Chapter 6
.docx
keyboard_arrow_up
School
Eastern Gateway Community College *
*We aren’t endorsed by this school
Course
132
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
15
Uploaded by DeaconGullMaster901
6.1.6
1 - Which of the following best describes how a router operates to transmit messages to different LAN segments? The router reads the LAN segment address contained in the message and consults the appropriate routing table for the protocol, then forwards the message to the appropriate LAN segment.
2 - Which of the following statements about routers are true? They use logical network and device addresses to route data between networks. AND They examine the destination device address contained in packets to make routing decisions.
3 - How does a router use frames to route data through a network? The router checks the MAC address in the frame, replaces the MAC address of the source with its own MAC address, and sends it to the proper host.
4 - Which processes does Cisco express forwarding (CEF) use to optimize packet processing through a router?
Organizes routing data in the forwarding information base (FIB). AND Maintains adjacency tables.
5 - Which internal routing logic organizes routing data using a tree structure, which allows very fast searches and requires less time to route packets?
Cisco express forwarding
6 - You are designing a routing solution for your organization. You want to improve routing efficiency by ensuring that routers save frequently used data link headers to encapsulate packets. Which types of routing logic could you implement?
Cisco express forwarding AND Fast Switching
7 - Which Cisco express forwarding mechanism maintains Layer 2 information linked to a particular entry in the routing table, reducing the need to send ARP requests before forwarding packets?
Adjacency tables
8 - Match each default administrative distance with the correct route type.
9 - Which of the following best describes a hop count?
The number of routers needed to get to the destination network.
10 - The administrative distance determines the trustworthiness of the route source. Assuming that two separate routes are available to the same location, the router will use the following criteria for choosing between these routes. Put the criteria in order.
6.2.5
In this lab, your task is to:
Configure a static route to 10.0.0.0/8 network.
Configure a default route to the internet.
Save your changes to the startup-config file.
Complete this lab as follows:
1.
Select SFO
.
2.
Press Enter
to get started.
3.
At the SFO> prompt, type enable
and press Enter
.
4.
At the SFO# prompt, type configure terminal
and press Enter
.
5.
At the SFO(config)# prompt, type ip route 10.0.0.0 255.0.0.0 172.17.12.98
and press Enter
.
6.
At the SFO(config)# prompt, type ip route 0.0.0.0 0.0.0.0 160.12.99.1
and press Enter
.
7.
At the SFO(config)# prompt, type exit
and press Enter
.
8.
At the SFO# prompt, type copy run start
and press Enter
.
9.
Press Enter
to begin building the configuration.
6.2.6
1 - Match each routing method on the left with its associated characteristics on the right. Each routing method may be used once, more than once, or not at all.
2 - If you have one router on your network and the IP address doesn't match one of the devices on your network, where would the default static route direct packets?
To your Internet Service Provider
3 - Which of the following is a disadvantage of static routing?
Require more configuration time
4 - Match each route types with its description.
5 - You have issued the following command on your router:
Router(config)#ip route 202.22.12.0 255.255.255.0 192.168.1.1
Which of the following are configured by the parameters in this command?
A route to network 202.22.12.0 is added. AND The next hop router address is 192.168.1.1.
6 - You are the administrator of the network shown. You want to configure the stub network located in Tampa to forward packets to Chicago, but you do not want the overhead associated with a routing protocol. Which of the following will accomplish your goal?
Tampa(config)#
ip route 0.0.0.0 0.0.0.0 182.1.48.3
Chicago(config)#
ip route 182.1.48.0 255.255.240.0 182.1.48.4
Chicago(config)#
ip route 192.168.112.128 255.255.255.248 182.1.48.4
7 - You need to configure a static route on your Cisco router. The destination network is 192.65.178.0 with a subnet mask of 255.255.255.0. The default gateway is 192.65.179.1, and the
IP address of the destination host for the message is 192.65.178.15. Which of the following commands configures this route?
ip route 192.65.178.0 255.255.255.0 192.65.179.1
8 - You have a small network as shown. You want to configure a route so that packets sent to any non-directly connected network get sent to RouterB. Which command would you use?
ip route 0.0.0.0 0.0.0.0 192.168.4.14
9 - You have a small network as shown. You have configured RIP on both RouterA and RouterB. The show ip route
command on RouterA shows the following information: Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
R 10.0.0.0/8 [120/1] via 192.168.4.14, 00:00:02, Serial0/1/0
C 192.168.1.0/24 is directly connected, FastEthernet0/0
192.168.4.0/30 is subnetted, 1 subnets
C 192.168.4.12 is directly connected, Serial0/1/0
You want to configure a default route so that all packets for unknown networks are sent to RouterB. Which command should you use?
