Sunteți pe pagina 1din 176

CCNA BOOT CAMP

CCNA 1 PART 1

Data Networks
Businesses needed a solution that would successfully address the following three problems: Duplication of equipment and resources Implementation of effective communication Network management

Businesses realized that networking technology could increase productivity while saving money.

What are the components of a network ?

Home Office Internet

Mobile Users

Branch Office

Main Office
3

Devices in Data Networks


End-user devices Devices that provide services directly to the user.
(computers, printers, scanners, etc.)

Network devices Devices that together.

connect

the

end-user

devices

(routers, switches, hubs, etc.)

Network Interface Card


A NIC card is a printed circuit board that provides network communication capabilities to and from a personal computer. Also known as LAN adapter.

Network Topology
Network Topology Defines the structure of the network. Network Topology Types

Physical Topology Actual layout of the wire or media.


Logical Topology Defines how the media is accessed by the hosts for sending data.

Physical and Logical Topology

Media Type Ethernet FDDI

Physical Topology Bus, Star, Point to Point Ring

Logical Topology Bus Ring

Token Ring

Star

Ring

Bus Topology
Uses a single backbone cable that is terminated at both ends. All the hosts connect directly to this backbone.

Ring Topology
Connects one host to the next and the last host to the first. This creates a physical ring of cable.

Star Topology
Connects all cables to a central point of concentration.

10

Extended Star Topology

Links individual stars together by connecting the hubs and/or switches.

11

Mesh Topology
Implemented to provide as much protection as possible from interruption of service. Each host has its own connections to all other hosts. Although the Internet has multiple paths to any one location, it does not adopt the full mesh topology.

12

LANs, MANs and WANs

One early solution was the creation of LAN standards which provided an open set of guidelines for creating network hardware and software, making equipment from different companies compatible.
What was needed was a way for information to move efficiently and quickly, not only within a company, but also from one business to another. The solution was the creation of metropolitan-area networks (MANs) and wide-area networks (WANs).

13

LANs
Operate within a limited
geographic area

Allow multi-access to high


bandwidth media

Control the network privately


under local administration

Provide full-time connectivity


to local services

Connect physically adjacent


devices

14

WANs
Operate within a large
geographic area

Allow access over serial

interfaces operating at lower speeds

Provide full-time and parttime connectivity

Connect devices separated

over wide, even global areas

15

VPNs
A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN, a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel between the telecommuters PC and a VPN router in the headquarters.

16

Bandwidth

17

Measuring Bandwidth

18

19

Why do we need the OSI Model?


To address the problem of networks increasing in size and in number, the International Organization for Standardization (ISO) researched many network schemes and recognized that there was a need to create a network model . This would help network builders implement networks that could communicate and work together

ISO therefore, released the OSI reference model in 1984.

20

Dont Get Confused.


ISO - International Organization for Standardization OSI - Open System Interconnection *IOS - Internetwork Operating System To avoid confusion, some people say International Standard Organization. *As of June 2010, the trademark of the term iOS now belongs to Apple.
21

The OSI Reference Model


7 Application
The OSI Model will be used throughout your entire networking career!

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical

Memorize it!

22

OSI Model
Application Application (Upper) Layers Presentation Session Transport Network Data-Link Physical

Data Flow Layers

23

Layer 7 - The Application Layer


7 Application
Deals with networking applications. Examples: Email Web browsers

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical

PDU: User Data

Question: What is a PDU?


24

Layer 6 - The Presentation Layer


7 Application
Responsible for presenting the data in the required format which may include: Code Formatting Encryption Compression PDU: Formatted Data

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical

25

Layer 5 - The Session Layer


7 Application
This layer establishes, manages, and terminates sessions between two communicating hosts. Creates Virtual Circuit Coordinates communication between systems Organize their communication by offering three different modes: Simplex Half Duplex Full Duplex PDU: Formatted Data
26

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical

Half Duplex
It uses only one wire pair with a digital signal running in both
directions on the wire.

uses the CSMA/CD protocol to help prevent collisions and to


permit retransmitting if a collision does occur.

If a hub is attached to a switch, it must operate in half-duplex


mode.

Half-duplex Ethernet (typically 10BaseT) is only about 30 to 40

percent efficient because a large 10BaseT network will usually only give you 3 to 4Mbpsat most.

27

Full Duplex
Full duplex, in twisted-pair cabling, uses two pairs of wire for simultaneous transmission and reception.

