Data Comm Tech

Embed Size (px)

Citation preview

  • 8/11/2019 Data Comm Tech

    1/48

    Configuring SSH

    Objectives

    View the default internetwork configuration. Enable SSH. Interconnect using SSH.

    Background/ScenarioTraditionally, remote administrative access on routers was configured using Telnet on TC !ort"#. However, Telnet was develo!ed in the days when security was not an issue. $or this reason,all Telnet traffic is forwarded in !lain te%t. SSH has re!laced Telnet as the best !ractice for

    !roviding remote router administration with connections that su!!ort strong !rivacy and sessionintegrity. SSH uses !ort TC "". It !rovides functionality that is similar to that of an outboundTelnet connection, e%ce!t that the connection is encry!ted. &ith authentication and encry!tion,SSH allows for secure communications over an insecure network. In this configuration, fourrouters are interconnected in a hub'and's!oke $rame (elay configuration. (outer () is the hub,and routers (", (#, and (* are the s!okes. +ynamic routing has been configured using multiareaS $.

    Task 1: View the Default Configuration

    Step 1. Verify the Frame Relay configuration on the routers.a. n all four routers, enter user E-EC mode with the !assword cisco.

    b. Enter !rivileged E-EC mode with the !assword cisco.

    c. $rom !rivileged E-EC mode on all four routers, issue the show frame'relay ma! command toverify $rame (elay connectivity.

    Step 2. Verify the routing tables.

    $rom !rivileged E-EC mode on all four routers, issue the show i! route command to verify theall network segments are being advertised.

    Step 3. Verify connectivity between routers.

    a. $rom (), !ing all /0 interfaces to verify connectivity.

    b. /gain from router (), Telnet to (" using it1s /0 interface I address. E%it and re!eat theste! for routers (# and (*. ing other Cs on the same network.

  • 8/11/2019 Data Comm Tech

    2/48

    Task !: Configure SS" on the "ub #outer $#1%

    Step 1. nable an! configure SSH on R1.

    To enable SSH on the router, the following !arameters must be configured2

    ' Hostname' +omain name' /symmetrical keys' ocal authentication

    a. The hostname on () is !re'configured. Therefore configure the domain name cisco.com usingthe i! domain'name domain'name command.

    b. The asymmetrical (S/ keys must be generated on () using the cry!to key generate rsacommand. &hen !rom!ted for a modulus si3e, s!ecify a modulus of )4"* bits.

    c. SSH will !rom!t for a username and !assword combination when enabled. Therefore, a localusername database entry must be configured using the username name !assword !asswordcommand. Create a local account for the user admin and !assword cisco.

    d. Configure the SSH version using the i! ssh version command. In this lab, we will beconfiguring to use version ".

    e. 0e%t, we need to disable Telnet and enable SSH communication to the VT5 lines. To do so,enter the following commands on ().

    ()6config78 line vty " #

    ()6config'line78 no transport input all()6config'line78 transport input ssh()6config'line78 login local()6config'line78 en!

    f. Save the configuration.

    Step 2. Chec$ results.

    5our com!letion !ercentage should be "9:. If not, click Check (esults to see which re;uired

    com!onents are not yet com!leted.

    Task &: Configure SS" on the S'oke #outers #!( #& and #)

    Step 1. Configure SSH on routers R2% R3% an! R#.(e!eat the Ste!s from Task " on routers (", (# and (*.

  • 8/11/2019 Data Comm Tech

    3/48

    Step 2. Chec$ results.

    5our com!letion !ercentage should be )44:. If not, click Check (esults to see which re;uiredcom!onents are not yet com!leted.

    Task ): Verif* SS"

    Step 1. Verify the SSH configuration.

    /fter configuring SSH on all routers, verify the SSH configuration on ().

    a. Issue the show ip ssh command to verify which version of SSH is configured, and what thedefault settings are.

    ()8 sho ip ssh

    SSH Enabled ' version ).Connection to )4."4."4.) closed by foreign host?

    (ecall that Telnet was deactivated using the no trans!ort in!ut all command. nly SSH can beused to establish a remote connection.

    b. @sing () as the SSH client, SSH to router (" using the ssh Al username i!'address command.

    ()8 ssh 'l a!min 1".2".2".1

    assword2

    c. &hen !rom!ted for a !assword, enter cisco . 5ou should now be connected to router (".

  • 8/11/2019 Data Comm Tech

    4/48

    Configuring S()

    *b+ectives View the default configuration of the s!anning tree !rotocol. Select and enable the root bridge. Enable !ortfast on !orts connected directly to host devices View how these configurations change the way in which traffic is forwarded.

    ,ac$groun!-Scenario

    The s!anning'tree !rotocol is useful in ensuring that loo!s do not e%ist in the network. However,it can introduce increased latency and unintended inefficiencies if left to auto negotiate the root

    bridge. In this activity, observe how the s!anning'tree !rotocol affects !ath selection and how that !ath selection can change based on the configuration of the root bridge.

    (as$ 1 View the /efault Configuration.

    Step 1. 0ait for S() convergence to occur.

    S!anning'tree must converge before connectivity occurs on a network. &ait for all linklights to turn either green or orange 6green for forwarding, orange for blocking7.

    *bservation /ll !orts take e;ually as long to converge, including those !orts that areconnected to host devices.

    Step 2. /etermine the root bri!ge.

    a. n the Central switches, enter !rivileged E-EC mode using the console !assword

    cisco and the secret !assword class .

    b. $rom !rivileged E-EC mode, issue the show spanning tree command and observethe out!ut.

    *bservation Central is 0 T the root bridge. 0otice that $a4B)# is !laced in designatedforwarding, i4B" is !laced in alternate blocking, and i4B) is s!ecified as (oot $wd.i4B) is connected to Switch).

    c. n Switch), from the !rivileged E-EC mode, issue the show spanning tree command.

    *bservation Switch) is 0 T the root bridge. 0otice that all !orts are forwarding, andfa4B"" is s!ecified as (oot $wd. $a4B"" is connected to S&'D.

    d. n S&'D, from the !rivileged E-EC mode, issue the show spanning tree command.

  • 8/11/2019 Data Comm Tech

    5/48

  • 8/11/2019 Data Comm Tech

    6/48

    o. Select Switch ".

    p. $rom the E-EC !riviledge mode, enable the Switch " as the secondary root bridge by

    ty!ing the command spanning tree vlan 1 root secon!ary .

    q. Save the configuration with the command copy run start .

    Step . nable )ortfast.

    To s!eed u! convergence, it is also good !ractice to enable !ortfast on !orts that areknown to connect to servers and workstations. &hen an interface is configured with

    !ortfast, the ST for that !ort assumes that the !ort is not !art of a loo! and immediatelymoves to the forwarding state and does not go through the blocking, listening, or learningstates. $or this e%ercise, enable !ortfast on !orts that are connected to servers.

    r. Click on S&'/

    s. @sing the interface range command, enable !ortfast on !orts $a4B) A $a4B*./dditionally enable !ortfast on the !ort connected to &orkgrou! Server " 6$a4B)#7

    E%am!le2

    Switch6config78 interface range fa4B) A fa4B*

    Switch6config'if'range78 spanning tree portfast

    Switch6config'if'range78 interface fa"-13

    Switch6config'if78 spanning tree portfast

    t. Save the configuration with the copy run start command.

    u. (e!eat ste!s a and b on switches S&'D, S&'C, S&'+, S&'E, and S&'$. In addition,on switch Central, enable !ortfast on !ort fa4B)#

    v. nce you have com!leted the configuration, click the button !ower cycle devicesF.This will reboot all devices and allow you to watch the s!anning'tree convergence. Be

    sure that you saved all configurations before rebooting devices.

