University of Human Development College of Science and Technology Information Technology – Morning Questions Bank Networks Routing & Switching 2016 – 2017 Lecturer/ Dana Faiq Abd

1

Part I. Multiple Choice Questions 1.! Which of the following statements is not true with regard to routers? A.! They forward broadcasts by default B.! They can filter the network based on Network layer information C.! They perform path selection D.! They perform packet switching 2.! Which if the following is the ONLY device that operates at all layers of the OSI model? A.! Network host B.! Switch C.! Router D.! Bridge 3.! Which of the following best defines encapsulation? A.! Segmenting data so that it flows uninterrupted through the network B.! Compressing data so that it moves faster C.! Moving data in groups so that it stays together D.! Wrapping data in a particular protocol header 4.! Ethernet switch cut through mode has the following advantage over store and forward. A.! supports error detection B.! supports flow control C.! prevents collisions D.! reduces latency 5.! The Address is used by transport-layer is _______________. A.! IP Address B.! Name Address C.! Physical Address D.! Port number 6.! In the Ethernet II frame shown here, what is the function of the section labeled “FCS”?

A.! B.! C.! D.!

Allows the receiving devices to lock the incoming bit stream. Error detection Identifies the upper-layer protocol Identifies the transmitting device

7.! In the Ethernet II frame shown here, what is the function of the section labeled “TYPE”?

2

A.! B.! C.! D.!

Allows the receiving devices to lock the incoming bit stream. Error detection Identifies the upper-layer protocol Identifies the transmitting device

8.! Given the Ethernet address 01011010 00010001 01010101 00011000 10101010 00001111 in binary, what is the address in hexadecimal notation? A.! 5A:88:AA:18:55:F0 B.! 5A:81:BA:81:AA:0F C.! 5A:18:5A:18:55:0F D.! 5A:11:55:18:AA:0F 9.! In the Ethernet II frame shown here, what is the function of the section labeled “Preeamble”?

A.! B.! C.! D.!

Allows the receiving devices to lock the incoming bit stream. Error detection Identifies the upper-layer protocol Identifies the transmitting device

10.! The _____ sub layer in Data Link layer is responsible for the operation of the flow control. A.! LLC B.! MII C.! MAC D.! None of the choices are correct 11.! The minimum data length for Ethernet is _______bytes. A.! 32 B.! 40 C.! 82 D.! None of the choices are correct 12.! 10 Gigabit Ethernet has a data rate of ________Mbps. A.! 10,000 B.! 1000 C.! 100 D.! 10 13.! In Ethernet addressing, if the least significant bit of the first byte is 0, the address is _________. A.! Unicast B.! multicast C.! broadcast D.! None of the choices are correct 14.! Which of the following commands sets the privileged mode password to Cisco and encrypts the password? A.! enable secret password Cisco B.! enable secret cisco C.! enable secret Cisco D.! enable password Cisco 15.! What is the problem of disabling STP on switches with loop topology?

3

A.! B.! C.! D.! E.!

Broadcast storm and significant performance degradation Longer packet delay but does not affect throughput Low throughput but does not affect packet delay Some packet loss but no significant impact on delay and throughput No problem

16.! Which of the following is not an STP state? A.! listening B.! learning C.! talking D.! forwarding E.! blocking 17.! Which of the following is an STP state but not an RSTP state? A.! listening B.! learning C.! talking D.! forwarding E.! blocking 18.! Which of the following is an advantage of RSTP (compared to STP)? A.! It has shorter fail-over time. B.! It is easier to configure. C.! Its software is less expensive.. D.! It providers higher throughput. 19.! By default, all Ethernet bridges have the same priority. How does STP determine the root bridge? A.! Based on the the aggregated port speed B.! Based on the MAC address of the bridge C.! Based on the IP address of the bridge D.! Based on the serial number of the bridge E.! Random selection 20.! What is the protocol layer between 802.3 and 802.1D? A.! 802.1s B.! 802.1w C.! 802.2 D.! 802.3x E.! 802.3ad 21.! Which if the following is not an issue addressed by STP? A.! Broadcast storms B.! Gateway redundancy C.! A device receiving multiple copies of the same frame D.! Constant updating of the MAC filter table 22.! What value is primarily used to determine which port becomes the root port on each non-root switch in a spanning-tree topology? A.! lowest port MAC address B.! port priority number and MAC address. C.! highest port priority number. D.! path cost 23.! Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? A.! 802.1d

