Anda di halaman 1dari 77

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 1 STUDY GUIDE 1. What does TCP/IP stand for?

Transmission Control Protocol/Internet Protocol 2. What does NIC stand for? Network Interface Card 3. When selecting a NIC, what three factors should you consider? Protocols Types of media Types of system bus 4. What device allows a computer to connect to the internet over the phone line? Modem 5. Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of protocols or rules developed to _________________________________________. Allow cooperating computers to share resources across a network. 6. What does the ping utility do? It is used to verify Internet connectivity.
7.

What is the internal loopback test command? Ping 127.0.0.1

8. Name four functions of a Web browser:


1. 2. 3. 4.

Contacts a web server Requests information Receives information Displays the results on the screen

9. Name two very popular web browsers. 1. Internet Explorer 2. Netscape Navigator

64112471.doc

Page 1

Rev. 4/2004

10.

What are the two numbers in the binary number system? 0 and 1

11.

What states do the binary numbers 0 and 1 represent? 0 is represented by the OFF state. 1 is represented by the ON state.

12.

How many bits form a byte? 8

13.

What is the decimal value range of a byte? 0 to 255

14. Convert 175 to binary. 10101111


15.

Convert 65 to binary. 1000001

16. Convert 11001100 to decimal. 204 17. Convert 11101010 to decimal. 234 18. What do we call the easy way to refer to 32 bit network addresses? Dotted decimal notation 19. Hexadecimal is based on what number system? Base 16 20. Convert 175 to hexadecimal. AF

64112471.doc

Page 2

Rev. 4/2004

21. Convert 65 to hexadecimal 41 22. Write the logic table for AND X 0 0 1 1 Y 0 1 0 1 Result 0 0 0 1

23. Write the logic table for OR X 0 0 1 1 Y 0 1 0 1 Result 0 1 1 1

24. An IP address is composed of what two parts? Network Host

64112471.doc

Page 3

Rev. 4/2004

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 2 STUDY GUIDE 1. List three types of networks: LAN Local Area Network MAN Metropolitan Area Network WAN Wide Area Network 2. The Internet originated with what department of the government? DoD department of defense 3. What does a repeater do? A repeater regenerates a signal. 4. List six physical topologies: Bus topology Ring topology Star topology Extended Star topology Hierarchical topology Mesh topology 5. Define a protocol. A protocol is a formal description of a set of rules and conventions that govern a particular aspect of how devices on a network communicate. 6. LANs consist of what five components? Computers Network interface cards Peripheral devices Networking media Network devices

64112471.doc

Page 4

Rev. 4/2004

7. List five networking devices: Router Bridge Hub Ethernet Switch Repeater 8. What are WANs designed to do? Operate over a large geographically separated areas Allow users to have real-time communication capabilities with other users Provide full-time remote resources connected to local services Provide e-mail, World Wide Web, file transfer, and e-commerce services 9. Describe a MAN. A MAN is a network that spans a metropolitan area such as a city or suburban area. 10. What three features do Storage Area Networks (SAN) offer? Performance Availability Scalability 11. Describe a VPN. A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. 12. List three main types of VPNs. Access VPN Intranet VPN Extranet VPN 13. List four reasons why bandwidth is important: Bandwidth is finite Bandwidth is not free Bandwidth requirements are growing at a rapid rate Bandwidth is critical to network performance
14.

What two analogies are used in the text to describe bandwidth?

64112471.doc

Page 5

Rev. 4/2004

Width of a pipe Number of lanes on a highway

15. Fill in the following table: Media Thinnet Thicknet 10Base-T 100Base-TX 1000Base-TX What is throughput? Throughput refers to actual measured bandwidth, at a specific time of day, using specific Internet routes, and while a specific set of data is transmitted on the network. 17. List six factors that can determine throughput: Internetworking devices Type of data being transferred Network topology Number of users on the network User computer Server computer Power conditions 18. What is the formula for best download? Typical download? Best Download T = S / BW T (Time for transfer to occur) = S (file size in bits) / BW (maximum theoretical bandwidth of the slowest link) Typical Download T = S / P T (Time for transfer to occur) = S (file size in bits) / P (actual throughput at the moment of transfer) Maximum Theoretical Bandwidth 10 Mbps 10 Mbps 10 Mbps 100 Mbps 1000 Mbps Maximum Physical Distance 185 M 500 M 100 M 100 M 100 M

16.

19. What is a packet?

64112471.doc

Page 6

Rev. 4/2004

A packet is a logically grouped unit of information that moves between computer systems. 20. What two models are used to explain how data is communicated from one computer to another? OSI TCP/IP 21. What do ISO and OSI stand for? International Organization for Standardization (ISO) Open System Interconnection (OSI) 22. What are six benefits of the OSI model? Reduces complexity Standardizes interfaces Facilitates modular engineering Ensures interoperable technology Accelerates evolution Simplifies teaching and learning 23. List the seven layers of the OSI model: 7 - Application 6 - Presentation 5 - Session 4 - Transport 3 - Network 2 - Data Link 1 - Physical 24. What is a PDU? Protocol Data Unit (PDU) 25. List the four layers of the TCP/IP model. Application Transport Internet Network Access 26. Fill in the table comparing the TCP/IP model to the OSI model

64112471.doc

Page 7

Rev. 4/2004

TCP/IP Model Application Transport Internet Network Access

OSI Model Application Presentation Session Transport Network Data Link Physical

27. List the five steps of data encapsulation. Data Segments Packets Frames Bits

64112471.doc

Page 8

Rev. 4/2004

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 3 STUDY GUIDE 1. What is an atom comprised of? Electrons Particles with a negative charge that orbit the nucleus Nucleus The center part of the atom, composed of protons and neutrons Protons Particles with a positive charge Neutrons Particles with no charge (neutral) 2. What is an insulator? What is a conductor? An insulator is any material that does not allow a current to flow or severely restrict its flow. A conductor is any material that offers very little or no resistance to the flow of a current. 3. What is attenuation? Attenuation refers to the resistance to the flow of electrons and why a signal becomes degraded as it travels along the conduit. 4. What is the unit of measurement for resistance? For voltage? Resistance is measured in ohms. Voltage is measured in volts. 5. What is electrical current? Electrical current is the flow of charges created when electrons move. 6. What is a circuit? A circuit is a closed loop in which a current flows.

7. Describe AC and DC.

64112471.doc

Page 9

Rev. 4/2004

Alternating current (AC) and voltages vary over time by changing their polarity, or direction. AC flows in one direction, then reverses its direction and flows in the other direction, and then repeats the process. AC voltage is positive at one terminal, and negative at the other. Then the AC voltage reverses its polarity, so that the positive terminal becomes negative, and the negative terminal becomes positive. This process repeats itself continuously. Direct current (DC) always flows in the same direction, and DC voltages always have the same polarity. One terminal is always positive, and the other is always negative. They do not change or reverse. 8. What does each part of the following cable specification represent? 10Base-T 10 represent the LAN Speed, 10 Mbps BASE = Baseband T indicates the type of cable and maximum length 9. Fill out the following table for media types. Speed and throughput Coaxial 10 100 Mbps STP 10 100 Mbps ScTP 10 100 Mbps UTP 10 100 1000 Mbps Average $ per node Media and connector size Inexpensive Medium Moderately expensive Moderately expensive Least expensive Medium to large Medium to large Small Maximum cable length 500 m 100 m 100 m 100 m

10. What is the electromagnetic spectrum? All the types of electromagnetic waves are arranged in order from the longest wavelength down to the shortest wavelength. 11. What does the Law of Reflection state? The angle at which a light ray strikes a reflective surface determines the angle that the ray will reflect off the surface. 12. What is refraction?

64112471.doc

Page 10

Rev. 4/2004

Refraction is a light ray crossing the interface between two substances and the ray entering the second substance. 13. What two conditions must be met for the light rays in a fiber to be reflected back into the fiber without any loss due to refraction? The core of the optical fiber has to have a larger index of refraction than the material that surrounds it. The material that surrounds the core of the fiber is called the cladding. The angle of incidence of the light ray is greater than the critical angle for the core and its cladding. 14. List the two modes used for fiber cable. Single mode Multimode 15. How far can single-mode fiber carry LAN data? Multimode fiber? Single-mode fiber can carry data up to 3000 meters. Multi-mode fiber can carry data up to 2000 meters. 16. What type of connector is most commonly used with multimode fiber? Single-mode fiber? SC Subscriber Connector is used on multimode fiber. ST Straight Tip is used on single-mode fiber. 17. List three problems associated with fiber cabling. Scattering of light in the fiber caused by microscopic distortions in the fiber. Absorption of light by impurities in the cable. Manufacturing irregularities in the fiber. 18. List five problems that lead to fiber noise. Scattering Absorption Dispersion Improper installation Dirty fiber ends 19. List four standards for 802.11. 802.11

64112471.doc

Page 11

Rev. 4/2004

802.11b 802.11a 802.11g 20. What is an Access Point on a wireless network? The AP is hard wired to the cabled LAN to provide Internet access and connectivity to the wired network. 21. Performance on a wireless network is affected by what characteristics? Performance of the network will also be affected by signal strength and degradation in signal quality due to distance or interference. 22. What layer of the OSI model does authentication occur on a wireless network? Layer 2 23. What does AM stand for? FM? AM is Amplitude Modulation FM is Frequency Modulation 24. List two emerging security solutions used on wireless networks. VPN Virtual Private Networking EAP Extensible Authentication Protocol

64112471.doc

Page 12

Rev. 4/2004

CED253 INTERNETWORKING I MODULE 4 STUDY GUIDE 1. What is a pulse? Disturbance deliberately caused, and involves a fixed, predictable duration. Pulses are important in electrical signals because they determine the value of the data being transmitted. 2. What is frequency and how is it measured? Frequency is the number of complete cycles per second, measured in Hertz. 3. What is amplitude and how is it measured? The amplitude of an electrical signal is the height, measured in volts. 4. What type of wave represents analog signals? Digital signals? Sine waves represent analog signals. Square waves represent digital signals. 5. What is characteristic of sine waves? Sine waves are periodic, which means that they repeat the same pattern at regular intervals. Sine waves are continuously varying, which means that no two adjacent points on the graph have the same value. 6. What is characteristic of square waves? Square wave graphs do not continuously vary with time. The wave holds one value for some time, and then suddenly changes to a different value. 7. What are decibels (dB) used for? Decibels (dB) measure the loss or gain of the power of a wave. 8. What is the power formula and what type of waves does it calculate?

dB = 10 log10 (Pfinal / Pref)

where:

64112471.doc

Page 13

Rev. 4/2004

dB measures the loss or gain of the power of a wave. Decibels are usually negative numbers representing a loss in power as the wave travels, but can also be positive values representing a gain in power if the signal is amplified log10 implies that the number in parenthesis will be transformed using the base 10 logarithm rule Pfinal is the delivered power measured in Watts Pref is the original power measured in Watts Vfinal is the delivered voltage measured in Volts Vreference is the original voltage measured in Volts

Typically, light waves on optical fiber and radio waves in the air are measured using the power formula.

