Describe Network-Supported Technologies That Impact How People Learn, Work, and Play
Describe Network-Supported Technologies That Impact How People Learn, Work, and Play
Internal factors that interfere with communication are related to the nature of the communication
itself. The communication may vary in complexity and importance. Clear and concise messages
are usually easier to understand than complex messages. Important communications require more
care to ensure that the meaning is received properly.
External factors affecting the quality of communication are related to the processes that devices
use to talk to each other and include:
• Whether a confirmation of the message was returned to the sender
• The quality of the pathway between the sender and the recipient
• The number of times the message has to change form
• The number of other messages in the communication network
• The number of times the message is reformatted
• The amount of time allotted for successful communication
Includes instant messaging, weblogs, podcasting, collaboration tools using text, graphic, audio
and video technologies over both fixed and mobile data networks.
Data:
Data is the pieces of information, such as files, audio, phone calls and video shared across the network.
Converged networks:
Traditionally telephone, data communications between computers, radio, and television each had separate networks
and each required a different technology to carry its particular communication signal. Additionally, each service had
its own set of rules and standards to ensure the successful communication of its service across a specific medium.
Technology can now consolidate these disparate networks into one platform—a platform we define as the converged
network. The flow of voice, radio, video, and data traveling over the same network eliminates the need to create and
maintain separate networks. As converged networks become more common, businesses and individual users can use
a single network for its services, instead of managing and using separate physical networks for each type of service.
We will still have many points of contact and many devices—for example, personal computers, phones, TVs, personal
assistants, and retail point-of-sale registers—but one common network. One network now carries multiple types of
messages and information.New Text
5. Why does Quality of Service matter on a data network?
Converged data networks carry multiple types of communication. Data network resources,
however, are always constrained by budgets, physical limitations, and technology. The existence
of these limitations means that decisions must be made regarding the priority of different types of
communication.
The management of different types of communication involves balancing both the traffic's
importance and its characteristics. Both of these factors are considered when developing a
Quality of Service (QoS) strategy for managing data in a given data network.
Without properly designed and implemented QoS mechanisms, data packets will be dropped
without consideration of the application characteristics or priority.
Intruders may desire to gain access to information for monetary gain. They steal financial records
or sell trade secrets to competitors. For others, stealing data is merely a game about which they
can brag. They just want to gain access "because they can." They often boast about their latest
online conquests. Many have limited computer and networking skills and are just doing this activity
for fun. Some people change, destroy data or disrupt network processes. Some are disgruntled
employees who decide to wreak havoc with corporate data.
Which form of communication is a real-time text-based communication type used between two or more people who use mostly text to communicate with each other?
j Weblogs
■J Wikis
V Instant Messaging
Podcasting
Collaboration Tools
Which type of network provides customer's limited access to corporate data such as inventory, parts lists and orders?
intranet
>/v£) extranet
internetwork
Internet
What balances the importance of traffic and its characteristics in order to manage data?
network administration
O network traffic
network evaluation
Which processes occur to network traffic so that quality of service strategies work correctly? (Choose two.)
Digital movies are always assigned to the high priority queue for processing.
programmed services and protocols that move the messages across the network
For which three reasons were circuit-switched, connection-oriented technologies rejected when the Internet was being developed? (Choose three.)
Circuit-switched technologies required that a single message be broken up into multiple message blocks that contain addressing information.
Early circuit-switched networks did not automatically establish alternative circuits in the event of circuit failure.
Circuit-switched technologies required that an open circuit between network endpoints be established, even if data was not actively being transferred between locations.
_ The quality and consistency of messages transmitted across a connection-oriented, circuit-switched network cannot be guaranteed.
/V The establishment of multiple, simultaneous open circuits for fault tolerance is costly.
For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (Choose three.)
Data packets can travel multiple paths through the network simultaneously.
It allows for billing of network use by the amount of time a connection is established.
It requires that a data circuit between the source and destination be established before data can be transferred.
Match the characteristics of a network architecture with their definitions by dragging the options on the left to targets on the Match the characteristics of a network architecture with their definitions by dragging the options on the left to targets on the
right. (Not all options are used.) right. (Not all options are used.)
scalability
V
quality of service
V
security
V
quality of service
Network security threats can be classified as relating to either network infrastructure security or content security. Classify the security
threats on the left by dragging them into the appropriate category on the right.
• End devices: desktop computer, laptop computer, server, PDA, cellular mobile phone, printer,
security camera, IP phone, electronic point of sale device, automatic teller machine
• Intermediate device: repeater, hub, wireless access point, switch, router, modem, and firewall
• Networking media: copper cable, fiber cable, radio (wireless)
Network - a group of interconnected devices capable of carrying many different types of communications, including traditional
computer data, interactive voice, video, and entertainment products.
LAN - a local network, or group of interconnected local networks that are under the same administrative control. In the past,
LANs were thought of only as small networks that existed in a single physical location. While LANs can be as small as a single
local network installed in a home or small office, LANs now include interconnected local networks consisting of many hundreds
of hosts, installed in multiple buildings and locations. All of the local networks within a LAN are under one administrative control
group that governs the security and access control policies that are in force on the network
WAN - Telecommunications service providers (TSP) operate large regional networks spanning long distances. Individual
organizations usually lease connections through a telecommunications service provider network. These networks that connect
LANs in geographically separated locations are Wide Area Networks (WANs). Although the organization maintains all of the
policies and administration of the LANs at both ends of the connection, the policies within the communications service provider
network are controlled by the TSP. WANs use specifically designed network devices to make the interconnections between
LANs.
Internetwork - Al mesh of interconnected networks is used. Some of these interconnected networks are owned by large public
and private organizations, such as government agencies or industrial enterprises, and are reserved for their exclusive use. The
most well-known and widely used publicly accessible internetwork is the Internet.
Internet - The most well-known and widely used publicly accessible internetwork. The Internet is created by the interconnection
of networks belonging to Internet Service Providers (ISPs). These ISP networks connect to each other to provide access for
users all over the world. Ensuring effective communication across this diverse infrastructure requires the application of
consistent and commonly recognized technologies and protocols as well as the cooperation of many network administration
agencies.
3. Compare and contrast the layers of the OSI model with the
TCP/IP protocol stack.
There are two basic types of networking models: protocol models and reference models.
A protocol model closely matches the structure of a particular protocol suite. The hierarchical set of related protocols in a
suite t represents all the functionality required to interface the human network with the data network. The 4-layer TCP/IP
model is a protocol model because it describes the functions that occur at each layer of protocols within the TCP/IP suite.
A reference model provides a common reference for maintaining consistency within all types of network protocols and
services. A reference model is not intended to be an implementation specification or to provide a sufficient level of detail to
define precisely the services of the network architecture. The primary purpose of a reference model is to aid in clearer
understanding of the functions and process involved. The 7-layer Open Systems Interconnection (OSI) model is the most
widely known internetwork reference model. It is used for data network design, operation specifications, and troubleshooting.