    Step 4. View how traffic is forwar!e! base! on Central as the root.

    w. Click on the simulation button.

  • 8/11/2019 Data Comm Tech

    7/48

    x. Close the Event ist window by selecting the % in the u!!er right'hand corner, Gust below the View!ort button. This will allow you to see then entire to!ology.

    y. In the dro! down bo%, select Scenario 4. Scenario 4 is a !ing originating from C' TE) and destined to Server' T &orkgrou! Server ). Click the /uto Ca!ture B lay

    button to view the !ath that the !acket will take to reach that server. &hen the Duffer

    $ull message a!!ears, click on view previous events .z. How has the !ath changed Is the !ath more efficient Is there more efficient !aths

    available

    aa. 0e%t, in the dro! down bo%, select Scenario ). Scenario ) is a !ing originating fromC' T E" and destined for Server' T &orkgrou! Server ". Click the /uto Ca!ture Blay button to view the !ath that the !acket will take to reach that server. &hen theDuffer $ull message a!!ears, click on view previous events .

    bb. How has the !ath changed Is the !ath more efficient Is there more efficient !athsavailable

    Step 5. Reflection.

    cc. How does s!ecifying the root bridge affect efficiencies in the network Changing theroot bridge affects how !ackets are forwarded. &ith the root bridge, all !orts are

    !laced to forwarding. &hereas on other switches, certain !orts may be !laced in blocking, !reventing traffic from taking the most efficientF !ath.

    dd. &hat are some factors that may be im!ortant to consider when selecting the root bridge The decision varies on several factors. In this case, Central is the connectionto the Internet and the &orkgrou! Server ) and may be the most im!ortant orcommonly accessed !ath for all devices. In addition, the s!eed of the connections toCentral is igabit, versus $astethernet. So !ackets taking that !ath have fasterconnection times.

    ee. In this to!ology there is only one V /0 and ) root bridge. There is a se!arateinstance of s!anning'tree for each V /0. How can s!ecifying multi!le V /0S anddifferent root bridges for each V /0 im!rove efficiency If there are several devicesthat must reach a s!ecific server, such as workgrou! server ", it is !ossible to !lace allof these devices and the server in a se!arate V /0. The root bridge for that V /0can then be s!ecified based on the most efficient !ath to reach that server.

    ff. How does enabling !ortfast increase efficiency in the network The ST for that !ortassumes that the !ort is not !art of a loo! and immediately moves to the forwardingstate and does not go through the blocking, listening, or learning states. $or a switchthat is newly connected to the network, this means that host devices connected to

    !ortfast enabled !orts will be able to start sending and receiving traffic immediately.

  • 8/11/2019 Data Comm Tech

    8/48

    Configuring therChannel

    Complete! (opology

    *b+ectives View the default ayer " configuration. Configure EtherChannel.

    ,ac$groun!-Scenario

    EtherChannel enables the switch administrator to increase bandwidth between switches by bundling together between " and links. In this scenario, you will bundle two $ast Ethernet linksto form a single logical link with an effective full'du!le% bandwidth of *44 JbBs.

    6*( This activity is for observation !ur!oses only and does not re;uire configuration, thusgrading will not be conducted.

    (as$ 1 View the /efault Configuration.

    Step 1. Verify the trun$ing an! V786 configuration on the switches.

    gg. n the two switches, enter !rivileged E-EC mode.

    hh. erform a show run to view the current configuration.

    ii. Issue the show interfaces trun$ and show interfaces switchport commands.

    *bservation The show interface truck command dis!layed no out!ut, hence there are notrunk !orts configured. The show interfaces switch!ort command dis!layed all !orts indynamic auto mode.

    jj. Issue the show vlan command to verify !ro!er V /0 configuration.

    *bservation V /0 )4 is the only non'default V /0 a!!earing. Currently, all !orts areassociated with V /0 ).

    Step 2. Verify the V() configuration on the switches.

    kk. $rom !rivileged E-EC mode on both + S) and + S" access layer switches, issuethe show vtp status command to verify VT modes and V /0 information.

  • 8/11/2019 Data Comm Tech

    9/48

    *bservation Doth + S) and + S" are VT servers with no VT domain nameconfigured.

    Step 3. Verify 9 :"2.1/ spanning tree.

    ll. $rom each switch, issue the show spanning tree command.

    mm. Verify that all switches are running IEEE 4".)+ s!anning'tree.

    nn. Verify that S) is the root bridge for V /0s )')44).

    *bservation Doth switches are running IEEE 4".)+. + S) is the s!anning'tree root bridge for all V /0s.

    (as$ 2 Configure therChannel on the switches.

    Step 1. 8!! therChannel functionality to /7S1 an! /7S2.

    oo. To enable EtherChannel on + S), enter the interface range mode for !orts $4B)) and$4B)" on with the command interface range f"-11 12 .

    pp. Enter the command switch!ort mode trunk.

    qq. Enter the command channel'grou! ) mode desirable.

    rr. (e!eat ste!s a through c on + S".

    Step 2. 8!! a logical )ort Channel associate! with the physical interfaces.

    a. Create ort Channel ) with the interface port channel 1 command.

    b. Enter the switchport mo!e trun$ command.

    (as$ 3 Verify the therChannel configuration.

    a. Enter the command show etherchannel summary and observe the out!ut.

    *bservation orts $4B)) and $4B)" a!!ear under rou! ), associated with a ortChannel labeled o).The default !ort bundling !rotocol is /g .

    b. Enter the command show interface switchport .

    *bservation The !hysical !orts $4B)) and $4B)", and the logical !ort o) all a!!ear as4".))K trunk !orts.

    c. n + S), enter the command ping 1".1".1".2 . The !ing should be successful.d. Enter the command show running config to determine the EtherChannel load'

    balancing mechanism.

    *bservation The out!ut dis!lays !ort'channel load'balance src'macF, indicating thatload balancing across the logical EtherChannel is based on the source J/C address of thedata.

  • 8/11/2019 Data Comm Tech

    10/48

    (roubleshoot a ultipoint Frame Relay Connection with *S)F

    8!!ressing (able

    /evice 9nterface 9) 8!!ress Subnet as$ /7C9

    (outer4S4B4B4 6+TE7 )

  • 8/11/2019 Data Comm Tech

    11/48

    !roblem is with the connection between 05 admin and the server. This could be a frame'relayconnection issue or an S $ issue.

    Step 2 Verify the frame relay an! *S)F configurations an! ma$e any necessaryconfiguration changes.

    a. n 05 admin, use the terminal window to access (outer) via the console cable.

    b. @se the show ip route command to view the routes that are available

    *bservation S $ has discovered a route to the )4.).#.4 network, but not the )4.).".4 network.

    c. ing the inside interface on (outer4 6)

  • 8/11/2019 Data Comm Tech

    12/48

    ". &hat is the !ur!ose of the ip ospf networ$ broa!cast command This command is usedto define the network ty!e as broadcast. The network ty!e is defined on nonbroadcastnetworks to avoid configuring the neighbors e%!licitly

    Configuring )ort Security

    Complete! (opology

    *b+ectives View the default ayer " configuration. Configure !ort security.