9. What is the voltage formula and what type of waves does it measure?

dB = 20 log10 (Vfinal / Vreference)

where:

dB measures the loss or gain of the power of a wave. Decibels are usually negative numbers representing a loss in power as the wave travels, but can also be positive values representing a gain in power if the signal is amplified log10 implies that the number in parenthesis will be transformed using the base 10 logarithm rule Pfinal is the delivered power measured in Watts Pref is the original power measured in Watts Vfinal is the delivered voltage measured in Volts Vreference is the original voltage measured

Electromagnetic waves on copper cables are measured using the voltage formula. 10. From your answers above, what are the units of measure used to calculate gain or loss in the networking signal? decibels watts volts 11. Name two devices used to analyze signals.

64112471.doc

Page 14

Rev. 4/2004

Oscilloscope Spectrum Analyzer 12. What is an oscilloscope and what does it's X and Y axis measure? An oscilloscope is an important electronic device used to view electrical signals such as voltage waves and pulses. The x-axis on the display represents time, and the y-axis represents voltage or current. There are usually two y-axis inputs, so two waves can be observed and measured at the same time. 13. What is time domain analysis? Analyzing signals using an oscilloscope is called time-domain analysis, because the x-axis or domain of the mathematical function represents time. Measured by an oscilloscope. 14. What is frequency domain analysis? In frequency-domain analysis, the x-axis represents frequency. An electronic device called a spectrum analyzer creates graphs for frequencydomain analysis. 15. What does noise mean when it relates to communications? Undesirable signals 16. What is noise? Noise usually refers to undesirable sounds, noise related to communications refers to undesirable signals. Noise can originate from natural and technological sources, and is added to the data signals in communications systems. 17. What is white noise? Narrowband interference? Noise that affects all transmission frequencies equally is called white noise. Noise that only affects small ranges of frequencies is called narrowband interference.

64112471.doc

Page 15

Rev. 4/2004

18. Describe digital bandwidth as it relates to communication.


Digital bandwidth measures how much information can flow from one place to another in a given amount of time.

19. Describe analog bandwidth as it relates to communication. Analog bandwidth typically refers to the frequency range of an analog electronic system. Analog bandwidth could be used to describe the range of frequencies transmitted by a radio station or an electronic amplifier. 20. List four types of cable used to carry data. Coaxial cable STP cable UTP cable Fiber cable 21. What is attenuation and what can cause it? Attenuation is the decrease in signal amplitude over the length of a link. Signal energy is also lost when it leaks through the insulation of the cable and by impedance caused by defective connectors. The resistance of the copper cable converts some of the electrical energy of the signal to heat. Long cable lengths and high signal frequencies contribute to greater signal attenuation. long cable lengths defective connectors energy leaks through the insulation of the cable 22. What is impedance? Impedance is a measurement of the resistance of the cable to alternating current (AC) and is measured in ohms. 23. What is an impedance discontinuity or an impedance mismatch and what does it cause? The normal, or characteristic, impedance of a Cat5 cable is 100 ohms. If a connector is improperly installed on Cat5, it will have a different impedance value than the cable. This is called an impedance discontinuity or an impedance mismatch. Attenuation due to REFLECTION. The echoes strike the receiver at different intervals making it difficult for the receiver to accurately detect data values on the signal. This is called jitter and results in data errors.

64112471.doc

Page 16

Rev. 4/2004

24. What is insertion loss? The combination of the effects of signal attenuation and impedance discontinuities on a communications link is called insertion loss. 25. Describe crosstalk. Crosstalk involves the transmission of signals from one wire to a nearby wire. When voltages change on a wire, electromagnetic energy is generated. This energy radiates outward from the transmitting wire like a radio signal from a transmitter. Adjacent wires in the cable act like antennas, receiving the transmitted energy, which interferes with data on those wires. 26. List three types of crosstalk. Near-end Crosstalk (NEXT) Far-end Crosstalk (FEXT) Power Sum Near-end Crosstalk (PSNEXT) 27. List the wire color sequence for T568B straight-thru. White-orange Orange White-green Blue White-blue Green White-brown Brown 28. List the wire color sequence for T568B cross-connect. White-green Green White-orange Blue White-blue Orange White-brown Brown

64112471.doc

Page 17

Rev. 4/2004

29. How do testers measure the length of a cable? Testers measure the length of the wire based on the electrical delay as measured by a Time Domain Reflectometry (TDR) test, not by the physical length of the cable jacket. 30. What test is used to identify the distance to wiring faults such as shorts and opens? Time Domain Reflectometry (TDR) test 31. Define the following: Short A short circuit occurs if two wires are connected to each other. Open An open circuit occurs if the wire does not attach properly at the connector. Reversed The reversed-pair fault occurs when a wire pair is correctly Pair installed on one connector, but reversed on the other connector. Split Pair A split-pair wiring fault occurs when two wires from different wire pairs are connected to the wrong pins on both ends of the cable 32. When testing a fiber cable, what is the main concern with the fiber link? The main concern with a fiber link is the strength of the light signal that arrives at the receiver. 33. What new standard was released on June 20, 2002? Category 6 (Cat 6) 34. What are the ten test parameters used to test copper cable to meet the EIA/TIA standards? Wire map Insertion loss Near-end crosstalk (NEXT) Power sum near-end crosstalk (PSNEXT) Equal-level far-end crosstalk (ELFEXT) Power sum equal-level far-end crosstalk (PSELFEXT) Return loss Propagation delay Cable length Delay skew

64112471.doc

Page 18

Rev. 4/2004

35. What are possible sources of noise?


Nearby cables which carry data signals (also known an crosstalk) Radio frequency interference (RFI), which is noise from other signals being transmitted nearby (i.e., radio transmitters) Electromagnetic interference (EMI), which is noise from nearby sources such as motors and lights (i.e., electrical motors or fluorescent light) Laser noise at the transmitter or receiver of an optical signal

36. What are the three important number systems?


Base 2 binary Base 10 decimal Base 16 hexadecimal

37. What are the advantages of fiber cabling? no crosstalk problems electromagnetic interference or noise has no affect on fiber cabling. Attenuation does occur on fiber links, but to a lesser extent than on copper cabling. 38. Why isn't there crosstalk on a fiber cable? No electrical signals No generation of electromagnetic waves

39. What are the major causes of light reflection and signal strength loss in optical fiber? Improperly installed connectors are the main cause of light reflection and signal strength loss in optical fiber.

64112471.doc

Page 19

Rev. 4/2004

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 4 STUDY GUIDE 1. What is frequency and how is it measured? Frequency is the number of complete cycles per second, measured in Hertz. 2. What is frequency and how is it measured? The amplitude of an electrical signal is the height, measured in volts. 3. What type of wave represents analog signals? Digital signals? Sine waves represent analog signals. Square waves represent digital signals. 4. What are decibels (dB) used for? Decibels (dB) measure the loss or gain of the power of a wave. 5. Name two devices used to analyze signals. Oscilloscope Spectrum Analyzer 6. What does noise mean when it relates to communications? Undesirable signals 7. What is white noise? Narrowband interference? Noise that affects all transmission frequencies equally is called white noise. Noise that only affects small ranges of frequencies is called narrowband interference. 8. Describe digital bandwidth.
Digital bandwidth measures how much information can flow from one place to another in a given amount of time.