The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI reference model. In the OSI
model, the Network Access layer and the Application layer of the TCP/IP model are further divided to describe discreet
functions that need to occur at these layers.
At the Network Access Layer, the TCP/IP protocol suite does not specify which protocols to use when transmitting over a
physical medium; it only describes the handoff from the Internet Layer to the physical network protocols. The OSI Layers 1
and 2 discuss the necessary procedures to access the media and the physical means to send data over a network.
The key parallels between the two network models occur at the OSI model Layers 3 and 4. OSI Model Layer 3, the
Network layer, almost universally is used to discuss and document the range of processes that occur in all data networks to
address and route messages through an internetwork. The Internet Protocol (IP) is the TCP/IP suite protocol that includes the
functionality described at Layer 3.
Layer 4, the Transport layer of the OSI model, is often used to describe general services or functions that manage
individual conversations between source and destination hosts. These functions include acknowledgement, error recovery,
and sequencing. At this layer, the TCP/IP protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
provide the necessary functionality.
The TCP/IP Application layer includes a number of protocols that provide specific functionality to a variety of end user
applications. The OSI model Layers 5, 6 and 7 are used as references for application software developers and vendors to
produce products that need to access networks for communications.
4. Explain why networking models are used.
Although the TCP/IP and OSI models are the primary models used when discussing network functionality, designers of
network protocols, services, or devices can create their own models to represent their products. Ultimately, designers are
required to communicate to the industry by relating their product or service to either the OSI model or the TCP/IP model, or
to both.
As a reference model, the OSI model provides an extensive list of functions and services that can occur at each layer. It
also describes the interaction of each layer with the layers directly above and below it. Whereas TCP/IP model layers are
referred to by name, the seven OSI model layers are usually referred to by number.
There are benefits to using a layered model to describe network protocols and operations:
- Assists in protocol design, because protocols that operate at a specific layer have defined information that they act
upon and a defined interface to the layers above and below
-Fosters competition because products from different vendors can work together
-Prevents technology or capability changes in one layer from affecting other layers above and below
-Provides a common language to describe networking functions and capabilities
Protocol:
All communication, whether face-to-face or over a network, is governed by predetermined rules called protocols. These
protocols are specific to the characteristics of the conversation. In our day-to-day personal communication, the rules we use
to communicate over one medium, like a telephone call, are not necessarily the same as the protocols for using another
medium, such as a sending a letter.
Successful communication between hosts on a network requires the interaction of many different protocols. A group of
interrelated protocols that are necessary to perform a communication function is called a protocol suite. These protocols are
implemented in software and hardware that is on each host and network device.
The form that a piece of data takes at any layer is called a Protocol Data Unit (PDU). During encapsulation, each
succeeding layer encapsulates the PDU that it receives from the layer above in accordance with the protocol being used. At
each stage of the process, a PDU has a different name to reflect its new appearance. PDUs within the protocols of the TCP/
IP suite are:
Data - The general term for the PDU used at the Application layer
Segment - Transport Layer PDU
Packet - Internetwork Layer PDU
Frame - Network Access Layer PDU
Individual pages of a letter are written and numbered sequentially. Each page is sealed in a separate envelope that is then
addressed to the recipient. The letters are posted and put in a mailbag (labelled with the destination) with many other
envelops each containing a page of different letters and addressed to recipients. Many mailbags are loaded into a van and
transported towards the destination. Along the way the mailbags may be transferred to other vans or different modes of
transport - trucks, trains, aircraft, ships. At the destination the mailbags are unloaded and emptied. The envelopes are
delivered to the destination addresses. At one address all the envelopes received are opened, the page removed from each
one, and the pages re-assembled into the letter.
The envelope, and then the mailbag and the vans/trucks/aircraft, each do not care what is in the "container" that they carry.
The letter itself is not used to provide information to assist in its delivery. The address on the envelope, the label on the
mailbag or the delivery instructions to the van driver are what direct the letter towards its destination.
Data encapsulation follows the same principle - it is the addresses used in each layer of encapsulation that direct the data
towards its destination not the data itself.
7. What are the unique roles of Layer 2, Layer 3, and Layer 4
addresses?
Layer 4 addresses (ports) identify the individual applications sending or receiving data.
Layer 3 (logical) addresses identify devices and their networks.
Layer 2 (physical) addresses identify devices on a local network.
00000003
o 1
U 2
3
0 _] logical
0 Vy4 physical
0 '/jd MAC
0 J IP
0 _l port
0
0 When a server responds to a web request, what occurs next in the encapsulation process after the web page data is formatted and separated into TCP segments?
0 The client decapsulates the segment and opens the web page.
0
■ The client adds the appropriate physical addresses to the segments so the server can forward the data.
0 The server converts the data to bits for transport across the medium.
0 nA» The server adds the source and destination IP address to each segment header to deliver the packets to the destination.
0 The server adds the source and destination physical addresses to the packet header.
m
0 Which term describes a specific set of rules that determines the formatting of messages and the process of encapsulation used to forward data?
CD segmentation
CD
0 A« protocol
n
0 O multiplexing
0 O QoS
0 reassembly
0
□ Which two are protocols associated with Layer 4 of the OSI model? (Choose two.)
0
0 G ip
0 '/.Vi TCP
0 □ FTP
“ □ TFTP
0 via UDP
m
0 Drag and drop the terms with their corresponding definition. (Not all items are used.) 0 Drag and drop the terms with their corresponding definition . (Not all items are used.)
0 0
0 0
dividing data streams into smaller pieces suitable for
0 multiplexing 0
0
transmission
✓ segmentation
0
0 PDU
the process of adding layer-specific information or labels 0
necessary to transmit data
0 ✓ encapsulation
0 0
interleaving multiple data streams onto a shared
QoS QoS multiplexing
communication channel or network medium
✓
formal rules outlining the structure and process of network
encapsulation protocol
communication
<s
protocol
Drag the networking terms on the left and drop them into their appropriate layer on the right. (Not all options are used.)
Uftwori.
^ Quiz - Internet Explorer
00000000
Drag and drop the functional description of the OSI layers to appropriate name of the layer.
gf-----------------------------------------------------------
E
O defines interfaces between application software
E
E ✓E standardizes the data formats between systems
E
0 ✓E manages users sessions and dialogues
Applications are designed to interact with us. Application is software for the user. If the device is a computer, the application is typically
initiated by the user. Although there may be many layers of support underneath, application software provides an interface between
humans and the hardware. The application will initiate the data transfer process when the user presses the Send button, or a similar action
Services are background programs that perform a particular function in the data network. Services are invoked by a device connecting to
the network or by an application. For example, a network service can provide functions that transmit data or provide conversion of data in a
network. In general, services are not directly accessible or seen by the end user. They provide the connection between an application and
the network.