4

B.! VTP C.! 802.1q D.! SAP 24.! What is the benefit of Link Aggregation? A.! Improvement in round trip delay (shorter delay) B.! Reduction in packet loss rate C.! Better support of flow control D.! Better support of Quality of Service (QoS) E.! Enhancement in throughput 25.! Wich of the following is etherchannel protocol? A.! 802.1s B.! 802.1w C.! 802.2 D.! 802.3x E.! 802.3ad 26.! What parameter can be different on ports within an EtherChannel? A.! speed B.! DTP negotiation settings C.! trunk encapsulation D.! duplex 27.! is a set of physical ports grouped (by assignment) into an aggregation group to appear as “one” logical port. A.! Link Aggregation Group (LAG) B.! Lan Aggregation Group C.! VLan Aggregation Group D.! Mac Aggregation protocol 28.! It provides by attempting to divide the data flow evenly over different links to allow greater link capacity A.! Link Aggregation B.! Etherchannel C.! load balancing D.! STP 29.! Which of the following are ALCP Modes(choose three)? A.! Desirable B.! Active C.! On D.! Passive E.! Auto 30.! Which of the following modes enable LACP EtherChannel? (Choose two.) A.! On B.! Prevent C.! Passive D.! Auto E.! Active F.! Desirable 31.! Which two link protocols are used to carry multiple VLANs over a single link? (Choose two) A.! VTP B.! 802.1q C.! IGP D.! ISL

5

E.! 802.3u 32.! In a switched environment, what does the IEEE 802.1Q standard describe? A.! the operation of VTP B.! a method of VLAN trunking C.! an approach to wireless LAN communication D.! the process for root bridge selection E.! VLAN pruning 33.! Which two benefits are provided by creating VLANs? (Choose two) A.! added security B.! dedicated bandwidth C.! provides segmentation D.! allows switches to route traffic between subinterfaces 34.! What is the purpose of frame tagging in virtual LAN (VLAN) configurations? A.! Inter-VLAN routing B.! Encryption of network packets C.! Frame identification over trunk links D.! Frame identification over access links 35.! The Spanning-Tree Protocol allows which of the following? A.! Bridges to communicate Layer 3 information B.! A redundant network path without suffering the effects of loops in the network C.! Static network paths for loop prevention D.! None of the above 36.! What does a switch do if a MAC address cannot be found in the CAM table? A.! The frame is forwarded to the default port. B.! The switch generates an ARP request for the address. C.! The switch floods the frame out all ports (except the receiving port). D.! The switch drops the frame. 37.! The switch MAC address table is constructed by? A.! A self-learning process from incoming traffic B.! Manual configuration by network administrator C.! A network protocol similar to OSPF D.! A designated root switch which creates and distributes the forwarding table E.! None of the above 38.! Which of the following is a standardized method of trunk encapsulation? A.! 802.1d B.! 802.1q C.! 802.3z D.! 802.1a 39.! Which VLANs are allowed on a trunk link by default? A.! None B.! Only the native VLAN C.! All active VLANs D.! Only negotiated VLANs 40.! Which of these is a method for negotiating an EtherChannel? A.! PAP

6

B.! CHAP C.! LAPD D.! LACP 41.! 802.1q untagged frames are members of the _________ VLAN. A.! Auxiliary B.! Voice C.! Native D.! Private 42.! Which of the following are valid representations of the IPv6 address 2035:0001:2BC5:0000:0000:087C:0000:000A? a.! 2035:0001:2BC5::087C::000A b.! 2035:1:2BC5::87C:0:A c.! 2035:0001:2BC5::087C:0000:000A d.! 2035:1:2BC5:0:0:87C::A e.! 2035:1:2BC5::087C:A 43.! What protocol is used to find the hardware address of a local device? a.! RARP b.! ARP c.! IP d.! ICMP e.! BootP 44.! Which of the following is an example of a multicast address? a.! 10.6.9.1 b.! 192.168.10.6 c.! 224.0.0.10 d.! 172.16.9.5 45.! What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? a.! 14 b.! 15 c.! 16 d.! 30 e.! 31 46.! You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? a.! 3 b.! 4 c.! 5 d.! 6 e.! 7 47.! What is the subnetwork address for a host with the IP address 200.10.5.68/28? a.! 200.10.5.56 b.! 200.10.5.32 c.! 200.10.5.64 d.! 200.10.5.0 48.! If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host belongs to? a.! 172.16.45.0 b.! 172.16.45.4 c.! 172.16.45.8 d.! 172.16.45.12

7

e.! 172.16.45.16 49.! When you issue the ping command, what protocol are you using? a.! DNS b.! DHCP c.! ARP d.! ICMP 50.! What command generated the output shown below? Reply from 172.16.10.2: bytes=32 time<1ms TTL=128 Reply from 172.16.10.2: bytes=32 time<1ms TTL=128 Reply from 172.16.10.2: bytes=32 time<1ms TTL=128

a.! traceroute b.! show ip route c.! ping d.! route print 51.!What type(s) of route is the following? 0.0.0.0/0 [1/0] via 172.16.10.5