64112471.doc

Page 20

Rev. 4/2004

9. Describe analog bandwidth. Analog bandwidth typically refers to the frequency range of an analog electronic system. Analog bandwidth could be used to describe the range of frequencies transmitted by a radio station or an electronic amplifier. 10. List four types of cable used to carry data. Coaxial cable STP cable UTP cable Fiber cable 11. What is attenuation? Attenuation is the decrease in signal amplitude over the length of a link. 12. What is impedance? Impedance is a measurement of the resistance of the cable to alternating current (AC) and is measured in ohms. 13. What is insertion loss? The combination of the effects of signal attenuation and impedance discontinuities on a communications link is called insertion loss. 14. Describe crosstalk. Crosstalk involves the transmission of signals from one wire to a nearby wire. When voltages change on a wire, electromagnetic energy is generated. This energy radiates outward from the transmitting wire like a radio signal from a transmitter. Adjacent wires in the cable act like antennas, receiving the transmitted energy, which interferes with data on those wires. 15. List three types of crosstalk. Near-end Crosstalk (NEXT) Far-end Crosstalk (FEXT) Power Sum Near-end Crosstalk (PSNEXT)

64112471.doc

Page 21

Rev. 4/2004

16. List the wire color sequence for T568B straight-thru. White-orange Orange White-green Blue White-blue Green White-brown Brown 17. List the wire color sequence for T568B cross-connect. White-green Green White-orange Blue White-blue Orange White-brown Brown 18. How do testers measure the length of a cable? Testers measure the length of the wire based on the electrical delay as measured by a Time Domain Reflectometry (TDR) test, not by the physical length of the cable jacket. 19. What test is used to identify the distance to wiring faults such as shorts and opens? Time Domain Reflectometry (TDR) test 20. When testing a fiber cable, what is the main concern with the fiber link? The main concern with a fiber link is the strength of the light signal that arrives at the receiver. 21. What new standard was released on June 20, 2002? Category 6 (Cat 6)

64112471.doc

Page 22

Rev. 4/2004

CED253 INTERNETWORKING I MODULE 5 STUDY GUIDE 1. At what layer of the OSI model does networking media exist? Networking media are considered Layer 1, or physical layer, components of LANs. 2. What is the most widely used LAN technology and who developed it? Ethernet Ethernet was first implemented by the Digital, Intel, and Xerox group, referred to as DIX. 3. Fill in the following table Media 10BBASE2 10BASE5 10BASE-T 100BASE-TX 100BASE-FX 1000BASE-CX 1000BASE-T 1000BASE-SX 1000BASE-LX Thinnet Thicknet Cat 3, 4, 5 Cat 5 62.5/125 STP Cat 5 62.5/50 62.5/50; 9 micron singlemode Maximum Segment Length 185 m 500 m 100 m 100 m 400 m 25 m 100 m 275 m for 62.5; 550 m for 50 440 m for 62.5; 550 m for 50; 3 -10 km single-mode Topology Bus Bus Star Star Star Star Star Star Star Connector BNC AUI RJ-45 RJ-45 ST or SC RJ-45 RJ-45 SC SC

4. What does it mean when a port on one Cisco device has 1 and the port on the other Cisco device has 1x? You need to use a straight-through cable to connect the two ports. Remember it by "unlike devices need a straight-through" 5. What does it mean when a port on one Cisco device has 1x and the port on the other Cisco device has 1x? You need to use a crossover cable to connect the two ports. Remember it by "like devices need a crossover" 6. Use straight-through cabling when connecting the following:

64112471.doc

Page 23

Rev. 4/2004

Switch to router Switch to PC or server Hub to PC or server 7. Use crossover cabling when connecting the following: Switch to switch Switch to hub Hub to hub Router to router PC to PC Router to PC 8. What does a repeater do? It can regenerate and retime network signals at the bit level to allow them to travel a longer distance on the media. 9. What is the Four Repeater Rule? This rule states that no more than four repeaters can be used between hosts on a LAN. 10. Why is the Four Repeater Rule important? This rule is used to limit latency added to frame travel by each repeater. Too much latency on the LAN increases the number of late collisions and makes the LAN less efficient. You want to prevent the number of collisions. 11. List the three basic types of hubs. Passive Active Intelligent 12. Hubs are also known as ____multiport repeaters__or concentrators.

64112471.doc

Page 24

Rev. 4/2004

1. What do wireless networks use to carry signals from one computer to another without permanent cable connection? Radio frequency (RF) Laser Infrared (IR) Satellite/microwaves 2. What are the advantages of wireless networks? A wireless network can be created with much less cabling. The only permanent cabling can be to the access points for the network. No need to run cabling to the hosts. A common application of wireless data communication is for mobile use. 3. What layer of the OSI model do switches and bridges operate? Switches and bridges operate at the Data Link layer of the OSI model. 4. What is switching and what is a switch's two major operations? Switching is a technology that alleviates congestion in Ethernet LANs by reducing the traffic and increasing the bandwidth. The first operation is called switching data frames. Switching data frames is the process by which a frame is received on an input medium and then transmitted to an output medium. The second is the maintenance of switching operations where switches build and maintain switching tables and search for loops. 5. What are the benefits of a switch? Reduces traffic Microsegmentation (increasing bandwidth) Creates more but smaller collision domains (Note: show teaching topology) 6. What is microsegmentation? Segmenting a network with switches so that each node is wired directly to one port on the switch.

64112471.doc

Page 25

Rev. 4/2004

7. What is the function of a NIC and what layer does the NIC operate? The function of a network interface card (NIC) is to connect a host device to the network medium. NICs are considered Layer 2 devices because each NIC carries a unique code called a Media Access Control (MAC) address. 17. Describe a peer-to-peer network. What are its benefits? In a peer-to-peer network, networked computers act as equal partners, or peers. As peers, each computer can take on the client function or the server function. Peer-to-peer networks are relatively easy to install (create) and operate. The users may also require passwords before allowing others to access their resources. Since individual users make these decisions, there is no central point of control or administration in the network. In a peer-to-peer network, networked computers act as equal partners, or peers. (no centralized equipment is required.) 18. A peer-to-peer network works well with ___10 or fewer________ computers. 19. Describe a client/server network, its advantages, and its disadvantages. In a client/server arrangement, network services are located on a dedicated computer called a server. The server responds to the requests of clients. Typically, desktop computers function as clients. Advantages: With the centralization of user accounts, security, and access control, server-based networks simplify the administration of large networks. The concentration of network resources such as files, printers, and applications on servers also makes the data generated easier to back-up and maintain. Most client/server systems also include facilities for enhancing the network by adding new services that extend the usefulness of the network.

64112471.doc

Page 26

Rev. 4/2004

Disadvantages: Although the aggregation of resources on server systems brings greater security, simpler access and coordinated control, the server introduces a single point of failure into the network. Servers require a trained, expert staff to administer and maintain. This increases the expense of running the network. Server systems also require additional hardware and specialized software that add to the cost. 20. What type of connections support WANs? Serial connections 21. Frequencies are measured in terms of cycles per second and expressed in Hertz (Hz). Signals transmitted over voice grade telephone lines use 4 kilohertz (kHz). 21. What does DTE stand for? Data terminal equipment 22. What does DCE stand for? Data communications equipment 23. The ____DTE_________ is the endpoint of the users device on the WAN link. The __________DCE______________ is typically the point where responsibility for delivering data passes into the hands of the service provider. 23. What does NT1 stand for when talking about an ISDN connection? Network Termination 1 (NT1) device 24. ISDN offers dial-on-demand connections or dial backup services. An ISDN Basic Rate Interface (BRI) is composed of two 64 kbps bearer channels (B channels) for data, and one delta channel (D channel) at 16 kbps used for signaling and other link-management tasks. PPP is typically used to carry data over the B channels.

64112471.doc

Page 27

Rev. 4/2004

24. What type of cable is used to connect a computer to the console port on the router? The cable used between a terminal and a console port is a rollover cable, with RJ-45 connectors. 24. What port do you use to manage the router through a modem? The AUX port is used to provide out-of-band management through a modem.

64112471.doc

Page 28

Rev. 4/2004

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 5 STUDY GUIDE 8. At what layer of the OSI model does networking media exist? Networking media are considered Layer 1, or physical layer, components of LANs. 9. What is the most widely used LAN technology? Ethernet 10. Fill in the following table Media 10BBASE2 10BASE5 10BASE-T 100BASE-TX 100BASE-FX 1000BASE-CX 1000BASE-T 1000BASE-SX 1000BASE-LX Thinnet Thicknet Cat 3, 4, 5 Cat 5 62.5/125 STP Cat 5 62.5/50 62.5/50; 9 micron singlemode Maximum Segment Length 185 m 500 m 100 m 100 m 400 m 25 m 100 m 275 m for 62.5; 550 m for 50 440 m for 62.5; 550 m for 50; 3 -10 km single-mode Topology Bus Bus Star Star Star Star Star Star Star Connector BNC AUI RJ-45 RJ-45 ST or SC RJ-45 RJ-45 SC SC

11. What does it mean when a port on one Cisco device has 1 and the port on the other Cisco device has 1x? You need to use a straight-through cable to connect the two ports. 12. What does it mean when a port on one Cisco device has 1x and the port on the other Cisco device has 1x? You need to use a crossover cable to connect the two ports.

64112471.doc

Page 29

Rev. 4/2004

13. Use straight-through cabling when connecting the following: Switch to router Switch to PC or server Hub to PC or server 14. Use crossover cabling when connecting the following: Switch to switch Switch to hub Hub to hub Router to router PC to PC Router to PC 15. What does a repeater do? It can regenerate and retime network signals at the bit level to allow them to travel a longer distance on the media. 16. What is the Four Repeater Rule? This rule states that no more than four repeaters can be used between hosts on a LAN. 17. List the three basic types of hubs. Passive Active Intelligent 18. What do wireless networks use to carry signals from one computer to another without permanent cable connection? Radio frequency (RF) Laser Infrared (IR) Satellite/microwaves 19. What layer of the OSI model do switches and bridges operate? Switches and bridges operate at the Data Link layer of the OSI model.

64112471.doc

Page 30

Rev. 4/2004

20. What is switching? Switching is a technology that alleviates congestion in Ethernet LANs by reducing the traffic and increasing the bandwidth. 14. What is the function of a NIC and what layer does the NIC operate? The function of a network interface card (NIC) is to connect a host device to the network medium. NICs are considered Layer 2 devices because each NIC carries a unique code called a Media Access Control (MAC) address. 15. Describe a peer-to-peer network. In a peer-to-peer network, networked computers act as equal partners, or peers. As peers, each computer can take on the client function or the server function. 16. Describe a client/server network. In a client/server arrangement, network services are located on a dedicated computer called a server. The server responds to the requests of clients. Typically, desktop computers function as clients. 17. What type of connections support WANs? Serial connections 18. What does DTE stand for? Data terminal equipment 19. What does DCE stand for? Data communications equipment 20. What does NT1 stand for when talking about an ISDN connection? Network Termination 1 (NT1) device 21. What type of cable is used to connect a computer to the console port on the router? The cable used between a terminal and a console port is a rollover cable, with RJ-45 connectors. 22. What port do you use to manage the router through a modem?
The AUX port is used to provide out-of-band management through a modem.
64112471.doc Page 31 Rev. 4/2004

CED253 INTERNETWORKING I MODULE 6 STUDY GUIDE 21. Define CSMA/CD. Carrier Sense Multiple Access with Collision Detection (CSMA/CD). 22. What is the standard for Ethernet? The standard for Ethernet is 802.3. 23. How did the idea for the Ethernet originate? The original idea for Ethernet grew out of the problem of allowing two or more hosts to use the same medium and prevent the signals from interfering with each other. This problem of multiple user access to a shared medium was studied in the early 1970s at the University of Hawaii. A system called Alohanet was developed to allow various stations on the Hawaiian Islands structured access to the shared radio frequency band in the atmosphere. 24. Success of Ethernet is due to what factors?