The source end of data communication is referred to as the “server” and the receiving end is called the “client.” The client and server processes
are application layer services provide the foundation for data network connectivity.
In some cases the "servers" and "clients" are devices that perform that role specifically and exclusively. For example:
A central file server may contain an organization's business data files that employees access using their client only workstations
Internet based examples include web servers and mail servers where many users access a centrally provided service.
In other situations, such as file sharing over a home network, individual devices may perform both server and client roles at different times.
Servers are both a repository and a source of information such as, text files, databases, pictures, video, or audio files that have been previously
recorded.
The role of the server may be to manage communications as it occurs. This is referred to as "real-time" communication. Examples include a
college student enrolment server where many users may be accessing the same database at the same time but everyone requires the same up
to date information; or, a communications server setting up an IP telephone call where device network addresses have to be matched with the
dialed telephone number.
The server process maybe called the "server daemon" and typically run in the background rather than under the direct control of an end user.
These server processes make the data of the communication available to the data network. Server processes are said to be "listening" for a
request from a client. When a server "hears" a request from a client, it exchanges appropriate messages with client as required by the protocol
being used and then sends the requested data.
Client processes at the other end of the communication across the data network allow the user to make requests to obtain the data from a
server. The client software typically uses a program initiated by a user. The client in initiates communication data flow from the server by
sending requests for the data to the server. The server responds by starting to send one or more streams of data to the client. In addition to the
actual data transfer, this exchange may include user authentication and identification of the data file to be transferred.
Although the data is typically considered as flowing from the server to the client, there is always some flow from the client to the server. A data
transfer from a client to a server is referred to as upload and the data from a server is download.
It is through the application layer client services most users experience the data network, hence the importance of understanding
this area of networking.
4. Compare and contrast client/server with peer-to-peer data
transfer over networks.
Client/server data transfer specifically refers to the centralized source end of data communication as the
server and the receiving end as the client.
With peer-to-peer data transfer both client and server services are used within the same conversation.
Either end of the communication can initiate the exchange and both devices are considered equal in the
communication process. The devices on either end of the communication are called peers.
In contrast to a client/server model, where a server is typically a centralized repository and responds to
requests from many clients; peer-to-peer networking has distributed data. Further once the communication
is established the peers communicated directly - the data is not processed at the Application layer by a
third device on the network.
DNS includes standard queries, responses, and data formats. DNS protocol communications are carried in a single format
called a message. This message format is used for all types of client queries and server responses, error messages and for
the transfer of resource record information between servers.
HTTP is a request/response protocol:
A client application layer application, typically a web browser, sends a request message to the server.
The server responds with the appropriate message.
The protocol also includes messages to upload data to the server, as when completing an online form.
SMB messages use a common format to:
-start, authenticate, and terminate sessions
-control file and printer access
-allow an application to send or receive messages to or from another device
SMTP specifies commands and replies that relate to session initiation, mail transaction, forwarding mail, verifying mailbox
names, expanding mailing lists, and the opening and closing exchanges.
POP is a typical client/server protocol with the server listening for client connections and the client initiating the connection
to the server. The server can then transfer the e-mail.
All above protocols use server/client request/response messages. Whereas users see the applications that use HTTP (a
web browser), SMB (file manager) and SMTP/POP (email client), DNS operation underlies these applications and is truly
transparent to the user.
CD Which three Layers of the OSI model make up the Application layer of the TCP/IP model? (Choose three.)
CD What protocol is used to transfer web pages from server to client?
0 data link O HTML
? 5
0 □ network 0 U SMTP
a
s Viaa
session
0
0
O SSH
Telnet
a presentation
application
0
0 Which protocols use authentication and encryption to secure data traveling between client and server? (Choose two.)
0
□ HTTP
0
0 □ DNS
0 HTTPS
0 □ SMTP
1
0 a
SSH
\ ■ Referto the exhibit. What is the top-level domain of the URL shown?
0
0 |/5 Academy Connection-Training Resources - Cisco Systems - Windows II
0
0
0
0
0
cisco.com
V& com
www.cisco.com
J WWW
netacad
http://
Drag each DNS resource record type on the left and drop it onto the resource it identifies on the right. CD Drag each DNS resource record type on the left and drop it onto the resource it identifies on the right.
CD
0
NS end device address 0 A
□
0 NS
CNAME authoritative name server
0 ✓
ID
MX canonical or Fully Qualified Domain Name for an alias CNAME
✓
Drag the functions on the left and drop them into the appropriate email component on the right.
0 A network administrator is troubleshooting failed access to www.cisco.com. Typing the IP address of the web server into the browser successfully brings up the web page. What application layer protocol is responsible
0 for the failure?
0 w DHCP
0 Vsi) DNS
0
0 CDP
D
0 HTTP
o
o HTTPS
o SSL
1. Where do Transport layer processes occur?
Transport layer processes occur between the Application layer and Internet layer of the TCP/IP model and
between the Session layer and Network layer of the OSI model.
Segmentation of the data, in accordance with Transport layer protocols, provides the means to both send
and receive data when running multiple applications concurrently on a computer.
In networking terms, reliability means ensuring that each segment that the source sends arrives at the
destination.
A sequence number allows the Transport layer functions on the destination host to reassemble segments
in the order in which they were transmitted.
One way to improve security on a server is to restrict server access to only those ports associated with the
services and applications that should be accessible to authorized requestors.
For the original message to be understood by the recipient, the data in these segments is reassembled
into the original order.
TCP uses the acknowledgement number in segments sent back to the source to indicate the next byte in
|this session that the receiver expects to receive.
When TCP at the source host has not received an acknowledgement after a predetermined amount of
time, it will go back to the last acknowledgement number that it received and retransmit data from that
point forward.
16. The amount of data that can be transmitted before a TCP
acknowledgement must be received is referred to as:
0R0000000S
Match the TCP port numbers with the correct protocol by dragging the options on the left to the targets on the right. (Not a Match the TCP port numbers with the correct protocol by dragging the options on the left to the targets on the right. (Not a
options are used.) options are used.)
<N
<S
0000000000
0 At the transport layer, which of the following controls is used to avoid a transmitting host overflowing the buffers of a receiving host?
CD best effort
CD
0 encryption
0 flow control
CD compression
0 congestion avoidance
m
CD End systems use port numbers to select the proper application. What is the smallest port number that can be dynamically assigned by a host system?