a.! Default b.! Directed connected c.! Static d.! Local 52.! In the following command what does the 172.16.3.0 address mean? Router(config)#ip route 172.16.3.0 255.255.255.0 192.168.2.4 a.! Administrative distance address b.! Source address c.! Destination address d.! Local address 53.! Which of the following commands correctly configures a static route? a.! ip route 10.1.3.0 255.255.255.0 10.1.130.253 b.! ip route 10.1.3.0 serial 0 c.! ip route 10.1.3.0 /24 10.1.130.253 d.! ip route 10.1.3.0 /24 serial 0 54.! What is the first address of a block of classless addresses if one of the addresses is 192.2.2.18/28? a.! 192.2.2.9 b.! 192.2.2.17 c.! 192.2.2.23 d.! 192.2.2.31 55.! An organization is granted a block; one address is 2.2.2.64/24. The organization needs 10 subnets. What is the subnet prefix length? a.! /26 b.! /27 c.! /28 d.! /29 56.! Which of the following is the resident subnet for IP address 192.168.44.97/30? a.! 192.168.44.0 b.! 192.168.44.64 c.! 192.168.44.96 d.! 192.168.44.128 57.! An organization is granted a block; one address is 2.2.2.64/25. If the subnet prefix length is /28, what is the maximum number of subnets? a.! 4 b.! 6 c.! 8 d.! None of the choices are correct

8

58.! An organization is granted a block of classless addresses with the starting address 199.34.76.128/29. How many addresses are granted? a.! 8 b.! 16 c.! 32 d.! None of the choices are correct 59.! In a block, the mask is 255.255.192.0; what is the prefix length? a.! /20 b.! /21 c.! /18 d.! /17 60.! In a block, the mask is 255.255.255.224; what is the prefix length? a.! /22 b.! /23 c.! /25 d.! None of the choices are correct 61.! An ARP request is normally _______. a.! broadcast b.! multicast c.! unicast d.! anycast 62.! An ARP reply is normally _______. a.! broadcast b.! multicast c.! unicast d.! anycast 63.! ICMP is a _________ layer protocol. a.! data link b.! transport c.! network d.! application 64.! In error reporting the encapsulated ICMP packet goes to _______. a.! the original sender b.! the receiver c.! a router d.! None of the choices are correct 65.! To test the IP stack on your local host, which IP address would you ping? a.! 127.0.0.1 b.! 172.0.0.1 c.! 1.0.0.127 d.! 127.255.255.255 66.! You want to ping the loopback address of your IPv6 local host. What will you type? a.! ping 127.0.0.1 b.! ping 0.0.0.0 c.! ping ::1 d.! trace 0.0.::1 67.! What are the two parts of an IP address? a.! Network address and MAC address b.! Host address and MAC address c.! Network address and host address d.! MAC address and subnet mask

9

68.! What portion of the Class B address 154.19.2.7 is the network address? a.! 154 b.! 154.19 c.! 154.19.2 d.! 154.19.2.7 69.! What portion of the IP address 129.219.51.18 represents the network? a.! 129.219.51.18 b.! 129.219.51 c.! 129.219 d.! 129 70.! _________ allows a site to use a set of private addresses for internal communication and a set of global Internet addresses for communication with the rest of the world. a.! DHCP b.! NAT c.! IMCP d.! None of the choices are correct 71.! The IPv4 header size is _______ bytes long. a.! 20 to 60 b.! 30 c.! 60 d.! None of the choices are correct 72.! In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in length. a.! 8; 2 b.! 8; 4 c.! 8; 6 d.! None of the choices are correct 73.! In IPv6, the _______ field in the base header restricts the lifetime of a datagram. a.! version b.! priority c.! hop limit d.! TTL 74.! Which one of the following is not a notation for a valid IPv6 address? a.! :: b.! ::1 c.! 2620::1::1 d.! 2620:0:2250:2301::100 75.! Which one of the following is not a valid IPv4 address? a.! 10.0.0.256 b.! 1.1.1.1 c.! 127.0.0.252 d.! 255.255.255.255 76.! Which field of the IP packet changes from router to router? a.! HLEN b.! Protocol Field c.! Time to live d.! Source IP address 77.! Which of the following is not a field in header of an IPv4 packet? a.! Next hop IP address b.! Header check sum c.! Fragment offset

10

d.! Total length 78.! What is used by traffic for which the destination network is not specifically listed in the routing table? a.! Dynamic area b.! Default route c.! Border gateway d.! Blackhole 79.! Which of the following is not a dynamic routing protocol? a.! RIPv1 b.! CDP c.! OSPF d.! BGP e.! RIPv2 80.! What is a metric? a.! A standard of measurement used by routing algorithms b.! The set of techniques used to manage network resources c.! Interdomain routing in TCP/IP networks d.! Services limiting the input or output transmission rate 81.! Which of the following is not a classification of routing protocols? a.! Link state b.! Default vector c.! Distance vector d.! Path vector 82.! What is the OSPF default administrative distance value? a.! 90 b.! 100 c.! 110 d.! 120 83.! Which IP address is used to send an updated LSA entry to OSPF DRs and BDRs? a.! Unicast 224.0.0.5 b.! Unicast 224.0.0.6 c.! Multicast 224.0.0.5 d.! Multicast 224.0.0.6 84.! Using the output shown, what protocol was used to learn the MAC address for 172.16.10.1?

