0% found this document useful (0 votes)
4 views10 pages

final exam module

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 10

No, collisions do not occur in a switched network.

This is because switches provide dedicated paths


for communication and operate in full-duplex mode, allowing devices to send and receive data
simultaneously without interference.
a) Answer each of the following questions TRUE or FALSE:
i. 57.69.168.31/27 is a valid host IP address.
Understanding /27 subnet mask: A /27 subnet mask means that the first 27 bits of the IP address are
used for the network portion, and the remaining 5 bits are used for the host portion.

This gives you a subnet size of 32 addresses (because 2^5 = 32), which includes:
1 network address, 1 broadcast address, 30 valid host addresses
Subnet Address Range: A /27 subnet allows 32 IP addresses in total, from the network address to the
broadcast address. The first address is reserved as the network address, and the last address is reserved
as the broadcast address. The addresses between these two are valid host addresses.

Subnet Example: Let's take a look at the specific example 57.69.168.31/27:


The subnet starts at 57.69.168.0 (network address).
The first valid host address is 57.69.168.1.
The last valid host address is 57.69.168.30.
The broadcast address is 57.69.168.31.
Therefore, the answer is FALSE.

ii. 205.64.87.17 is in the 205.64.87.0/26 subnet.


A /26 subnet mask means there are 26 bits for the network and 6 bits for the host portion. This allows
for 64 addresses (2^6 = 64), with the first being the network address and the last being the broadcast
address.
The subnet 205.64.87.0/26 has the following range of IP addresses:
Network address: 205.64.87.0
The first valid host: 205.64.87.1
The last valid host: 205.64.87.62
Broadcast address: 205.64.87.63
Since 205.64.87.17 is within this range (from 205.64.87.1 to 205.64.87.62), it is a valid IP address in the
205.64.87.0/26 subnet.
Answer: TRUE
c) Write the following IPv6 address in abbreviated form:
48a4:00b4:0000:0000:0000:0000:cd00:0a7b
Answer: 48a4:b4::cd00:a7b
Concept: IPv6 addresses can be shortened to make them easier to read:
1. Remove leading zeros from each block (e.g., 00b4 becomes b4).
2. Replace consecutive blocks of 0 with :: (but this can be done only once per address).
3. The result is 48a4:b4::cd00:a7b.

d) Consider the host with the IPv6 Address 2001:16d4:b:4:13a1:18ee:ed2b:8f7b/64:


i. What is the Site Address Space ID with prefix?
Answer: 2001:16d4:b:4::/64
Concept: An IPv6 address is divided into two parts:
- Network Prefix: Defined by the /64 portion, which specifies the first 64 bits (the network).
- Host Identifier: The remaining 64 bits (specific to the device).
For 2001:16d4:b:4:13a1:18ee:ed2b:8f7b/64, the Site Address Space ID is the network portion:
2001:16d4:b:4::/64.

a) TCP Three-Way Handshake


i. How many bytes of data are contained within the first SYN packet?
Answer: 0 bytes of data.
Concept:
The SYN packet is used to initiate a connection and synchronize sequence numbers. It contains no actual
data, only control information.

ii. In the SYN-ACK response, what is the Acknowledgement number?


Answer: 1544.
Concept:
The ACK number in the SYN-ACK packet acknowledges receipt of the SYN packet. It is the initial
sequence number of the SYN packet (1543) plus 1.

iii. What is the sequence number in the SYN-ACK response?


Answer: Example: 3000.
Concept:
The sequence number in the SYN-ACK packet is chosen by the responding host to begin its own
sequence. This is usually a randomly generated number. If not specified in the question, any valid
random number could be used (e.g., 3000 as a placeholder).

iv. How many bytes of data may the sender include in the final ACK packet?
Answer: 0 bytes of data.
Concept:
The ACK packet in the handshake typically only acknowledges the SYN-ACK. It does not contain any
application data, so the number of bytes of data is zero.
A. Question: When a packet from PC1 to PC4 traverses the trunk link from Switch 1 to Router 1, what
are the source and destination MAC and IP addresses in the packet headers?
Steps to Solve:

Understand the Layer 2 (MAC) and Layer 3 (IP) roles:


Layer 2 (Data Link Layer) involves MAC addresses and determines how frames are forwarded within the
local network (e.g., between devices in the same VLAN or switch).
Layer 3 (Network Layer) involves IP addresses and determines how packets are forwarded across
subnets (e.g., via a router).

Check the route from PC1 to PC4:


PC1 (192.168.10.1) wants to send a packet to PC4 (192.168.20.9).
These devices are in different subnets (192.168.10.0/24 vs. 192.168.20.0/24), so the packet must
traverse Router 1.

MAC Address Determination:


Initially, PC1 will send the packet to Router 1 (its default gateway). PC1 uses Router 1's MAC address for
its respective VLAN interface as the destination MAC in the frame.
PC1’s MAC (aa:bb:cc:dd:ee:99) will be the source MAC.
Router 1’s interface f0/1.99 has the MAC address aa:bb:cc:dd:00:99, which becomes the destination
MAC.

