final exam module
final exam module
final exam module
This gives you a subnet size of 32 addresses (because 2^5 = 32), which includes:
1 network address, 1 broadcast address, 30 valid host addresses
Subnet Address Range: A /27 subnet allows 32 IP addresses in total, from the network address to the
broadcast address. The first address is reserved as the network address, and the last address is reserved
as the broadcast address. The addresses between these two are valid host addresses.
iv. How many bytes of data may the sender include in the final ACK packet?
Answer: 0 bytes of data.
Concept:
The ACK packet in the handshake typically only acknowledges the SYN-ACK. It does not contain any
application data, so the number of bytes of data is zero.
A. Question: When a packet from PC1 to PC4 traverses the trunk link from Switch 1 to Router 1, what
are the source and destination MAC and IP addresses in the packet headers?
Steps to Solve:
IP Address Determination:
The source IP is always the sender’s IP, which is 192.168.10.1 for PC1.
The destination IP is the final recipient’s IP, which is 192.168.20.9 for PC4.
IP addresses remain unchanged during the journey because routing happens at Layer 3.
B. Question: Name one advantage and one disadvantage of a layered network protocol architecture.
Concept: The layered architecture (e.g., the OSI model or TCP/IP model) divides communication into
smaller, manageable layers, each handling a specific function. Here’s how to analyze its pros and cons:
Advantage: Modularity: Each layer operates independently, allowing for flexibility and easier
troubleshooting. 每一层都独立运行,具有灵活性,更容易进行故障排除。
Example: If there's an issue at the Transport Layer (e.g., TCP), you don’t need to debug the Physical or
Data Link layers.
Disadvantage: Overhead: Each layer adds its own header or processing logic, which can consume extra
bandwidth and CPU resources. 每一层都添加了自己的标头或处理逻辑,这可能会消耗额外的带宽和 CPU 资源。
Example: When a packet is encapsulated, multiple headers (e.g., Ethernet, IP, TCP) are added, increasing
packet size.
Concept:
The Spanning Tree Protocol (STP) ensures a loop-free topology in Ethernet networks by electing a root
bridge for the network. For Multiple VLANs, the process involves Per-VLAN Spanning Tree (PVST+ or
MST), allowing a unique spanning tree instance for each VLAN.
The root bridge for each VLAN is determined based on the bridge priority and MAC address:
The bridge priority is the main factor. By default, the bridge priority is 32768 for all switches.
In case of a tie (same priority), the switch with the lowest MAC address becomes the root bridge.
Example:
SwitchA(config)# spanning-tree vlan 10 root primary
SwitchB(config)# spanning-tree vlan 20 root primary
Alternatively, Manually Set Priority Values: Lower the priority value to explicitly control the root bridge.
A lower priority value increases the chances of becoming the root bridge.
Example:
SwitchA(config)# spanning-tree vlan 10 priority 4096
SwitchB(config)# spanning-tree vlan 20 priority 4096
Answer Summary:
To configure different switches as the root bridge for each VLAN, adjust the bridge priority for each
VLAN on the desired switches using the spanning-tree vlan <VLAN_ID> commands. Lower priority
values ensure a switch becomes the root bridge for the specified VLAN.
A. Concept: In a hierarchical network design, the roles of the layers are as follows:
Core Layer: High-speed backbone; focuses on fast packet forwarding and connectivity. Rarely concerns
itself with PoE.
Distribution Layer: Connects the access layer to the core. Also unlikely to focus on PoE.
Access Layer: Where devices like IP phones, wireless access points, and cameras connect directly. Power
over Ethernet (PoE) is crucial here because it allows these devices to receive power through Ethernet
cables.
Answer: Access Layer is where PoE is most important because this is the layer where end devices
requiring power are connected.
B. Concept: A converged network integrates multiple types of traffic (e.g., data, voice, video) over the
same network infrastructure instead of maintaining separate systems for each.
Key Features of a Converged Network:
Simplifies network management.
Reduces costs by combining resources.
Supports various services (e.g., VoIP, streaming) over a single network.
Answer: A converged network refers to a single infrastructure that integrates and carries multiple
types of traffic, such as voice, video, and data, enabling efficient resource usage and simplified
management.
a) Trunking vs. Access Ports
i. Advantage of using trunking:
Supports multiple VLANs over a single connection, reducing the need for multiple links between
switches or routers. 支持单个连接上的多个 VLAN,减少了交换机或路由器之间对多个链路的需求。
ii. Disadvantage of using trunking:
More complex and can have security risks like VLAN hopping if not configured properly. 更复杂,如果配置不
正确,可能会有 VLAN 跳转等安全风险。
b) Benefits of VLANs
i. Cost Reduction:
The SSID (Service Set Identifier) in a wireless network serves as the network name. It uniquely
identifies a wireless network, allowing devices to connect to the correct network in environments
with multiple wireless networks.
无线网络中的 SSID(服务集标识符)用作网络名称。它唯一地标识一个无线网络,允许设备在具有多个无线网络的环境中连接到正确的网络。