CD
CD o 1
0 O 64
0 G 128
0 C 256
0 G 512
0
V& •
1024
d
0 During data transfer, what are the main responsibilities of the receiving host? (Choose two.)
0 throughput
0
0 encapsulation
0 acknowledgment
- bandwidth
0 _J segmentation
0
0 ■/_»4 reassembly
d
0 At which layer of the TCP/IP model does TCP operate?
0 session
0
0 transport
0 G network
0 data link
0
0
0
d
□ What determines how much data a sending station running TCP/IP can transmit before it must receive an acknowledgment?
E segment size
E
E transmission rate
E ji bandwidth
E V® window size
E
sequence number
0
0
0
E What is the purpose of the sequence number in the TCP header?
E s/ » reassemble the segments into data
E
E identify the application layer protocol
E Which acknowledgement number should be sent by the receiver shown in the graphic?
E Sender Receiver
E
E send 1
E send 2
receive 1
E send 3
receive 2
E receive 3
E send 4
E send 5
receive 4
k: send 6
receive 5
receive 6
send ACK
O 3
J 4
J 6
V® 7
O 12
E identify the number of data packets that may be sent without acknowledgment
E V® track different conversations crossing the network at the same time
E
E
E
0
1. What does the Network layer do to a Transport layer PDU so
that it can be communicated from host to another?
The Network layer protocol encapsulates, or packages, the Transport layer segment or datagram so that
the network can deliver it to the destination host The IPv4 encapsulation remains in place from the time the
packet leaves the Network layer of the originating host until it arrives at the Network layer of the destination
host. The routing performed by intermediary devices only considers the contents of the packet header that
encapsulates the segment. In all cases, the data portion of the packet—that is, the encapsulated Transport
layer PDU—remains unchanged during the Network layer processes.
The Time-to-Live (TTL) field is an 8-bit binary value that indicates the remaining "life" of the packet. The
TTL value is decreased by at least one each time the packet is processed by a router (that is, each hop).
When the value becomes zero, the router discards or drops the packet and it is removed from the network
data flow. This mechanism prevents packets that cannot reach their destination from being forwarded
indefinitely between routers in a routing loop. If routing loops were permitted to continue, the network would
become congested with data packets that will never reach their destination. Decrementing the TTL value
at each hop ensures that it eventually becomes zero and that the packet with the expired TTL field will be
dropped.
• Geographic location
• Purpose
• Ownership
The IPv4 Destination Address field contains the Layer 3 address of the destination host. The router uses
the network portion of this address to determine where to forward the packet.
The gateway, also known as the default gateway, is needed to send a packet out of the local network. If the
network portion of the destination address of the packet is different from the network of the originating
host, the packet has to be routed outside the original network. To do this, the packet is sent to the
gateway. This gateway is a router interface connected to the local network. The gateway interface has a
Network layer address that matches the network address of the hosts. The hosts are configured to
recognize that address as the gateway.
The routing table stores information about connected and remote networks. Connected networks are
directly attached to one of the router interfaces. These interfaces are the gateways for the hosts on
different local networks. Remote networks are networks that are not directly connected to the router.
Routes to these networks can be manually configured on the router by the network administrator or learned
automatically using dynamic routing protocols.
8. Describe the three features of a route listed in a routing table.
The router matches the destination address in the packet header with the destination network of a route in
the routing table and forwards the packet to the next-hop router specified by that route. If there are two or
more possible routes to the same destination, the metric is used to decide the next hop.
10. List the three possible actions a router can perform to a packet.
Packet forwarding or routing is done packet-by-packet and hop-by-hop. Each packet is treated
independently in each router along the path. At each hop, the router examines the destination IP address
for each packet and then checks the routing table for forwarding information.
0 Which protocol provides connectionless network layer services? 0 Which protocol provides connectionless network layer services?
0
0 '✓5s) lp
0 V(s) lp
0 O TCP 0 O TCP
0 C UDP 0 C UDP
0 osi 0 osi
0 0
0 0
0 0
0 Which part of a network layer address does the router use during path determination? 0 Which network layer device can separate a network into different broadcast domains?
0 0
The host address
0 tj hub
0 The router address
0
0 bridge
0 The server address
0 switch
0 '/•, The network address 0 '/^ router
0
0
0 0
0 m
CD
000000000
What network layer problem is avoided or reduced by using consistent end-to-end addressing? What commands can be used to view a hosts routing table? (Choose two.)
CD Reduces chance of infinite loops. ipconfig / all
CD
5
0 What are three pieces of information about a route are contained in a routing table? (Choose three.) What kinds of problems are caused by excessive broadcasts traffic on a network segment? (Choose three.)
0 consumes network bandwidth
next-hop
0 Va increases overhead on network
0 _J source host address
0 What are the key factors to consider when grouping hosts into a common network? (Choose three,
0 gateways
0
0 purpose
0 physical addressing
0 __ software version
0 Via geographic location
0
0 VI3 ownership
1. What defines a network in terms of an IPv4 address?
For each IPV4 address, some portion of the high-order bits represents the network address. At Layer 3,
we define a network as a group of hosts that have identical bit patterns in the network address portion of
their addresses.
Within the IPv4 address range of a network, the lowest address is reserved for the network address. This
address has a 0 for each host bit in the host portion of the address.
Host address - host bits are a unique mix of ones and zeroes within a network. The broadcast address
uses the highest address in the network range. This is the address in which the bits in the host portion are
all 1s. For the network 10.0.0.0 with 24 network bits, the broadcast address would be 10.0.0.255. This
address is also referred to as the directed broadcast.
Specified private addresses allows network administrators to all allocate addresses to those hosts they
know never need to access the public internet.
Multicast Addresses - reserved for special purposes is the IPv4 multicast address range 224.0.0.0 to 239.255.255.255.
Private Addresses The private address blocks are:
-10.0.0.0 to 10.255.255.255 (10.0.0.0 /8)
-172.16.0.0 to 172.31.255.255 (172.16.0.0/12)
-192.168.0.0 to 192.168.255.255 (192.168.0.0 /16)
Private space address blocks, as shown in the figure, are set aside for use in private networks. The use of these addresses need not be
unique among outside networks. Hosts that do not require access to the Internet at large may make unrestricted use of private addresses.
Many hosts in different networks may use the same private space addresses. Packets using these addresses as the source or destination
should not appear on the public Internet. The router or firewall device at the perimeter of these private networks must block or translate these
addresses.
Default Route:
The IPv4 default route as 0.0.0.0. The use of this address also reserves all addresses in the 0.0.0.0 - 0.255.255.255 (0.0.0.0 /8) address block.
Loopback:
One reserved address is the IPv4 loopback address 127.0.0.1 - addresses 127.0.0.0 to 127.255.255.255 are reserved for loopback where
hosts direct traffic to themselves.
IPv4 addresses in the address block 169.254.0.0 to 169.254.255.255 (169.254.0.0 /16) are designated as link-local addresses. These
addresses can be automatically assigned to the local host by the operating system in environments where no IP configuration is
available. These might be used in a small peer-to-peer network or for a host that could not automatically obtain an address from
a Dynamic Host Configuration Protocol (DHCP) server.