    ,ac$groun!-Scenario

    ort security enables the switch administrator to !revent unauthori3ed devices from gainingaccess to the network. ort security is normally enabled on access layer switches for this !ur!ose.

    6*( This activity is for observation !ur!oses only and does not re;uire configuration, thusgrading will not be conducted.

  • 8/11/2019 Data Comm Tech

    13/48

    (as$ 1 View the /efault Configuration.

    Step 1. Verify the trun$ing an! V786 configuration on the switches.

    ss. n the three switches, enter !rivileged E-EC mode using the console !assword ciscoand the secret !assword class .

    tt. $rom !rivileged E-EC mode, issue the show interfaces trun$ and show interfacesswitchport commands.

    *bservation n S), !orts $4B) and $4B" are 4".)K trunk !orts. n S", !ort $4B) is an4".)K trunk !ort. n S#, !ort $4B" is an 4".)K trunk !ort. The native V /0 is

  • 8/11/2019 Data Comm Tech

    14/48

    (as$ 2 Configure port security on the switches.

    Step 1. nable port security on S2 an! enforce a ma&imum number of 8C a!!resses.

    a. To enable !ort security on S", enter the interface mode for !ort $4BL and issue thecommand switchport port security .

    b. (e!eat ste! ).a. on !orts $4B)) and $4B) of S".

    c. n !orts $4BL, $4B)), and $4B) of S", enter the command switchport port securityma&imum

    d. Enter the show run command in !rivileged E-EC mode to see the effect of ste! ".a.

    *bservation The command switchport port security ma&imum 1 does not a!!earunder the interfaces $4BL, $4B)), and $4B) . This is because the default ma%imum for !ortsecurity on an interface is ). The command switchport port security ma&imum ; willonly a!!ear if a value higher than ) is configured.

    e. (e!eat ste!s a through d on !orts $4BL, $4B)), and $4B) of switch S#.

    Step 2. Configure !ynamic learning for port security an! verify operation.

    a. n !orts $4BL, $4B)), and $4B) of S" and S#, enter the command switchport portsecurity mac a!!ress stic$y . Issue the show run command to view the final

    configuration on both S" and S#.

    b. Click on CL. CL is currently connected to $a4BL on S#. $rom the command !rom!ton CL, issue the command ping 152.15.3".23 . This will !ing C#, which isconnected to $a4BL on S". The !ing should be successful.

    c. n S" and S#, enter the command show run and check to see if anything has changedin the out!ut.

    *bservation n S", the entry switchport port security mac a!!ress stic$y"""1.C5C8. 31C F now a!!ears under the configuration for !ort $4BL. n S#, the entryswitchport port security mac a!!ress stic$y ""3".838 .8:C2 F now a!!ears under

    the configuration for !ort $4BL.

    d. n S#, enter the command show port security interface fa"-4 .

  • 8/11/2019 Data Comm Tech

    15/48

    *bservation ort security is enabled, !ort'status is secure'u!, security violation count is4.

    Step 3. *bserve what happens when a security violation occurs.

    a. Click on the red % button on the right hand !ortion of the T window. This will allowyou to delete a connection in the to!ology. lace the % over the connection betweenCL and S# and click. The connection should disa!!ear.

    b. Select the lightening bolt button on the bottom left'hand corner of the T window to !ull u! connection ty!es. Click the co!!er straight'throughF connection. Click theTest C device and select the fastethernet !ort. 0e%t, click on S# and select !ort $a4BL.

    c. $rom the command !rom!t of Test C ty!e the command ping 152.15.3".23 . The !ingshould fail.

    d. n S#, enter the command show port security interface fa"-4 .

    *bservation ort security is enabled, !ort'status is secure'shutdown, security violationcount is ).

    e. +elete the connection between Test C and S#. lace a new connection between CLand S# using !ort $a4BL. (emember that once a !ort is shutdown due to a securityviolation, the !ort must be administratively shutdown and re'enabled to bring the !ort

    back online. n $a4BL on S#, issue the command no shut!own .

    f. $rom the command !rom!t on CL, ty!e the command ping 152.15.3".23 . The !ingshould succeed. n S#, issue the command show !ort'security interface $a4BL. Thestatus of the !ort should be back to normal.

    5ou have com!leted this configurationBobservation activity.

  • 8/11/2019 Data Comm Tech

    16/48

    Configuring Frame Relay

    *b+ectives View the default internetwork configuration. Configure $rame (elay connectivity. Configure Static and +efault routing. Verify connectivity.

    ,ac$groun!-Scenario

    $our routers must be interconnected in a hub'and's!oke $rame (elay configuration. (outer () isthe hub, and routers (", (#, and (* are s!oke routers. The $rame (elay connections will beestablished using $rame (elay !oint'to'!oint connections over subinterfaces from () to eachs!oke router. (outing will be established using static routes on the hub router and default routeson all s!oke routers. The frame relay switch6es7 have already been configured within the cloud. (emote administrative access is established using SSH with the username a!min and !asswordcisco .

    (as$ 1 Configure Frame Relay an! Static Routing on the Hub Router

  • 8/11/2019 Data Comm Tech

    17/48

    Step 3. Configure the Subinterfaces on R1.

    $rame (elay subinterfaces will be configured using !oint'to'!oint $rame (elay. Configure the

    !oint'to'!oint connections to the three s!oke routers via subinterfaces and assign the a!!ro!riatedlci number to each frame relay connection, see the table below2

    S4B4B4.)4" I 2 )4.4.).)SJ2 "99."99."99."9"

    + CI2 )4"

    S4B4B4.)4# I 2 )4.4.).9SJ2 "99."99."99."9"

    + CI2 )4#

    S4B4B4.)4* I 2 )4.4.). 2 .2 .2 .2 2()6config'subif78 frame relay interface !lci 1"#()6config'subif78 e&it

    Step #. Configure Static Routing on R1 to reach the 786s of each spo$e router.

    (outing between sites could be configured using dynamic or static routing. In this activity, youwill configure static routes to each remote /0 sites.

    n. $rom global configuration mode, enter the following static routes.

    ()6config78 ip route 1".2".2"." 2 .2 .2 ." 1".".1.2()6config78 ip route 1".3".3"." 2 .2 .2 ." 1".".1.4()6config78 ip route 1".#".#"." 2 .2 .2 ." 1".".1.1"

    o. E%it out of configuration mode and issue the show running config command to viewthe final configuration on ().

  • 8/11/2019 Data Comm Tech

    18/48

    (as$ 2 Configure Frame Relay an! /efault routing on the Spo$e Routers.

    Step 1. Configure the )hysical Frame Relay 9nterface on the spo$e routers.

    Oust as we configured the hub router for $rame (elay, the s!oke routers must also be configured.

    p. $rom !rivileged E-EC mode on (", enter global configuration mode.

    q. Configure the main !hysical interface for $rame (elay connectivity. Enter thefollowing commands on (".

    ("6config78 interface serial"-"-"("6config'if78 encapsulation frame relay("6config'if78 no shut!own

    Step 2. Configure the Subinterfaces on R2.

    $rom global configuration mode, enter the following commands to create and configure thesubinterface. /ssign + CI number )4) to the connection.