28

Layer 4 - The Transport Layer


7 Application
This layer breaks up the data from the sending host and then reassembles it in the receiver. It also is used to insure reliable data transport across the network.

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical

Can be reliable or unreliable


Sequencing, Acknowledgment, Retransmission, Flow Control PDU: Segments

29

Layer 4 : Transport Layer


Distinguishes between upper-layer applications Establishes end-to-end connectivity between applications Defines flow control Provides reliable or unreliable services for data transfer
Transport TCP UDP SPX

Network

IP

IPX

30

TCP vs UDP

31

TCP Segment Format


Bit 0 Source Port (16) Bit 15 Bit 16 Destination Port (16) Bit 31

Sequence Number (32)


Acknowledgment Number (32)
Header Length (4)

20 Bytes

Reserved (6) Code Bits (6) Checksum (16)

Window (16) Urgent (16)

Options (0 or 32 if Any) Data (Varies)


32

UDP Segment Format

No sequence or acknowledgment fields


Bit 15 Source Port (16) Length (16) Data (if Any) Bit 16 Destination Port (16) Checksum (16) 8 Bytes Bit 31

Bit 1 0

33

Port Numbers

Application Layer

F T P

T E L N E T
23 TCP

S M T P

D N S

T F T P

S N M P

R I P

21 Transport Layer

25

53

69
UDP

161

520

Port Numbers

34

TCP Port Numbers

Source Port

Destination Port

Telnet Z
Host A

Host Z

SP 1028

DP 23

Destination port = 23. Send packet to my Telnet application.

35

TCP Port Numbers

36

TCP Three-Way Handshake/Open Connection

Host A

Host B

Send SYN

(seq = 100 ctl = SYN)

SYN Received Send SYN, ACK


(seq = 300 ack = 101 ctl = syn,ack)

SYN Received

Send ACK

(seq = 101 ack = 301 ctl = ack)

37

Reliable Service

Sender

Receiver

Synchronize
Acknowledge, Synchronize Acknowledge

Connection Established
Data Transfer (Send Segments)

38

Opening & Closing Connection

39

Windowing
Windowing in networking means the quantity of data segments
that a machine can transmit/send on the network without receiving an acknowledgement.

Example:

There are two window sizesone set to 1 and one set to 3. When youve configured a window size of 1, the sending
machine waits for an acknowledgment for each data segment.

If youve configured a window size of 3, its allowed to transmit


three data segments before an acknowledgment is received.

40

TCP Simple Acknowledgment

Window Size = 1
Sender Send 1 Receive ACK 2 Receiver

Receive 1
Send ACK 2

Send 2
Receive ACK 3 Send 3

Receive 2 Send ACK 3 Receive 3 Send ACK 4

Receive ACK 4

41

Windowing

42

TCP Sequence and Acknowledgment Numbers

Source Port

Destination Port

Sequence

Acknowledgment

I just sent number 11.

I just got number 11, now I need number 12.

Source Dest. Seq. Ack. 1028 23 10 100

Source Dest. Seq. Ack. 23 1028 100 11

Source Dest. Seq. Ack. 1028 23 11 101 Source Dest. Seq. Ack. 23 1028 101 12
43

Transport Layer Reliable Delivery

44

Flow Control
Flow control is used to ensure that networking devices dont send too much information to the destination, overflowing its receiving buffer space, and causing it to drop the sent information

45

Flow Control
A SEQ 1024 SEQ 2048 SEQ 3072 3 3072 B

46

User Datagram Protocol (UDP)


User Datagram Protocol (UDP) is the connectionless transport protocol in the TCP/IP protocol stack. UDP is a simple protocol that exchanges datagrams, without acknowledgments or guaranteed delivery. Error processing and retransmission must be handled by higher layer protocols. Popular UDP protocols: TFTP (Trivial File Transfer Protocol) SNMP (Simple Network Management Protocol) DHCP (Dynamic Host Control Protocol) DNS (Domain Name System)

47

Layer 3 - The Network Layer


7 Application
Sometimes referred to as the Cisco Layer. End to End Delivery Provide logical addressing for best path determination Internetwork Communication Packet Filtering forwarding
PDU: Packets

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical

and

Packet

48

Layer 3 : Network Layer

Network

Data-Link

Defines logical source and destination addresses associated with a specific protocol Defines paths through network

IP, IPX

802.2

Physical

802.3

EIA/TIA-232 V.35

49

Layer 3 : (cont.)
Network Layer End-Station Packet
IP Header Logical Address Source Address Destination Address Data

172.15.1.1
Network Node or Host

Route determination occurs at this layer, so a packet must include a source and destination address. Network-layer addresses have two components: a network component for internetwork routing. a node number for a device-specific address. The example in the figure is an example of an IP packet and IP address.
50

Layer 3 (cont.)