a.! ICMP b.! ARP c.! TCP d.! UDP 85.! What metric does RIPv2 use to find the best path to a remote network? a.! Hop count b.! MTU c.! Cumulative interface delay d.! Load e.! Path bandwidth value 86.! Which of the following is an EGP? a.! RIPv2

11

b.! EIGRP c.! BGP d.! RIP 87.! Updates addressed to 224.0.0.6 are destined for which type of OSPF router? a.! DR b.! ASBR c.! ABR d.! All OSPF routers 88.! Which of the following is called an link state routing protocol? a.! OSPF b.! EIGRP c.! BGP d.! RIP 89.! Routing inside an autonomous system is referred to as ________ routing. a.! interdomain b.! intradomain c.! out-of-domain d.! None of the choices are correct 90.! The metric used by _______ is the hop count. a.! OSPF b.! RIP c.! BGP d.! None of the choices are correct 91.! In RIP, the ________ timer controls the advertising of regular update messages. a.! garbage collection b.! expiration c.! update timer d.! invalid timer 92.! The _________ routing uses the Dijkstra algorithm to build a routing table. a.! distance vector b.! link state c.! path vector d.! None of the choices are correct 93.! In OSPF, a ________ link connects two routers without any other host or router in between. a.! point-to-point b.! transient c.! stub d.! virtual 94.! In OSPF, a _______ link is a network with several routers attached to it. a.! point-to-point b.! transient c.! stub d.! virtual 95.! In OSPF, a ________ link is a network connected to only one router. a.! point-to-point b.! transient c.! stub d.! virtual 96.! The purpose of echo request and echo reply is to _______. a.! report errors b.! check node-to-node communication c.! check packet lifetime d.! None of the choices are correct 97.! Which of the following is not an OSPF packet type?

12

a.! Acknowledgment b.! Link state update packet c.! Database describtion d.! Open connection 98.! How does RIP address the issue of routing loops? a.! hold down timer b.! Split Horizon c.! Split Horizon and Poison Reverse d.! None of the above 99.! Which of the following is NOT a correct statement of RIPv2? a.! It supports classless addressing b.! It supports multicasting c.! It interworks with other routing protocols, such as OSPF d.! It supports Quality of Service (QOS) 100.! In OSPF, an autonomous system is divided into multiple ____. a.! regions b.! sub-autonomous systems c.! areas d.! divisions 101.! Which of the following is a disadvantage of enabling Triggered updates in a RIP router network? a.! extends convergence time b.! may increase likelihood of routing loops c.! increases network traffic due to response messages that are propagated from router to router d.! does not always enable the least cost route to be calculated ************************************************************************************

Part II Questions ! Match the following to one or more layers of the TCP/IP protocol suite:

a.! creating user datagrams b. responsibility for handling frames between adjacent nodes c. transforming bits to electromagnetic signals 5.! List the OSI layer that performs each of the following functions: a. b. c. d. e. f.

Data compression Routing Definition of a signal’s electrical characteristics E-mail Error detection End-to-end flow control

6.! In the work area below, matches the OSI model layer on the left to its description on the right. left list:

right list:

Layer

Description 13

Transport

Framing

Physical

End-to-end connection

Data Link

Routing

Network

Conversion to bits

7.! What is the difference between a port address, a logical address, and a physical address? 8.! Draw the diagram of TCP/IP layers? A.! Write name of layers ? B.! Write name of data at each layers ? C.! Write name of addresses at each layers ? 9.! What do we mean when we say that a bridge can filter traffic? Why is filtering important? 2.! Refer to the following network diagram. The letter id’s refers to the layer 3 address (equivalent to an IP address), the number id’s refer to the layer 2 addresses (equivalent to an MAC address). Host 1 sends a frame to Host 2 as illustrated with the red arrow

Fill in the table below: ! !

LAN$1$

LAN$2$

LAN$3$

Source$

Destination$

Source$

Destination$

Source$

Destination$

Address$

Address$

Address$

Address$

Address$

Address$

Layer$2$

!

!

!

!

!

!

Layer$3$

!

!

!

!

!

!

3.! Refer to the exhibit topology. PC-1 is sending packets to the FTP server. Consider the packets as they leave Router A interface Fa0/0 towards Router B interface Fa0/1. Fill the table below Addresses when Router B gets the packet.

14

Source MAC Address

Destination MAC Address

Source IP Address

Destination IP Address

Router B gets the packet !

4.! For question 1-4, refer to the following network diagram. The letter id’s refers to the layer 3 address (equivalent to an IP address), the number id’s refer to the layer 2 addresses (equivalent to an MAC address). Host 1 sends a frame to Host 5 as illustrated

15

1.!

the!source!and!destination!Layer!2!addresses!for!the!frame!in!LAN!2!are!_______!and! ______,!respectively:!

2.!

(!the!source!and!destination!Layer!3!addresses!for!the!frame!in!LAN!2!are! _______! and!______,!respectively!

3.!

!the! source! and! destination! Layer! 2! addresses! for! the! frame! in! LAN! 3! are! _______! and!______,!respectively!

