* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download 1.List The OSI Layers and Explain what each Layer Does? Physical
Survey
Document related concepts
Asynchronous Transfer Mode wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Deep packet inspection wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Internet protocol suite wikipedia , lookup
Transcript
1.List The OSI Layers and Explain what each Layer Does? Physical-Physical topology Data link-Framing Network-routing Transport-End to end connection Session-Dialog control Presentation-Data encryption, compression, and translation services Application-File, print,message,database,and application services 2.What is Connection-Oriented Protocol mean? A protocol that establishes a connection between two hosts before transmitting data, and verifies receipt before closing the connection between the hosts. TCP is an example of a connection-oriented protocol. 3..Explain Call Setup, Data Transfer, & Call Termination in reference to Connection-Oriented protocol? call set up- transmitting device first establishes a connection-orientated session with its peer system, data transfer-data is transferred next, following that a call termination takes place to tear down the virtual circuit 4.What does Connectionless Communication mean and what protocol(s) does it apply to? 5. What was the OSI reference model originally developed For?so computers could communicate with each other reguardless of the manufacturer . Was made to help vendors create interoperable network devices and software in the form of protocols so that different vendor networks could work with each other. 6. The Network Layer has Four Characteristics, List the four and explain each? 7. What is the Network layer data unit called? 8. What are the 2 Sub layers Of the Data link Layer?Logical Link, Media Access 9. Code formatting and data translation take place in which layer of the OSI model? Presentation Layer 10. What are the 3 phases of connection-oriented communication? Transmitting device establishes connection orientated session with its peer system(call setup), data is transferred, call termination takes place to tear down virtual circuit. a.connection agreement b.acknowledge request, establish connection parameters c. notifies destination host that the connection agreement has been accepted and that actual connection has been established. Data transfer can now begin 11. What OSI layer does subnetting take place?Networl Layer 12. What is a disadvantage of connection-oriented protocol?more overhead is used than in connectionless 13.What is the advantages of connectionless protocol? faster transfers(UDP) 14.Is TCP reliable? Explain.yes. Created by department of defense to ensure and preserve data integrity, as well as maintain communications in war, therefore if designed and implemented correctly, it is very dependable 15. Is UDP Reliable? Explain. No, does not sequence the segments, and does not care in which order the segments arrive at the destination.UDP sends segments off and forgets about them. Doesn’t follow through or check up on them. UDP also does not create a virtual circuit Data Link & Network Addressing 1. What is a MAC Address & why are they uniquely identified?Media Access control 2. A MAC Addresses is ( what kind of number)? 3. Give a example of a MAC Address from 3COM 4. When and Where are MAC Addresses copied in to the CPU? 5. What is used to transmit a frame from one interface to another? 6. What is the Encapsulation process and where does it occur in the OSI model? 7. What is a IP Address?.numeric identifier assigned to each machine on an IP network.Designates the specific location of a device on the network 8. How many parts is there to a network address and what are they?node address, host address 9. What is the benefits of the OSI layered Model? List at least four examples 10. Define Tunneling?- a method of avoiding protocol restrictions by wrapping packets from one protocol in another protocol’s frame and transmitting the encapsulated packet over a network that supports the wrapper protocal 11. What is the Correct order of Encapsulation? 12. What happens when data arrives faster then the machine can handle it? 13. In flow control, a host that transmits all O's means? 14. What is the bit pattern of a class A Address?00000001-01111111 15. What is the bit pattern of a class B Address?11000000-1101111 TCP/IP Hint: Remember CISCO uses classfull Addressing. Class A, B, C. The following questions assume you understand that the mask bits for the subnet are added to the default mask! 1.What are the Private IP addresses? 