TEST-NET Addresses
The address block 192.0.2.0 to 192.0.2.255 (192.0.2.0 /24) is set aside for teaching and learning purposes. These addresses can
be used in documentation and network examples. Unlike the experimental addresses, network devices will accept these
addresses in their configurations.
7. List three reasons for planning and documenting IPv4
addresses.
The allocation of addresses inside the networks should be planned and documented for the purpose of:
• Preventing duplication of addresses
• Providing and controlling access
• Monitoring security and performance
Static assigned addresses - servers, printers, LAN gateway addresses on routers, management
addresses on network devices such as switches and wireless access points.
Dynamically assigned addresses - large numbers of general-purpose computers and end devices such
as IP phones.
Network devices use the subnet mask to determine the network or subnet address of an IP address the
device is processing.
Network are subnetted to overcome issues with location, size, and control. In designing the addressing,
consider these factors for grouping the hosts:
• Grouping based on common geographic location
• Grouping hosts used for specific purposes
• Grouping based on ownership
12. State three possible levels at which to use the ping utility to test
and verify a host's network connectivity.
13. When would using a trace route utility be more useful than ping?
When a remote address cannot be accessed and ping fails. Using traceroute would show how many hops
towards the destination that the source host could successfully reach. This may then help in determining
where the network is failing or where security restrictions are.
IPv4 is an unreliable best-effort protocol. ICMPv4 provides a means for network problems such as
dropped packets or congestion to be reported back to the source network or host. Messages include:
• Host conformation
• Unreachable Destination or Service
• Time exceeded
• Route redirection
• Source quench
Decimal numbers are based on powers of 1 and binary numbers are based on powers of 2.
CD
0 Binary numbers are based on powers of 2 and decimal numbers are based on powers of 10.
0 }h Computers use binary numbers and people normally use decimal numbers.
0 Numbers typed on a keyboard are entered as binary and converted to decimal by the computer.
0 Binary numbers consist of three states: on, off, null. Decimal numbers do not have states.
0
0
0
0 Refer to the exhibit. A network administrator is testing the configuration on a host computer. What type of address is 127.0.0.1?
0
0 C:\>ping 127.0.0.1
0 Pinging 127.0.0.1 with 32 bytes of data:
0 Reply from 127.0.0.1: bytes=32 time<lms TTL=128
0 Reply
Reply
from
from
127.0.0.1:
127.0.0.1:
bytes=32
bytes=32
time<lms
time<lms
TTL=128
TTL=128
0 Reply from 127.0.0.1: bytes=32 time<lms TTL=128
0 Ping statistics for 127.0.0.1:
0 Packets: Sent = 4, Received = 4, Lost = 0 <0X loss).
Approximate round trip times in nilli-seconds:
0 Minimum = 0ms, Maximum = 0ms, Average = 0ms
>/•. network
0 unicast
0
0
0
0
0 Which is true regarding IP network addresses?
0 all host bits are set to 0
0
0 all host bits are set to 1
0 host
unicast
-
0
0
0
0000000000
64 bits
48 bits
32 bits
E What is the primary reason for development of IPv6?
E security
E
E header format simplification
E Refer to the exhibit. The numbers in the exhibit are part of a single subnet. Which statements are true regarding these numbers? (Choose three.)
E
E
E 192.168.223.99 192.168.223.107 192.168.223.117 192.168.223.127
E
E Their final octet has 4 of the most significant bits in common.
S
E They have 5 low-order bits in common.
Drop the options on the left to the correct target on the right.
172.31.16.128/19
E Drop the options on the left to the correct target on the right.
E
E 172.18.125.6/20
E ✓L
E 172.31.16.128/19
E </[ 192.168.16.192/30
B
E 10.1.167.36/13 192.168.87.212/24
E v\- 172.27.64.98/23
E3
1. How does the Data Link layer prepare packets for transmission?
The Data Link layer prepares a packet for transport across the local media by encapsulating it with a
header and a trailer to create a frame.
A logical point-to-point topology connects two nodes directly together. In data networks with point-to-point
topologies, the media access control protocol can be very simple. All frames on the media can only travel
to or from the two nodes. The frames are placed on the media by the node at one end and taken off the
media by the node at the other end. In point-to-point networks, if data can only flow in one direction at a
time, it is operating as a half-duplex link. If data can successfully flow across the link from each node
simultaneously, it is a full-duplex service.
A logical multi-access topology enables a number of nodes to communicate by using the same shared
media. Data from only one node can be placed on the medium at any one time. Every node sees all the
frames that are on the medium, but only the node to which the frame is addressed processes the contents
of the frame. Having many nodes share access to the medium requires a Data Link media access control
method to regulate the transmission of data and thereby reduce collisions between different signals.
In a logical ring topology, each node in turn receives a frame. If the frame is not addressed to a node, the
node passes the frame to the next node. This allows a ring to use a controlled media access control
technique called token passing.
The media usually carries only one frame at a time. If there is no data being transmitted, a signal (known
as a token) may be placed on the media and a node can only place a data frame on the media when it has
the token.
Unlike Layer 3 logical addresses that are hierarchical, physical addresses do not indicate on what network
the device is located. If the device is moved to another network or subnet, it will still function with the same
Layer 2 physical address.
Because the frame is only used to transport data between nodes across the local media, the Data Link
layer address is only used for local delivery. Addresses at this layer have no meaning beyond the local
network. Compare this to Layer 3, where addresses in the packet header are carried from source host to
destination host regardless of the number of network hops along the route.
7. What are the possible header field types in Data Link frames?
Answer
The media is a potentially unsafe environment for data. The signals on the media could be subject to
interference, distortion, or loss that would substantially change the bit values that those signals represent.
To ensure that the content of the received frame at the destination matches that of the frame that left the
source node, a transmitting node creates a logical summary of the contents of the frame. This is known as
the Frame Check Sequence (FCS) and is placed in the trailer to represent the contents of the frame.
When the frame arrives at the destination node, the receiving node calculates its own logical summary, or
FCS, of the frame. The receiving node compares the two FCS values. If the two values are the same, the
frame is considered to have arrived as transmitted. If the FCS values differ, the frame is discarded. There
is always the small possibility that a frame with a good FCS result is actually corrupt. Errors in bits may
cancel each other out when the FCS is calculated. Upper layer protocols would then be required to detect
and correct this data loss.
□ Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?