Address

Mask

172.16.122.204 255.255.0.0
172 16 122 204

Binary Address 10101100 00010000 01111010 11001100


255 255 0 0

Binary Mask

11111111 11111111
Network

00000000 00000000
Host

51

IPv4 Packet Format


Bit 1 0
Version (4) Header Length (4)

Bit 15 Bit 16 Priority &Type of Service (8) Flags (3) Total Length (16)

Bit 31

Identification (16) Time-to-Live (8) Protocol (8)

Fragment Offset (13) Header Checksum (16) 20 Bytes

Source IP Address (32) Destination IP Address (32) Options (0 or 32 if Any) Data (Varies if Any)

52

Protocol Field

Determines destination upper-layer protocol

Transport Layer

TCP 6

UDP 17 IP Protocol Numbers

Internet Layer

53

Internet Control Message Protocol

Application Transport ICMP Internet

Destination Unreachable

Echo (Ping) Other

Data-Link Physical

54

Device On Layer 3 --- Router

Broadcast control Multicast control Optimal path determination Traffic management Logical addressing Connects to WAN services

55

Type of Transmission
Unicast Multicast Broadcast

56

Type of Transmission

57

Layer 2 - The Data Link Layer


7 Application
Performs Physical Addressing This layer provides reliable transit of data across a physical link. Combines bits into bytes and bytes into frames MAC address Error detection, not correction LLC and MAC PDU - Frames
SMAC Data length DATA FCS
58

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
Preamble DMAC

The Ethernet FRAME

MAC Layer802.3
8 *Preamble 6 DMAC 6 SMAC 2 Length Variable Data 4 FCS

Ethernet II uses Type here


0000.0C
OUI

xx.xxxx
Vendor Assigned

* **

synchronizes the sender and the receiver in terms of bytes


59

Layer 1 - The Physical Layer


7 Application

6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
This is the physical media through which the data, represented as electronic signals, is sent from the source host to the destination host. Move bits between devices Encoding

PDU - Bits
60

Physical Layer

Defines
Media type

Connector type
Signaling type

802.3 is responsible for LANs based on the carrier sense multiple access collision detect (CSMA/CD) access methodology. Ethernet is an example of a CSMA/CD network.

Physical

802.3

61

Physical Layer: Ethernet/802.3

10Base2Thin Ethernet 10Base5Thick Ethernet

Host Hub
10BaseTTwisted Pair

Hosts

62

Data Encapsulation
Application
Presentation Upper-Layer Data TCP Header Upper-Layer Data Session

PDU
Segment

Transport

IP Header

Data

Network

Packet

LLC Header

Data

FCS

Data-Link

Frame

MAC Header

Data

FCS

0101110101001000010

Physical

Bits

63

Data Encapsulation

64

Cisco Icons and Symbols

78

Devices associated in Each Layer

Layer 3 2 1

Device Router Switch Hub

Broadcast Domain ? ? ?

Collision Domain ? ? ?

79

Broadcast Domain

Encompasses a group of devices receiving broadcast frames initiating from any device within the group. Routers do not forward broadcast frames, broadcasts are not forwarded from one broadcast domain to another.

80

Collision Domain

The network area in Ethernet over which collision of frames are expected to transpire. extended by hubs and repeaters. divided by switches, routers, or bridges

Q: Which is better, a network with 10 collision domains or a network with 1 collision domain? Q2: a network with 3 broadcast domains or a network with 10 broadcast domains?
81

Collision

The effect of two nodes simultaneously in Ethernet. sending transmissions

When the electrical signals meet on the physical media, the frames from each node collide and are damaged. Q: What is the role of communication?

82

Device Used At Layer 1

Physical

All devices are in the same collision domain. All devices are in the same broadcast domain. Devices share the same bandwidth.
83

Hubs & Collision Domains

More end stations means more collisions.


CSMA/CD is used.

84

Devices On Layer 2 (Switches & Bridges)

Data-Link

OR

Each segment has its own collision domain. All segments are in the same broadcast domain.
85

Switches

Switch
Memory

Each segment is its own collision domain. Broadcasts are forwarded to all segments.