ip default-network 10.0.0.0
10 - You have a small network as shown. You have configured RIP on both RouterA and RouterB. The show ip route
command on RouterA shows the following information: Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
R 10.0.0.0/8 [120/1] via 192.168.4.2, 00:00:02, FastEthernet0/1
C 192.168.1.0/24 is directly connected, FastEthernet0/0
C* 192.168.4.0/24 is directly connected, FastEthernet0/1
C 192.168.2.0/24 is directly connected, FastEthernet0/2
RouterA receives a packet addressed to 172.16.0.1. What will RouterA do with the packet?
Drop the packet.
6.3.9
Lab Questions
Q1Which network is not directly connected to the SFO router?
Your answer: 192.168.129.0
Correct answer: 192.168.129.0
Q2The SFO router has a packet to send to host 192.168.127.12. What is the address of the next
hop router in the path?
Your answer: 10.10.0.2
Correct answer: 10.10.0.2
Q3The SFO router receives a packet addressed to host 192.168.130.155. Through which interface will SFO send out the packet?
Your answer: FastEthernet0/1
Correct answer: FastEthernet0/1
Q4How many hops away is network 192.168.64.0 from SFO?
Your answer: 1
Correct answer: 1
Explanation
In this lab, your task is to use the show ip route
command to find out the following:
1.
192.168.129.0 is the only network that is not directly connected to SFO. Directly connected networks are labeled with a C. 192.168.129.0 is a route learned through RIP and is designated with the letter R, as in the following line: R 192.168.127.0/24 [120/1] via 10.10.0.2, 00:00:05, Serial0/0/0.
2.
10.10.0.2 is the address of the next hop router when SFO sends a packet to host 192.168.127.12. To find this information, locate the destination network (192.168.127.0). The address of the next hop router is indicated by the address following via for the route: R 192.168.127.0/24 [120/1] via 10.10.0.2, 00:00:05, Serial0/0/0./li> 3.
FastEthernet0/1 is the SFO interface used to send packets to hosts in the 192.168.130.0 network. To find this information, locate the destination network (192.168.130.0). The last item in the routing table indicates the interface used to reach the destination network as in the following line: C 192.168.130.0/24 is directly connected, FastEthernet0/1.
4.
One hops exist between the 192.168.64.0 network and the SFO router. To find this information, look for the entry for network 192.168.64.0. The second number in brackets [120/1] indicates the hop count. The first number (120) is the administrative distance.
Complete this lab as follows:
1.
Select SFO
.
2.
Press Enter
to get started.
3.
At the SFO> prompt, type enable
and press Enter
.
4.
At the SFO# prompt, type show ip route
and press Enter
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Question 6
Consider the case when two end hosts communicate remotely, through multiple intermediate
network hops.
What is a routing table in that context?
Select all statements below that are correct.
O A data structure that does not contain any addresses / portions of addresses.
O A data structure containing transport-layer addresses (e.g. TCP/UDP port numbers) and no IP addresses (no
Network IDs).
O Information the router's CPU uses to select the best path between the remote hosts.
arrow_forward
Build and configure topology above in packet tracer, no python, c#, etc.
arrow_forward
True or false
6. Before sending a data packet into a packet-switching network, the source must determine all of the links that the packet will traverse between source and destination.
7. With non-persistent connections between a web browser and a web server, it is possible for a single TCP segment to carry two distinct HTTP request messages.
arrow_forward
A router interconnects a subnet, where all the interfaces of the subnets must have the prefix 164.132.62/24. suppose that the Subnet is required to support up to 60 interfaces, provide a network address that satisfies the above.
arrow_forward
posted so many multiple times dont waste my question will compliant
arrow_forward
Assume the maximum transmission unit (or MTU) of an IP packet on 100 Mbps Ethernet is set at 1500
bytes. Also, assume we are sending our file using IPv6 at the Network layer and UDP at the Transport layer. A
typical IPv6 header consists of 40 bytes, a UDP header consists of 8 bytes.
Answer the following three questions based on the information provided above. For all answers, enter
a decimal integer value without formatting (no commas).