•
1
ra
□ Which data link layer addressing scheme is used in a point-to-point logical topology?
a IPv4 addressing
a IPv6 addressing
a J ring addressing
a multi-access addressing
a
a -/(•) Layer 2 addressing not required for this topology
»
a
a What do network hosts use data link layer addresses for?
a
a remote delivery
a v® local delivery
a remote delivery using routers
a
a
a
a
a Which three basic parts are common to all frame types supported by the data link layer? (Choose three.)
a
a V ✓ header
a □ type field
a □ MTU size
a data
a
a ■/ ✓ trailer
CRC value
».
a
a What are two characteristics of the controlled media access method? (Choose two.)
a
a Vi3 It is known as a deterministic access method.
1
a
CD Which of the following are sublayers of the Data Link layer?
CD ACL.LMC
CD
CD ^ MAC, LAC
CD MAC, LLC
OSI, LLC
0
0
0
CD Which of the following are data link layer encapsulation details? (Choose two.)
CD A header and trailer are added.
0
0 Data is converted into packets.
Drag the characteristics on the left to the associated topology type on the right. (Not all options are used.)
1
connects two nodes directly
NRZ (Non-Return to Zero) encoding, a “0" may be represented by one voltage level on the media during
the bit time and a !,1’ might be represented by a different voltage on the media during the bit time.
Manchester Encoding uses transitions, or the absence of transitions, to indicate a logic level. For
example, a “0" is indicated by a high to low transition in the middle of the bit time. For a “1" there is a low to
high transition in the middle of the bit time.
One encoding technique is the use of symbols. The Physical layer may use a set of encoded symbols to represent encoded
data or control information called code groups. A code-group is a consecutive sequence of code-bits interpreted and mapped
as data bit patterns. For example, code bits 10101 may represent the data bits 0011.
While code groups introduce overhead in the form of extra bits to transmit, they improve the robustness of a communications
link. This is particularly true for higher speed data transmission.
By transmitting symbols, the error detection capabilities and timing synchronization between transmitting and receiving
devices are enhanced. These are important considerations in supporting high-speed transmission over the media.
Some of these advantages are:
-Reduced bit level error
-Limiting the effective energy transmitted into the media
-Help distinguish data bits from control bits
-Better media error detection
Electrical hazards
Copper wires may conduct electricity in undesirable ways. This may subject personnel and equipment to a range of electrical
hazards. A defective network device may conduct currents to the chassis of other network device. Additionally, network
cabling could present undesirable voltage levels when used to connect devices that have power sources with different ground
potentials. Also copper cabling may conduct voltages caused by lightning strikes to network devices. The result of undesirable
voltages and currents can include damage to network devices and connected computers, or injury to personnel.
Fire hazards
Cable insulation and sheaths may be flammable or produce toxic fumes when heated or burned. Building authorities or
organizations may also stipulate related safety standards for cabling and hardware installations.
Given that the glass fibers used in fiber optic media are not electrical conductors, the media is immune to
electromagnetic interference and will not conduct unwanted electrical currents due to grounding issues.
Because optical fibers are thin and have relatively low signal loss, they can be operated at much greater
lengths than copper media, without the need for signal regeneration.
0 ✓L
B
Si . ✓[
SI ✓E
si
Sj ✓L
Sj
03
s Place each pin on the left onto the correct pin on the right to properly create a RJ-45 connector for a router console cable.
s
s zz ______ I J
s Pin 1 Pin 1 Pin 8
s _____ Pin 2
________ *__________
Pin 2 ______ J
Pin 7
E
S __________
Pin 3
________ *__________
Pin 3 ______ J
Pin 6
E Pin 4 Pin 4 ______ J
Pin 5
S ________ *__________
03 __________
Pin 5
________ x__________
Pin 5 ______ I J
Pin 4
console connection
Ethernet connection
ISDN connection
E Controls the way frames are placed on the media at the Data link layer.
E nA? Represents the data bits by using different voltages, light patterns or electromagnetic waves as they are placed onto the physical media.
S
B
B
03
fH__
192.168.1.11/24
192.168.1.12/24
192.168.1.13/24
125 Meters
incorrect IP address
incorrect prefix
switch type
0003003000
What are the advantages of using fiber optic cable over copper cable? (Choose three.)
What cable type would be used to connect a computer directly to another computer?
Straight-through
O' Rollover
Crossover
Console
0003003003
Refer to the exhibit. What is the purpose of cladding in fiber optic cables?
Cable grounding
noise cancellation
EMI protection
1. Name the two Data Link sublayers and list their purposes.
• Low bandwidth
• Half-duplex
• Coaxial cable, especially Thicknet—Ddifficult to install; required large radius corners
• Physical bus—termination issues
• Bayonet/vampire type connectors—difficult to install and were a source of problems
Length/Type:
The Length (2 bytes in length) field defines the exact length of the frame's data field. The Type field describes which protocol
is listed inside the frame.
Ethernet MAC address is a 48-bit binary value expressed as 12 hexadecimal digits. The first 24 bits (3
bytes) are the Organizationally Unique Identifier (OUI). The second 24 bits (3 bytes) identify the device and
must be unique for a particular OUI value.
5. Why are Layer 2 MAC addresses necessary?
Ethernet MAC address is used to transport the frame across the local media. A particular MAC address
has no meaning or use outside the local segment. It is unique; it is non-hierarchal and associated with a
particular device regardless of its location or to which network it is connected. In contrast, Layer 3
addresses are used end-to-end across networks.
Unicast:
A unicast MAC address is the unique address used when a message is sent from one transmitting device to one destination
device. All hosts examine the frame, but if it is not addressed to them, the frame is dropped. Only the host whose MAC
address matches the frame destination address accepts the frame and processes the message through the upper layers.
Multicast:
Multicast MAC addresses are a group of common MAC addresses that all devices have, to enable delivery of frames
carrying multicast packets, such as streaming audio or video. For IP multicasting, the Ethernet multicast MAC addresses
begin with 0100.5E or 0100.5F. Frames with a destination address in this range will be delivered to those devices on the LAN
whose upper layers have established a multicast session.
Broadcast:
The Ethernet broadcast MAC address is FFFF.FFFF.FFFF. Frames with this destination address are delivered to and
processed by all of the devices on that LAN subnet.
Carrier Sense
All network devices that have messages to send must listen before transmitting. If a signal from another device is detected, the
device sits back and waits a random amount of time before trying again. When no traffic is detected, the device transmits its
message.
Multiple Access
If the latency of one device's signals means that they are not detected by a second device, the second device may then start
to transmit, too. The two messages will propagate across the media until they encounter each other. The jumble of remaining
signals continues to propagate across the media.
Collision Detection
All devices detect the increase in the amplitude of the signal above the normal level that a collision produces. Once detected,
every device transmitting will continue to transmit to ensure that all devices on the network detect the collision.
Jam Signal
Further, once the collision is detected, all devices send out a jamming signal.
