IT220 Chapter 7 1. What’s a routing table? Keeps track of the routes to use for forwarding datat to its destination 2. What is the most common static route used in a host computer? Default gateway 3. What command is used to view a PC computer’s routing table? Netstat –r /route prints 4. What is meant by a O. O. O. O network address entry with a subnet mask of 0. 0. 0. 0. in a PC’s routing table? Default route 5. What is the 127. 0. 0. 1 IP address and what is it used for? loopback, the data is routed directly back to the source 14. What is the difference between a static and a dynamic routing protocol?
Static routing protocol is of limited use for campuswide network routing but is essential when configuring the default route on router but dynamic routing protocols enable the router’s routingtable to be dynamically updated toaccount for loss or canges in routes or changes in data traffic. 15. What are the four key issues in dynamic routing protocols? Path determination, Metric, Convergence, Load Balancing 16. Define hop count. The number of routers the data packet must pass through to reach the destination network 17. Which of the following is not a metric used in dynamic routing protocols a.
Don’t waste your time!
Order your assignment!
Hop count b. Cost c. Runs d. Ticks 18. A distance vector protocol typically uses what as the metric? Hop couints 22. Link state protocols issue what to update neighbor routers regarding route status? a. Hop status b. Link state advertisements c. “Hello” packets d. Adjacencies 23. Which of the following are key issues of link state protocols? a. Send updates every 90 seconds b. Send update when routing changes c. Use link lights to establish adjacencies d. Use a hop count metric to determine the best route to a destination Section 7-4 24. RIP is classified as a a.
Distance vector protocol b. Dynamic routing protocol c. Link state protocol d. a andc e. a andb f. b arid c 25. Define routing loops. Data is forwarded back to the router that sent the data packets 26. Which of the following are examples of classful addresses? a. 10. 10. 0. 0 b. 192. 168. 0. 0 c. 10. 1. 0. 0 d. 10. 0. 0. 0 90. You are configuring a router connection to a remote network. What protocol would you select if there is only one network route to the remote network? Explain why you selected the protocol. 91. You are configuring the routing protocols for a small network.
What routing protocol would you select and why? Chapter 8 2. What is the data rate of a Tl line? 1. 544 Mbps 6. Explain the difference between line of demarcation and point of presence. The point of presence point where the customer connects the network data traffic to the communications carriers but the line or demarcation point where ownership of the communications equipment changes from the 10. What is B8ZS and how does it work? Bipolar 8 zero substitution,bipolar a pulse is intentionally sent in the data stream even if the data being transmitted is a series of all 0s. 14.
Draw a picture of a point-to-point connection to the Frame Relay cloud. 18. A telco provides a dlci number of 150 for a Frame Relay connection. List the router command to configure the assigned dIci number. frame-relay interface-dlci 150 22. What is VPI used for? to identify the virtual circuits used to deliver cells in the ATM network. 26. What are the data speeds for V. 44/V. 34 and V. 92/V. 90? V. 44/V. 34 speed is 33. 6 kbps and V. 92/V. 90 speed is 56kbps. 30. Define discrete multitone. A multicarrier technique used to transport digital data over copper telephone lines. 34.
Draw a sketch of the encapsulation of a VPN data packet. Show the IP source and destination address and the VPN tunnel source and destination address encapsulated with the IP packet. 38. What router command can be used to check to see whether tunneling has been configured on a router? sh int tunnel 0 42. What is the purpose of a wide area network connection? The purpose of wide area network to typically link remote sites and branch offices to the main network 46. BGP is considered to be a. An external routing protocol b. An internal routing protocol c. Used for routing between the same networks . Outdated 50. Define the following: a. Outbound data traffic-data traffic leaving the network b. Inbound data traffic-data traffic entering the network Chapter 9 Section 9-2 1. What networking equipment is usually found in the core of a campus network? Switches 3. What is the advantage of using a layer 3 switch in the core of the campus network? uses electronic hardware instead of software to make routing decisions 5. What is the function of the distribution layer in a campus network? Point where the individual LANS connect together. 7. What is the purpose of the access layer?
To connect together networking devices in a LAN 9. Why are routers typically not interconnected at the distribution layer? there are network stability issues when routing large amounts of network data traffic if the networks are full or even partially meshed together 11. List three criteria for selecting the network media. Which is the final decision factor? Desired data speed, distance for connection, budget 13. Define load balancing in terms of data traffic flow in a computer network. Is used as tool to control the direction of the data flow when multiple routes are available. 5. Define per-packet load balancing. Load balance is guaranteed for all interfaces, but there is no guarantee that the packets will arrive at the destination in the proper order. 17. With regards to campus DHCP service, the IP address assignment is based on what? MAC address 19. How are BOOTP and DHCP related? Use the same port numbers 21. What networking function is required if the DHCP server is not on the same LAN? Why is this networking function required? Unicast, a packet is issued a fixed destination and therefore is no longer a broadcast packet. 3. Why is packet 14 in the captured DHCP packets shown in Figure 9-5 (shown earlier in the chapter) a broadcast? this packet is sent from the client back to the server tha has been slected to provide the DHCP service Section 9-4 25. List 11 top level domains. .com,. net,. org,. edu,. mil,. gov,. us,. ca,. info,. biz,. tv 27. A new network wants to obtain a domain name. The first step is what? Select a company that registers domain names 29. How is it possible for the command ping www. networkB. edu to find the destination without an IP address? he host check the DNS cache; assuming the DNS cache is empty, the host then send a DNS request to the campus DNS Server Section 9-5 31. What port number does SNMP use and what transport protocol? 161 33. What is the purpose of the MIB? Used to obtain configuration parameters and performance data on a networking device such as a router. 35. The command show run is entered on a Cisco router. Describe what the output “SNMP-server test RO” means. Server test is the community string and ro is the permission to read only Use Figure 9-20 to answer questions 37 to 41. 37. What MIB was issued? ifPhysAddress 39.
What port number was used? 161 41. Who is the manufacturer of this networking device? Cisco 43. What should you check if you are installing a Power over Ethernet connection using computer equipment from two different manufactures? make sure electrical power is available for the networking devices 45. What is resistive power discovery, and how does it work? Looking for device that supports PoE, two low voltage discovery signals are sent out to verify that a compatible PoE is attached second of the two signal is slightly higher voltage that the first but neither is larger enough to damage an incompatible device. 7. How much power can a class 0 PD PoE device source? (. 44 to 12. 95 watts) Section 9-6 49. What is a VLAN? A group of host computer and servers that are configured as if they are in the same LAN even if they reside across routers in separate LANs 51. What type of VLAN is port·based? Host computers connected to specific ports on a swich are assigned to specific VLAN 53. What switch command is used to display the interfaces assigned to a VLAN? Show interface VLAN 1 55. List the commands used to create VLAN5 and name this VLAN Marketing group. Vlan 5 name Marketing group 7. What is the purpose of the Spanning· Tree Protocol? prevents looping and also controls data flow over possible redundant data paths 59. Discuss how a root switch is elected. switches assume they are the root switch until the BPDUs are exchanged and a root switch is elected. The root switch elected is the switch with the lowest MAC address. The MAC address is issuing the data packet as start of the bidding process. 61. A BPDU data packet shows that the “Hello Time” is 2. 0 sees. What information does this provide? the default notification interval