IP Address Determination:
The source IP is always the sender’s IP, which is 192.168.10.1 for PC1.
The destination IP is the final recipient’s IP, which is 192.168.20.9 for PC4.
IP addresses remain unchanged during the journey because routing happens at Layer 3.

Summarize the information:


Source MAC: aa:bb:cc:dd:ee:99 (PC1's MAC)
Destination MAC: aa:bb:cc:dd:00:99 (Router 1's MAC for f0/1.99)
Source IP: 192.168.10.1 (PC1's IP)
Destination IP: 192.168.20.9 (PC4's IP)

B. Question: Name one advantage and one disadvantage of a layered network protocol architecture.
Concept: The layered architecture (e.g., the OSI model or TCP/IP model) divides communication into
smaller, manageable layers, each handling a specific function. Here’s how to analyze its pros and cons:

Advantage: Modularity: Each layer operates independently, allowing for flexibility and easier
troubleshooting. 每一层都独立运行,具有灵活性,更容易进行故障排除。
Example: If there's an issue at the Transport Layer (e.g., TCP), you don’t need to debug the Physical or
Data Link layers.

Disadvantage: Overhead: Each layer adds its own header or processing logic, which can consume extra
bandwidth and CPU resources. 每一层都添加了自己的标头或处理逻辑,这可能会消耗额外的带宽和 CPU 资源。
Example: When a packet is encapsulated, multiple headers (e.g., Ethernet, IP, TCP) are added, increasing
packet size.
Concept:
The Spanning Tree Protocol (STP) ensures a loop-free topology in Ethernet networks by electing a root
bridge for the network. For Multiple VLANs, the process involves Per-VLAN Spanning Tree (PVST+ or
MST), allowing a unique spanning tree instance for each VLAN.
The root bridge for each VLAN is determined based on the bridge priority and MAC address:
The bridge priority is the main factor. By default, the bridge priority is 32768 for all switches.
In case of a tie (same priority), the switch with the lowest MAC address becomes the root bridge.

Steps to Configure Different Root Bridges for Each VLAN:


Set the Bridge Priority Per VLAN: Use the spanning-tree vlan <VLAN_ID> root primary command to
configure the priority for a specific VLAN.

Example:
SwitchA(config)# spanning-tree vlan 10 root primary
SwitchB(config)# spanning-tree vlan 20 root primary

Here, Switch A will be the root bridge for VLAN 10.


Switch B will be the root bridge for VLAN 20.

Alternatively, Manually Set Priority Values: Lower the priority value to explicitly control the root bridge.
A lower priority value increases the chances of becoming the root bridge.

Example:
SwitchA(config)# spanning-tree vlan 10 priority 4096
SwitchB(config)# spanning-tree vlan 20 priority 4096

Priority values should be multiples of 4096 (as required by STP).

Answer Summary:
To configure different switches as the root bridge for each VLAN, adjust the bridge priority for each
VLAN on the desired switches using the spanning-tree vlan <VLAN_ID> commands. Lower priority
values ensure a switch becomes the root bridge for the specified VLAN.
A. Concept: In a hierarchical network design, the roles of the layers are as follows:
Core Layer: High-speed backbone; focuses on fast packet forwarding and connectivity. Rarely concerns
itself with PoE.
Distribution Layer: Connects the access layer to the core. Also unlikely to focus on PoE.
Access Layer: Where devices like IP phones, wireless access points, and cameras connect directly. Power
over Ethernet (PoE) is crucial here because it allows these devices to receive power through Ethernet
cables.
Answer: Access Layer is where PoE is most important because this is the layer where end devices
requiring power are connected.

B. Concept: A converged network integrates multiple types of traffic (e.g., data, voice, video) over the
same network infrastructure instead of maintaining separate systems for each.
Key Features of a Converged Network:
Simplifies network management.
Reduces costs by combining resources.
Supports various services (e.g., VoIP, streaming) over a single network.
Answer: A converged network refers to a single infrastructure that integrates and carries multiple
types of traffic, such as voice, video, and data, enabling efficient resource usage and simplified
management.
a) Trunking vs. Access Ports
i. Advantage of using trunking:
Supports multiple VLANs over a single connection, reducing the need for multiple links between
switches or routers. 支持单个连接上的多个 VLAN,减少了交换机或路由器之间对多个链路的需求。
ii. Disadvantage of using trunking:
More complex and can have security risks like VLAN hopping if not configured properly. 更复杂,如果配置不
正确,可能会有 VLAN 跳转等安全风险。

b) Benefits of VLANs
i. Cost Reduction:
The SSID (Service Set Identifier) in a wireless network serves as the network name. It uniquely
identifies a wireless network, allowing devices to connect to the correct network in environments
with multiple wireless networks.
无线网络中的 SSID(服务集标识符)用作网络名称。它唯一地标识一个无线网络,允许设备在具有多个无线网络的环境中连接到正确的网络。

You might also like