    ("6config78 interface Serial"-"-".1"1 point to point("6config'subif78 ip a!!ress 1".".1.2 2 .2 .2 .2 2("6config'subif78 frame relay interface !lci 1"1("6config'subif78 e&it

    Step 3. Configure /efault Routing on R2.

    $rom global configuration mode, enter the following static routes.

    ("6config78 ip route "."."." "."."." 1".".1.1

    Step #. Repeat Steps 1 ' 3 on R3 an! R#.

    r. n router (#, configure the following commands. /ssign + CI )4) to the frame relayconnection

    (#6config78 interface serial"-"-"(#6config'if78 encapsulation frame relay(#6config'if78 no shut!own(#6config78 interface Serial"-"-".1"1 point to point

    (#6config'subif78 ip a!!ress 1".".1.4 2 .2 .2 .2 2(#6config'subif78 frame relay interface !lci 1"1(#6config'subif78 e&it(#6config78 ip route "."."." "."."." 1".".1.

    s. n router (*, configure the following commands. /ssign +C I )4) to the frame'relay connection.

  • 8/11/2019 Data Comm Tech

    19/48

    (*6config78 interface serial"-"-"(*6config'if78 encapsulation frame relay(*6config'if78 no shut!own(*6config78 interface Serial"-"-".1"1 point to point(*6config'subif78 ip a!!ress 1".".1.1" 2 .2 .2 .2 2

    (*6config'subif78 frame relay interface !lci 1"1(*6config'subif78 e&it(*6config78 ip route "."."." "."."." 1".".1.>

    (as$ # Verify Connectivity.

    Step 1. Verify the Frame Relay networ$.

    /fter configuring $rame (elay on all routers, verify the $rame (elay configuration on ().

    t. Issue the show frame relay map command on () to verify the connections to thes!oke routers.

    ()8 show frame relay mapSerial4B4B4.)4" 6u!72 !oint'to'!oint dlci, dlci )4", broadcast, status defined, activeSerial4B4B4.)4# 6u!72 !oint'to'!oint dlci, dlci )4#, broadcast, status defined, activeSerial4B4B4.)4* 6u!72 !oint'to'!oint dlci, dlci )4*, broadcast, status defined, active

    u. 0e%t, issue the show frame relay lmi command on ().

    ()8 show frame relay lmiJI Statistics for interface Serial4B4B4 6$rame (elay +TE7 JI T5 E P CISC Invalid @nnumbered info 4 Invalid rot +isc 4 Invalid dummy Call (ef 4 Invalid Jsg Ty!e 4 Invalid Status Jessage 4 Invalid ock Shift 4 Invalid Information I+ 4 Invalid (e!ort IE en 4 Invalid (e!ort (e;uest 4 Invalid Qee! IE en 4 0um Status En;. Sent "L 0um Status msgs (cvd "L 0um @!date Status (cvd 4 0um Status Timeouts )L

    JI Statistics for interface Serial4B4B4.)4" 6$rame (elay +TE7 JI T5 E P CISC Invalid @nnumbered info 4 Invalid rot +isc 4 Invalid dummy Call (ef 4 Invalid Jsg Ty!e 4 Invalid Status Jessage 4 Invalid ock Shift 4 Invalid Information I+ 4 Invalid (e!ort IE en 4 Invalid (e!ort (e;uest 4 Invalid Qee! IE en 4 0um Status En;. Sent 4 0um Status msgs (cvd 4 0um @!date Status (cvd 4 0um Status Timeouts )L JI Statistics for interface Serial4B4B4.)4# 6$rame (elay +TE7 JI T5 E P CISC Invalid @nnumbered info 4 Invalid rot +isc 4 Invalid dummy Call (ef 4 Invalid Jsg Ty!e 4 Invalid Status Jessage 4 Invalid ock Shift 4 Invalid Information I+ 4 Invalid (e!ort IE en 4

  • 8/11/2019 Data Comm Tech

    20/48

  • 8/11/2019 Data Comm Tech

    21/48

    Step 2. Verify connectivity to the spo$e 786s.

    $rom the () router, !ing the /0 interfaces of routers (", (#, and (*. 5ou should be able tosuccessfully !ing.

    Step 3. Chec$ results.

    5our com!letion !ercentage should be )44:. If not, click Chec$ Results to see which re;uiredcom!onents are not yet com!leted.

  • 8/11/2019 Data Comm Tech

    22/48

    Configuring 9nter V786 Routing with ultilayer Switches

    Complete! (opology

    *b+ectives View the default ayer " configuration. Configure the switch virtual interfaces 6SVIs7. Verify inter'V /0 routing.

    ,ac$groun!-Scenario

    Inter'V /0 routing on distribution layer switches is made !ossible with switch virtual interfaces

    6SVIs7. Jultilayer switches, such as Cisco Catalyst #9L4 switches, are ca!able of wires!eed Irouting in addition to traditional ayer " switching. In this case, distribution layer bound Isubnets with hosts !ointing to the SVIs as default gateways for the res!ective I subnets. $ull Icommunications, !reviously available only with dedicated routers, are made available with thesemultilayer switches.

    In this configuration, two distribution layer switches, + S) and + S" are connected in a !artial'mesh to!ology with the access layer switches, / S) and / S". + S) and + S" load balancethe traffic at ayer " on a !er'V /0 basis. SVIs are configured for each V /0 to enable inter'V /0 I communication.

    (as$ 1 View the /efault Configuration.

    Step 1. Verify the trun$ing an! V786 configuration on the switches.

    w. n all four switches, enter !rivileged E-EC mode with the enable command.

    x. $rom !rivileged E-EC mode, issue the show interfaces trun$ and show interfacesswitchport commands.

  • 8/11/2019 Data Comm Tech

    23/48

    y. n the two distribution switches, issue the show vlan command to verify !ro!erV /0 configuration.

    *bservation $a4B), $a4B", and $a4B# are configured for 4".); trunking. /dditionally,all three are configured to trunk V /0s ), )4, "4, #4, > command followed by the no shut!own command on/ S) and / S".

    c. ive / S) the management interface I address of )4.4.

  • 8/11/2019 Data Comm Tech

    24/48

    e. n / S), configure the default gateway to be )4.4.

  • 8/11/2019 Data Comm Tech

    25/48

    Configuring RS()

    Objectives View the default ayer " configuration. Enable (ST . Configure !rimary and secondary root bridges.

    Background/ScenarioS!anning tree modes other than VSTR are available. ne of these modes is (ST 6ra!ids!anning tree !rotocol7, which greatly reduces the time between a !ort coming u! and changingto forwarding, while still !reventing bridging loo!s. +uring the transition !eriod between (STstates, ra!id s!anning tree falls back to regular s!anning tree on links that have regular s!anningtree on one side.

    In this configuration, two distribution layer switches, + S) and + S" are connected in a full'mesh to!ology with the access layer switches, / S) and / S". + S) and + S" load balancethe traffic at ayer " on a !er'V /0 basis.

    (as$ 1 View the /efault Configuration.

    Step 1. Verify the trun$ing an! V786 configuration on the switches.a. n all four switches, enter !rivileged E-EC mode with the enable command.

    b. $rom !rivileged E-EC mode, issue the show interfaces trun$ and show interfacesswitchport commands.