Simplicity and ease of maintenance Ability to incorporate new technologies (Mention in lecture that this is "Scalable") Reliability Low cost of installation and upgrade

25. What does scalable mean as it relates to Ethernet? All the standards are essentially compatible with the original Ethernet standard. An Ethernet frame could leave an older coax 10-Mbps NIC in a PC, be placed onto a 10-Gbps Ethernet fiber link, and end up at a 100-Mbps NIC. As long as the packet stays on Ethernet networks it is not changed. For this reason Ethernet is considered very scalable. The bandwidth of the network could be increased many times without changing the underlying Ethernet technology. 26. What network technologies are included in Ethernet? Legacy Fast Ethernet Gigabit Ethernet

64112471.doc

Page 32

Rev. 4/2004

27. How do Ethernet standards guarantee minimum bandwidth and operability? By specifying the maximum number of stations per segment, maximum segment length, maximum number of repeaters between stations, etc. Stations separated by repeaters are within the same collision domain. Stations separated by bridges or routers are in different collision domains. 28. Ethernet technologies have three part names. What do these parts stand for and mean? Example: 10BaseT

10 A number indicating the number of Mbps transmitted. Base The word base, indicating that baseband signaling is used. T One or more letters of the alphabet indicating the type of medium used (F= fiber optical cable, T = copper unshielded twisted pair).

29. What is baseband? What is broadband? Baseband: Ethernet relies on baseband signaling, which uses the entire bandwidth of the transmission medium. The data signal is transmitted directly over the transmission medium. Broadband: In broadband signaling, not used by Ethernet, the data signal is never placed directly on the transmission medium. An analog signal (carrier signal) is modulated by the data signal and the modulated carrier signal is transmitted. Radio broadcasts and cable TV use broadband signaling. 30. At what layers of the OSI model does Ethernet operate? Ethernet operates in two areas of the OSI model, the lower half of the data link layer (MAC), the entirety of Layer 1. 31. The data link layer is subdivided into what two sublayers? The Media Access Control (MAC) sublayer is concerned with the physical components that will be used to communicate the information. The Logical Link Control (LLC) sublayer remains relatively independent of the physical equipment that will be used for the communication process. 32. What are the two parts of a MAC address? The first six hexadecimal digits identify the manufacturer or vendor. This portion of the MAC address is known as the Organizational Unique Identifier (OUI). The remaining six hexadecimal digits represent the interface serial number, or another value administered by the specific equipment manufacturer.

64112471.doc

Page 33

Rev. 4/2004

33. How many bits is the MAC address? How many bytes is the MAC address? How many hex digits is the MAC address? Bits: Bytes: Hex: 48 6 12

34. Why are MAC addresses sometimes called BIA? MAC addresses are sometimes referred to as burned-in addresses (BIA) because they are burned into read-only memory (ROM) and are copied into random-access memory (RAM) when the NIC initializes. 35. What is a frame? A frame is the Layer 2 protocol data unit. 36. A single generic frame has sections called fields. Identify what each field does in a frame. Field A: Start Frame Field: beginning signaling sequence of bytes that says "Here I come". Field B: Address Field: All frames contain naming information, such as the name of the source node (MAC address) and the name of the destination node (MAC address). Field C: Type/Length Field: a length field specifies the exact length of a frame in bytes. Some frames have a type field, which specifies the Layer 3 protocol making the sending request. Field D: Data Field: gets upper layer data, ultimately the user application data, from the source to the destination. The data package has two parts, the user application data and the encapsulated bytes to be sent to the destination computer. Padding bytes may be added so frames have a minimum length for timing purposes. Field E: FCS Field: contains a number that is calculated by the source node based on the data in the frame. This FCS is then added to the end of the frame that is being sent. When the destination node receives the frame the FCS number is recalculated and compared with the FCS number included in the frame. If the two numbers are different, an error is assumed, the frame is discarded, and the source is asked to retransmit. 37. All frames contain what naming information? The name of the source address (MAC address) and the name of the destination address (MAC address)

64112471.doc

Page 34

Rev. 4/2004

38. In the type/length field


When is type used? early versions of DIX Ethernet When is length used? early versions of IEEE Ethernet versions When is type/length used? later IEEE versions of Ethernet The field labeled Length/Type was only listed as Length in the early IEEE versions and only as Type in the DIX version. These two uses of the field were officially combined in a later IEEE version, as both uses of the field were common throughout industry. MENTION IN LECTURE: At the data link layer the frame structure is nearly identical for all speeds of Ethernet from 10 Mbps to 10,000 Mbps

39. What designates a type/length field as Ethernet II? frame field size value is equal to or greater than 0x600 (hex) 40. List three common LAN technologies. Ethernet Token Ring FDDI 41. What is deterministic? Which LAN technologies are considered deterministic? deterministic (taking turns) Token Ring and FDDI MENTION IN LECTURE: Token Ring is a collisionless environment as only one host is able to transmit at any given time. 42. What is non-deterministic? Which LAN technologies are considered nondeterministic? non-deterministic (first come, first served). Ethernet 43. The access method CSMA/CD used in Ethernet performs what three functions? Transmitting and receiving data packets Decoding data packets and checking them for valid addresses Detecting errors within data packets or on the network

64112471.doc

Page 35

Rev. 4/2004

24. What happens when network devices detect a collision on the network media? When a collision occurs, each node that is transmitting will continue to transmit for a short time to ensure that all devices see the collision. Once all the devices have detected the collision, a backoff algorithm is invoked and transmission is stopped. The nodes stop transmitting for a random period of time (listen before transmit mode), which is different for each device. When the delay period expires, all devices on the network can attempt to gain access to the networking media. 25. Which sending device has priority after a collision has occurred? Neither of the devices have a priority. The backoff algorithm determines when the devices will retransmit. 26. What is the most common error condition on an Ethernet? The collision 27. What is slot time? The actual calculated slot time is just longer than the theoretical amount of time required to travel between the furthest points of the collision domain, collide with another transmission at the last possible instant, and then have the collision fragments return to the sending station and be detected. The time period just longer than the longest possible round trip when all options are at their maximum. Undefined on 10 Gigabit Ethernet. MENTION IN LECTURE: The reason half-duplex mode is not permitted on 10 Gigabit Ethernet is because transmission is completed before the sending station can be made aware of any collisions. 28. At what point would the MAC layer generate an error to the network layer? Why would it do so? If the MAC layer is unable to send the frame after sixteen attempts, it gives up and generates an error to the network layer. Such an occurrence is fairly rare and would happen only under extremely heavy network loads, or when a physical problem exists on the network. 29. How does a networking device know that there has been a collision? Networking devices detect a collision has occurred when the amplitude of the signal on the networking media increases.

64112471.doc

Page 36

Rev. 4/2004

30. List three types of collisions. Local collision Remote collision Late collision 31. Define the following:

Collision or runt Simultaneous transmission occurring before slot time has elapsed Late collision Simultaneous transmission occurring after slot time has elapsed Jabber, long frame and range errors Excessively or illegally long transmission Short frame, collision fragment or runt Illegally short transmission FCS error Corrupted transmission Alignment error Insufficient or excessive number of bits transmitted Range error Actual and reported number of octets in frame do not match Ghost or jabber Unusually long Preamble or Jam event

32. What is the maximum Ethernet frame size? 1518 Octets 33. What are a jabber and a long frame? A frame that is larger than 1518 Octets 34. What is a short frame? A frame that is less than 64 octets 35. Describe half-duplex. Information can travel in one direction at one time. 36. Describe full duplex. Information can travel in both directions at one time.

64112471.doc

Page 37

Rev. 4/2004

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 6 STUDY GUIDE 44. Define CSMA/CD. Carrier Sense Multiple Access with Collision Detection (CSMA/CD). 45. What is the standard for Ethernet? The standard for Ethernet is 802.3. 46. What network technologies are included in Ethernet? Legacy Fast Ethernet Gigabit Ethernet 47. At what layers of the OSI model does Ethernet operate? Ethernet operates in two areas of the OSI model, the lower half of the data link layer (MAC), the entirety of Layer 1. 48. The data link layer is subdivided into what to sublayers? The Media Access Control (MAC) sublayer is concerned with the physical components that will be used to communicate the information. The Logical Link Control (LLC) sublayer remains relatively independent of the physical equipment that will be used for the communication process. 49. What are the two parts of a MAC address? The first six hexadecimal digits identify the manufacturer or vendor. This portion of the MAC address is known as the Organizational Unique Identifier (OUI). The remaining six hexadecimal digits represent the interface serial number, or another value administered by the specific equipment manufacturer. 50. What is a frame? A frame is the Layer 2 protocol data unit. 51. All frames contain what naming information? The name of the source address (MAC address) and the name of the destination address (MAC address)

64112471.doc

Page 38

Rev. 4/2004

52. List three common LAN technologies. Ethernet Token Ring FDDI 53. The access method CSMA/CD used in Ethernet performs what three functions? Transmitting and receiving data packets Decoding data packets and checking them for valid addresses Detecting errors within data packets or on the network 11. What happens when network devices detect a collision on the network media? When a collision occurs, each node that is transmitting will continue to transmit for a short time to ensure that all devices see the collision. Once all the devices have detected the collision a backoff algorithm is invoked and transmission is stopped. The nodes stop transmitting for a random period of time, which is different for each device. When the delay period expires, all devices on the network can attempt to gain access to the networking media. 12. What is the most common error condition on an Ethernet? The collision 13. List three types of collisions. Local collision Remote collision Late collision 14. What is the maximum Ethernet frame size? 1518 Octets 15. What are a jabber and a long frame? A frames that is larger than 1518 Octets 16. What is a short frame? A frame that is less than 64 octets

64112471.doc

Page 39

Rev. 4/2004

17. Describe half-duplex. Information can travel in one direction at one time. 18. Describe full duplex. Information can travel in both directions at one time.

