Download 1.List The OSI Layers and Explain what each Layer Does? Physical

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Asynchronous Transfer Mode wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

CAN bus wikipedia , lookup

Deep packet inspection wikipedia , lookup

Network tap wikipedia , lookup

AppleTalk wikipedia , lookup

Airborne Networking wikipedia , lookup

Computer network wikipedia , lookup

IEEE 1355 wikipedia , lookup

Wake-on-LAN wikipedia , lookup

I²C wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Internet protocol suite wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
1.List The OSI Layers and Explain what each Layer Does?
Physical-Physical topology
Data link-Framing
Network-routing
Transport-End to end connection
Session-Dialog control
Presentation-Data encryption, compression, and translation services
Application-File, print,message,database,and application services
2.What is Connection-Oriented Protocol mean? A protocol that establishes a connection
between two hosts before transmitting data, and verifies receipt before closing the
connection between the hosts. TCP is an example of a connection-oriented protocol.
3..Explain Call Setup, Data Transfer, & Call Termination in reference to
Connection-Oriented protocol? call set up- transmitting device first establishes a
connection-orientated session with its peer system, data transfer-data is transferred next,
following that a call termination takes place to tear down the virtual circuit
4.What does Connectionless Communication mean and what protocol(s) does it apply
to?
5. What was the OSI reference model originally developed For?so computers could
communicate with each other reguardless of the manufacturer . Was made to help
vendors create interoperable network devices and software in the form of protocols so
that different vendor networks could work with each other.
6. The Network Layer has Four Characteristics, List the four and explain each?
7. What is the Network layer data unit called?
8. What are the 2 Sub layers Of the Data link Layer?Logical Link, Media Access
9. Code formatting and data translation take place in which layer of the OSI model?
Presentation Layer
10. What are the 3 phases of connection-oriented communication? Transmitting device
establishes connection orientated session with its peer system(call setup), data is
transferred, call termination takes place to tear down virtual circuit.
a.connection agreement
b.acknowledge request, establish connection parameters
c. notifies destination host that the connection agreement has been accepted and that
actual connection has been established. Data transfer can now begin
11. What OSI layer does subnetting take place?Networl Layer
12. What is a disadvantage of connection-oriented protocol?more overhead is used than
in connectionless
13.What is the advantages of connectionless protocol? faster transfers(UDP)
14.Is TCP reliable? Explain.yes. Created by department of defense to ensure and
preserve data integrity, as well as maintain communications in war, therefore if designed
and implemented correctly, it is very dependable
15. Is UDP Reliable? Explain. No, does not sequence the segments, and does not care in
which order the segments arrive at the destination.UDP sends segments off and forgets
about them. Doesn’t follow through or check up on them. UDP also does not create a
virtual circuit
Data Link & Network Addressing
1. What is a MAC Address & why are they uniquely identified?Media Access control
2. A MAC Addresses is ( what kind of number)?
3. Give a example of a MAC Address from 3COM
4. When and Where are MAC Addresses copied in to the CPU?
5. What is used to transmit a frame from one interface to another?
6. What is the Encapsulation process and where does it occur in the OSI model?
7. What is a IP Address?.numeric identifier assigned to each machine on an IP
network.Designates the specific location of a device on the network
8. How many parts is there to a network address and what are they?node address, host
address
9. What is the benefits of the OSI layered Model? List at least four examples
10. Define Tunneling?- a method of avoiding protocol restrictions by wrapping packets
from one protocol in another protocol’s frame and transmitting the encapsulated packet
over a network that supports the wrapper protocal
11. What is the Correct order of Encapsulation?
12. What happens when data arrives faster then the machine can handle it?
13. In flow control, a host that transmits all O's means?
14. What is the bit pattern of a class A Address?00000001-01111111
15. What is the bit pattern of a class B Address?11000000-1101111
TCP/IP
Hint: Remember CISCO uses classfull Addressing. Class A, B, C. The following
questions assume you understand that the mask bits for the subnet are added to the