    *bservation $a4BN, $a4B< and $a4B)) have all been configured as trunk !orts.

    c. n the two distribution switches 6+ S) and + S"7, issue the show vlan command to verify !ro!er V /0 configuration.

    *bservation orts $a4BN, $a4B< and $a4B)) are not listed within a s!ecific vlan. /lsoV /0)44, ))4, )"4 and )#4 are created and active2

    )44 Server'$arm') active))4 Server'$arm'" active)"4 0et'Eng active

    )#4 Staff active

    Step 2. Verify the V() configuration on the switches.$rom !rivileged E-EC mode on the + S), + S", / S), and / S", issue the show vtp status command to verify the !ro!agation of V /0 information.

  • 8/11/2019 Data Comm Tech

    26/48

    *bservation In + S) and + S", the o!erating mode is set to serverF. In / S) and / S", theo!erating mode is set to clientF.

    Step 3. Verify 9 :"2.1/ spanning tree an! Root configuration on /7S1.

    a. n switch + SI, issue the show spanning tree command and the show spanning treesummary command.

    b. Verify that it is running IEEE 4".)+ s!anning'tree.

    c. Verify that + S) is the root bridge for all the V /0s.

    *bservation In the show spanning tree out!ut the line This bridge is the rootF indicates thecurrent switch is the root bridge. /dditionally, the show spanning tree summary out!utindicates2 (oot bridge for2 default Server'$arm') Server'$arm'" 0et'Eng Staff

    d. Verify that !orts $4BN, $4B

  • 8/11/2019 Data Comm Tech

    27/48

    Step 2. Configure /7S1 as the primary root bri!ge for V786s 1% 1""% an! 12" an! as thesecon!ary root bri!ge for V786s 11" an! 13".

    a. n + S), issue the spanning tree vlan 1%1""%12" root primary command.

    b. n + S), issue the spanning tree vlan 11"%13" root secon!ary command.

    Step 3. Configure /7S2 as the primary root bri!ge for V786s 11" an! 13" an! as thesecon!ary root bri!ge for V786s 1% 1""% an! 12".

    a. n + S", issue the spanning tree vlan 11"%13" root primary command.

    b. n + S", issue the spanning tree vlan 1%1""%12" root secon!ary command.

    Step #. Save the configuration an! power cycle all !evices.a. n each swich, issue the command copy run start .

    b. n T, below the to!ology, click on the button !ower cycle devicesF.

    (as$ 3 Verify RS() output.

    Step 1. Verify the RS() configuration./fter configuring (ST on all switches, verify the (ST configuration on + S).

    a. Issue the show spanning tree summary command to verify which version of s!anning tree !rotocol is running on + S) and to observe the V /0s for which + S) is the root bridge.

    *bservation+ S)8 show spanning tree summarySwitch is in ra!id'!vst mode(oot bridge for2 default Server'$arm') 0et'Eng

    b. 0e%t, issue the show spanning tree summary command to verify which version of s!anningtree !rotocol is running on + S" and to observe the V /0s for which + S" is the root bridge.

    *bservation+ S"8 show spanning tree summarySwitch is in ra!id'!vst mode(oot bridge for2 Server'$arm'" Staff

    6ote If this out!ut does not a!!ear, go back and ensure that all commands from Task " were !erformed on all switches. /lso, be sure to !ower cycle the devices to allow for ;uickerconvergence in T.

  • 8/11/2019 Data Comm Tech

    28/48

    (ests9ntro!ucing Computer 6etwor$s

    Com!uter networks do which of the following/. /llow com!uter hosts to communicate data between each otherD. rovide a user interface to control com!uter hostsC. rovide a user interface to control networking devices+. !erate solar !ower stations

    0etworking devices do which of the following/. rovide an o!erating system for the InternetD. /llow users to use more than one com!uter at onceC. Control and o!timi3e communication between host devices+. /llow users to use more than one user interface at once

    / hub does which of the following/. Jodifies the J/C address of a data'link frame to allow transmission over longer distancesD. Sends frames it receives on all !orts, e%ce!t on the !ort where the frame is receivedC. /m!lifies the electrical signal to allow transmission over longer distances+. Sends frames it receives only on the !ort that corres!onds to the destination J/C address ofthe data'link frame

    / switch does which of the following/. Jodifies the J/C address of a data'link frame to allow transmission over longer distancesD. Sends frames it receives on all !orts, e%ce!t on the !ort where the frame is receivedC. /m!lifies the electrical signal to allow transmission over longer distances+. Sends frames it receives only on the !ort that corres!onds to the destination J/C address ofthe data'link frame

    (he *S9 Reference o!el

    &hat is the !en Systems Interconnection 6 SI7 reference model/. / cabling standard that !hone and networking com!anies im!lementD. / com!uter host architecture blue!rint that com!uter device manufacturers im!lementC. / network architecture blue!rint that network and com!uter device manufacturers im!lement+. / network device architecture blue!rint that network device manufacturers im!lement

    How does the SI reference model guarantee inde!endence of layer functionality/. Dy enca!sulating data at each layer and by defining clear interfaces between each layerD. Dy allowing network and com!uter device manufacturers to im!lement !ro!rietary layersC. Dy allowing communication between com!uter hosts over a network+. Dy o!timi3ing the network route between com!uter hosts

    &hat is the function of the a!!lication layer of the SI reference model/. Segments and delivers data, correcting transmission errors

  • 8/11/2019 Data Comm Tech

    29/48

    D. !ens and maintains communication channels, authenticating data communicationsC. Converts data, encry!ts data, and translates data+. Janages the user interface and !rocesses data before handing it off to the user

    &hat is the function of the !resentation layer of the SI reference model

    /. Segments and delivers data, correcting transmission errorsD. !ens and maintains communication channels, authenticating data communicationsC. Converts data, encry!ts data, and translates data+. Janages the user interface and !rocesses data before handing it off to the user

    &hat is the function of the session layer of the SI reference model/. Segments and delivers data, correcting transmission errorsD. !ens and maintains communication channels, authenticating data communicationsC. Converts data, encry!ts data, and translates data+. Janages the user interface and !rocesses data before handing it off to the user

    &hat is the function of the trans!ort layer of the SI reference model/. Segments and delivers data, correcting transmission errorsD. !ens and maintains communication channels, authenticating data communicationsC. Converts data, encry!ts data, and translates data+. Janages the user interface and !rocesses data before handing it off to the user

    &hat is the function of the network layer of the SI reference model/. Segments and delivers data, correcting transmission errorsD. Janages electrical, o!tical, and over'the'air transmission of data bitsC. (outes data frames locally and manages local !hysical addressing+. (outes data !ackets between networks and manages global logical addressing

    &hat is the function of the data link layer of the SI reference model/. Segments and delivers data, correcting transmission errorsD. Janages electrical, o!tical, and over'the'air transmission of data bitsC. (outes data frames locally and manages local !hysical addressing+. (outes data !ackets between networks and manages global logical addressing

    &hat is the function of the !hysical layer of the SI reference model/. Segments and delivers data, correcting transmission errorsD. Janages electrical, o!tical, and over'the'air transmission of data bitsC. (outes data frames locally and manages local !hysical addressing+. (outes data !ackets between networks and manages global logical addressing

    9ntro!ucing the (C) H) )rotocol Suite

    &hich of the following describes a &eb browser/. ayer N 6a!!lication7 !rotocolD. ayer N software a!!lication

  • 8/11/2019 Data Comm Tech

    30/48

    C. ayer L 6!resentation7 software a!!lication+. /ll of the above

    In connection'oriented trans!ort, which of the following occurs/. Sending and receiving hosts e%change TC acknowledgments.