64112471.doc

Page 40

Rev. 4/2004

MODULE 7 STUDY GUIDE 54. Which forms of Ethernet are considered Legacy Ethernet? 10BASE2 10BASE5 10BASE-T 55. What do Legacy Ethernet technologies all have in common?
The four common features of Legacy Ethernet are timing parameters, frame format, transmission process, and a basic design rule.

56. What is the 5-4-3 Rule?


10-Mbps Ethernet operates within the timing limits offered by a series of not more than five segments separated by no more than four repeaters. This is known as the 5-4-3 rule. No more than four repeaters may be connected in series between any two distant stations. There can also be no more than three populated segments between any two distant stations.

57. What is the maximum length of a network segment for 10BASE5? 500 meters 58. What were the advantages of 10BASE5 at the time that it was prevalent?
10BASE5 systems are inexpensive and require no configuration

59. What are the disadvantages of 10BASE 5?


Basic components like NICs are very difficult to find as well as the fact that it is sensitive to signal reflections on the cable. 10BASE5 systems also represent a single point of failure.

60. What is the maximum length of a network segment for 10BASE2? 185 meters 61. What is the maximum transmission rate and duplex for 10BASE2 and 10BASE5? 10 Mbps and half-duplex 62. What are the differences in 10BASE2 and 10BASE5?
10BASE2 installation was easier because of its smaller size, lighter weight, and greater flexibility.

64112471.doc

Page 41

Rev. 4/2004

63. What are the similarities in 10BASE2 and 10BASE5?


Both use half-duplex. Both use Manchester encoding.

64. What is the maximum unrepeated length for a 10BASE-T network segment? 100 meters 65. What is required of a 10BASET network?
UTP cable uses eight-pin RJ-45 connectors. It is strongly recommended that any new cable installations be made with Category 5e or better. 10BASE-T links generally consist of a connection between the station and a hub or switch.

66. List the two technologies that are part of 100 Mbps Ethernet (Fast Ethernet). 100BASE-TX 100BASE-FX 67. List three Ethernet standards that support full duplex. 10BASE-T 100BASE-TX 100BASE-FX 68. What was the main purpose of 100BaseFX?
At the time copper-based Fast Ethernet was introduced, a fiber version was also desired. A fiber version could be used for backbone applications, connections between floors and buildings where copper is less desirable, and also in high noise environments. 100BASE-FX was introduced to satisfy this desire. (LECTURE: This will be confusing to students that read this paragraph

and try to answer the test as the answers look very similar: answer-->interbuilding backbone connectivity.) 69. Where do the differences between Ethernet, Fast Ethernet, and Gigabit Ethernet occur? The physical layer 70. What media can Gigabit Ethernet transmit on? Cat 5e Optical fiber 71. What is similar on all versions of Gigabit Ethernet?
The timing, frame format, and transmission are common to all versions of 1000 Mbps.

64112471.doc

Page 42

Rev. 4/2004

72. What could limit the bandwidth of a fiber based Ethernet network? (I couldn't find this in the reading.) emitter technology fiber manufacturing processes detector technology

73. How many wire pairs are used with 1000BASE-T? 4 pair 74. Gigabit Ethernet operates in what duplex mode? Full duplex 75. What is the next Ethernet technology beyond Gigabit Ethernet? 10 Gigabit Ethernet (10GbE) 76. What media supports 10 Gigabit Ethernet? Fiber optic 77. What future standards are being developed for Ethernet technology? 40 Gbps 100 Gbps 160 Gbps 78. What are the line encoding methods for the following: 10BaseT 100 Mbps Ethernet 1000Base X Manchester Encoding 4B/5B and the line encoding specific to copper or fiber 8B/10B and NRZ

79. What are some applications that use increased data transport speeds such as 1000Base-T? inter-switch links video streaming applications server to DAT backup drive links intra-building backbones

NOTE: my students would never get this correct as most don't have any idea what DAT is or an inter-switch link and I don't find it explained in the online curriculum.
64112471.doc Page 43 Rev. 4/2004

80. 27. What do the underlined portions of the technology represent? 10BaseT 100BaseTX 100BaseFX 1000BaseTX 1000BaseSX 1000BaseLX Twisted Pair Copper-based UTP Fast Ethernet Multi-mode Fiber-based Fast Ethernet Gigabit speed using Cat5 and all 4 pairs Short-wavelength uses an 850 nm laser or LED source in multimode optical fiber Long-wavelength 1310 nm laser source uses either single-mode or multimode optical fiber

1. For what applications would you use Gigabit Ethernet? general infrastructure needs high speed cross connects backbone installations

As Fast Ethernet was installed to increase bandwidth to workstations, this began to create bottlenecks upstream in the network. 1000BASE-T (IEEE 802.3ab) was developed to provide additional bandwidth to help alleviate these bottlenecks. It provided more "speed" for applications such as intra-building backbones, inter-switch links, server farms, and other wiring closet applications as well as connections for high-end workstations. Gigabit Ethernet standards are now the dominant technology for backbone installations, highspeed cross-connects, and general infrastructure needs.

2. Why is the Media Access Control method considered point to point in gigabit Ethernet?
Since separate fibers are used for transmitting (Tx) and receiving (Rx) the connection is inherently full duplex.

3. What devices can be used to interconnect a 1000Base-T network to a 100Base-T network? Layer 2 Bridge Switch

The differences between standard Ethernet, Fast Ethernet and Gigabit Ethernet occur at the physical layer.

4. 100BASE-TX cable between Class II repeaters may not exceed _____________ meters. 5. What is WWDM?
Complex serial bit streams are used for all versions of 10GbE except for 10GBASE-LX4, which uses Wide Wavelength Division Multiplex (WWDM) to multiplex four bit simultaneous bit streams as four wavelengths of light launched into the fiber at one time.

64112471.doc

Page 44

Rev. 4/2004

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 7 STUDY GUIDE 6. Which forms of Ethernet are considered Legacy Ethernet? 10BASE2 10BASE5 10BASE-T 7. What is the maximum length of a network segment for 10BASE5? 500 meters 8. What is the maximum length of a network segment for 10BASE2? 185 meters 9. What is the maximum transmission rate and duplex for 10BASE2 and 10BASE5? 10 Mbps and half-duplex 10. What is the maximum unrepeated length for a 10BASE-T network segment? 100 meters 11. List the two technologies that are part of 100 Mbps Ethernet (Fast Ethernet). 100BASE-TX 100BASE-FX 12. List three Ethernet standards that support full duplex. 10BASE-T 100BASE-TX 100BASE-FX 13. Where do the differences between Ethernet, Fast Ethernet, and Gigabit Ethernet occur? The physical layer 14. What media can Gigabit Ethernet transmit on? Cat 5e Optical fiber

64112471.doc

Page 45

Rev. 4/2004

15. How many wire pairs are used with 1000BASE-T? 4 pair 16. Gigabit Ethernet operates in what duplex mode? Full duplex 17. What is the next Ethernet technology beyond Gigabit Ethernet? 10 Gigabit Ethernet (10GbE) 18. What media supports 10 Gigabit Ethernet? Fiber optic 19. What future standards are being developed for Ethernet technology? 40 Gbps 100 Gbps 160 Gbps

64112471.doc

Page 46

Rev. 4/2004

MODULE 8 STUDY GUIDE 20. What does a bridge divide a network into?

Collision domains 21. What are layer 2 devices and why are they considered layer 2 devices?

Bridges and Switches: These devices use the MAC address for forwarding frames. 22. What is a switch?

A bridge with many ports 23. What is latency?

The delay between the time a frame first starts to leave a source device and the time the first part of the frame reaches the destination device. 24. List three switching modes and their definitions.

Cut through: A switch can start to transfer the frame as soon as the destination MAC address is received. Switching at this point is called cut-through switching and results in the lowest latency through the switch. However, no error checking is available. Store and forward: The switch can receive the entire frame before sending it out the destination port. This gives the switch software an opportunity to verify the Frame Check Sum (FCS) to ensure that the frame was reliably received before sending it to the destination. If the frame is found to be invalid, it is discarded at this switch rather than at the ultimate destination. Since the entire frame is stored before being forwarded, this mode is called store-and-forward. Fragment-Free: A compromise between the cut-through and store-and-forward modes is the fragment-free mode. Fragment-free reads the first 64 bytes, which includes the frame header, and switching begins before the entire data field and checksum are read. This mode verifies the reliability of the addressing and Logical Link Control (LLC) protocol information to ensure the destination and handling of the data will be correct. 25. Which switch modes have a fixed latency time?

Cut through and fragment free

64112471.doc

Page 47

Rev. 4/2004

26.

What does asymmetric switching provide?

Asymmetric switching provides connections between ports of unlike bandwidths. 27. What is synchronous switching?

The source port and the destination port operate at the same bit rate. 28. What is asynchronous switching?

The source port and the destination port operate at different bit rates. 29. What is STP?

Spanning-Tree Protocol used to prevent switching loops. 30. What is the purpose of the BPDUs?

