chose 1 model from the 3 main series. The first is the Cisco 1861, then the Cisco 2811, & finally the Cisco 3845 The Cisco 1861 is an Integrated Service Router, that has an integrated, managed Ethernet switch, and has eight 10/100 PoE ports. It is an All-in-One unified communications solution, which integrates voice, data, security, and video into one platform. The Cisco 1861 can be easily expanded by attaching a Cisco recommended Catalyst Portfolio of switches. The Cisco 1861 eliminates the cost of adding multiple servers and provides a lower price solution that is easy to set up and manage. Cisco IOS Software security feature is also an option that can be activated with hardware-based encryption on the motherboard and provides a variety of security features such as a Firewall, IP Security, and an Advanced Encryption Standard, just to name a few. This router is highly recommended for SBMs and small branch enterprises consisting of eight to fifteen employees. Some of the specifications are; DRAM * Cisco IOS Software – 256 MB * Voice Messaging – 512 MB Compact Flash Memory * Cisco IOS Software – 128 MB * Voice Messaging – 1 GB, Compact Flash Onboard Ethernet Ports * 1 10/100 Fast Ethernet * 8 10/100-Mbps......

Words: 561 - Pages: 3

Nt2640

...1. Cut-through frame processing by a switch allows the switch to discard frames that fail the FCS check. - False 2. When a switch receives an Ethernet frame to a destination MAC address which is not in the devices MAC address table the switch applies the following logic - Floods the Ethernet frame out all interfaces except the received interface 3. Which of the following correctly describes the collision domain design trade-offs? - Single collision domain requires all devices on a segment to share the available bandwidth 4. When setting local cisco switchport to initiate the negotiation of a trunk link with the remote switch, the administrative mode is referred to as - Dynamic desirable 5. Which component of IPv6 neighbor discovery replaces the capabilities of ARP? - Neighbor solicitation 6. Which of the UTP cabling is required to connect to hosts back-to-back? - Cross-over 7. Which type of ICMP message will be rerouted to host by a remote router if that router does not have a route to a network? - Destination Unreachable – Code Network Unreachable 8. Which Cisco IOS show command aids in the troubleshooting of routing protocols by displaying information on which protocols is enabled and as well as passive interfaces? - Show ip protocols 9. IPv6 broadcast addresses are used in a similar manner to IPv4 broadcast addresses. - False 10. Inverse ARP in Frame Relay provides - mapping of Layer 3 addresses and the layer 2 addresses 11. Which one of the following......

Words: 1118 - Pages: 5

Montature occhiali da vista | Manuales y documentación | ダウンロード APK