1. How many packets do we have to send in order to transfer a file of 24KB over 100 Mbps Ethernet?
packets
2. How many bytes do we have to send at the network layer in order to transfer the above file entirely?
bytes
3. How many bytes do we have to send at the data link layer in order to transfer the above file entirely?
Assume that the Ethernet header is 14 bytes and the frame checksum is 4 bytes.
bytes
arrow_forward
MC9: In wireless LAN communication, MACA is widely used. In this protocol, in
order to avoid collision, a sender can send
sender is granted the privilege to send a frame to the receiver only after it receives
request signal to a receiver. The
replied from the receiver.
RTS, RTS
CTS, CTS
RTS, CTS
CTS, RTS
arrow_forward
B. Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a
DNS lookup is necessary to obtain the IP address.
Suppose that two DNS servers are visited before your host receives the IP address from DNS. The first DNS server visited is the local DNS cache, with an RTT
delay of RTTO = 5 msecs. The second DNS server contacted has an RTT of 8 msecs.
Initially, let's suppose that the Web page associated with the link contains exactly one object, consisting of a small amount of HTML text.
Suppose the RTT between the local host and the Web server containing the object is RTTHTTP=63 msecs.
1. Assuming zero transmission time for the HTML object, how much time elapses from when the client clicks on the link until the client receives the object?
2. Suppose the HTML object references 4 very small objects on the same web server. Neglecting transmission times, how much time elapses from when
the client…
arrow_forward
The gRPC protocol does not have this:
The gRPC protocol does not have this:
a) Support for streams of requests or streams of responses.
b) Ability to choose UDP or TCP for communication at the transport layer.
c) Ability for the client to specify how long it's willing to wait for a response by providing a timeout.
d) Use of HTTP/2 as an underlying protocol.
arrow_forward
An IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most significant bits are used as a network ID, and the 16 least significant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's. How many hosts (i.e., host IDs) can there be on a class B network?
arrow_forward
4. The original HTTP protocol used TCP/IP as the underlying protocol. For each
page, graphic, or applet, a separate TCP connection was constructed, used, and
terminated. This caused several problems: one referred to as the elephant and mice
problem and two aspects of connection overhead. Describe both problems. Why
were separate connections used? Would UDP rather than TCP be a good
alternative? What solution would you propose to these problems to improve HTTP
performance?
arrow_forward
Which two statements about routing protocols are true (choose 2).
a) OSPF elects designed routers on multi-access links.
b) RIP does not support classless routing.
c) EIGRP uses broadcast traffic to establish adjacencies with its neighbors.
d) RIP does not advertise a route beyond a hop count of 15.
e) IBGP is an internal routing protocol.
arrow_forward
Suppose within your web browser you click on a link to obtain a Web page. The IP address for the
associated URL is not cached in your local host, so a DNS lookup is necessary to obtain the IP
address. Suppose that three DNS servers are visited before your host receives the IP address from
DNS. The first DNS server visited is the local DNS cache, with an RTT delay of RTT = 4 msecs.
The second and third DNS servers contacted have RTTs of 45 and 24 msecs, respectively.
Initially, let's suppose that the Web page associated with the link contains exactly one object,
consisting of a small amount of HTML text. Suppose the RTT between the local host and the Web
server containing the object is RTTHTTP = 9 msecs.
Assuming zero transmission time for the HTML object, how much time elapses from when the
client clicks on the link until the client receives the object?
(Do not forget the TCP handshake(s).)
82 msecs
O 91 msecs
O 46 msecs
O 67 msecs
arrow_forward
A router receives a packet with destination address IP: 201.10.64.199 (please refer to the table attached to find the IP address)
Show how it finds the network and the subnetwork address to route the packet. Assume the number of subnetwork required is four.
arrow_forward
Thanks
arrow_forward
Use Wireshark software.
arrow_forward
Using packet tracer, implement a network that has the following components: 1- At least five routers
2- At least 7 subnets
3- At least 12 PCs
4- At least 4 switches
5- Use RIP routing protocol
To assign IP addresses of the routers and PCs, use the IP address from your ID as follows Assume your id is 118zyxw, Consider the numbers z, y, x and w as deciemal You have the subnet 118.0.0.0/24 If your ID is 1181234 then the IP is 118.0.0.0/24 Use this subnet to get at least 7 subnets.
arrow_forward
DO NOT COPY FROM OTHER WEBSITES
Upvote guarenteed for a correct and detailed answer. Thank you!!!