Each switch in a LAN using STP sends special messages called Bridge Protocol Data Units (BPDUs) out all its ports to let other switches know of its existence and to elect a root bridge for the network. The switches then use the Spanning-Tree Algorithm (STA) to resolve and shut down the redundant paths. 31. What are the five states for a port on a switch using Spanning-Tree Protocol? Blocking Listening Learning Forwarding Disabled 32. List the order as a port moves through the five states.

From initialization to blocking From blocking to listening or to disabled From listening to learning or to disabled From learning to forwarding or to disabled From forwarding to disabled

64112471.doc

Page 48

Rev. 4/2004

33.

Fill in the following table on how layers affect collision domains. What happens to the collision domain at each layer? Breaks up collision domain: Layer 3 devices, like Layer 2 devices, do not forward collisions. Because of this, the use of Layer 3 Network

devices in a network has the effect of breaking up collision domains into smaller domains.

Data Link

Breaks up collision domain: Layer 2 devices segment or divide


collision domains. Controlling frame propagation using the MAC address assigned to every Ethernet device performs this function. Layer 2 devices, bridges, and switches, keep track of the MAC addresses and which segment they are on. One collision domain: Simply put, Layer 1 devices extend collision domains, but the length of a LAN can also be overextended and cause other collision issues.

Physical

34.

Define the following network types:

Shared media environment Occurs when multiple hosts have access to the same medium. For example, if several PCs are attached to the same physical wire, optical fiber, or share the same airspace, they all share the same media environment. Extended shared media environment Is a special type of shared media environment in which networking devices can extend the environment so that it can accommodate multiple access or longer cable distances. Point-to-point network environment Is widely used in dialup network connections and is the most familiar to the home user. It is a shared networking environment in which one device is connected to only one other device, such as connecting a computer to an Internet service provider by modem and a phone line.

35.

What is the Four Repeater Rule?

The four repeater rule in Ethernet states that no more than four repeaters or repeating hubs can be between any two computers on the network. 36. What guidelines should not be exceeded with the 5-4-3-2-1 rule?

Five segments of network media Four repeaters or hubs Three host segments of the network Two link sections (no hosts) One large collision domain

64112471.doc

Page 49

Rev. 4/2004

37.

What is a broadcast?

When a node needs to communicate with all hosts on the network, it sends a broadcast frame with a destination MAC address 0xFFFFFFFFFFFF. This is an address to which the network interface card (NIC) of every host must respond. Workstations broadcast an Address Resolution Protocol (ARP) request every time they need to locate a MAC address that is not in the ARP table. Broadcast storms can be caused by a device requesting information from a network that has grown too large. So many responses are sent to the original request that the device cannot process them, or the first request triggers similar requests from other devices that effectively block normal traffic flow on the network. Every 30 seconds, RIPv1 uses broadcasts to retransmit the entire RIP routing table to other RIP routers. Although multicasting is an efficient way to send a stream of multimedia data to many users on a shared-media hub, it affects every user on a flat switched network. A particular packet video application can generate a seven megabyte (MB) stream of multicast data that, in a switched network, would be sent to every segment, resulting in severe congestion.Broadcasts have to be controlled at Layer 3, as Layer 2 and Layer 1 devices have no way of controlling them.

38.

What is the broadcast address for layer 2?

0xFFFFFFFFFFFF 39. What is a broadcast domain?

A broadcast domain is a grouping of collision domains that are connected by Layer 2 devices. 40. Router 41. Layer 3 forwarding is based on the _____destination IP address________ and not the MAC address. For a packet to be forwarded it must contain an IP address that is outside of the range of addresses assigned to the LAN and the router must have a destination to send the specific packet to in its routing table. 42. How does adding a bridge to a network affect collision and broadcast domains? Collision: Increases the number of collision domains. Broadcast: No change in the broadcast domain. What device breaks up a broadcast domain?

64112471.doc

Page 50

Rev. 4/2004

43.

What is segmentation?

Breaking up, or increasing the number of collision domains with Layer 2 and 3 devices is also known as segmentation.

44.

What are the three definitions of segment?

1. Section of a network that is bounded by bridges, routers, or switches. 2. In a LAN using a bus topology, a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. Term used in the TCP specification to describe a single transport layer unit of information. The terms datagram, frame, message, and packet are also used to describe logical information groupings at various layers of the OSI reference model and in various technology circles

LECTURE NOTES ON DATA FLOW: A good rule to follow is that a Layer 1 device always
forwards the frame, while a Layer 2 device wants to forward the frame. In other words, a Layer 2 device will forward the frame unless something prevents it from doing so. A Layer 3 device will not forward the frame unless it has to. Using this rule will help identify how data flows through a network. Layer 1 devices do no filtering, so everything that is received is passed on to the next segment. The frame is simply regenerated and retimed and thus returned to its original transmission quality. Any segments connected by Layer 1 devices are part of the same domain, both collision and broadcast. Layer 2 devices filter data frames based on the destination MAC address. A frame is forwarded if it is going to an unknown destination outside the collision domain. The frame will also be forwarded if it is a broadcast, multicast, or a unicast going outside of the local collision domain. The only time that a frame is not forwarded is when the Layer 2 device finds that the sending host and the receiving host are in the same collision domain. A Layer 2 device, such as a bridge, creates multiple collision domains but maintains only one broadcast domain. Layer 3 devices filter data packets based on IP destination address. The only way that a packet will be forwarded is if its destination IP address is outside of the broadcast domain and the router has an identified location to send the packet. A Layer 3 device creates multiple collision and broadcast domains. Data flow through a routed IP based network, involves data moving across traffic management devices at Layers 1, 2, and 3 of the OSI model. Layer 1 is used for transmission across the physical media, Layer 2 for collision domain management, and Layer 3 for broadcast domain management.

64112471.doc

Page 51

Rev. 4/2004

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 8 STUDY GUIDE 45. What does a bridge divide a network into? Collision domains 46. At what OSI layer does a bridge operate at? Layer 2 47. What is a switch? A bridge with many ports 48. What is latency? The delay between the time a frame first starts to leave a source device and the time the first part of the frame reaches the destination device. 49. List two switching modes. Cut through Store and forward 50. What does asymmetric switching provide? Asymmetric switching provides connections between ports of unlike bandwidths. 51. What is synchronous switching? The source port and the destination port operate at the same bit rate. 52. What is asynchronous switching? The source port and the destination port operate at different bit rates. 53. What is STP? Spanning-Tree Protocol used to prevent switching loops

64112471.doc

Page 52

Rev. 4/2004

54. What are the five states for a port on a switch using Spanning-Tree Protocol? Blocking Listening Learning Forwarding Disabled 55. List the order as a port moves through the five states. From initialization to blocking From blocking to listening or to disabled From listening to learning or to disabled From learning to forwarding or to disabled From forwarding to disabled 56. Fill in the following table on how layers affect collision domains. Network Data Link Physical What happens to collision domain? Breaks up collision domain Breaks up collision domain One collision domain

57. What is the Four Repeater Rule? The four repeater rule in Ethernet states that no more than four repeaters or repeating hubs can be between any two computers on the network. 58. What guidelines should not be exceeded with the 5-4-3-2-1 rule? Five segments of network media Four repeaters or hubs Three host segments of the network Two link sections (no hosts) One large collision domain 59. What is the broadcast address for layer 2? 0xFFFFFFFFFFFF 60. What is a broadcast domain? A broadcast domain is a grouping of collision domains that are connected by Layer 2 devices.

64112471.doc

Page 53

Rev. 4/2004

61. What device breaks up a broadcast domain? Router

64112471.doc

Page 54

Rev. 4/2004

MODULE 9 STUDY GUIDE 62. Who created the TCP/IP reference model? U.S. Department of Defense 63. At what layer of the TCP/IP model do FTP, NFS, and DNS work? Application layer 64. At what layer of the TCP/IP model do TCP and UDP work? Transport layer 65. What are considered TCP and UDP Services?
TCP and UDP Segmenting upper-layer application data Sending segments from one end device to another end device

5. What are considered TCP Only Services?


TCP only Establishing end-to-end operations Flow control provided by sliding windows Reliability provided by sequence numbers and acknowledgments

6. What protocols and their function is at the Internet layer of the TCP/IP model?
IP provides connectionless, best-effort delivery routing of packets. IP is not concerned with the content of the packets but looks for a path to the destination. Internet Control Message Protocol (ICMP) provides control and messaging capabilities. Address Resolution Protocol (ARP) determines the data link layer address, MAC address, for known IP addresses. Reverse Address Resolution Protocol (RARP) determines IP addresses when the MAC address is known.

64112471.doc

Page 55

Rev. 4/2004

7. What are the operations of IP?


Defines a packet and an addressing scheme Transfers data between the Internet layer and network access layers Routes packets to remote hosts

8. In _________________ the standardization of a new generation of IP, often called IPng, was supported by the Internet Engineering Task Force (IETF). IPng is now known as _________________. 1992 , IPv6 9. Name four protocols that work at the Internet layer of TCP/IP. Internet Protocol (IP) Internet Control Message Protocol (ICMP) Address Resolution Protocol (ARP) Reverse Address Resolution Protocol (RARP) 10. At what layer of the TCP/IP model does Ethernet exist? Network Access layer 11. The Internet is developed by what standards? TCP/IP protocols 12. How is an IP address stored inside a computer? As a 32-bit sequence of 1s and 0s 13. What are four ways that the addressing scheme of IP addresses is being expanded?
Subnetting, Network Address Translation (NAT) and private addressing are used to extend IP addressing without exhausting the supply. Another version of IP known as IPv6 improves on the current version providing a much larger address space, integrating or eliminating the methods used to work with the shortcomings of IPv4.

14. What is dotted decimal notation? Writing the binary IP address in decimal

64112471.doc

Page 56

Rev. 4/2004

15. TCP/IP and OSI Layer Relationship. Fill in the following table. State what each layer is responsible for. Application: The application
layer of the TCP/IP model handles high-level protocols, issues of representation, encoding, and dialog control.