86

Router
Routers are used to connect networks together Route packets of data from one network to another Cisco became the de facto standard of routers because of their high-quality router products Routers, by default, break up a broadcast domain

87

Internetworking Devices

88

How They Operate


Hub Bridge Switch Router

Collision Domains: 1 4 Broadcast Domains: 1 1 4 1 4 4


89

Data Flow Through a Network

90

Network Structure & Hierarchy


Core Layer

Distribution Layer

Access Layer

91

Network Structure & Hierarchy

92

Network Structure & Hierarchy

93

94

Why Another Model?


Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).

The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.

The U.S. Department of Defense (DoD) created the TCP/IP reference model because it wanted a network that could survive any conditions, even a nuclear war.
95

TCP/IP Protocol Stack

7 6 5 4 3 2 1

Application Presentation Session Transport Network Application


4 5

Transport
3

Internet
2

Data-Link
Physical

Data-Link
Physical
1

96

Application Layer Overview

Application Transport Internet Data-Link Physical

File Transfer - TFTP* - FTP* - NFS E-Mail - SMTP Remote Login - Telnet* - rlogin* Network Management - SNMP* Name Management - DNS* *Used by the Router

97

Transport Layer Overview

Application Transport Internet Data-Link Physical

Transmission Control Protocol (TCP) User Datagram Protocol (UDP)

ConnectionOriented Connectionless

98

Internet Layer Overview

Internet Protocol (IP)


Application

Transport
Internet Data-Link Physical

Internet Control Message Protocol (ICMP) Address Resolution Protocol (ARP) Reverse Address Resolution Protocol (RARP)

In the OSI reference model, the network layer corresponds to the TCP/IP Internet layer.
99

Address Resolution Protocol

I need the Ethernet address of 176.16.3.2. 172.16.3.1 172.16.3.2

I heard that broadcast. The message is for me. Here is my Ethernet address.

IP: 172.16.3.2 = ??? IP: 172.16.3.2 Ethernet: 0800.0020.1111

100

Reverse ARP

What is my IP address?

I heard that broadcast. Your IP address is 172.16.3.25.

Ethernet: 0800.0020.1111 IP = ??? Ethernet: 0800.0020.1111 IP: 172.16.3.25

101

IEEE 802 Standards


IEEE 802.1: Standards related to network management. IEEE 802.2: General standard for the data link layer in the OSI
Reference Model. The IEEE divides this layer into two sublayers -the logical link control (LLC) layer and the media access control (MAC) layer.

IEEE 802.3: Defines the MAC layer for bus networks that use
CSMA/CD. This is the basis of the Ethernet standard.

IEEE 802.4: Defines the MAC layer for bus networks that use a
token-passing mechanism (token bus networks).

IEEE 802.5: Defines the MAC layer for token-ring networks.

IEEE 802.6: Standard for Metropolitan Area Networks (MANs)

102

103

Origin of Ethernet
Found by Xerox Palo Alto Research Center (PARC) in 1975 Original designed as a 2.94 Mbps system to connect 100 computers on a 1 km cable

Later, Xerox, Intel and DEC drew up a standard support 10 Mbps Ethernet II
Basis for the IEEEs 802.3 specification Most widely used LAN technology in the world
104

10 Mbps IEEE Standards - 10BaseT

10BaseT 10 Mbps, baseband, over Twisted-pair cable Running Ethernet over twisted-pair wiring as specified by IEEE 802.3 Configure in a star pattern Twisting the wires reduces EMI Fiber Optic has no EMI

Unshielded twisted-pair

RJ-45 Plug and Socket

105

Twisted Pair Cables


Unshielded Twisted Pair Cable (UTP)

most popular maximum length 100 m prone to noise


Category 1 Category 2 Category 3 Category 4 Category 5 Category 6 Voice transmission of traditional telephone For data up to 4 Mbps, 4 pairs full-duplex For data up to 10 Mbps, 4 pairs full-duplex For data up to 16 Mbps, 4 pairs full-duplex For data up to 100 Mbps, 4 pairs full-duplex For data up to 1000 Mbps, 4 pairs full-duplex
106

Twisted Pair Cables


Shielded Twisted Pair Cable (UTP)

Used for backbone cabling, adds several layers of protective layer used to counter the effects of EMI
Maximum length = 25 m