arrow_forward
Q10) Under which circumstance is a router on a stick most appropriate? * O When a router have multiple interface on single physical links O When a router have multiple subnets on a single physical link O When a router have single interface on multiple physical links O When a router have single subnet on multiple physical links
arrow_forward
Suppose the network layer provides the following service. The network layer in the sourcehost accepts a segment of maximum size 1,200 bytes and a destination host address from thetransport layer. The network layer then guarantees to deliver the segment to the transport layerat the destination host. Suppose many network application processes can be running at thedestination host In your protocols, does the transport layer “have to do anything” in the core of the computer network?
arrow_forward
Do it soon i will rate
arrow_forward
Given the following topology of a network, the router Node 3 connects the two subnets
together: Nodes 1 and 2 are 'inside' of the subnet neta, Nodes 4 and 5 are 'outside' of neta
and Node 3 with a firewall is the gateway of neta. The two networks have the prefix 192.168
as the first two octets in their IP addresses, e.g, Node 1 has IP address 192.168.1.11.
eth1: 1.11
eth1: 2.21
1
2
eth1: 1.12
neta
eth 1: 1.1
3
eth2: 2.1
netb
4
5
eth1: 2.22
(i) Suppose in the firewall on Node 3 the default policy is ACCEPT. Write packet
filtering rules for the following goal.
Suppose Node 5 hosts a web server supporting both HTTP and HTTPs. Set rules in Node 3
that prevents Node 2 from browsing any web pages at Node 5.
Now change in Node3 the default policy as DROP and write packet filtering rules for the
following goal.
(ii) Allow all nodes in the subnet neta to browsing HTTP pages hosted at Node 5.
(iii) Allow hosts in netb to SSH into Nodel.
arrow_forward
Refer to the network figure above, showing two Ethernet Subnets connected through an IP Router, answer the following question 1-5. The devices in each subnet are connected locally to each other through layer two intermediate devices such as Ethernet switch and ethernet hub. For each device in the subnets, both its Internet Protocol (IP )address and its MAC address (also called the Physical address or the Ethernet address are shown. The subnet mask used by all devices is 255.255.255.240 (which is the same as the prefix length “/28”).
1. If Client #1 wants to send a broadcast packet to all the devices on the left subnet (containing client #1, client #2, client #3) what destination IP address should be used? (Mention in both binary and decimal format.)
2. What is the first and last assignable IP address for the left subnet above (containing client #1 and #3)? (Mention in both binary and decimal format.)
arrow_forward
An IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most signi cant bits are used as a network ID, and the 16 least signi cant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's.
How many hosts (i.e., host IDs) can there be on a class B network?
arrow_forward
Suppose a user has a webserver running at a machine with the name www.nadir.edu.net.pk and IP address 10.10.10.10. The authoritative dns address for this web server is with the name dns.nadir.edu.net.pk and with IP address 11.11.11.11.
a. Write all the steps involved in inserting this webserver name in the DNS hierarchy.
b. Write all the steps involved in retrieving the IP address of www.nadir.edu.net.pk
arrow_forward
There are two hosts a and B, which are connected through router R1. The IP addresses and MAC
addresses of a, B and R1 are shown in the figure. Write out the ARP request packet sent by a to B and
the MAC address and IP address of the received ARP response packet. (including source address and
destination address).
220.168.11.16
A
00-15-C5-C6-CB-11
220.168.11.1 R1 220.168.10.1
02-21-13-16-42-910-15-C5-C6-08-11
220.168.10.12
MACE
00-15-CS-CB-C4-95
arrow_forward
Suppose Alice, with a Web-based e-mail account (such as Hotmail or Gmail), sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice’s host to Bob’s host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts.
arrow_forward
Protocols at the Transport Layer's Core Both TCP and UDP are known by their respective acronyms. Justify the decision to implement TCP rather than UDP in an application. Please provide two (2) separate instances.
arrow_forward
Suppose Alan, with a Web-based e-mail account (such as Gmail or Yahoo! Mail), sends a
message to Benson, who accesses his mail from his mail server using POP3. Discuss how the
message gets from Alan's host to Benson's host. Be sure to list the series of application-layer
protocols that are used to move the message between the two hosts.
arrow_forward
IPV4 is a Connection oriented
Protocol. *
False
True
Broadcast is the process of
sending a packet from one host
to a selected group of hosts. *
False
True
The prefix length is the number
of bits in the address that gives
the Host portion. "
False
True
The metric is used to decide
which route appears on the
routing table. *
True
False
The throughput value is greater
than The Bandwidth Value. *
True
False
O O
O O
arrow_forward
n this Question, you have been given the network address 199.11.55.0/24 to subnet and provide the IP addressing for the networks shown in the topology diagrams. You must determine the number of networks needed then design an appropriate addressing scheme. Place the correct address and mask in the addressing table. In this Question, the number of hosts is not important. You are only required to determine the number of subnets per topology example. Use the topology in Figure to answer the questions that follow.