Application Presentation Session

Transport: The transport


layer provides transport services from the source host to the destination host. The transport layer constitutes a logical connection between the endpoints of the network, the sending host and the receiving host. The transport layer sends data packets from the sending source to the receiving destination through the cloud. Internet: The purpose of the Internet layer is to select the best path through the network for packets to travel. Network Access: The network access layer is also called the host-to-network layer. It includes the LAN and WAN technology details, and all the details contained in the OSI physical and data-link layers. Based upon the hardware type and the network interface, the network access layer will define the connection with the physical network media.

Transport

Network Data Link

Physical

16. The ___________________________ is used as a guide for understanding the communication process. 17. Fill in the following table for IP address classes Address Class Class A Class B Class C Number of Networks 127 16,384 2,097,152 Number of hosts per network 16,777,216 65,535 254

64112471.doc

Page 57

Rev. 4/2004

64112471.doc

Page 58

Rev. 4/2004

18. Fill in the following table identifying address classes IP Address Class Class A Class B Class C High Order Bits 0 10 110 First Octet Address Range 0-127 128-191 192-223 Number of Bits in the Network Address 8 16 24

19. An IP address is composed of what two parts? Network and host 20. Fill in the private IP addresses for each class. Class A Class B Class C RFC 1918 internal address range 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255

21. What is subnetting? A method of dividing full network address classes into smaller pieces. 22. How many usable hosts are on a Class C address? 254 23. What happens if two host computers have the same IP address with the same subnet mask? One or both host computers may not operate correctly 24. List two examples of devices that need static IP addresses? Server Network printer 25. What information is found in the ARP table? IP and MAC addresses of other devices on the same LAN.

64112471.doc

Page 59

Rev. 4/2004

26. What does Reverse Address Resolution Protocol (RARP) do? Reverse Address Resolution Protocol (RARP) associates a known MAC addresses with an IP addresses.
In this example, the source device knows its own MAC address but is unable to locate its own IP address in the ARP table. The source device must include both its MAC address and IP address in order for the destination device to retrieve data, pass it to higher layers of the OSI model, and respond to the originating device. Therefore, the source initiates a process called a RARP request. This request helps the source device detect its own IP address. RARP requests are broadcast onto the LAN and are responded to by the RARP server which is usually a router.

27. What are the disadvantages of BOOTP?


It was not designed to provide dynamic address assignment. The administrator must add hosts and maintain the BOOTP database. For every host on the network there must be a BOOTP profile with an IP address assignment in it. No two profiles can have the same IP address. Those profiles might be used at the same time and that would mean that two hosts have the same IP address.

28. What are the advantages of DHCP?


The major advantage that DHCP has over BOOTP is that it allows users to be mobile. It is no longer required to keep a fixed profile for every device attached to the network as was required with the BOOTP system. This means that DHCP offers a one to many ratio of IP addresses and that an address is available to anyone who connects to the network.

29. What does DHCP stand for and what does it do? Dynamic host configuration protocol (DHCP). DHCP allows a host to obtain an IP address dynamically without the network administrator having to set up an individual profile for each device. 30. What is Proxy ARP?
TCP/IP has a variation on ARP called Proxy ARP that will provide the MAC address of an intermediate device for transmission outside the LAN to another network segment.

Proxy ARP is a variation of the ARP protocol. In this variation, a router sends an ARP response with the MAC address of the interface on which the request was received, to the requesting host. The router responds with the MAC addresses for those requests in which the IP address is not in the range of addresses of the local subnet. Another method to send data to the address of a device that is on another network segment is to set up a default gateway. The default gateway is a host option where the IP address of the router interface is stored in the network configuration of the host. The source host compares the destination IP address and its own IP address to determine if the two IP addresses are located on the same segment. If the receiving host is not on the same segment, the source host sends the

64112471.doc

Page 60

Rev. 4/2004

data using the actual IP address of the destination and the MAC address of the router. The MAC address for the router was learned from the ARP table by using the IP address of that router. If the default gateway on the host or the proxy ARP feature on the router is not configured, no traffic can leave the local area network. One or the other is required to have a connection outside of the local area network.

31. What is ARP?


There needs to be a way to automatically map IP to MAC addresses. It would be too time consuming for the user to create the maps manually. The TCP/IP suite has a protocol, called Address Resolution Protocol (ARP), which can automatically obtain MAC addresses for local transmission.

When a source determines the IP address for a destination, it then consults the ARP table in order to locate the MAC address for the destination. If the source locates an entry in its table, destination IP address to destination MAC address, it will associate the IP address to the MAC address and then uses it to encapsulate the data. The data packet is then sent out over the networking media to be picked up by the destination device. The computer that requires an IP and MAC address pair broadcasts an ARP request. All the other devices on the local area network analyze this request. If one of the local devices matches the IP address of the request, it sends back an ARP reply that contains its IP-MAC pair. If the IP address is for the local area network and the computer does not exist or is turned off, there is no response to the ARP request. In this situation, the source device reports an error. If the request is for a different IP network, there is another process that can be used.

64112471.doc

Page 61

Rev. 4/2004

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 9 STUDY GUIDE 66. Who created the TCP/IP reference model? U.S. Department of Defense 67. At what layer of the TCP/IP model do FTP, NFS, and DNS work? Application layer 68. At what layer of the TCP/IP model do TCP and UDP work? Transport layer 69. Name four protocols that work at the Internet layer of TCP/IP. Internet Protocol (IP) Internet Control Message Protocol (ICMP) Address Resolution Protocol (ARP) Reverse Address Resolution Protocol (RARP) 70. At what layer of the TCP/IP model does Ethernet exist? Network Access layer 71. The Internet is developed by what standards? TCP/IP protocols 72. How is an IP address stored inside a computer? As a 32-bit sequence of 1s and 0s 73. What is dotted decimal notation? Writing the binary IP address in decimal 74. Fill in the following table for IP address classes Address Class Class A Class B Number of Networks 127 16,384 Number of hosts per network 16,777,216 65,535

64112471.doc

Page 62

Rev. 4/2004

Class C 2,097,152 254 75. Fill in the following table identifying address classes IP Address Class Class A Class B Class C High Order Bits 0 10 110 First Octet Address Range 0-127 128-191 192-223 Number of Bits in the Network Address 8 16 24

76. An IP address is composed of what two parts? Network and host 77. Fill in the private IP addresses for each class. Class A Class B Class C RFC 1918 internal address range 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255

78. What is subnetting? A method of dividing full network address classes into smaller pieces. 79. How many usable hosts are on a Class C address? 254 80. What happens if two host computers have the same IP address with the same subnet mask? One or both host computers may not operate correctly 81. List two examples of devices that need static IP addresses? Server Network printer 82. What does Reverse Address Resolution Protocol (RARP) do? Reverse Address Resolution Protocol (RARP) associates a known MAC addresses with an IP addresses.

64112471.doc

Page 63

Rev. 4/2004

18. What does DHCP stand for and what does it do? Dynamic host configuration protocol (DHCP). DHCP allows a host to obtain an IP address dynamically without the network administrator having to set up an individual profile for each device.

64112471.doc

Page 64

Rev. 4/2004

MODULE 10 STUDY GUIDE 83. What does a protocol describe?

1 The format that a message must conform to 2 The way in which computers must exchange a message within the context of a particular activity 84. IP is a connectionless delivery protocol. What does connectionless mean in regards to networking? Connectionless means that there is not a dedicated circuit connecting one computer to another. 85. List two types of network delivery services?

Connectionless Connection-oriented 86. Connectionless network processes are often referred to as _________________ processes and operates at the _________________ layer of the OSI model. Packet switched; network 87. Connection-oriented network processes are often referred to as ________________ processes and operates at the _________________layer of the OSI model. Circuit switched; transport 88. At what layer of the OSI model does a router operate?

Network Layer 3 89. What is the procedure used by the router in determination of where to send a packet?
As a frame is received at a router interface, the destination MAC address is extracted. The address is checked to see if the frame is directly addressed to the router interface, or if it is a broadcast. In either of these two cases, the frame is accepted. Otherwise, the frame is discarded since it is destined for another device on the collision domain. The accepted frame has the Cyclic Redundancy Check (CRC) information extracted from the frame trailer, and calculated to verify that the frame data is without error. If the check fails, the frame is discarded. If the check is valid, the frame header and trailer are removed and the packet is passed up to Layer 3. The packet is then checked to see if it is actually destined for the router, or if it is to be routed to another device in the internetwork. If the destination IP address matches one of the router ports, the Layer 3 header is

64112471.doc

Page 65

Rev. 4/2004

removed and the data is passed up to the Layer 4. If the packet is to be routed, the destination IP address will be compared to the routing table. If a match is found or there is a default route, the packet will be sent to the interface specified in the matched routing table statement. When the packet is switched to the outgoing interface, a new CRC value is added as a frame trailer, and the proper frame header is added to the packet. The frame is then transmitted to the next broadcast domain on its trip to the final destination. The following process is used during path determination for every packet that is routed: The destination address is obtained from the packet. The mask of the first entry in the routing table is applied to the destination address. The masked destination and the routing table entry are compared. If there is a match, the packet is forwarded to the port that is associated with that table entry. If there is not a match, the next entry in the table is checked. If the packet does not match any entries in the table, the router checks to see if a default route has been set. If a default route has been set, the packet is forwarded to the associated port. A default route is a route that is configured by the network administrator as the route to use if there are no matches in the routing table. If there is no default route, the packet is discarded. Usually a message is sent back to the sending device indicating that the destination was unreachable.

90.

Fill in the router and switch feature comparison table. Features Speed OSI Layer Addressing used Broadcasts Security Router Slower Layer 3 IP Blocks Higher Switch Faster Layer 2 MAC Forwards Lower

91.