    D. Sending and receiving hosts se;uence their TC segments.C. Sending and receiving hosts !erform a three'way handshake.+. /ll of the above.

    &hat does the three'way handshake !rocess allow two hosts to do/. !en a bidirectional TC connectionD. !en a bidirectional I channelC. !en a bidirectional @+ session+. /ll of the above

    &hat ha!!ens whenever a TC segment is missing at destination/. The receiving com!uter host aborts transmission.D. The sending com!uter host aborts transmission.C. The receiving com!uter host re;uests a retransmission.+. The sending com!uter host re;uests a retransmission.

    &hat does the !ositive acknowledgment and retransmission 6 /(7 TC !rocess ensure/. That all TC segments are received within a certain time !eriodD. That all @+ segments are received within a certain time !eriodC. That all TC BI segments are received within a certain time !eriod+. That all I segments are received within a certain time !eriod

    &hat do TC and @+ !orts allow multi!le network a!!lications to do/. (esolve the J/C address of the com!uter host they run onD. Connect to network interface card 60IC7 driversC. Connect their sending and receiving counter!arts on the same sending and receiving com!uterhosts+. (esolve the I address of the com!uter host they run on

    0ame one of the main functions of ayer # 6network layer7 TC BI !rotocols./. Janage the electrical as!ect of network linksD. Choose the best route to send data !ackets between hosts, even when the hosts are se!arated

    by several networksC. Choose the best route to send data frames between hosts, only when the hosts are locatedwithin the same local network+. /ll of the above

    I addresses are hierarchical to facilitate which of the following/. Counting the number of hosts in a networkD. Counting the number of networks in a networkC. (outing of data !ackets in local and global networks+. (outing of data frames in local networks

  • 8/11/2019 Data Comm Tech

    31/48

    / routed !rotocol is a ayer " 6network layer7 !rotocol that does which of the following/. (oute data !acketsD. Send route u!date !acketsC. (oute data !ackets and send route u!date !ackets

    +. /ll of the above/ routing !rotocol is a ayer " 6network layer7 !rotocol that does which of the following/. (oute data !acketsD. Send route u!date !acketsC. (oute data !ackets and send route u!date !ackets+. /ll of the above

    &hat do Jedia /ccess Control 6J/C7 addresses uni;uely identify/. / s!ecific wide'area network 6&/07D. / s!ecific local'area network 6 /07C. / s!ecific network device, such as a switch or a router, or a network interface card 60IC7 in acom!uter host device+. /ll of the above

    /ata ncapsulation &hat does inde!endence of layer functionality allow/. ayers to change internally without im!acting other layersD. ayers to interact with network hardwareC. ayers to interact with network software+. ayers to migrate from one o!erating system to another

    +escribe !rotocol data units 6 +@s7./. Dasic encry!tion method that allows a network interface card 60IC7 to send encry!ted data

    !ackets over the networkD. Dasic encoding method that allows a network interface card 60IC7 to send data !ackets overthe networkC. Dasic data container used by each !rotocol to e%change data between hosts in a network +. Dasic data container used by each !rotocol to set u! a virtual circuit

    Each !rotocol data unit 6 +@7 contains which of the following/. +ata !ayload and control information about the local com!uter hostD. +ata !ayload and control information that hel!s the !rotocol figure out what to do with thedata !ayloadC. +ata !ayload and control information about devices in the network+. +ata !ayload and control information about the remote com!uter host

    n the sending host, what is the function of each network layer/. (eceives a +@ from the u!!er layer

  • 8/11/2019 Data Comm Tech

    32/48

    D. Duilds its own +@ containing the u!!er'layer +@ enca!sulated within its own +@C. Enca!sulates original data !ayload in several nested +@s, one for each layer +. /ll of the above

    n the receiving host, what is the function of each network layer

    /. (eceives a +@ from the lower layer D. Stri!s out the lower'layer header and trailer because it doesn t need themC. E%tracts its own +@, containing a control header, data !ayload, and o!tionally a controltrailer+. /ll of the above

    ,inary% He&a!ecimal an! /ecimal Systems

    &hich of the following com!uter and network features rely on the !ro!erties of the he%adecimaland binary numbering systems/. Dit ma!sD. Subnet masksC. 0etwork addresses+. /ll of the above

    Convert )4)4) " to decimal notation./. ")D. )C. *++. $

    Convert )L )4 to binary notation./. )44)4D. 4)44)C. )4444+. )4))4

    Convert L* )4 to binary notation./. )444444D. ))4)4)4C. ))))4)4+. 44)4)4)

    Convert )4)4) " to he%adecimal notation./. $D. +C. )9+. )*

    &hat does a nibble corres!ond to/. * bitsD. ) he%adecimal digit

  • 8/11/2019 Data Comm Tech

    33/48

    C. byte+. /ll of the above

    &hat does a byte corres!ond to/. * bits

    D. ) he%adecimal digitC. bits+. /ll of the above

    Convert ))4)4) " to he%adecimal notation./. $D. #9C. "9+. +)

    Convert )44))))4)4) " to he%adecimal notation./. *$DD. *+9C. 9E)+. +#"

    Convert )L )L to binary notation./. )))D. )4))4C. )9+. 4)4)

    Convert )L$/ )L to binary notation./. )))4)))4))444D. )4))44))4)44)C. )4))4)))))4)4+. 4)4)44))44)4)

    Convert +C)*$/)Lto binary notation./. 44)4))))4)4)4))4)4)4))))D. )))4)4)44)4))))))4)44)4)C. 4)4)))4)44)))4)44)4)4)4)+. ))4)))44444)4)44)))))4)4

    7ocal 8rea 6etwor$s

  • 8/11/2019 Data Comm Tech

    34/48

  • 8/11/2019 Data Comm Tech

    35/48

    /. )4444 Jb!sD. )4 Jb!sC. )444 Jb!s+. )44 Jb!s

    &hat is the most common $ast Ethernet standard/. )4D/SE'TD. )44D/SE'T-C. )444D/SE'T+. )4 D/SE'T

    &hat is the most common Ethernet standard/. )4D/SE'TD. )44D/SE'T-C. )444D/SE'T+. )4 D/SE'T

    9ntro!ucing to 0i!e 8rea 6etwor$s

  • 8/11/2019 Data Comm Tech

    36/48

    +. /ll of the above

    &hat is the main disadvantage of !acket'switched connections/. ow s!eedD. Shared bandwidth

    C. High cost+. ow reliability

    9ntro!ucing 0ireless 6etwor$s

    &hat is the main advantage of wireless /0s/. Elimination of wired connectionsD. Elimination of crosstalkC. Elimination of signal attenuation+. /ll of the above

    &hat is a disadvantage of wireless /0s/. imited rangeD. iggybackingC. otential security risks+. /ll of the above

    +escribe wireless networks./. Short' or medium'range networks that connect host devices using satellitesD. Short' or medium'range networks that connect host devices using airwavesC. Short' or medium'range networks that connect host devices using o!tical fiber +. /ll of the above

