(Routing Loop Strategies)
____ works by preventing the router from advertising a route
back to the other router from which it was learned. This prevents two
nodes from bouncing packets back and forth between them, creating a
loop.
Split horizon
(Routing Loop Strategies)
dictates that the route is advertised back on the interface from which it
was learned, but it has a hop count of infinity, which tells the node that
the route is unreachable.
Poison reverse (also called split horizon with poison reverse)
ExamAlert
The term well-known ports identifies the ports ranging from 0 to 1023. When
CompTIA says to “identify the well-known ports,” this is what it refers t
ExamAlert
1. Port mirroring enables administrators to monitor which traffic to the switch? ❍ A. Inbound only ❍ B. Outbound only ❍ C. Inbound and outbound ❍ D. Neither inbound nor outbound
2. What is the term used for the number of hops necessary to reach a node? ❍ A. Jump list ❍ B. Link stops ❍ C. Connections ❍ D. Hop count
____ are used in networks that use twisted-pair cabling to connect devices. They also
can be joined to create larger networks. They are simple devices that direct
data packets to all devices connected to the hub, regardless of whether the
data package is destined for the device.
hubs
____ are used to divide larger networks into smaller sections. They
accomplish this by sitting between two physical network segments and managing
the flow of data between the two.
bridges
____ assigns IP addresses, eliminating the need to individually assign IP addresses and making
the job of network administrators considerably easier. When a ___ server runs on a network, the workstation boots up and requests an IP address from the server. The server responds to the request and automatically assigns an IP address to the computer for a given period of time, known as a lease. The workstation acknowledges the receipt of the IP address, and the workstation has all the information it needs to become part of the network.
Dynamic Host Configuration Protocol (DHCP)
_____ are used to route information outside the network, such as on the Internet. On the Internet, an it is required. It is also a distance-vector protocol commonly used between hosts on the Internet to exchange routing table information. BGP is an example this.
Exterior Gateway Protocols
EGPs
_____ is a distance-vector routing protocol. It is
limited to a maximum of 15 hops. One of the downsides of the protocol
is that the original specification required router updates to be transmitted
every 30 seconds. On smaller networks this is acceptable; however,
this can result in a huge traffic load on larger networks
Routing Information Protocol (RIP)
_____ is a protocol that enables routers to exchange information more
efficiently than earlier network protocols. It uses its neighbors to
help determine routing information. Routers configured to use it
keep copies of their neighbors’ routing information and query these
tables to help find the best possible route for transmissions to follow.
It also uses Diffusing Update Algorithm (DUAL) to determine the best
route to a destination.
Enhanced Interior Gateway Routing
Protocol (EIGRP)
_____ is the router’s IP address, which is the pathway to any and
all remote networks. To get a packet of information from one network to
another, the packet is sent to the _____, which helps forward the
packet to its destination network.
DEFAULT GATEWAY