107

STANDARDS in TWISTED PAIR


Pin 1 2 3 4 5 6 7 EIA-TIA 568A WG G WO Bl WBl O WBr EIA-TIA 568B WO O WG Bl WBl G WBr

Br

Br

108

Baseband VS Broadband
Baseband Transmission

Entire channel is used to transmit a single digital signal Complete bandwidth of the cable is used by a single signal The transmission distance is shorter The electrical interference is lower
Use analog signaling and a range of frequencies Continuous signals flow in the form of waves Support multiple analog transmission (channels)

Broadband Transmission

Baseband Transmission

Network Card

Modem

Broadband 109 Transmission

Straight-through cable

110

Straight-through cable pinout

111

Crossover cable

112

Crossover cable

Pin 1 ---------------------------------- Pin 3


Pin 2 ---------------------------------- Pin 6 Pin 3 ---------------------------------- Pin 1 Pin 4 ---------------------------------- Pin 4

Pin 5 ---------------------------------- Pin 5


Pin 6 ---------------------------------- Pin 2 Pin 7 ---------------------------------- Pin 7 Pin 8 ---------------------------------- Pin 8

113

Rollover cable

114

Rollover cable pinout

115

Straight-through or Crossover

Use straight-through cables for the following cabling: Switch to Router Switch to PC or server Hub to PC or server

Use crossover cables for the following cabling:


Switch to switch Switch to hub Hub to hub Router to router PC to PC Router to PC
116

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server? a. b. c. d. denial of service brute force reconnaissance Trojan horse

117

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server? a. b. c. d. denial of service brute force reconnaissance Trojan horse

118

Which of the following are associated the application layer of the OSI model? (Choose Two) a. b. c. d. e. ping telnet ftp tcp ip

119

Which of the following are associated the application layer of the OSI model? (Choose Two) a. b. c. d. e. ping telnet ftp tcp ip

120

Which troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message Request timed out is displayed. At which layer of the OSI model does the problem most likely exist? a. b. c. d. e. f. The session layer The protocol layer The data link layer The access layer The network layer The application layer

121

Which troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message Request timed out is displayed. At which layer of the OSI model does the problem most likely exist? a. b. c. d. e. f. The session layer The protocol layer The data link layer The access layer The network layer The application layer

122

Which topologies are using the correct type of twisted pair cables? Choose Two.

123

Which topologies are using the correct type of twisted pair cables? Choose Two.

124

An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm? a. b. c. d. The PC has connectivity with a local host. The PC has connectivity with a layer 3 device The PC has a gateway correctly configured The PC has connectivity up to layer 5 of the OSI model e. The PC has the TCP/IP protocol stack correctly installed

125

An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm? a. b. c. d. The PC has connectivity with a local host. The PC has connectivity with a layer 3 device The PC has a gateway correctly configured The PC has connectivity up to layer 5 of the OSI model e. The PC has the TCP/IP protocol stack correctly installed

126

What are some of the advantages of using a router to segment a network? a. b. c. d. e. f. Filtering can occur based on Layer 3 information Broadcasts are eliminated Routers generally cost less than switches Broadcasts re not forwarded across the router Adding a router to the network decreases latency Addresses licensed to enterprises or ISPs by an internet registry organization

127

What are some of the advantages of using a router to segment a network? a. b. c. d. e. f. Filtering can occur based on Layer 3 information* Broadcasts are eliminated Routers generally cost less than switches Broadcasts re not forwarded across the router* Adding a router to the network decreases latency Addresses licensed to enterprises or ISPs by an internet registry organization

128

Which of the following statements are true regarding bridges and switches? (Choose 3) a. Switches are primarily software based while bridges are hardware based b. Both bridges and switches forward layer 2 broadcasts c. Bridges are frequently faster than switches d. Switches have a higher number of ports than most bridges e. Bridges define broadcast domains while switches define collision domains f. Both bridges and switches make forwarding based on layer 2 addresses
129

Which of the following statements are true regarding bridges and switches? (Choose 3) a. Switches are primarily software based while bridges are hardware based b. Both bridges and switches forward layer 2 broadcasts c. Bridges are frequently faster than switches d. Switches have a higher number of ports than most bridges e. Bridges define broadcast domains while switches define collision domains f. Both bridges and switches make forwarding based on layer 2 addresses
130

Why will a switch never learn a broadcast address?

a. Broadcasts only use network layer addressing b. A broadcast frame is never forwarded by a switch c. A broadcast address will never be the source of a frame d. Broadcast addresses use an incorrect format for the switching table e. Broadcast frames are never sent to switches