4.!

(!the!source!and!destination!Layer!3!addresses!for!the!frame!in!LAN!3!are! _______! and!______,!respectively!

5.! Show the root switch and label each port as Root Switch (RS), Root Port (RP), Designated Port (DP), and Blocked Port (BP) in the following diagram. Use a large red dot to indicate the blocked port. (P is the priority of the switch.)

100

10

10

BR1 P=100

BR2 P=200

4

4 BR3 P=300

100

BR4 P=400

20

20

6.!Refer to the belwo topology. Explain in details how Spanning Tree Protocol operate to make a tree topology.

16

SW-01 WS-01

SW-02

SW-03

WS-02

blocke d 7.! What are some differences between Switch and Router? 8.! What are some differences between Switch and Hub?

9.! Description

Devices

a . This device has not address filtering capability.

.

b. This device creates many smaller collision domains, but the network is still one large broadcast domain

.

c. This device can never run full-duplex

.

d. This device breaks up collision domains and broadcast domains

.

10.! Which one has more overhead, a Switch or a Router? Explain your answer. 11.! An Ethernet MAC sub-layer receives 39 bytes of data from the upper layer. How many bytes of padding must be added to the data? 12.! Draw a network diagram to illustrate VLAN tagging (802.1Q). The diagram needs to show (a) workstations and their VLAN IDs, (b) Ethernet switches, (c) VLAN tagging (trunk) and access ports. DO NOT cut-and-paste any diagram from lecture notes.

13.!How does the Ethernet address lA:2B:3CAD:5E:6F appear on the line in binary? 14.! In the work area below match the cable type to the standard with which it goes. 1000Base-T

IEEE 802.3u

10Base-5

IEEE 802.3

100Base-TX

IEEE 802.3z

15.! What are main four differences between Connectionless and Connection oriented? 16.! Find the class of the following classful IP addresses: a. 01110111 .11110011 .10000111 .11011101 b. 11101111 .11000000 .11110000 .00011101 17.! Change each of the following masks to a prefix length:

17

a.! 255.255.255.128 b. 255.255.192.0 18.! Explain the advantages of IPv6 when compared to IPv4. 19.! Refer to the IPv4 Header.

what is the function of the section labeled “Identification”? what is the function of the section labeled “Time to live”? what is the function of the section labeled “Protocol”? 20.! Explain three transition strategies from IPv4 to IPv6? 21.! Can each of the following be the value of the TTL in a datagram? Explain your answer. a. 23

b. 0

c. 302

22.! Identify (2) causes of IPv4 address depletion and (2) mitigations that have reduced the depletion rate. 23.! Draw IPv6 header Fields, write Field names and describe the function of each fields? 24.! Show abbreviations for the following addresses: a. 0000:FFFF:FFFF:0000:0000:0000:0000:0000 b. 0000:0001:0000:0000:0000:FFFF:1200:1000

18

c. E3D7:0000:0000:0000:51F4:00C8:C0A8:6420 d. FDCE:BA98:0074:3210:000F:BBFF:0000:FFFF e. 0020:1000:0000:9ABC:0000:0000:0000:0000 f. 0004:1456:0000:0003:F7A9:23FF:0000:0000 25.! Show the original (unabbreviated) form of the following IPv6 addresses: a.! B:A:CC::1234:A b.! ::2222 c.! EC::2:0 d.! 20:0:0:130F::9C0:13 e.! FE00:0:0:1::56 f.! FE80::F7A9:23FF:FE11:2 26.! What are three benefits of implementing VLANs? 27.! Refer to the exhibit. How many broadcast domains and how many collision domains are in the network topology? Also, identify which links, if any, can be a VLAN trunks determined by port numbers.

28.! The topology below illustrates a network for an enterprise LAN. The network is comprised of an Ethernet switch and five PCs. Fill the below tables for question a) based on the topology below.

19

a)!Assume!that!the!MAC!forwarding!tables!are!initially!empty.!!For!the!following!sequence!of!frame! transmissions,!determine!whether!the!switch!receiving!the!frame!floods!learns!(creates!a!new!entry!in! the!MAC!forwarding!table)!and!whether!it!floods.! ! !

Sequence! Frame!transmission! step! 1! 2!

PC:0!sends!a!frame!to!PC:4! PC:4!sends!a!frame!to!PC:3!

3!

PC:0!sends!a!frame!to!PC:2!

4!

PC:2!sends!a!frame!to!PC:3!

5!

PC:0!sends!a!frame!to!PC:2!

Learn?' (YES!or!NO)!

Flood?' (YES!or!NO)!

! ! !

! ! !

!

!

!

!

29.! Refer to the exhibit. How many broadcast domains and how many collision domains are in each of the network topologies?

20

30.!Draw Ethernet Frame Fields Format, write Field names and describe the function of each field by a sentence? 31.!The topology below illustrates a network for an enterprise LAN. The network is comprised of an Ethernet switch and four PCs. Fill the below tables for question a) and b) based on the topology below.

a)!