    &ireless local'area networks 6& /0s7 are standardi3ed by which of the following standards/. IEEE 4".#wD. IEEE 4".))wC. IEEE 4".))+. /ll of the above

    & /0 security issues can be mitigated using which of the following/. &i'$i rotected /ccess 6& /7D. J/C address filteringC. &ired E;uivalent rivacy 6&E 7+. /ll of the above

    6etwor$ /esign

    &hat is one of the layers defined by the Cisco hierarchical network model/. +ata link layerD. Session layerC. /ccess layer+. resentation layer

  • 8/11/2019 Data Comm Tech

    37/48

    The core layer in the Cisco hierarchical network model is the layer that !rovides which of thefollowing/. Very high's!eed, very highly available connectivity between large local networksD. Very high's!eed, very highly available connectivity between large global networks

    C. Very high's!eed, very highly available connectivity for hosts+. Very high's!eed, very highly available connectivity for I !hones

    To ensure that the core layer in the Cisco hierarchical network model is highly available, youneed to do which of the following/. +esign redundancy into the network2 redundant routing, redundant links to distribution layer,redundant !ower su!!lies, redundant cooling systemsD. +esign the network using blade hardware only2 use only blade'based routers when designingcore layer connectivityC. +esign the core layer using ayer " switches only+. /ll of the above

    &hat should you do to ensure that the core layer in the Cisco hierarchical network model is fast/. /void enabling any services that would slow the core routerD. /void connecting end devices such as host devices at the core layerC. /void enabling slower routing !rotocols on core routers+. /ll of the above

    The distribution layer in the Cisco hierarchical network model is the layer that does which of thefollowing/. inks the session layer to the access layerD. inks the data link layer to the access layerC. inks the core layer to the access layer+. inks the !resentation layer to the access layer

    &hat are distribution layer switches and routers best suited to do/. $ind the best network route for !ackets into and out of /0s and &/0sD. $ilter !acketsC. Interconnect /0s and connect /0s to &/0s+. /ll of the above

    &hat do distribution layer switches and routers manage/. 0/T 60etwork /ddress Translation7, /C s 6access control lists7, firewalls, inter' /0 andinter'V /0 routingD. 0/T 60etwork /ddress Translation7, /C s 6access control lists7, firewalls, routing within/0s and routing within V /0sC. 0/T 60etwork /ddress Translation7, /C s 6access control lists7, firewalls+. /ll of the above

    &hat is the function of the access layer in the Cisco hierarchical network model/. Interconnects core routers to /0sD. Interconnects end devices such as hosts to /0s

  • 8/11/2019 Data Comm Tech

    38/48

    C. Interconnects distribution routers to /0s+. Interconnects end devices such as hosts to core routers

    0ame some of the benefits of designing networks according to the Cisco hierarchical networkmodel.

    /. S!eciali3ationD. ScalabilityC. imitation of !roblem domain+. /ll of the above

    9ntro!ucing Cisco Har!ware

    &hat is the Cisco I S/. Cisco s !ro!rietary switch and router o!erating systemD. Cisco s !ro!rietary &eb'based switch and router network management systemC. Cisco s !ro!rietary switch and router memory routing !rotocol+. Cisco s !ro!rietary &eb'based switch and router device management software a!!lication

    &hat is the Cisco +evice Janager/. Cisco s !ro!rietary switch and router o!erating systemD. Cisco s !ro!rietary &eb'based switch and router network management systemC. Cisco s !ro!rietary switch and router memory routing !rotocol+. Cisco s !ro!rietary &eb'based switch and router device management software a!!lication

    &hen does the !ower'on self test 6 ST7 run/. Immediately after the Cisco I S loads on a switch or routerD. Immediately after the startu! configuration loads on a switch or routerC. Immediately after the flash memory is initiali3ed on a switch or router+. Immediately after a Cisco switch or router is !owered u!

    &hat is the main !ur!ose of the bootstra! !rogram, also known as the bootloader/. To bring u! a Cisco switch or router by loading the startu! configurationfrom flash memory to (/JD. To bring u! a Cisco switch or router by loading the Cisco I S from flash memory to (/JC. To bring u! a Cisco switch or router by loading the running configurationfrom flash memory to (/J+. To bring u! a Cisco switch or router by loading the Cisco +evice Janager from flash memoryto (/J

    &hat is the main !ur!ose of the ( J Jonitor micro!rogram, also known as ( JJ 0/. To maintain, test, and troubleshoot the !ower consum!tion of a Cisco deviceD. To maintain, test, and troubleshoot the console !ort of a Cisco deviceC. To maintain, test, and troubleshoot the configuration stored in ( J and in the flash memoryof a Cisco device+. To maintain, test, and troubleshoot the ( J !ort of a Cisco device

  • 8/11/2019 Data Comm Tech

    39/48

    It is best !ractice to use entry'level switches, such as the Cisco Catalyst #9L4, at which of thefollowing layers/. /ccess and distribution layerD. +istribution and core layerC. Core layer

    +. /ccess and core layer &hat does the flash memory on a Cisco switch or router store/. The startu! configuration of a Cisco switch or router D. The image file of the Cisco I SC. The Cisco +evice Janager software a!!lication !rogram+. /ll of the above

    &here is the Cisco switch and router running configuration loaded from/. The running configuration file during startu!D. Cisco s &eb site during startu!C. The startu! configuration file during startu!+. /ll of the above

    The Cisco I S command'line interface o!erates in setu! mode to do which of the following/. Initially configure the ( J Jonitor 6( JJ 07 micro!rogramD. Initially configure the Cisco +evice Janager software a!!licationC. Initially configure the I S+. Initially configure the switch or router

    The Cisco I S command'line interface o!erates in !rivileged configuration mode to do which ofthe following/. Configure the ( J Jonitor 6( JJ 07 micro!rogramD. Configure the Cisco +evice Janager software a!!licationC. Configure the I S+. Configure the switch or router

    9ntro!ucing (C)-9)

    &hich layer of the SI model is res!onsible for reliable delivery of data across the !hysicalnetwork/. 0etwork layerD. +ata link layerC. Trans!ort layer+. hysical layer

    Transmission Control rotocol o!erates at which SI layer/. Trans!ort layerD. 0etwork layerC. Session layer+. +ata link layer

  • 8/11/2019 Data Comm Tech

    40/48

    &hich layer of the SI model is res!onsible for managing sessions between a!!lications/. resentation layerD. /!!lication layerC. Trans!ort layer

    +. Session layer &hich of the following are not ste!s in the data'enca!sulation !rocess 6Choose two.7/. Segments are converted into framesD. @ser information is converted into dataC. $rames are converted into bits+. ackets are converted into framesE. +ata is converted into !ackets

    &hat does SJT stand for/. Sending Jail Transfer rotocolD. Sim!le Jail Transfer rotocolC. Sim!le Jethod Timing rotocol+. Sim!le Janagement Transfer rotocol

    The @ser +atagram rotocol o!erates at which SI layer/. Trans!ort layer D. 0etwork layer C. Session layer +. +ata link layer

    TC BI is based on which ty!e of technology/. Circuit'switchingD. acket'switchingC. $rame'switching+. Header'switching

    &hich layer of the SI model theoretically resides closest to the end user/. resentation layerD. +ata link layerC. /!!lication layer+. hysical layer

    TC is considered to be what ty!e of !rotocol/. ConnectionlessD. ro!rietaryC. Session'oriented+. Connection'oriented