How many networks are there? ________
How many bits should you allocate to create the required number of subnets?___
How many usable host addresses did this give you? ____________
What is the new subnet mask in decimal form? ________________
How many subnets are available for future use? ________________
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Related Questions
- Question 6 Consider the case when two end hosts communicate remotely, through multiple intermediate network hops. What is a routing table in that context? Select all statements below that are correct. O A data structure that does not contain any addresses / portions of addresses. O A data structure containing transport-layer addresses (e.g. TCP/UDP port numbers) and no IP addresses (no Network IDs). O Information the router's CPU uses to select the best path between the remote hosts.arrow_forwardBuild and configure topology above in packet tracer, no python, c#, etc.arrow_forwardTrue or false 6. Before sending a data packet into a packet-switching network, the source must determine all of the links that the packet will traverse between source and destination. 7. With non-persistent connections between a web browser and a web server, it is possible for a single TCP segment to carry two distinct HTTP request messages.arrow_forward
- A router interconnects a subnet, where all the interfaces of the subnets must have the prefix 164.132.62/24. suppose that the Subnet is required to support up to 60 interfaces, provide a network address that satisfies the above.arrow_forwardposted so many multiple times dont waste my question will compliantarrow_forwardAssume the maximum transmission unit (or MTU) of an IP packet on 100 Mbps Ethernet is set at 1500 bytes. Also, assume we are sending our file using IPv6 at the Network layer and UDP at the Transport layer. A typical IPv6 header consists of 40 bytes, a UDP header consists of 8 bytes. Answer the following three questions based on the information provided above. For all answers, enter a decimal integer value without formatting (no commas). 1. How many packets do we have to send in order to transfer a file of 24KB over 100 Mbps Ethernet? packets 2. How many bytes do we have to send at the network layer in order to transfer the above file entirely? bytes 3. How many bytes do we have to send at the data link layer in order to transfer the above file entirely? Assume that the Ethernet header is 14 bytes and the frame checksum is 4 bytes. bytesarrow_forward
- MC9: In wireless LAN communication, MACA is widely used. In this protocol, in order to avoid collision, a sender can send sender is granted the privilege to send a frame to the receiver only after it receives request signal to a receiver. The replied from the receiver. RTS, RTS CTS, CTS RTS, CTS CTS, RTSarrow_forwardB. Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS lookup is necessary to obtain the IP address. Suppose that two DNS servers are visited before your host receives the IP address from DNS. The first DNS server visited is the local DNS cache, with an RTT delay of RTTO = 5 msecs. The second DNS server contacted has an RTT of 8 msecs. Initially, let's suppose that the Web page associated with the link contains exactly one object, consisting of a small amount of HTML text. Suppose the RTT between the local host and the Web server containing the object is RTTHTTP=63 msecs. 1. Assuming zero transmission time for the HTML object, how much time elapses from when the client clicks on the link until the client receives the object? 2. Suppose the HTML object references 4 very small objects on the same web server. Neglecting transmission times, how much time elapses from when the client…arrow_forwardThe gRPC protocol does not have this: The gRPC protocol does not have this: a) Support for streams of requests or streams of responses. b) Ability to choose UDP or TCP for communication at the transport layer. c) Ability for the client to specify how long it's willing to wait for a response by providing a timeout. d) Use of HTTP/2 as an underlying protocol.arrow_forward
- An IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most significant bits are used as a network ID, and the 16 least significant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's. How many hosts (i.e., host IDs) can there be on a class B network?arrow_forward4. The original HTTP protocol used TCP/IP as the underlying protocol. For each page, graphic, or applet, a separate TCP connection was constructed, used, and terminated. This caused several problems: one referred to as the elephant and mice problem and two aspects of connection overhead. Describe both problems. Why were separate connections used? Would UDP rather than TCP be a good alternative? What solution would you propose to these problems to improve HTTP performance?arrow_forwardWhich two statements about routing protocols are true (choose 2). a) OSPF elects designed routers on multi-access links. b) RIP does not support classless routing. c) EIGRP uses broadcast traffic to establish adjacencies with its neighbors. d) RIP does not advertise a route beyond a hop count of 15. e) IBGP is an internal routing protocol.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning