Home Blog Page 4

OSI Layers Questions and Answers in Networking

0

OSI Layers Questions and Answers in Networking

Which phrase describes an FTP daemon?

  • a program that is running on an FTP server

Which two actions are taken by SMTP if the destination email server is busy when email messages are sent? (Choose two.)

  • SMTP periodically checks the queue for messages and attempts to send them again
  • SMTP tries to send the messages at a later time

When would it be more efficient to use SMB to transfer files instead of FTP?

  • when downloading large numbers of files from the same server

What is an example of network communication that uses the client-server model?

  • A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

What is true about the Server Message Block protocol?

  • Clients establish a long term connection to servers.

Refer to the exhibit. What command was used to resolve a given host name by querying the name servers?

  • nslookup

Which DNS server in the DNS hierarchy would be considered authoritative for the domain name records of a company named netacad?

  • netacad.com

A user accessed the game site www.nogamename.com last week. The night before the user accesses the game site again, the site administrator changes the site IP address. What will be the consequence of that action for the user?

  • The user will access the site without problems.

Match the purpose with its DHCP message type

  • DHCPREQUEST – a message that is used to identify the explicit server and lease offer to accept
  • DHCPDISCOVER – a message that is used to locate any available DHCP server on the network
  • DHCPOFFER – a message that is used to suggest a lease to a client
  • DHCPACK – a message that is used to acknowledge that the lease is successful

What are two characteristics of peer-to-peer networks? (Choose two.)

  • resource sharing without a dedicated server
  • decentralized resources

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)

  • session layer
  • application layer
  • presentation layer

What is an advantage for small organizations of adopting IMAP instead of POP?

  • Messages are kept in the mail servers until the client manually deletes them.

Which application layer protocol uses message types such as GET, PUT, and POST?

  • HTTP

A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.)

  • DHCPDISCOVER
  • DHCPREQUEST

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which PC or PCs are sending FTP packets to the server?

  • PC_2

Which three statements describe a DHCP Discover message? (Choose three.)

  • The destination IP address is 255.255.255.255.
  • The message comes from a client seeking an IP address.
  • All hosts receive the message, but only a DHCP server replies.

Which two tasks are functions of the presentation layer? (Choose two.)

  • Compression
  • Encryption

Fill in the blank.
What is the acronym for the protocol that is used when securely communicating with a web server?

  • HTTPS

Select three protocols that operate at the Application Layer of the OSI model. (Choose three.)

  • POP3
  • DHCP
  • FTP

Match a statement to the related network model

Peer-to-peer network

  • no dedicated server required
  • client and server roles are set on a per request basis

Peer-to-peer application

  • a background service is required
  • requires a specific user interface

A manufacturing company subscribes to certain hosted services from their ISP. The services required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)

  • FTP
  • HTTP
  • SMTP

Match the DNS record type to the corresponding description

  • A – end device address
  • NS – authoritative name server
  • CNAME – canonical name
  • MX – mail exchange record

Some Routing CCNA Examination Answers

Some Best Routing CCNA Examination Answers Exams solutions






What is the correct order for PDU encapsulation?

  • Frame Header-Network Header-Transport Header-Data-Frame Trailler

A PC is configured to obtain an IP address automatically from network 192.168.1.0/24. The network administrator issues the arp -a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?

  • This is a static map entry

Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)

  • /64
  • /68

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

  • It forwards the frame out of all ports except for the port at which the frame was received.

Which two statements correctly describe a router memory type and its contents?

  • RAM is volatile and stores the IP routing table.
  • ROM is nonvolatile and contains basic diagnostic software.

What is the auto-MDIX feature on a switch?

  • the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection

What is the purpose of the routing process?

  • to select the paths that are used to direct traffic to destination networks

What is the purpose of ICMP messages?

  • to provide feedback of IP packet transmissions

Open the PT activity. Perform the tasks in the activity instructions and then fill in the blank.
The Server0 message is

  • Winner

Refer to the exhibit. Which IP addressing scheme should be changed?

  • Site 2

Which subnet would include the address 192.168.1.96 as a usable host address?

  • 192.168.1.64/26

Which subnet would include the address 192.168.1.192 as a usable host address?

  • 192.168.1.128/25

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?

  • to interrupt the ping process

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?

  • linevtyin

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses console port to connect to the switch, which password is needed to access user EXEC mode?

  • linecoin

Refer to the exhibit. What is the significance of the asterisk (*) in the exhibited output?

  • The asterisk designates which file system is the default file system.

When applied to a router, which command would help mitigate brute-force password attacks against the router?

  • login block-for 60 attempts 5 within 60

A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that?

  • 192.168.1.64/27
  • 192.168.1.96/28

Which field in an IPv4 packet header will typically stay the same during its transmission?

  • Destination Address

Refer to the exhibit.
The network administrator enters these commands into the R1 router: R1# copy running-config tftp
Address or name of remote host [ ]?
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?

  • 192.168.11.252

What is the effect of configuring the ipv6 unicast-routing command on a router

  • to enable the router as an IPv6 router

Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?

  • It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.

Which procedure is used to reduce the effect of crosstalk in copper cables?

  • twisting opposing circuit wire pairs together

What happens when part of an Internet radio transmission is not delivered to the destination?

  • The transmission continues without the missing portion.

Which address on a PC does not change, even if the PC is moved to a different network?

  • MAC address

Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?.

  • audio conference, financial transactions, web page

Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details?

  • Request for Comments

Which three IP addresses are private ? (Choose three.)

  • 172.16.4.4
  • 10.1.1.1
  • 192.168.5.5

What is the purpose of the network security accounting function?

  • to keep track of the actions of a user

How does a Layer 3 switch differ from a Layer 2 switch?

  • An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches.

Which connection provides a secure CLI session with encryption to a Cisco switch?

  • an SSH connection

A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

  • the amount of traffic that is currently crossing the network
  • the type of traffic that is crossing the network
  • number of network devices that the data is crossing

A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the network? (Choose two.)

  • DHCPREQUEST
  • DHCPDISCOVER

A host PC has just booted and is attempting to lease an address through DHCP. Which message will the client broadcast first on the network?

  • DHCPDISCOVER

What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)

  • data link layer addressing
  • detection of errors through CRC calculations
  • delimiting groups of bits into frames

Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the hostname command as shown (Switch(config)# hostname My Switch). What prompt will display after the command is issued?​

  • Switch(config)#​

Which type of wireless security generates dynamic encryption keys each time a client associates with an AP?

  • WPA

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

  • ipconfig /displaydns

What is an important function of the physical layer of the OSI model? (Chaptr 4 exam)

  • It encodes frames into electrical, optical, or radio wave signals.

Match the phases to their correct stage in the router setup process. (Not all options are used.)

  • Stage 1 – perform the post
  • Stage 2 – load the bootstrap program
  • Stage 3 – Locate and load the Cisco IOS
  • Stage 4 – locate and load the configuration file

Match the description with the associated IOS mode. (Not all options are used.)
user EXEC mode

  • limited number of basic monitoring commands
  • the first entrance into the CLI of an IOS device

privileged EXEC mode

  • accessed by entering the enable command
  • identified by a prompt ending with the # character

global configuration mode

  • changes made affect the opperation of the device as a whole
  • accessed by entering the configure terminal command

Refer to the exhibit. A TCP segment from a server has been captured by Wireshark, which is running on a host. What acknowledgement number will the host return for the TCP segment that has been received?

  • 306

Match the IPv6 address to the IPv6 address type. (Not all options are used.)

  • Link-Local – FE80:056BA:FFEE:A0B4:47FF:FE36:532B and FE80::1
  • Multicast – FF02::2 and FF02::1:FF3A:25C9
  • Global Unicast – 2DD1:D88:10::12 and 2001:DB8:A1:0B:C78::1

What is a characteristic of the LLC sublayer?.

  • It places information in the frame that allows multiple Layer 3 protocols to use the same network interface and media.

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

  • VLAN 1

During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a _____ message

  • multicast

Which function is provided by TCP?

  • detection of missing packets

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which IPv6 address is assigned to the Serial0/0/0 interface on RT2?

  • 2001:db8:abc:5::1

A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

  • regenerating data signals
  • providing a channel over which messages travel
  • notifying other devices when errors occur

In which default order will a router search for startup configuration information?

  • NVRAM, TFTP, setup mode

What two preconfigured settings that affect security are found on most new wireless routers? (Choose two.)

  • broadcast SSID
  • default administrator password

What will happen if the default gateway address is incorrectly configured on a host?

  • The host cannot communicate with hosts in other networks.

What is the purpose of having a converged network?

  • to reduce the cost of deploying and maintaining the communication infrastructure

Refer to the exhibit. Which area would most likely be an extranet for the company network that is shown?

  • area C

After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result of issuing this command?

  • The new configuration will be loaded if the switch is restarted.

Which parameter does the router use to choose the path to the destination when there are multiple routes available?

  • the lower metric value that is associated with the destination network

Refer to the exhibit (PC0 and PC1 connected to S1, PC2 and PC3 connected to S2, S1 connected to S2). A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port (port connecting S1 to S2)?

  • just PC0 and PC1 MAC addresses

During normal operation, from which location do most Cisco switches and routers run the IOS?

  • RAM

Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)

  • wireless NIC
  • wireless client software

A technician uses the ping 127.0.0.1 command. What is the technician testing?

  • the TCP/IP stack on a network host

Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

  • NAT

A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?

  • to check the frame for possible transmission errors

What method is used to manage contention-based access on a wireless network?

  • CSMA/CA

Which three statements characterize the transport layer protocols? (Choose three.)

  • TCP and UDP port numbers are used by application layer protocols.
  • TCP uses windowing and sequencing to provide reliable transfer of data.
  • TCP is a connection-oriented protocol. UDP is a connectionless protocol.

Copper cables

  • horizontal cabling structure, desktop PCs in an enterprise office

Fiber optic

  • backbone cabling in an enterprise, long-haul networks

Wireless

  • guest access in a coffee shop
  • waiting rooms in a hospital

A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

  • DSL

Best Wireless Networking Terminology

0

At its most basic, wireless communication is the sending and receiving of data through airwaves. But the CCENT certification exam expects you to understand wireless terminology and concepts. The following are some key points to remember for the exam:

Know the following organizations that help define wireless:

Institute of Electrical and Electronics Engineers (IEEE): Creates the wireless standards, such as 802.11a/b/g/n

Federal Communications Commission (FCC): Regulates the use of wireless devices (licenses of frequencies)

WiFi-Alliance: Ensures compatibility of wireless components. The WiFi-Alliance is responsible for testing and certification of wireless devices.

Know the two types of wireless networks:

Ad hoc mode: No wireless access point is used. The wireless clients communicate in a peer-to-peer environment.

Infrastructure mode: Uses a wireless access point

Know the IEEE Standards for wireless:

802.11a: A wireless standard that uses the 5 GHz frequency range and runs at 54 Mbps.

802.11b: A wireless standard that uses the 2.4 GHz frequency range and runs at 11 Mbps. The WiFi standard was created and 802.11b is part of that standard. This is the frequency used by cordless phones and microwaves, so you may experience interference from those devices. As a correction, you can change the channel of the wireless network or purchase phones that use a different frequency.

802.11g: A wireless standard, which is compatible with 802.11b, that also uses the 2.4 GHz frequency range and runs at 54 Mbps.

802.11n: A new wireless standard that can use either the 2.4 GHz frequency range or the 5 GHz frequency range and is compatible with 802.11a/b/g. 802.11n has a transfer rate of approximately 150 Mbps.

Other wireless terms to know for the exam:

Basic Service Set (BSS): A wireless network consisting of one access point using an SSID. If you had three access points, each using a different SSID, then this would be three BSS networks.