Random Backoff
This jamming signal invokes the backoff algorithm, which causes all devices to then stop transmitting for a random amount of
time. This allows for the collision signals to subside from the medium. After the delay has expired, all devices go back into the
listen before transmit mode. The random back offtime means that a third device may transmit before either of the two involved
in the original collision.
The group of connected devices that can cause collisions to occur with each other is known as a collision
domain. Collision domains occur at Layer 1 of the networking reference model.
Hubs and repeaters are intermediary devices at Layer 1 that extend the distance that Ethernet cables can
reach. Hubs (also known as multi-port repeaters) enable more devices to connect to the shared media.
Both types of devices have the effect of increasing the size of the collision domain. Providing network
access for more users with hubs reduces the performance for each because the fixed capacity of the
media has to be shared among more and more devices.
9. Compare the specifications of early Ethernet technologies to
current versions.
Distance:
Copper media—500 meters to 200 meters to 100 meters (Lower cost and higher bandwidth outweighed shorter distance)
Fiber media—400 meters to 10 kilometers
Media:
Coaxial cable to Unshielded Twisted-Pair to Optic Fiber
Multiple-hosts per segment (shared media) to single hosts per segment
Flalf-duplex to Full-duplex
Scalability:
Hubs share limited bandwidth among users.
Switches provide the full available bandwidth to each host.
Latency:
Latency is the amount of time that a packet takes to get to the destination.
More nodes on a segment increase latency as each waits to transmit.
Hubs regenerate frames, which also adds delay.
Switches also buffer frames, but with only one host on each segment, there is no delay when each host wants to transmit.
Network Failure:
Incompatible speeds, e.g., 100 Mbps device connected to a 10 Mbps hub.
Switches can be configured to manage different segment speeds.
Collisions:
Hubs increase the size of the collision domain. Using hubs (Layer 1 devices) to increase the number of nodes on the
same segment can increase the number of collisions.
Switches divide collision domains at Layer 2, reducing, if not eliminating, collisions to each segment.
11. List and describe the stages of operation of an Ethernet switch.
Learning
When a frame of data is received from a node, the switch reads the source MAC address and saves the address to the
lookup table against the incoming interface. The switch now knows out which interface to forward frames with this address.
Flooding
When the switch does not have a destination MAC address in its lookup table, it sends (floods) the frame out all interfaces
except the one on which the frame arrived.
Forwarding
When the switch has the destination MAC address in its lookup table and the interface mapped to the MAC address is not the
interface it received the frame on, it sends (forwards) the frame out that interface.
Filtering
When the switch has the destination MAC address in its lookup table and the interface mapped to the MAC address is the
interface it received the frame on, it drops the frame. (Other interfaces/segments are spared unnecessary and potentially
collision-causing traffic.)
Aging
Each MAC-IP address entry on a lookup table has a timestamp that is reset each time the entry is referred to. If the timer
expires, the entry is purged from the table. This reduces the number of entries to look up and frees up memory.
12. Describe the forwarding of a frame through a switch.
Ethernet switches selectively forward individual frames from a receiving port to the port where the
destination node is connected. A switch will buffer an incoming frame and then forward it to the proper port
when that port is idle.
This process is referred to as store and forward. With store and forward switching, the switch receives the
entire frame, checks the FSC for errors, and forwards the frame to the appropriate port for the destination
node. Because the nodes do not have to wait for the media to be idle, the nodes can send and receive at
full media speed without losses due to collisions or the overhead associated with managing collisions.
13. When and why does a network host need to broadcast an ARP
request?
When a host has a packet to send to a known IP address but does not know the destination MAC address
to use the frame, it sends an ARP broadcast to all hosts on the network requesting that the host with the
known IP address reply with its MAC address. This enables the originating host to store and use the IP
and MAC address pair.
To enable the requesting host to map the IP address of a destination in a non-local network with the MAC
address of the gateway (local network router interface). This enables the frame to be sent to the router,
which will forward on the packet.
15. Explain why entries in a network host's ARP cache are cleared if
not used for a period of time.
Unlimited ARP cache hold times could cause errors when devices leave the network or change Layer 3
address, and overtime could fill the available cache memory.
0000000000
Drag the Ethernet frame fields on the left and drop them onto their function on the right.
Preamble (7 Bytes) and Start of Frame Delimiter (1 Byte) contains the encapsulated data from a higher layer V 802.2 Header and Data (46 to 1500 Bytes)
Frame Checksum Sequence (4 Bytes) identifies the intended recipient Destination Address (6 Bytes)
used for synchronization between the sending and Preamble (7 Bytes) and Start of Frame Delimiter (1 Byte)
Source Address (6 Bytes)
receiving devices **
Length/Type (2 Bytes) used to detect errors in a frame V Frame Checksum Sequence (4 Bytes)
802.2 Header and Data (46 to 1500 Bytes) identifies the frame's originating NIC or interface V Source Address (6 Bytes)
0000000000
'/v« provides a method to determine when and how hosts access the Ethernet medium
Voice over IP
only PC
(j only router
PC and router
In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do?
Host B can transmit immediately since it is connected on its own cable segment.
Host B must wait to receive a CSMA transmission from the hub, to signal its turn.
•/• Host B must wait until it is certain that Host A has completed sending its frame.
CD Which of the following are fields in an 802.3 Ethernet frame? (Choose three.)
CD source physical address
CD
CD _| source logical address
CD What address type does a switch use to make selective forwarding decisions?
CD c source IP
CD
CD O destination IP
CD c source MAC
CD \A? destination MAC
0
0
0
m
1. List the five factors to consider when selecting the type of Answer
physical media to deploy in the LAN.
• Cable length—Does the cable need to span across a room or from building to building?
• Cost—Does the budget allow for using a more expensive media type?
• Bandwidth—Does the technology used with the media provide adequate bandwidth?
• Ease of installation—Does the implementation team have the ability to install the cable or is a
vendor required?
• Susceptible to EMI/RFI—Is the environment we are installing the cable going to interfere with the
signal?
• Switch to router
• PC to Switch
• PC to Hub (if used)
• Switch to switch
• Switch to hub (if used)
• Hub to hub (if used)
• Router to router
• PC to PC
• PC to router
Data Communications Equipment (DCE)—A device that supplies the clocking to another device. Typically
a device at the WAN access provider end of the link.
Data Terminal Equipment (DTE)—A device that receives clocking from another device and adjusts
accordingly. Typically this device is at the WAN customer or user end of the link.
In a lab environment, generally connect two routers with a serial cable providing a point-to-point WAN link.
In this case, decide which router is going to be the one in control of the clocking. Cisco routers are DTE
devices by default but can be configured to act as DCE devices.
• Cost
• Cable/Wireless
• Speed
• Ports
• Expandability
• Manageability
• Features
6. Give examples of the different types of hosts and network
devices that require IP addresses.
