Documente Academic
Documente Profesional
Documente Cultură
HOMEWORK
CHAPTER 10
TCP/IP INTERNETWORKING II
Last name (surname): ________________________________
DIRECTIONS
To answer a question, place you cursor at the very end of a question and hit Enter. This should put you in the Answer (A) style, which neatly indents your answer.
Business Data Networking and Telecommunications, 8th Edition, Panko and Panko
e) How does NAT allow a firm to deal with a shortage of IP addresses given to it by its ISP? f) Where are private IP addresses used? g) What are the three ranges of private IP addresses? h) What problems may firms encounter when using NAT? 3. a) Is the Domain Name System only used to send back IP addresses for given host names? b) What is a domain? c) Which level of domain name do corporations most wish to have? d) What are DNS root servers? e) How many DNS root servers are there? f) Why do most firms have both a primary and a secondary DNS server? 4. a) What hosts are given static IP addresses? b) Why do these hosts need static IP addresses? c) What are dynamic IP addresses? d) How do clients get dynamic IP addresses? e) Can the client send a DHCP request information to multiple DHCP servers? f) Do DHCP servers update their the configuration information they store automatically? g) What are DHCP scopes? 5. a) List the main elements in a network management system. b) Does the manager communicate directly with the managed device? Explain. c) Explain the difference between managed devices and objects. d) Is the MIB a schema or the actual database? (This is a trick question.) e) Why must user interface functionality for the SNMP manager be considered carefully in selecting SNMP manager products? 6. 7. List one object in each of the following areas: the system, IP, TCP, UDP, ICMP, and an interface. a) In SNMP, which device creates commands? b) Responses? c) Traps? d) Explain the two types of commands. e) What is a trap? f) Why are firms often reluctant to use Set commands? g) Describe SNMPv1s poor authentication method. h) Describe SNMPv3s good authentication method. 8. a) At what layer does IPsec operate? b) What layers does IPsec protect? c) Does IPsec protect these layers transparently?
Business Data Networking and Telecommunications, 8th Edition, Panko and Panko
d) Describe IPsec tunnel mode. e) What is the main advantage of tunnel mode? f) What is the main disadvantage of tunnel mode? g) Describe IPsec transport mode. h) What is the main advantage of transport mode? i) What is the main disadvantage of transport mode? j) In which IPsec mode are clients and servers required to have digital certificates? k) Which IPsec mode does not require clients and servers to have digital certificates? l) Is IPsec used for remote-access VPNs, site-to-site VPNs, or both? 9. a) How is SSL/TLS limited? b) Why is SSL/TLS inexpensive? c) What are SSL/TLSs authentication options? d) Does SSL/TLS have the ability to be centrally managed? e) When an SSL/TLS gateway is used, how many SSL/TLS connections does the client have? f) What is webification? g) What is webifications benefit? h) Why are downloads for SSL/TLS gateway service not likely to be useful on public PCs? 10. a) Of the two VPN security technologies discussed in this section, which provides transparent security to higher layers? b) Which tends to require the installation of digital certificates on many client PCs? c) Which has stronger security? d) Which would you use to give employees remote access to a highly sensitive webserver via the Internet? (This is not a trivial question.) Justify your answer. 11. a) What kinds of information are stored in a directory server? b) How is information in directory servers organized? c) What is the purpose of LDAP? d) If Astronomy has a similar directory organization to Business (in Error: Reference source not found), give the specification for the telephone extension of Claire Williams (username cwilliams), who is an Astronomy staff member. 12. a) What is Active Directory? b) What is an AD domain? c) What are domain controllers? d) Can a domain have more than one domain controller? e) What are servers called that do not run AD? f) Describe replication among domain controllers in the same domain. g) What is a tree? h) Describe replication among domain controllers at different levels.
Business Data Networking and Telecommunications, 8th Edition, Panko and Panko
i) What is an AD forest?
TROUBLESHOOTING QUESTION
1. In your browser, you enter the URL of a website you use daily. After some delay, you receive a DNS error message that the host does not exist. What may have happened? Explain your reasoning. Again, do NOT just come up with one or two possible explanations.
PERSPECTIVE QUESTIONS
1. 2. What was the most surprising =-thing to you about the material in this chapter? What was the most difficult thing for you in the chapter?