Extended Service Set (ESS): A wireless network comprising multiple access points using the same SSID.

Be sure to know the configuration requirements to set up an ESS:

The SSID on each access point must be the same.

The range of the access points must overlap by 10% or more.

Each access point must use a different channel.

Know the difference between the different wireless encryption types:

Wired Equivalent Privacy (WEP): An old wireless encryption protocol that involves configuring a pre-shared key on the access point and the wireless client that is used to encrypt and decrypt data. WEP uses the RC4 encryption algorithm with the pre-shared key and is not considered secure due to the way the key is used. WEP supports 64-bit and 128-bit encryption.

WiFi Protected Access (WPA): The improvement on WEP that adds the TKIP protocol in order to perform key rotation to help improve on the fact that WEP uses a static key. WPA has two modes: personal mode involves configuring a pre-shared key, and enterprise mode can use an authentication server such as RADIUS.

WiFi Protected Access 2 (WPA2): Improves upon WPA by changing the encryption algorithm to the Advanced Encryption Standard (AES) and supports both personal mode and enterprise mode.

The following are some key points regarding best practices to improve the security of your wireless network:

Disable wireless: If you aren’t using wireless, then disable the wireless functionality on the wireless router.

Change the SSID: Make sure you change the SSID to something meaningless. You don’t want the SSID set to a value that will help the hacker identify the building you’re in because he could move closer to the building to get a stronger signal.

Disable SSID broadcasting: After disabling SSID broadcasting. the router won’t advertise the existence of the wireless network. This makes it harder for someone to connect because they have to manually configure their client for the SSID name.

Implement MAC filtering: MAC filtering allows you to limit who can connect to the wireless network by the MAC address of the network card.

Implement encryption: Be sure to encrypt wireless traffic with WEP, WPA, or WPA2. WPA2 is the most secure of the three.

Configuring Routing for the Commands

0

Routing protocols will certainly come up on your CCENT certification exam. This section reviews popular commands that deal with routing and routing protocols, such as RIPv1 and RIPv2.

Command(s) Result
ip routing Enables routing on the router. Should be on by default.
no ip routing Disables routing on the router.
show ip route Displays the routing table.
ip route 23.0.0.0 255.0.0.0 22.0.0.2 Adds a static route to the router for the 23.0.0.0 network and sends any data for that network to the 22.0.0.2 address (next hop).
no ip route 23.0.0.0 255.0.0.0 22.0.0.2 Deletes the static route from the routing table.
ip route 0.0.0.0 0.0.0.0 22.0.0.2 Sets the gateway of last resort on the router to forward any packets with unknown destinations to the 22.0.0.2 address.
ROUTERB>enable
ROUTERB#config term
ROUTERB(config)#router rip
ROUTERB(config-router)#network 26.0.0.0
ROUTERB(config-router)#network 27.0.0.0 Configures the router for RIPv1. RIP is a dynamic routing protocol that is used to share routing information with other routers running RIP. In this example, RIP will share knowledge of the 26.0.0.0 and the 27.0.0.0 networks.
ROUTERB>enable
ROUTERB#config term
ROUTERB(config)#router rip
ROUTERB(config-router)#network 26.0.0.0
ROUTERB(config-router)#network 27.0.0.0
ROUTERB(config-router)#version 2 To configure the router for RIPv2, you use the same commands but add the “version 2” command at the end.
show ip protocols Display what routing protocols are running on the router.
debug ip rip Enable RIP debugging, which will display RIP related messages on the screen as RIP-related events occur (packets are sent and received).
no debug all Turns off debugging once you are done troubleshooting RIP.

Network Cabling for the CCENT Certification Exam

0

The CCENT certification tests you on the different types of cabling that are used in different scenarios. The following are some key points to remember about network cabling.

Rollover cable: A rollover cable is also known as a console cable and gets the name rollover because the order of the wires from one end of the cable to the other are totally reversed, or rolled over. The rollover/console cable is used to connect a computer to the console port or auxiliary port of the router for administration purposes.