Security
Network security features can be implemented based on network addresses. This enables control and
management of access to different network and data services.
Ethernet Interfaces This interface is used for connection of the LAN devices, which include computers and switches. This
interface can also be used to connect routers together.
Serial Interfaces This interface is used for connection of the WAN devices to the CSU/DSU. Clock rate and addressing are
assigned to these interfaces.
Console Interface This is the primary interface for gaining initial access to and configuration of a Cisco router or switch and is
the primary means of troubleshooting. It is important to note that through physical access to the router's console interface, an
unauthorized person can interrupt or compromise network traffic. Physical security is extremely important!
Auxiliary (AUX) Interface This interface is used for remote, out-of-band management of the router. Typically a modem is
connected to the AUX interface for dial-in access. From a security standpoint, having the ability to remotely dial in to a
network device also requires vigilant management.
transmission of data
reception of data
A router which terminates a serial WAN link is typically a DTE device. Under which circumstance would a router be configured as a DCE device?
When the clock rate from the service provider cannot be matched by the router.
CD J 172.32.5.2
CD J 192.167.10.10
a 172.16.4.4
a 192.168.5.5
a
a _| 224.6.6.6
a
0000000000
Match the "Slash format" number with the mask number to subnet the last octet.
✓L
«/[
0000000000
Refer to the exhibit. What type of cable connects the two routers together without any intermediary device?
console
rollover
\A» crossover
straight-through
0000000000
Refer to the exhibit. Which option defines the default port configuration settings used to establish this direct serial connection between a computer and a Cisco networking device?
i COM3 Properties
Port Settings
Data bits: [i
—El
Parity: |None —3
Stop bits: fl
“3
Flow control: |None
Restore Defaults
Apply
9600 bps, 8 data bits, even parity, 2 stop bits, hardware flow control
9600 bps, 16 data bits, odd parity, 1 stop bit, hardware flow control
19,200 bps, 8 data bits, even parity, 1 stop bit, hardware flow control
>/• 9600 bps, 8 data bits, no parity, 1 stop bit, no flow control
0000000003 Which UTP cable lengths are specified by ANSI/TIA/EIA-568-B standards? (Choose three.)
• Console
• Telnet or SSH
• AUX port
• The running configuration file-used during the current operation of the device
• The startup configuration file-stored in NVRAM and loaded to provide the device configuration when
the device is started or restarted.
4. Distinguish the features of the Cisco IOS user EXEC mode and
privileged EXEC mode.
The user EXEC mode allows only a limited number of basic monitoring commands. This is often referred to as view-only
mode. The user EXEC level does not allow the execution of any commands that might change the configuration of the
device.
The user EXEC mode can be identified by the prompt ending with the > symbol.
Switch >
The privileged EXEC mode can be identified by the prompt ending with the # symbol.
Switch#
5. Give the difference between entering a "?" and "? " directly after
a partial command at the appropriate prompt, For example, "cl?"
and "clock ?".
When using the ? without a space, as with “cl?", a display of all available commands that begin with the
characters “cl" will be listed.
When using the “?" with a space, as with clock ?" a display of all available sub-commands that begin with
clock will be listed.
The prompt displayed shows privileged EXEC mode. It is invoked from the user EXEC mode by using
the enable command.
7. State the purpose and difference of the configuration commands
service password-encryption and enable secret class.
The service password-encryption command applies weak encryption to all unencrypted passwords.
This encryption does not apply to passwords as they are sent over media. The purpose of this command is
to keep unauthorized individuals from viewing passwords in the configuration file.
The enable secret command provides security to privileged EXEC mode by encrypting the password.
The banner motd command requires the use of delimiters to identify the content of the banner message.
The exact content or wording of a banner depends on the local laws and corporate policies. Here are
some examples of information to include in a banner:
• "Use of the device is specifically for authorized personnel."
• "Activity may be monitored."
• "Legal action will be pursued for any unauthorized use."
Configuration files can be stored on a Trivial File Transfer Protocol (TFTP) server, a CD, a USB memory
stick, or a floppy disk stored in a safe place. A configuration file should also be included in the network
documentation.
By default, interfaces are disabled. To enable an interface, enter the no shutdown command from the
interface configuration mode.
As the hostname helps to identify the device on a network, an interface description indicates the purpose
of the interface. A description of what an interface does or where it is connected should be part of the
configuration of each interface. This description can be useful for troubleshooting.
13. List the steps to follow to verify that a host can successfully
connect to and access a network.
It is used to create a record of network traffic for troubleshooting and network performance analysis.
0000000000
A copy of a configuration file can be saved to a TFTP server. Construct the command sequence to accomplish this task. (Not all
options apply.)
router-config
CD Which command sequence will permit access to five virtual terminal lines with a password of cisco?
03 Router(config-line)#configure telnet
Router(config-line)#line vty 0 5
0 Router(config-line}#password cisco
0
0 Router(config)#line vty 0 5
0 Router(config)#password cisco
0
0 '/v^ Router(config)#line vty 0 4
03 Ro ute r(co nfi g-l i n e )#log i n
Router(config-line)#password cisco
Router(config)#configure telnet
Router(config-line)#password cisco
Router(config-line)#session 0 4
Router(config-if)# no down
0 Router(config-if)# sO active
0 Router(config-if)# interface up
0 V ,• Router(config-if)# no shutdown
0
0
fiol
0 Which command will display statistics for all interfaces configured on a router?
0 list interfaces
0
0 show interfaces
0 show processes
0 show statistics
0
0
0
0
0 What command will display a list of commands available for viewing the status of the router?
0 Router# ?show
0
0 Router# sh?
0 V • Router# show ?
0 Router# help
0 Router# status ?
0
0
0
0 An administrator configures a new router and names it SANJOSE. The administrator needs to set a password that will be required to establish a console session with the router. What commands should be issued by
0 the administrator to set the console password to CISCO?
0 SANJOSE(config)# enable password CISCO
0
0 SANJOSE(config)# line con 0
0 SANJOSE(config-line)# login
0 SANJOSE(config-line)# enable password CISCO
0
0 SANJOSE(config)# enable console password CISCO
0
V'ti) SANJOSE(config)# line con 0
SANJOSE(config-line)# login
SANJOSE(config-line}# password CISCO
E A network administrator must configure a serial interface with an IP address. The configuration must also identify the remote site to which the interface is connected. Which set of commands will meet these
E requirements?
E Chicago(config)# description San Jose T1
E Chicago(config)# interface serialO/O
E Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
E
E V• Chicago(config)# interface serialO/O
E Chicago(config-if)# ip address 192.168.204.9 255.255.255.252
0 Chicago(config-if)# description San Jose T1
0
E Which utility shows the route a packet takes to reach its destination?
E netstat
E
E o ping
E © Telnet
E • traceroute
E
E
E