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 10.0.0.0 - 10.255.255.255 2.List the class A addresses? 1-127 3.List the Class B Addresses? 128-191 4.List the Class C Addresses?192-233 5.What is the Default class A Mask?255.0.0.0 6.What is the Default class B Mask?255.255.0.0 7.What is the Default class C Mask?255.255.255.0 8.List the three High order bits for Class A, B, C?A-0, B-10,C-110 9. What is the command to configure an IP address on a interface on the Cisco router?config t int s0 ip address 10.What is the binary values for the first octet in a class be address?10000000 11. If you have a class B IP network with a 10 bit subnet-mask, How many Subnets and hosts can you have? Hint: do not forget the 16 bits in the default mask67,108,862 subnets, 62 hosts 12. You have a IP address of 172.16.13.5 with a mask of 255.255.255.128, What is the network ID and what is the range of host addresses?Network Id-172.16.0.0 Host Range-0.129-0.254 13. You have a mask of 255.255.255.248 in a class B network, How many Networks and how many hosts do you have?hosts-6 30 subnets 14. You have a 11 bit mask with 172.16.3.57, What is the network ID range of subnet addresses, and broadcast address?172.16.32.0-172.16.63.254, broadcast172.16.63.255 15. What is the largest possible number of subnets with up to 12 hosts on each subnet can you have with the following 192.158.17.0? 1,048,574 16. What is the range of class D addresses (Multi-cast)? 224-239 Managing Configuration Files 1. Define the Following Terms Configuration Terminal- puts you in global configuration mode and allows changes to the running configuration Configuration Memory- copies the startup-config to running config Configuration Network- copies a configuration stored on a TFTP host to running config Configuration Overwrite- overwrites the configuration Copy running-config startup-config- or copy run start, places a configuration into NVRAM Copy startup-config running-config-if you’ve changed your router’s running config fileand want to restore the configuration to the version in the start –config file, use this command copy running-config tftp-once the file is copied to NVRAM, you can make a second backup to a TFTP server by using this command copy tftp running-config- if you did copy the router’s configuration to a TFTP server as a second backup, you can restore the configuration using this command copy tftp flash- will download the file from a TFTP server to flash memory copy flash tftp- to back up Cisco IOS to a TFTP server copy tftp startup-config- you can use this command as an alternate command for copy TFTP running-config 2. List the five places where a password is installed?console, auxillary, telnet(VTY), enable password and enable secret 3. What copy command loads a new version of the Cisco IOS? 4. What is stored in RAM on the Router?start up configuration 5. When NVRAM is erased or corrupted, how does the router start? From set up mode 6. Where is the back up info stored?RAM 7. What command do you use to show the backup configuration?show start, short for show startup-config 8. When configuring a router what appears in the squared brackets[ ]? 9. Which password is not in clear text when it is set?enable secret 10. what are the commands to set the password on the console? list each line from start to finish? 11. What is the command to enter the MOTD?banner ? 12. When are message of the day banners displayed?when people are dialing into or connecting to the router via Telnet or auxillary port, or through a console 13. What is the command to name the router?config t 14. What are the ways to get in to setup mode?type setup, or router will do so if there isn’t any configuration in NVRAM 15. What are the steps of a router start up, for a successful startup and a fail start up? a. bring up router b. b. it will run POST(power on self test) c. c.if passes, will look for and load Cisco IOS from flash memory d. d. IOS proceeds to load and looks for a valid configuration in NVRAM called the startup-config. Enabling IP Routing 1. What is the command to add a static Route to a router? 2. Define the following? Show ip protocol Show ip route Show ip interface terminal no monitor 3. IP addresses can be verified by which tools? 4. Define Telnet, Trace and Ping 5. List the layers of the Internet Model? 6. What is TCP? 7. What is UDP? 8. What are the Network Layer protocols? 9. Define the following: Internet Protocol Address Resolution Protocol Reverse Address Resolution Protocol Boot Strap Protocol 10. What is ICMP and what is the four functions ICMP performs? 11. The Ping Command Works at which layer of the OSI Model? 12. What Protocol is used to determine a MAC Address? 13. What are trace and PING used for?