Back-to-back serial cable: The back-to-back serial cable is used to connect two Cisco routers directly together over a serial link. A back-to-back serial link will have one router act as the DCE device with the clock rate set and the other router act as the DTE device.

Straight-through cable: A straight-through cable is used to connect dissimilar devices together. Scenarios that use straight-through cables are computer-to-switch and switch-to-router.

Crossover cable: A crossover cable has wires 1 and 2 switch positions with wires 3 and 6 on one end and is used to connect similar devices together. Scenarios that use crossover cables are computer-to-computer, switch-to-switch, and computer-to-router (they are both hosts).

Coaxial cable: A network cable type used in old Ethernet environments, such as 10Base2 and 10Base5. Coaxial cable is seen in high-speed Internet connections with cable companies today.

Fiber optic cable: A unique cable type that has a glass core which carries pulses of light as opposed to copper cable carrying electrical signals (coax and twisted pair cabling).

Security Best Practices for the CCENT Certification Exam

0

One of the most important skills to have as a CCENT is the capability of implementing basic security practices on your Cisco devices. The following are some key points to remember about securing devices when you take the CCENT exam:

Secure Location: Be sure to locate your Cisco routers and switches in a secure location — a locked room where limited access is permitted.

Disable Ports: In high secure environments, you should disable unused ports so that unauthorized systems cannot connect to the network.

Configure Port Security: In order to control which systems can connect to the enabled ports, use port security to limit which MAC addresses can connect to which ports.

Set Passwords: Be sure to configure passwords on the console port, auxiliary port, and the vty ports. Also configure the enable secret for access to priv exec mode.

Login Command: Do not forget the login command after setting the password on the port. The login command tells the Cisco device that anyone connecting must log in and forces the prompt for a password.

Login Local Command: If you are looking to create usernames and passwords for login, then use the login local command to tell the Cisco device that you wish to authenticate persons by the usernames and password configured on the device.

Encrypt Passwords: Be sure to encrypt all passwords in the configuration with the service password-encryption command!

Banners: Be sure to configure banners that do not have the word “welcome” in the message or any other inviting phrases. You want to make sure that the banners indicate that unauthorized access is prohibited.

Secure Communication: To remotely manage the device, use SSH instead of telnet as the communication is encrypted.

Troubleshooting Commands

0

When problems arise on Cisco devices, there are a number of show commands you can use to help identify what the problem is. The following table lists popular show commands:

Command(s) Result
show running-config Displays the running configuration stored in VRAM.
show startup-config Displays the startup configuration stored in NVRAM.
show ip interface brief Shows a summary of the interfaces and their status.
show interfaces Displays detailed information about each interface.
show interface serial 0/0 Displays detailed information about a specific interface.
show ip route Displays the routing table.
show hosts Displays the host name table.
show controller serial0/1 Displays whether the serial interface is a DCE or DTE device.
show ip protocols Displays what routing protocols are loaded.
show cdp neighbors Displays basic information about neighboring devices such as name, type of device, and model.
show cdp neighbors detail Displays detailed information about neighboring devices such as name, type of device, model, and IP address.

Viewing Routing Information for Cisco Networking

0

After setting up any routing protocol that you want to implement – RIP, OSPF, or EIGRP – you can view all of your routing information through the ip route command. The following is an example of the output of this command. The output includes a legend showing the codes for each routing protocol, and the specific routes are identified by the source protocol.

Router2>enable
Password:
Router2#show ip route
Codes: C – connected, S – static, R – RIP, M – mobile, B – BGP
       D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
       N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
       E1 – OSPF external type 1, E2 – OSPF external type 2
       i – IS-IS, su – IS-IS summary, L1 – IS-IS level-1, L2 – IS-IS level-2
       ia – IS-IS inter area, * – candidate default, U – per-user static route
       o – ODR, P – periodic downloaded static route
Gateway of last resort is not set
D    192.168.10.0/24 [90/284160] via 192.168.1.1, 00:04:19, FastEthernet0/0
O    192.168.10.0/24 [110/11] via 192.168.1.1, 00:01:01, FastEthernet0/0
R    192.168.10.0/24 [120/1] via 192.168.1.1, 00:00:07, FastEthernet0/0
C    192.168.5.0/24 is directly connected, FastEthernet0/1
C    192.168.1.0/24 is directly connected, FastEthernet0/0
S    192.168.3.0/24 [1/0] via 192.168.1.1

Managing Static Routing for Cisco Networking

0

When working with your routers on your Cisco network, it’s very likely that you’ll want to have your routers route data. The first step in having your router pass data from one interface to another interface is to enable routing; just use these commands.