    &hich layer in the +o+ model is res!onsible for routing I !ackets/. hysical layer D. Session layer

  • 8/11/2019 Data Comm Tech

    41/48

    C. 0etwork layer+. Internet layer

    (C)-9) 7ayers an! )rotocols

    &hich !rotocol !revents bridging loo!s/. S!anning Tree rotocolD. Dorder ateway rotocolC. !en Shortest ath $irst rotocol+. Transmission Control rotocol

    &hich function of Ethernet networks !revents data collisions/. TC BID. CSJ/BC+C. I (+. 4".#

    &hich layer of the SI model contains the J/C and C sublayers/. hysical layerD. 0etwork layerC. Trans!ort layer+. +ata link layer

    &hich !rotocol does not acknowledge recei!t of data/. @ser +atagram rotocolD. @ser +atagram acketC. Transmission Control rotocol+. Internet Control Jessage rotocol

    &hich of the following is a valid J/C address/. )

  • 8/11/2019 Data Comm Tech

    42/48

  • 8/11/2019 Data Comm Tech

    43/48

    E. 4.9*.

  • 8/11/2019 Data Comm Tech

    44/48

    /. (/(D. ICJC. /(+. /( !ro%y

    Select some of the benefits of !rivate I addressing 6Choose all that a!!ly.7/. +oes not re;uire 0/TD. Increased securityC. Saves I v* address s!ace+. /llows entire !rivate network to use one !ublic I address

    Subneting

    How many hosts are available on the "44.)44.)9.4B"* network/. )"LD. L"C. "9*+. #"

    &hat is the !ur!ose of V SJ/. S!lits a network into e;ual !artsD. Creates sub'subnets of various lengthsC. !timi3es and load'balances routing traffic+. /utomatically u!dates routing tables

    &hich command disables 6default'enabled7 I subnet 3ero on the router/. 4 i! subnet'3eroD. off i! subnet 3eroC. disable i! subnet'3ero+. no i! subnet'3ero

    How many bits must you borrow from a Class D host I+ to get the subnet mask of"99."99.""*.4/. "D. #C. 9+. *

    &hich of the following re!resents the reverse !rocess of subnetting 6Choose three.7/. Su!ernettingD. (oute aggregationC. V SJ+. Summari3ationE. Subnet masking

  • 8/11/2019 Data Comm Tech

    45/48

    $. Converting binary to dotted'decimal

    &hat are im!ortant reasons for subnetting a network 6Choose three.7/. (outing table si3e reductionD. Troubleshooting and !roblem isolation

    C. Se!arating broadcast traffic+. Ease of managementE. (e;uires less !lanning

    &hich routing !rotocols su!!ort V SJ 6Choose all that a!!ly.7/. I (D. EI (C. (I+. IS'ISE. S $$. D

    5our Class C network re;uires )4 subnets with )4 hosts !er subnet. &hich subnet mask iscorrect/. "99."99."99.4D. "99."99."99."*4C. "99."99."*4+. "99."99."99."*

    &hich of the following networks would use the subnet mask of "99.4.4.4 by default 6Choose allthat a!!ly.7/. ) 4.).9.4D. )"

  • 8/11/2019 Data Comm Tech

    46/48

    /. To handle data frame transmission locally between two devices connected on a local'areanetwork 6 /07D. To handle data frame transmission between two devices connected on a wide'area network6&/07C. To handle I !acket routing locally between two nodes connected on a local'area network

    6 /07+. To handle I !acket routing between two nodes connected on a wide'area network 6&/07

    ayer " switches rely on the to determine whether they forward data'link frames on an outgoing !ort./. $irmware versionD. I addressC. J/C address+. /ll of the above

    How does a hub forward a data frame/. nly on the outbound !ort where the target firmware connectsD. nly on the outbound !ort where the target I address connectsC. nly on the outbound !ort where the target J/C address connects+. n all outbound !orts, e%ce!t on the !ort through which the frame came in

    +escribe how a ayer " switch learns addresses./. The switch saves the !ort number where each data frame enters the switch along with thesource I address of that frame in the I address table.D. The switch saves the !ort number where each data frame enters the switch along with thesource J/C address of that frame in the J/C address table.C. The switch saves the !ort number where each data frame enters the switch along with thesource firmware version of that frame in the J/C address table.+. The switch saves the !ort number where each data frame enters the switch along with thesource firmware version of that frame in the I address table.

    +escribe how a ayer " switch floods a frame./. The switch eliminates redundant interswitch links.D. The switch sends a data frame only on the outgoing !ort where the destination device can bereached.C. The switch sends a data frame on all outgoing !orts e%ce!t on the !ort where it entered theswitch.+. The switch discards a data frame.

    +escribe how a ayer " switch forwards a frame./. The switch eliminates redundant interswitch links.D. The switch sends a data frame only on the outgoing !ort where the destination device can bereached.C. The switch sends a data frame on all outgoing !orts e%ce!t on the !ort where it entered theswitch.+. The switch discards a data frame.

  • 8/11/2019 Data Comm Tech

    47/48

    +escribe how a ayer " switch avoids loo!s./. The switch eliminates redundant interswitch links.D. The switch sends a data frame only on the outgoing !ort where the destination device can bereached.C. The switch sends a data frame on all outgoing !orts e%ce!t on the !ort where it entered the

    switch.+. The switch discards a data frame.

    @nicast transmission involves which of the following/. / device sending a frame to multi!le target devicesD. / device sending a frame to all devices in its local network C. / device sending a frame to a single target device+. /ll of the above

    Virtual local area networ$s

  • 8/11/2019 Data Comm Tech

    48/48

    How is data'link traffic identified to belong to a s!ecific V /0/. Dy tagging each data'link frame with the /0 I+D. Dy tagging each data'link frame with the I addressC. Dy tagging each data'link frame with the J/C address

    +. Dy tagging each data'link frame with the V /0 I+&hat do you need to do to create a V /0 trunk over an EtherChannel logical !ort/. Create the EtherChannel logical !ort first and set it u! as a trunk !ortD. Create the trunk !ort first and set it u! as an EtherChannel logical !ortC. Create a V /0 first and set it u! as a trunk !ort+. Create a V /0 first and set it u! as an EtherChannel logical !ort

    &hat is the main !ur!ose of the +ynamic Trunking rotocol 6+T 7/. To configure EtherChannel logical !orts automaticallyD. To configure EtherChannel logical !orts and V /0 !ort trunks automaticallyC. To configure V /0 !ort trunks automatically+. /ll of the above

    VT u!dates re!resent the !rocess by which a VT server does which of the following/. +istributes information about new J/C addresses added to J/C address tables in the VTdomain using a VT notificationD. +istributes information about new EtherChannel logical !orts defined in the VT domainusing a VT notificationC. +istributes information about new V /0 trunk !orts defined in the VT domain using a VTnotification+. +istributes information about new V /0s defined in the VT domain using a VTnotification

    VT !runing re!resents the !rocess by which a VT server or client does which of the following/. (efuses VT u!dates for V /0s that are not active on its !ortsD. (efuses VT u!dates for V /0 trunk !orts that are not active on its !ortsC. (efuses VT u!dates for EtherChannel logical !orts that are not active on its !orts+. (efuses VT u!dates for J/C addresses that are not active on its !orts