Assume!that!the!MAC!forwarding!tables!are!initially!empty.!!For!the!following!sequence!of!frame! transmissions,!determine!whether!the!switch!receiving!the!frame!floods!learns!(creates!a!new!entry!in! the!MAC!forwarding!table)!and!whether!it!floods.! ! !

!

21

Sequence!step!

Frame!transmission!

Learn?' (YES!or!NO)!

Flood?' (YES!or!NO)!

1! 2! 3! 4!

PC:C!sends!a!frame!to!PC:D! PC:A!sends!a!frame!to!PC:B! PC:B!sends!a!frame!to!PC:C! PC:A!sends!a!frame!to!PC:D!

! ! ! !

! ! ! !

!

b)!

Fill!in!the!MAC!forwarding!table!for!Switch!in!the!tables!provided!below!after!the!switch!have!fully!! learned!the!MAC!addresses.! ! !!!!!!!!!!!!!!!!!!!!Switch!Fully!Learn!MAC!addresses! ! Port! MAC!Address! P0! ! P1!

!

P2! P3!

! !

!

32.!In the work area below match the best left answer to the right which it goes. Description, Cable and Abbreviation 1.! In OSPF, a link is a network connected

Standard, Device, Function and Technology A.! Metric

to only one router

2.! In RIP, the timer controls the advertising

B.! VLAN

of regular update messages

3.! RIP default administrative distance value

C.! OSPF

4.! A protocol uses by Ping

D.! 802.1Q

5.! A standard of measurement used by

E.! Stub

routing algorithms

6.! A field of the IPv6 packet changes from

F.! Update Timer

router to router

7.! A method for VLAN trunking

G.! Flow Control

8.! Breaks up broadcast domains in a layer 2

H.! Hop limit

9.! Uses Dijkstra Algorithm to find the

I.! 120

shortest route

10.!It is a routing protocol may have routing

J.! TTL

loop problem K.! RIPv2

22

L.! 100 M.! MAC Address N.! ICMP O.! Invalid Timer P.! DHCP

33.!In the work area below match the best left answer to the right which it goes. Description, Cable and Abbreviation

Standard, Device, Function and Technology

1.! Distance Vector Routing

A. 255

2.! It is a routing protocol which Cost metric = bandwidth

B. It provides high throughput

3.! The header length size of IPv4 in bytes

C. 802.1Q

4.! The purpose of frame tagging in virtual LAN

D. Hub

5.! A protocol is used by switches to prevent loops in a layer 2 network

E. 256

6.! What is the maximum value of TTL in an IPV6 address? 7.! Is an STP state but not an RSTP state

F. Learning

8.! It is an advantage of RSTP

H. 802.1D

9.! It is network device all ports must run at same data rate

I. Frame identification over trunk links

10.! It is an Ethernet standard connect each device to a centralized LAN hub using UTP cabling

J. Listening

G. 40 to 60

K. 20 to 60 L. Shorter fail over time M. ICMP N.! Frame identification over access links O.! OSPF

23

P.! RIPv2 Q.! 10BaseT R.! Switch

34.!In the work area below match the best left answer to the right which it goes. Description, Cable and Abbreviation

Standard, Device, Function and Technology

1.! It is a Distance Vector Routing Protocol

A. Hop Count

2.! Is a disadvantage of enabling Triggered updates in a Routing Protocol

B.! It extends convergence time

3.! In OSPF, a link in a network with several routers attached to it

C. 802.1Q

4.! RIP routing protocol uses a metric called

D. 802.1D

5.! A protocol is used by switches to prevent loops in a layer 2 network

E. 120

6.! OSPF default administrative distance value is

F. ICMP

7.! It is an Ethernet standard connect each device in series using coaxial cabling

G. 10Base2

8.! Is used to acquire the physical address (MAC address) when the logical address (IP address) is known.

H. VLAN

9.! A protocol uses by Traceroute

I. It increases network traffic

10.! Breaks up broadcast domains in a layer 2

J. Cost K. 110 L. ARP M. Stub S.! Frame identification over access links T.! OSPF U.! RIPv2 V.! 10BaseT W.! Ttansit

24

35.! What is the functions of each fields in IPv6 Header?

what is the function of the section labeled “Hoplimit”? what is the function of the section labeled “Next header”? what is the function of the section labeled “Traffic Class”? 36.! Explain three transition strategies from IPv4 to IPv6? 37.! What are Four differences between IPv4 to IPv6? 38.! What are some differences between access mode and trunk mode in VLAN? 39.! What are the Three advantages of implementing Network Address Translation (NAT). 40.! Write the Name of the 3 fields includes in IPv4 Header but removed in IPv6 Header. 41.! What is Ping and what is Traceroute, and why they used for? 42.! What are the Differences between Store and forward switching and Cut-through switching? 43.! Explain in details how an ARP protocol works illustrate by graph? 44.! For the block 192.168.1.0/25. a. Find number of subnets, b. Find first host address, last host address and broadcast address for each subnet? For the block 192.168.2.0/26. a. Find number of subnets, b. Find first host address, last host address and broadcast address for each subnet? For the block 192.168.3.0/27. a. Find number of subnets, b. Find first host address, last host address and broadcast address for each subnet?