default mask!
1.What are the Private IP addresses?
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
10.0.0.0 - 10.255.255.255
2.List the class A addresses? 1-127
3.List the Class B Addresses? 128-191
4.List the Class C Addresses?192-233
5.What is the Default class A Mask?255.0.0.0
6.What is the Default class B Mask?255.255.0.0
7.What is the Default class C Mask?255.255.255.0
8.List the three High order bits for Class A, B, C?A-0,
B-10,C-110
9. What is the command to configure an IP address on a interface on the Cisco
router?config t
int s0
ip address
10.What is the binary values for the first octet in a class be address?10000000
11. If you have a class B IP network with a 10 bit subnet-mask, How many Subnets and
hosts can you have? Hint: do not forget the 16 bits in the default mask67,108,862
subnets, 62 hosts
12. You have a IP address of 172.16.13.5 with a mask of 255.255.255.128, What is the
network ID and what is the range of host addresses?Network Id-172.16.0.0
Host Range-0.129-0.254
13. You have a mask of 255.255.255.248 in a class B network, How many Networks and
how many hosts do you have?hosts-6
30 subnets
14. You have a 11 bit mask with 172.16.3.57, What is the network ID range of subnet
addresses, and broadcast address?172.16.32.0-172.16.63.254,
broadcast172.16.63.255
15. What is the largest possible number of subnets with up to 12 hosts on each subnet
can you have with the following 192.158.17.0? 1,048,574
16. What is the range of class D addresses (Multi-cast)? 224-239
Managing Configuration Files
1. Define the Following Terms
Configuration Terminal- puts you in global configuration mode and allows changes to the
running configuration
Configuration Memory- copies the startup-config to running config
Configuration Network- copies a configuration stored on a TFTP host to running config
Configuration Overwrite- overwrites the configuration
Copy running-config startup-config- or copy run start, places a configuration into NVRAM
Copy startup-config running-config-if you’ve changed your router’s running config fileand
want to restore the configuration to the version in the start –config file, use this command
copy running-config tftp-once the file is copied to NVRAM, you can make a second
backup to a TFTP server by using this command
copy tftp running-config- if you did copy the router’s configuration to a TFTP server as a
second backup, you can restore the configuration using this command
copy tftp flash- will download the file from a TFTP server to flash memory
copy flash tftp- to back up Cisco IOS to a TFTP server
copy tftp startup-config- you can use this command as an alternate command for copy
TFTP running-config
2. List the five places where a password is installed?console, auxillary, telnet(VTY),
enable password and enable secret
3. What copy command loads a new version of the Cisco IOS?
4. What is stored in RAM on the Router?start up configuration
5. When NVRAM is erased or corrupted, how does the router start? From set up mode
6. Where is the back up info stored?RAM
7. What command do you use to show the backup configuration?show start, short for
show startup-config
8. When configuring a router what appears in the squared brackets[ ]?
9. Which password is not in clear text when it is set?enable secret
10. what are the commands to set the password on the console? list each line from start
to finish?
11. What is the command to enter the MOTD?banner ?
12. When are message of the day banners displayed?when people are dialing into or
connecting to the router via Telnet or auxillary port, or through a console
13. What is the command to name the router?config t
14. What are the ways to get in to setup mode?type setup, or router will do so if there isn’t
any configuration in NVRAM
15. What are the steps of a router start up, for a successful startup and a fail start up?
a. bring up router
b. b. it will run POST(power on self test)
c. c.if passes, will look for and load Cisco IOS from flash memory
d. d. IOS proceeds to load and looks for a valid configuration in NVRAM called the
startup-config.
Enabling IP Routing
1. What is the command to add a static Route to a router?
2. Define the following?
Show ip protocol
Show ip route
Show ip interface
terminal no monitor
3. IP addresses can be verified by which tools?
4. Define Telnet, Trace and Ping
5. List the layers of the Internet Model?
6. What is TCP?
7. What is UDP?
8. What are the Network Layer protocols?
9. Define the following:
Internet Protocol
Address Resolution Protocol
Reverse Address Resolution Protocol
Boot Strap Protocol
10. What is ICMP and what is the four functions ICMP performs?
11. The Ping Command Works at which layer of the OSI Model?
12. What Protocol is used to determine a MAC Address?
13. What are trace and PING used for?