131

Why will a switch never learn a broadcast address?

a. Broadcasts only use network layer addressing b. A broadcast frame is never forwarded by a switch c. A broadcast address will never be the source of a frame d. Broadcast addresses use an incorrect format for the switching table e. Broadcast frames are never sent to switches

132

Which of the following statements describe the network shown in the graphic? (choose two) a. b. c. d. e. f. There are two broadcast domains in the network There are four broadcast domains in the network There are six broadcast domains in the network There are four collision domains in the network There are five collision domains in the network There are seven collision domains in the network

133

Which of the following statements describe the network shown in the graphic? (choose two) a. b. c. d. e. f. There are two broadcast domains in the network There are four broadcast domains in the network There are six broadcast domains in the network There are four collision domains in the network There are five collision domains in the network There are seven collision domains in the network

134

At which OSI layer is a logical path created between two host systems? a. b. c. d. e. Session Transport Network Data link Physical

135

At which OSI layer is a logical path created between two host systems? a. b. c. d. e. Session Transport Network Data link Physical

136

What functions do routers perform in a network?

a. b. c. d. e. f.

Packet switching Access layer security Path selection VLAN membership assignment Bridging between LAN segments Microsegmentation of broadcast domains

137

What functions do routers perform in a network?

a. b. c. d. e. f.

Packet switching Access layer security Path selection VLAN membership assignment Bridging between LAN segments Microsegmentation of broadcast domains

138

At which layers of the OSI model do WANs operation? (Choose two) a. b. c. d. e. f. Application Session Transport Network Data link Physical

139

At which layers of the OSI model do WANs operation? (Choose two) a. b. c. d. e. f. Application Session Transport Network Data link Physical

140

Why does the data communication industry use the layered OSI reference model?
a. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting b. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds c. It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers d. It encourages industry standardization by defining what functions occur at each layer of the model e. It provides a means by which changes in functionality in one layer require changes in other layers 141

Why does the data communication industry use the layered OSI reference model?
a. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting b. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds c. It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers d. It encourages industry standardization by defining what functions occur at each layer of the model e. It provides a means by which changes in functionality in one layer require changes in other layers 142

Which of the following is true regarding the use of switches and hubs for network connectivity? a. Switches take less time to process frames than hubs take. b. Switches do not forward broadcasts c. Hubs can filter frames d. Using hubs can increase the amount of bandwidth available to hosts e. Switches increase the number of collision domains in the network

143

Which of the following is true regarding the use of switches and hubs for network connectivity? a. Switches take less time to process frames than hubs take. b. Switches do not forward broadcasts c. Hubs can filter frames d. Using hubs can increase the amount of bandwidth available to hosts e. Switches increase the number of collision domains in the network

144

The network administrator must complete the connection between the RTA of the XYZ company and the service provider. To accomplish this task, which two devices could be installed at the customer site to provide a connection through the local loop of the central office of the provider? (choose two) a. b. c. d. e. f. WAN switch PVC ATM switch Multiplexer CSU/DSU Modem
145

The network administrator must complete the connection between the RTA of the XYZ company and the service provider. To accomplish this task, which two devices could be installed at the customer site to provide a connection through the local loop of the central office of the provider? (choose two) a. b. c. d. e. f. WAN switch PVC ATM switch Multiplexer CSU/DSU Modem
146

Acknowledgements, sequencing, and flow control are characteristics of which OSI later? a. b. c. d. e. f. 2 3 4 5 6 7

147

Acknowledgements, sequencing, and flow control are characteristics of which OSI later? a. b. c. d. e. f. 2 3 4 5 6 7

148

Which of the following are types of flow control? (choose three) a. b. c. d. e. Buffering Cut through Windowing Congestion avoidance Load balancing

149

Which of the following are types of flow control? (choose three) a. b. c. d. e. Buffering Cut through Windowing Congestion avoidance Load balancing

150

Refer to the exhibit. Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection? a. b. c. d. UTP cable STP cable Coaxial cable Fiber optic cable

151

Refer to the exhibit. Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection? a. b. c. d. UTP cable STP cable Coaxial cable Fiber optic cable

152

What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (choose three) a. b. c. d. e. f. Default gateway DNS servers FTP server Helper address Subnet mask TFTP server

153

What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (choose three) a. b. c. d. e. f. Default gateway DNS servers FTP server Helper address Subnet mask TFTP server