45.!An organization site is granted the block 192.168.12.32/27. The organization needs 2 subnets each one with 16 addresses. What are the network addresses, first host address, last host address and broadcast addresses for each subnet? An organization site is granted the block 192.168.12.64/26. The organization needs 2 subnets each one with 32 addresses. What are the network addresses, first host address, last host address and broadcast addresses for each subnet?

46.! Deriving Network diagrams from Routing Tables below?

25

mask /26 /25 /24 /22 /21

Network address 180.70.65.192 180.70.65.128 201.4.22.0 201.4.16.0

111.0.0.0 Default Default Route 0.0.0.0/0

Next Hop ---------------------

m2 m0 m3 m1

Interface

201.4.16.2 180.70.65.200

m1 m2

26

47.! Form the Routing table below answer question a and b based on longest network prefix matches. Network address mask 180.70.65.192/26 1011 0100 0100 0110 0100 0001 11 180.70.65.128/25 1011 0100 0100 0110 0100 0001 1 201.4.22.0/24 1100 1001 0000 0100 0001 1100 201.4.16.0/22 1100 1001 0000 0100 0001 00 Default Route 0.0.0.0/0

Next Hop ------

m2

Interface

------

m0

------

m3

------

m1

180.70.65.200

m2

a.! What is the outgoing interface for a packet with destination address 180.70.65.170 prove it? b.! What is the outgoing interface for a packet with destination address 180.70.65.199 prove it? c.! What is the outgoing interface for a packet with destination address 192.168.8.5 prove it?

48.! Form the Routing table below answer question a and b based on longest network prefix matches. Network address mask 180.70.65.192/26 1011 0100 0100 0110 0100 0001 11 180.70.65.128/25 1011 0100 0100 0110 0100 0001 1 201.4.22.0/24 1100 1001 0000 0100 0001 1100 201.4.16.0/22 1100 1001 0000 0100 0001 00 Default Route 0.0.0.0/0

Next Hop ------

m2

Interface

------

m0

------

m3

------

m1

180.70.65.200

m2

a.! What is the outgoing interface for a packet with destination address 201.4.16.16 prove it? b.! What is the outgoing interface for a packet with destination address 180.70.65.195 prove it? c.! What is the outgoing interface for a packet with destination address 192.168.2.2 prove it?

27

49.! Drive a routing tables for the network topologies as shown below from the initial start up until convergence?

50.! Deriving Routing Table from Network diagram below?

28

51.!Calculate routing table fro R1 and R4 after Network Full convergence.

52.! Explain what What is IGP vs EGP, with some routing protocol examples? 53.! What are the main components of dynamic routing protocols? 54.! What are some Cost Metrics Types for different routing protocols? 55.! In OSPF what is Area? And describe four different types of Area? 56.! What is Designated router (DR) and Backup designated router (BDR) and what are some Criteria for getting elected DR/BDR.

57.!A network running RIPV2 is illustrated below, based on the network design answer question a) to e).

a)! Assume that R1 has just powered up and has not received any RIP response messages from its peer routers. b)! Enter R1’s routing table content in the table below. c)! Now assume that R2 sends a RIP response message with the route table content (below) to R1.

29

Destination address

Hop

20.60.16.0/24

1

25.10.0.0/16

1

16.6.20.0/24

1

d)! Update R1’s routing table after it has received R2’s routing table. e)! What are the contents of R1’s routing table after R1 has fully converged? 58.! Assume that the network below is using RIPv2 routing protocol. Based on the network design answer question a) to e).

a) Assume that R1 has just powered up and has not received any RIP response messages from its peer routers. b) Enter R1’s routing table content in the table below. c) Now assume that R2 sends a RIP response message with the route table content (below) to R1.

d) Update R1’s routing table after it has received R2’s routing table. e) What are the contents of R1’s routing table after R1 has fully converged? 59.! Explain what is a metric what is the benefits in routing protocols?

30

60.! How Dynamic routing protocols are operating explain their steps? 61.! Explain what is an Administrative Distance in routing protocol, when it will be used? 62.! When using the RIPv2 routing protocol, what is a triggered update? How is this different from a periodic update? 63.! Explain in details what are the two solutions for distance vector routing protocol loops? 64.! What are the differences between RIPv1 and RIPv2? 65.! What are the differences between RIPv2 and OSPF? 66.! What are the three Advantages of Hierarchical (area) Topology in OSPF? 67.!

68.!

31

69.! Explain what are the purposes of the OSPF HELLO message? 70.!

32

1 University of Human Development College of Science and ...

B. Error detection. C. Identifies the upper-layer protocol. D. Identifies the transmitting device. 10. The _____ sub layer in Data Link layer is responsible for the operation of the flow control. A. LLC. B. MII. C. MAC. D. None of the choices are correct. 11. The minimum data length for Ethernet is _______bytes. A. 32. B. 40. C. 82.