What does the IP header consist of?

Version Indicates the version of IP currently used; four bits. If the version field is different than the IP version of the receiving device, that device will reject the packets. IP header length (HLEN) Indicates the datagram header length in 32-bit words. This is the total length of all header information, accounting for the two variable-length header fields. Type-of-service (TOS) Specifies the level of importance that has been assigned by a particular upper-layer protocol, eight bits. Total length Specifies the length of the entire packet in bytes, including data and header, 16 bits. To get the length of the data payload subtract the HLEN from the total length. Identification Contains an integer that identifies the current datagram, 16 bits. This is the sequence number. Flags A three-bit field in which the two low-order bits control fragmentation. One bit specifies whether the packet can be fragmented, and the other specifies whether the packet is the last fragment in a series of fragmented packets. Fragment offset Used to help piece together datagram fragments, 13 bits. This field allows the previous field to end on a 16-bit boundary.

64112471.doc

Page 66

Rev. 4/2004

Time-to-live (TTL) A field that specifies the number of hops a packet may travel. This number is decreased by one as the packet travels through a router. When the counter reaches zero the packet is discarded. This prevents packets from looping endlessly. Protocol indicates which upper-layer protocol, such as TCP or UDP, receives incoming packets after IP processing has been completed, eight bits. Header checksum helps ensure IP header integrity, 16 bits. Source address specifies the sending node IP address, 32 bits. Destination address specifies the receiving node IP address, 32 bits. Options allows IP to support various options, such as security, variable length. Padding extra zeros are added to this field to ensure that the IP header is always a multiple of 32 bits. Data contains upper-layer information, variable length up to 64 Kb.

92.

What are the routing metrics and what do they mean?

Metrics can be based on a single characteristic of a path, or can be calculated based on several characteristics. The following are the metrics that are most commonly used by routing protocols: Bandwidth The data capacity of a link. Normally, a 10-Mbps Ethernet link is preferable to a 64kbps leased line. Delay The length of time required to move a packet along each link from source to destination. Delay depends on the bandwidth of intermediate links, the amount of data that can be temporarily stored at each router, network congestion, and physical distance. Load The amount of activity on a network resource such as a router or a link. Reliability Usually a reference to the error rate of each network link. Hop count The number of routers that a packet must travel through before reaching its destination. Each router the data must pass through is equal to one hop. A path that has a hop count of four indicates that data traveling along that path would have to pass through four routers before reaching its final destination. If multiple paths are available to a destination, the path with the least number of hops is preferred. Ticks The delay on a data link using IBM PC clock ticks. One tick is approximately 1/18 second. Cost An arbitrary value, usually based on bandwidth, monetary expense, or other measurement, that is assigned by a network administrator.

64112471.doc

Page 67

Rev. 4/2004

11. What are the functions of routing protocols?


Routers must maintain routing tables and make sure other routers know of changes in the network topology. This function is performed using a routing protocol to communicate network information with other routers. When packets arrive at an interface, the router must use the routing table to determine where to send them. The router switches the packets to the appropriate interface, adds the necessary framing information for the interface, and then transmits the frame.

12. What is path determination at the network layer?


When packets arrive at an interface, the router must use the routing table to determine where to send them.

13. What is the difference in routable and non-routable protocols and give examples of each.
This course focuses on the most common routable protocol, which is the Internet Protocol (IP). Other examples of routable protocols include IPX/SPX and AppleTalk. These protocols provide Layer 3 support. Non-routable protocols do not provide Layer 3 support. The most common non-routable protocol is NetBEUI. NetBEUI is a small, fast, and efficient protocol that is limited to frame delivery within one segment.

14.What is the difference in routED and routING protocols?


A routed protocol functions include the following: Includes any network protocol suite that provides enough information in its network layer address to allow a router to forward it to the next device and ultimately to its destination. Defines the format and use of the fields within a packet

Routers use routing protocols to exchange routing tables and share routing information. In other words, routing protocols enable routers to route routed protocols. A routing protocol functions includes the following: Provides processes for sharing route information Allows routers to communicate with other routers to update and maintain the routing tables

15.What is encapsulation and de-encapsulation process as it relates to a router?

64112471.doc

Page 68

Rev. 4/2004

This process breaks up the data stream into segments, adds the appropriate headers and trailers then transmits the data. The de-encapsulation process is the opposite process, removing the headers and trailers, then recombining the data into a seamless stream.

64112471.doc

Page 69

Rev. 4/2004

16.List several routing protocols Routing Information Protocol RIP Interior Gateway Routing Protocol IGRP Open Shortest Path First OSPF Border Gateway Protocol BGP Enhanced IGRP - EIGRP 17.List several routed protocols. Internet Protocol IP Internetwork Packet Exchange IPX DECnet AppleTalk Banyan VINES Xerox Network Systems - XNS 18.At what layer of the OSI model does path determination operate? Network layer 3 19.Routers use _________ protocols to build and maintain routing tables that contain route information. Routing 20.List the two families of routing protocols. Interior Gateway Protocols (IGP) Exterior Gateway Protocols (EGP) 21.List five interior gateway protocols. RIP RIPv2 EIGRP OSPF IS-IS 22.List an exterior gateway protocol. BGP 23.List three examples of distance-vector protocols. RIP(routing information protocol) (uses hop count only as its metric) IGRP(interior gateway routing protocol) (Cisco proprietary)

64112471.doc

Page 70

Rev. 4/2004

EIGRP (enhanced interior gateway routing protocol) (advanced distance vector hybrid distance vector and link state) 24. List two examples of link-state protocols. OSPF IS-IS 25.Why do we subnet?
subnetting enables the net work administrator to provide broadcast containment (smaller broadcast domains) low-level security on the LAN manageability (by having increased address flexibility)

64112471.doc

Page 71

Rev. 4/2004

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 10 STUDY GUIDE 93. What does a protocol describe? 1 The format that a message must conform to 2 The way in which computers must exchange a message within the context of a particular activity 94. IP is a connectionless delivery protocol. What does connectionless mean in regards to networking? Connectionless means that there is not a dedicated circuit connecting one computer to another. 95. List two types of network delivery services? Connectionless Connection-oriented 96. Connectionless network processes are often referred to as _________________ processes. Packet switched 97. Connection-oriented network processes are often referred to as ________________ processes. Circuit switched 98. At what layer of the OSI model does a router operate? Network Layer 3 99. Fill in the router and switch feature comparison table. Features Speed OSI Layer Addressing used Broadcasts Security Router Slower Layer 3 IP Blocks Higher Switch Faster Layer 2 MAC Forwards Lower

64112471.doc

Page 72

Rev. 4/2004

100.

What doing routed protocols do? Routed protocols transport data across a network

101.

What doing routing protocols do? Routing protocols allow routers to choose the best path for data from source to destination

102.

List several routing protocols Routing Information Protocol RIP Interior Gateway Routing Protocol IGRP Open Shortest Path First OSPF Border Gateway Protocol BGP Enhanced IGRP - EIGRP

103.

List several routed protocols. Internet Protocol IP Internetwork Packet Exchange IPX DECnet AppleTalk Banyan VINES Xerox Network Systems - XNS

104.

At what layer of the OSI model does path determination operate? Network layer 3

105. Routers use _________ protocols to build and maintain routing tables that contain route information. Routing 106. List the two families of routing protocols. Interior Gateway Protocols (IGP) Exterior Gateway Protocols (EGP)

64112471.doc

Page 73

Rev. 4/2004

107.

List five interior gateway protocols. RIP RIPv2 EIGRP OSPF IS-IS

108.

List an exterior gateway protocol. BGP

109.

List three examples of distance-vector protocols. RIP IGRP EIGRP

18. List two examples of link-state protocols. OSPF IS-IS

64112471.doc

Page 74

Rev. 4/2004

CED253 INTERNETWORKING I, Ver. 3.0 MODULE 11 STUDY GUIDE 110. What are the primary duties of the transport layer of the OSI model? Transport and regulate the flow of information from one source to another reliably and accurately. 111. TCP requires connection establishment before data transfer begins. What is the exchange called TCP uses to establish a connection? Three-way handshake 112. What flow control mechanism does TCP use? Windowing 113. What is one technique TCP uses to guarantee reliable delivery? Positive acknowledgement with retransmission 114. What protocols use TCP? FTP HTTP SMTP Telnet 115. What does UDP stand for? User Datagram Protocol (UDP) 116. What protocol is connectionless and exchanges datagrams without acknowledgements or guaranteed delivery? User Datagram Protocol (UDP) 117. What does TCP stand for? Transmission Control Protocol (TCP)

64112471.doc

Page 75

Rev. 4/2004

118.

What protocols use UDP? TFTP SNMP DHCP DNS

119.

Fill in the following table for common port number assignments Port Number 21 23 25 53 69 80 Description FTP Telnet SMTP DNS TFTP HTTP

120.

Fill in the following table for port number ranges. Description Well-known port numbers Dynamically assigned port numbers Registered port numbers for vendor specific applications Range Numbers below 1024 Numbers above 1024 Most of these numbers are above 1024

121.

Fill in the following table on how layers affect collision domains. Network Data Link Physical What happens to collision domain? Breaks up collision domain Breaks up collision domain One collision domain

122.

List five world wide generic domains. .edu .com .gov .org .net

64112471.doc

Page 76

Rev. 4/2004

123.

What is the main purpose of FTP? The main purpose of FTP is to transfer files from one computer to another by copying and moving files from servers to clients, and from clients to servers.

124.

The World Wide Web uses the _______________ protocol? HTTP Hypertext Transfer Protocol

125.

What protocol is used to send and receive email? Simple Mail Transfer Protocol (SMTP)

126.

What layer of the TCP/IP model does Telnet operate? Application layer

64112471.doc

Page 77

Rev. 4/2004

Anda mungkin juga menyukai