Router1>enable
Router1#configure terminal
Router1(config)#ip routing
Whether or not you choose to use a dynamic routing protocol, you may add static routes to your router. The following will add a static route to Router1 to send data to the 192.168.5.0/24 network using the router with the IP address of 192.168.3.2.

Router1>enable
Router1#configure terminal
Router1(config)#ip routing
Router1(config)#ip route 192.168.5.0 255.255.255.0 192.168.3.2
Managing routing information protocol for Cisco networking
Routing Information Protocol (RIP) is widely used, with version 2 allowing you to use Variable Length Subnet Masks (VLSM) across your network. The following code will enable routing, enable RIP, set RIP to version 2, disable route summarization, defines the distributed network from this router as 192.168.5.0/24, and rather than broadcasting routes, it will send RIP data directly to 192.168.1.1.

Router2>enable
Router2#configure terminal
Router2(config)#ip routing
Router2(config)#router rip
Router2(config-router)#version 2
Router2(config-router)#no auto-summary
Router1(config-router)#network 192.168.5.0
Router2(config-router)#neighbor 192.168.1.1
Managing enhanced interior gateway routing protocol for Cisco networking
Enhanced Interior Gateway Routing Protocol (EIGRP) is the updated version of IGRP. The following code will enable EIGRP using an autonomous-system (AS) number of 100, distribute two networks and disables auto summary.

Router2>enable
Router2#configure terminal
Router2(config)#ip routing
Router2(config)#router eigrp 100
Router2(config-router)#network 192.168.1.0
Router2(config-router)#network 192.168.5.0
Router2(config-router)#no auto-summary
Managing open shortest path first for Cisco networking
Open Shortest Path First (OSPF) is a link state protocol which is widely used. OSPF uses the address of the loopback interface as the OSPF identifier, so this example will set the address of the loopback interface, then enable OSPF with a process ID of 100, and distributing a network of 192.168.255.254 and a network of 192.168. 5.0/24

Router2>enable
Router2#configure terminal
Router2(config)#interface loopback 0
Router2(config-if)#ip address 192.168.255.254 255.255.255.0
Router2(config-if)#exit
Router2(config)#router ospf 100
Router2(config-router)#network 192.168.255.254 0.0.0.0 area 0
Router2(config-router)#network 192.168.5.0 0.0.0.255 area 0

Working with Spanning Tree Protocol for Cisco Networking

0

Spanning Tree Protocol (STP) enables you to create redundant loops on your Cisco network for fault tolerance, and prevents inadvertent loops that may be created on your network from bringing the network to its knees.

The following code will enable the Cisco proprietary Rapid Per VLAN Spanning Tree Protocol (PVST) over the open standard of Multiple Spanning Tree Protocol (MSTP). In addition to configuring STP on the switch, you will also configure port 2 on the switch for portfast, which allows the port to immediately transition to forwarding mode.

Switch1> enable
Switch1# configure terminal
Switch1(config)#spanning-tree mode rapid-pvst
Switch1(config)#interface FastEthernet 0/2
Switch1(config-if)#spanning-tree portfast
%Warning: portfast should only be enabled on ports connected to a single
 host. Connecting hubs, concentrators, switches, bridges, etc… to this
 interface when portfast is enabled, can cause temporary bridging loops.
 Use with CAUTION
%Portfast will be configured in 10 interfaces due to the range command
 but will only have effect when the interfaces are in a non-trunking mode.