3MB Sizes 39 Downloads 345 Views

Recommend Documents

Department of Computer Science University College of ...
Murtaza Syed. Mian Said. 814/1050. 763/1100. BCS (Hons) Self72.63%. 5. UG-16-009076. Ihtisham Ali. Akbar Ali. 870/1100. 750/1100. BCS (Hons) Self72.55%.

ACADEMIC POLICIES OF UNIVERSITY OF SCIENCE AND ...
ACADEMIC POLICIES OF UNIVERSITY OF SCIENCE AND TECHNOLOGY OF HANOI.pdf. ACADEMIC POLICIES OF UNIVERSITY OF SCIENCE AND ...

BS Human Nutrition and Dietetics - Government College University ...
Oct 21, 2015 - 2 924363. 382. IQRA WAHEED ... MUHAMMAD ASGHAR. 31203-8234741-2 ... Approved By : Powered By IT Services (GCUF). Page : 1/3 ...

BS Human Nutrition and Dietetics - Government College University ...
Oct 21, 2015 - GOVERNMENT COLLEGE UNIVERSITY, FAISALABAD. 1st MERIT LIST OF BS (Hons.) Human Nutrition and Dietetics (EVENING). FOR FALL ...

UNIVERSITY OF TARTU Faculty of Science and Technology Institute ...
Faculty of Science and Technology. Institute of .... European space research and technology centre. FSMC ...... and Data Handling System,” Bachelor thesis.

UNIVERSITY OF TARTU Faculty of Science and Technology Institute ...
6.3.4 Use of bus switches . . . . . . . . . . . . . . . . . . . . . 40 .... CDHS runs the software of payload, distributes received telecommands, executes schedules and offers ..... for the satellite Command and Data Management System. However, accor

Punjab Engineering College University of Technology.pdf ...
DA : Application forms. Page 3 of 3. Punjab Engineering College University of Technology.pdf. Punjab Engineering College University of Technology.pdf. Open.

UNIVERSITY COLLEGE OF THE CARIBBEAN ... -
Such rules are in fact always found ... The law always lags behind social change. .... was at that time almost always a member of the clergy (the clergy was ...

college of natural resources - NC State University
COLLEGE OF NATURAL RESOURCES. About the ... resource markets, and geospatial analytics), receive interdisciplinary research training, and participate as a member of cohort of doctoral students to ... CENTER FOR GEOSPATIAL ANALyTICS AND DEPARTMENT OF

college of natural resources - NC State University
water resources, wildlife, forest product markets, and tourism in the region. ... engagement, as nurturing and enjoying the environment and engineering ...

BOSTON UNIVERSITY COLLEGE OF ENGINEERING ...
BOSTON UNIVERSITY. COLLEGE .... 4.2 Mask-length and maximum graph node degree . . . . . . . . . . . . . 70 ...... data is converted to data readable by our Palm program using PRC-tools [49]. It is ...... 22, (Copper Mountain Resort, Colorado), pp.

BOSTON UNIVERSITY COLLEGE OF ENGINEERING ...
B.Tech., Regional Engineering College, Warangal, India. May 2000. Submitted in partial fulfillment of the requirements for the degree of. Master of Science. 2002 ...

BOSTON UNIVERSITY COLLEGE OF ENGINEERING ...
68. 4.5 Average delay: Comparison between the oracle and the real modes . . 70. 4.6 CCDF: Comparison between the oracle and the real modes at load=20. 70.

BOSTON UNIVERSITY COLLEGE OF ENGINEERING ...
then put back together on a remote host using recent graph-theoretic techniques. We present analyses ... gossip protocols and content delivery networks. We provide .... 2.5 CPIsync vs. slow sync, fixed number of differences . . . . . . . . . . . 29.

BOSTON UNIVERSITY COLLEGE OF ENGINEERING ...
counterpart in home, campus, and business environments due to their low cost of installation and ..... Unfortunately, this is often not the case in a wireless environ- ment. .... Avoidance) protocol used by Apple Localtalk [21] network. Figure 2.9 ..

University of Florida College of Medicine 2016 Participant ...
University of Florida College of Medicine 2016 Participant Application.pdf. University of Florida College of Medicine 2016 Participant Application.pdf. Open.

University of Texas at Arlington College of Nursing.pdf
Whoops! There was a problem loading this page. Whoops! There was a problem loading this page. Whoops! There was a problem loading this page. University ...

University of Sulaimani MA 2016-2017- College of Basic Education ...
University of Sulaimani MA 2016-2017- College of Basic Education- Summer Semester-2.pdf. University of Sulaimani MA 2016-2017- College of Basic ...

Yale University Department of Computer Science
intimately related to the spherical harmonics. 3.1 GCAR graph. We assume as before that we are given K projection images. Let Λk,l, k = 1,...,K, l = 1,...,L be KL ...