154

Host 1 sends a request for a file to remote server 1. Which destination does Host 1 place the packet containing the request? a. b. c. d. e. The MAC address of the NIC in server1 The IP address of server 1 The MAC address of the s0/0/0 interface of router R2 The IP address of s0/0/0 interface of router R1 The IP address of fa0/0 interface of router R1

155

156

Host 1 sends a request for a file to remote server 1. Which destination does Host 1 place the packet containing the request? a. b. c. d. e. The MAC address of the NIC in server1 The IP address of server 1 The MAC address of the s0/0/0 interface of router R2 The IP address of s0/0/0 interface of router R1 The IP address of fa0/0 interface of router R1

157

Host 1 sends an ICMP echo request to remote server 1. Which destination address does Host 1 place in the header of the frame containing the ping packet?
a. The IP address of server 1 b. The MAC address of the NIC in server1 c. The IP address of fa0/0 interface of router R1 d. The MAC address of fa0/0 interface of router R1 e. The MAC address of the s0/0/0 interface of router R2 f. The IP address of s0/0/0 interface of router R1
158

159

Host 1 sends an ICMP echo request to remote server 1. Which destination address does Host 1 place in the header of the frame containing the ping packet?
a. The IP address of server 1 b. The MAC address of the NIC in server1 c. The IP address of fa0/0 interface of router R1 d. The MAC address of fa0/0 interface of router R1 e. The MAC address of the s0/0/0 interface of router R2 f. The IP address of s0/0/0 interface of router R1
160

R1 forwards a packet from Host 1 to remoter Server 1. Which describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1? a. The frame does not have MAC addresses b. The source MAC address in the frame is the MAC address of the NIC of Host 1 c. The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1

d. The destination MAC address in the frame is the MAC address of the NIC of Server 1
e. The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2
161

162

R1 forwards a packet from Host 1 to remoter Server 1. Which describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1? a. The frame does not have MAC addresses b. The source MAC address in the frame is the MAC address of the NIC of Host 1 c. The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1

d. The destination MAC address in the frame is the MAC address of the NIC of Server 1
e. The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2
163

Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1? a. The MAC address of the NIC in Host 1

b. The MAC address of the NIC in server 1


c. The MAC address of the Fa0/0 interface of router R1

d. The MAC address of the s0/0/0 interface of router R2

164

165

Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1? a. The MAC address of the NIC in Host 1

b. The MAC address of the NIC in server 1


c. The MAC address of the Fa0/0 interface of router R1

d. The MAC address of the s0/0/0 interface of router R2

166

Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2? (choose two) a. Host 1 addresses the frames to the MAC address of router R1 b. Host 1 looks in its ARP cache for the MAC address of router R1 c. Host 1 addresses the frames to the MAC address of web server 2

d. Host 1 sends the packets to router R1 to be forwarded to web server 2


e. Host 1 sends a broadcast ARP request to obtain the MAC address of webserver 2
167

168

Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2? (choose two) a. Host 1 addresses the frames to the MAC address of router R1 b. Host 1 looks in its ARP cache for the MAC address of router R1 c. Host 1 addresses the frames to the MAC address of web server 2

d. Host 1 sends the packets to router R1 to be forwarded to web server 2


e. Host 1 sends a broadcast ARP request to obtain the MAC address of webserver 2
169

A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as part of this TCP/IP transfer? a. b. c. d. e. f. Send ACK 1 to 3 Send ACK 3 Send ACK 4 Send ACK 4 -6 Send ACK 6 Send ACK 7

170

A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as part of this TCP/IP transfer? a. b. c. d. e. f. Send ACK 1 to 3 Send ACK 3 Send ACK 4 Send ACK 4 -6 Send ACK 6 Send ACK 7

171

What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN? (choose two) a. The number of collision domains would remain the same b. The number of collision domains would decrease c. The number of collision domains would increase d. The number of broadcast domains would remain the same e. The number of broadcast domains would decrease f. The number of broadcast domains would increase

172

What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN? (choose two) a. The number of collision domains would remain the same b. The number of collision domains would decrease c. The number of collision domains would increase d. The number of broadcast domains would remain the same e. The number of broadcast domains would decrease f. The number of broadcast domains would increase

173

How does a DHCP server dynamically assign IP addresses to hosts?


a. Addresses are permanently assigned so that the host uses the same address at all times b. Addresses are assigned for a fixed period of time. At the end of the period, a new request for an address must be made, and another address is then assigned c. Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the DHCP server to renew the lease d. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement
174

How does a DHCP server dynamically assign IP addresses to hosts?


a. Addresses are permanently assigned so that the host uses the same address at all times b. Addresses are assigned for a fixed period of time. At the end of the period, a new request for an address must be made, and another address is then assigned c. Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the DHCP server to renew the lease d. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement
175

What is the purpose of using the traceroute command?

a. To map all the devices on a network b. To display the current TCP/IP configuration values c. To see how a device MAC address is mapped to its IP address d. To see the path a packet will take when travelling to a specified destination e. To display the MTU values for each router in a specified network path from a source to a destination

176

What is the purpose of using the traceroute command?

a. To map all the devices on a network b. To display the current TCP/IP configuration values c. To see how a device MAC address is mapped to its IP address d. To see the path a packet will take when travelling to a specified destination e. To display the MTU values for each router in a specified network path from a source to a destination

177

What is the purpose of an ARP request message?


a. It binds the IP address of a host to the network that it is on. b. It builds a correlation between an IP address and a MAC address. c. It provides connectivity and path selection between hosts on a network d. It encapsulates the layer 3 address and then passes the packet to layer 2 e. It creates a session by passing a header with the destination layer 2 address to the transport layer
178

What is the purpose of an ARP request message?


a. It binds the IP address of a host to the network that it is on. b. It builds a correlation between an IP address and a MAC address. c. It provides connectivity and path selection between hosts on a network d. It encapsulates the layer 3 address and then passes the packet to layer 2 e. It creates a session by passing a header with the destination layer 2 address to the transport layer
179

Drag and drop the network user application to the appropriate description of its primary use. (not all options are used)

180

181

A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen? a. b. c. d. e. Session Transport Network Data link Physical

182

A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen? a. b. c. d. e. Session Transport Network Data link Physical

183

A network interface port has CSMA/CD enabled on a shared twisted pair network. From this statement, what is known about the network interface port? a. b. c. d. e. This is a 10Mbps switch port This is a 100Mbps switch port This is an Ethernet port operating at half duplex This is an Ethernet port operating at full duplex This is a port on a network interface card in a PC

184

A network interface port has CSMA/CD enabled on a shared twisted pair network. From this statement, what is known about the network interface port? a. b. c. d. e. This is a 10Mbps switch port This is a 100Mbps switch port This is an Ethernet port operating at half duplex This is an Ethernet port operating at full duplex This is a port on a network interface card in a PC

185

Refer to the exhibit. What is the meaning of the output MTU 1500 bytes? a. The maximum number of bytes that can traverse this interface per second is 1500 b. The minimum segment size that can traverse this interface is 1500 bytes c. The maximum segment size that can traverse this interface is 1500 bytes d. The minimum packet size that can traverse this interface is 1500 bytes e. The maximum packet size that can traverse this interface is 1500 bytes f. The maximum frame size that can traverse this interface is 1500 bytes 186

Refer to the exhibit. What is the meaning of the output MTU 1500 bytes? a. The maximum number of bytes that can traverse this interface per second is 1500 b. The minimum segment size that can traverse this interface is 1500 bytes c. The maximum segment size that can traverse this interface is 1500 bytes d. The minimum packet size that can traverse this interface is 1500 bytes e. The maximum packet size that can traverse this interface is 1500 bytes f. The maximum frame size that can traverse this interface is 1500 bytes 187

Which statement is true about full duplex Ethernet in comparison to half duplex Ethernet?
a. Full duplex Ethernet consists of a shared cable segment. Half duplex Ethernet provides a point to point link. b. Full duplex Ethernet uses a loopback circuit to detect collisions. Half duplex Ethernet uses a jam signal. c. Full duplex Ethernet can provide higher throughput than can half duplex Ethernet of the same bandwidth. d. Full duplex Ethernet uses two wires to send and receive. Half duplex Ethernet uses one wire to send and receive.
188

Which statement is true about full duplex Ethernet in comparison to half duplex Ethernet?
a. Full duplex Ethernet consists of a shared cable segment. Half duplex Ethernet provides a point to point link. b. Full duplex Ethernet uses a loopback circuit to detect collisions. Half duplex Ethernet uses a jam signal. c. Full duplex Ethernet can provide higher throughput than can half duplex Ethernet of the same bandwidth. d. Full duplex Ethernet uses two wires to send and receive. Half duplex Ethernet uses one wire to send and receive.
189

S-ar putea să vă placă și