ITEC_357_Review_1
.pdf
keyboard_arrow_up
School
Towson University *
*We aren’t endorsed by this school
Course
357
Subject
Computer Science
Date
Dec 6, 2023
Type
Pages
10
Uploaded by PrivateAlligatorPerson999
ITEC 357 Review #1 Name: _________________________________ 1.
Use the diagram to answer the following nine questions. (4 points each question
—
36 total) a.
How many subnets (networks) are in the topology? _______ b.
Assign the g0/0/0 interface on R1 the first available IP address on the network: ________.________.________.________ c.
Assign the g0/0/0 interface on R2 the first available IP address on the network: ________.________.________.________ d.
Assign the g0/0/1 interface on R1 the first available IP address on the network: ________.________.________.________ e.
Assign the g0/0/1 interface on R2 the last available IP address on the network: ________.________.________.________ f.
Assign PC1 the last available IP address on the subnet: ________.________.________.________ g.
Assign PC2 the last available IP address on the subnet: ________.________.________.________ h.
What is the default gateway address for PC3? ________.________.________.________ i.
How many total IP addresses are available on each network? ________
2.
List 3 characteristics of a Peer-to-Peer network: (3 points) 3.
List 3 characteristics of a client-server network: (3 points) 4.
What layer of the OSI model does HTTP function? (3 points) 5.
Explain the primary responsibility of the Network Layer. (3 points) 6.
Describe the Star topology. (3 points) 7.
What name is given to the process of adding a header to the data inherited from the layer above? (3 points) 8.
What is the commonly used IPv4 loopback address? (3 points) _______.________.________.________ 9.
List any two services and the associated port numbers that you know. (4 points each)
10.
Describe the concept of static routing. (4 points) 11.
Describe the concept of dynamic routing. (4 points) 12.
What is the following device? (3 points) 13.
What is the following device? (3 points) 14.
What are the MSDS sheets? (3 points)
15.
Answer the following questions based on the following output: a.
What is the block ID? (3 points) b.
What is the device ID? (3 points) c.
Assuming the default subnet mask is configured on the DNS serves, what network are those DNS servers on? (3 points) 16.
What does the block ID identify? (3 points) 17.
What does the device ID identify? (3 points)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
show the complete solu
arrow_forward
Draw a network design that you think will be useful in the future for the industry that you have visited. Network should include the following requirements:
3 routers
4 switches
10 PCs
4 VLANs.
Suitable IP addressing scheme in tabular form (assume as many hosts as necessary for each department).
Indicate where do you use static routing, dynamic routing protocols (name the protocols, RIP, EIGRP, OSPF, etc.), Access Control List (ACL) as per the network preferences. Justify your choices.
arrow_forward
4. The original HTTP protocol used TCP/IP as the underlying protocol. For each
page, graphic, or applet, a separate TCP connection was constructed, used, and
terminated. This caused several problems: one referred to as the elephant and mice
problem and two aspects of connection overhead. Describe both problems. Why
were separate connections used? Would UDP rather than TCP be a good
alternative? What solution would you propose to these problems to improve HTTP
performance?
arrow_forward
Using the network diagram and information given create an addressing scheme which utilizes
variable-length subnet masks. This company will be using the class C address 222.10.150.0.
Remember to start with your largest groups first.
WAN ADDRESS:
Boston
12 Hosts
LAN ADDRESS:
Toyko
GATEWAY ADDRESS:
IP ADDRESS RANGE:
LAN ADDRESS:
GATEWAY ADDRESS:
IP ADDRESS RANGE:
WAN ADDRESS:
24 Hosts
London
37 Hosts
LAN ADDRESS:
LAN ADDRESS:
GATEWAY ADDRESS:
IP ADDRESS RANGE:
GATEWAY ADDRESS:
IP ADDRESS RANGE:
arrow_forward
With reference to the Internet MIB-II group Figure below, state the object Identifier for the following nodes:
arrow_forward
w
ith reference to the Internet MIB-II group Figure below, state the object Identifier for the following nodes:
Internet
Experimental
mib-2 system
ip
icmp
tcp
transmission
arrow_forward
With reference to the Internet MIB-II group Figure below, state the object Identifier for the following nodes:
· Internet
· Experimental
· mib-2 system
· ip
· icmp
· tcp
· transmission.
arrow_forward
Help please
arrow_forward
Create a spanning tree for the given topology. Label all ports with their status i.e. Root, designated or block.
Note: STP link costs are shown in brackets
arrow_forward
Refer to the exhibit. There are 3 LAN networks in the diagram.
The network address given is 192.168.1.0/24. Your task is to do subnetting to support 62 hosts for each network.
arrow_forward
4- The Transmission Control Protocol (TCP) is known to be one of the most important protocol used in computer networks. It helps to understand and analyse the protocol most effectively and monitor and capture the traffic using a protocol analyser. Using Wireshark capture, analyse the TCP, identify source and destination MAC address, source and destination IP address, and show the full working out of your experiment in a logical structure.
arrow_forward
Using the network diagram and information given create an addressing scheme which utilizes
variable-length subnet masks. This company will be using the class C address 192.168.16.0. Re-
member to start with your largest groups first.
LAN ADDRESS:
WAN ADDRESS:
GATEWAY ADDRESS:
IP ADDRESS RANGE:
Baltimore
60 Hosts
Washington D.C
120 Hosts
LAN ADDRESS:
GATEWAY ADDRESS:
IP ADDRESS RANGE:
WAN ADDRESS:
Frederick
20 Hosts
LAN ADDRESS:
GATEWAY ADDRESS:
IP ADDRESS RANGE:
arrow_forward
Which address on a personal computer (PC) does not change, even if the PC is moved to a different network? Justify your answer.
Your answer:
2. Which OSI model layer manages communications in simplex, half-duplex, and full-duplex modes?
Your answer:
3.How does the OSI reference model guarantee independence of layer functionality?
arrow_forward
32- Is the following figure illustrates the correct GPRS infrastructure?
MSC
NLR
BSS
LA-Interface
Interface
Mobile
Subscriber
TRUE
FALSE
Gs-Interface
Gb- Interface
D- Interface
Gn-
Interface
GMSC
MSC
Gr-Interface
GB-
Interface
Gp-Interface
HLR
Ge- Interface
GGSN (Gateway
GPRS Support Node)
Gi- Interface
SGSN (Gateway
GPRS Support Node)
PSTN
Other
GPRS
arrow_forward
LANT
P
LAN 1
Task 9
Link state routing (open shortest path first protocol) is used in the given network.
F
F
Fa
F
F60
LAN 2
Fa
F
Gig
LAN 2
Bandwidths of Fast Ethernet (100 Mbps) and Gigabit Ethernet (1000 Mbps) are
known and the OSPF cost of an interface is defined as:
Cost 100Mbps/ (interface bandwidth).
Solve the subtasks below. Write down all assumptions.
a) Determine routing table of router A (15p)
Destination Next
A
vertex
1
B
с
D
E
F
G
H
OSPF cost
0
b) Determine the lowest OSPF cost from the device in LAN 1 to the device in
LAN 2. (5p)
c) Draw all sink trees for Router A. One graph should represent one sink tree.
(10p)
arrow_forward
Chose the appropriate terminology which expresses the following concepts:
(Flow control, A token-ring Network, RTT, star topology, non-persistent HTTP, persistent HTTP,
Network layer, Persistent, Interconnection, bus topology, Transport services, DNS).
NO
Terminology
Description
1
Is a deterministic network, meaning each station connected to the
network is assured access for transmission of its messages at regular
or fixed time intervals.
2
Multiple objects can be sent over single TCP connection between
client, server.
3
Allows users to exchange information (data) with other network
members.
All LAN data traffic is carried over a common coaxial cable link.
Value used for error checking.
Response time=2RTT+ file transmission time.
10
5
6
arrow_forward
Network topology is a physical arrangement of the network.
a) Draw a diagranm that shows 6 nodes of computer in Ring topology.
b) Based on your answer in (a), what will be happen if all these 6 nodes of computers are
disconnected but are connected to ONE host computer?
arrow_forward
Hi, please solve it correctly ,else i will downvote .
Subject code - rcs511
arrow_forward
• IPV6 addresses use 128 bits to represent an address which includes bits to be
used for subnetting. The second half of the address (least significant 64 bits)
is always used for hosts only. Therefore, there is no compromise if we subnet
the network. Use the Figure below to Create five subnets using route prefix
2001:db:acad::/48 (1 Marks)
Routing Prefix
Subnet
ID
Interface ID
48 Bits
16 Bits
64 Bits
arrow_forward
Discrete Mathematic Question:
Pretend we are defining a new class of networks: 1 byte for network IDs and 1 byte for hostID.
The definition of class A is:
networkdID is : 0xxx-xxxx and the one byte (8 bits) hostID cannot contain all 0s and 1s.
The definition of class B is:
networkdID is : 10xx-xxxx and the one byte (8 bits) hostID cannot contain all 0s and 1s
The definition of class C is:
networkdID is : 110x-xxxx and the one byte (8 bits) hostID cannot contain all 0s and 1s.
How many total IP addresses can we have with the above definition?
arrow_forward
Design and implement an addressing scheme with a given network address: 172.32.0.0/18. Subnet the allocated prefix into 5 networks with 8 addressable host on the first 4 subnetworks, and 2 addressable host on the 5th subnetwork.
arrow_forward
can anyone help me with this homework?
arrow_forward
SUBNET ADDRESSING
Consider the router and the two attached subnets below (A and B). The number of hosts is also shown below. The subnets share the 23 high-order
bits of the address space: 144.145.110.0/23
175 hosts
QUESTION 3 OF 10
A
Answer
What is the subnet address of subnet A? (CIDR notation)
144,145.110.0/23
Assign subnet addresses to each of the subnets (A and B) so that the amount of address space assigned is minimal, and at the same time leaving the
largest possible contiguous address space available for assignment if a new subnet were to be added. Then answer the questions below.
B
84 hosts
arrow_forward
Create a spanning tree for the given topology. Label all ports with their status i.e. Root, designated or block.
Note: STP link costs are shown in brackets
arrow_forward
6.4-2 Network- and Link-layer addressing: an end-to-end-scenario (1b). Consider the network shown below. The IP and MAC addresses are shown for hosts A, B, C and D,
as well as for the router's interfaces. Consider an IP datagram being sent from node B to node D. Match the source/destination network- or link-layer address at the location (4)
by choosing a value from the pulldown list. [Note: You can find more examples
problems similar to this here.]
49-FA-BO-3C-E2-70
128.119.50.60
68-01-BC-58-AF-24
128.119.50.107
4C-9D-AA-74-D6-1F
128.119.240.52
77-34-F1-EF-14-72
128.119.97.18
(1)
(2)
(5)
72-9E-4A-31-9C-42
128.119.240.15
D5-A0-EE-9A-73-D5
128.119.240.116
CC-A5-81-OB-AE-33
128.119.97.194
What is the source MAC address on the frame at point (4)?
1.128.119.50.60
* What is the destination MAC address on the frame at point (4)?
2.72-9E-4A-31-9C-42
e What is the source IP address of the datagram at point (4)?
3. 128.119,50.107
-
What is the destination IP address of the datagram at point (4)?…
arrow_forward
6.4-3 Network- and Link-layer addressing: an end-to-end-scenario (1c). Consider the network shown below. The IP and MAC addresses are shown for hosts A, B, C and D, as well as for the router's interfaces. Consider an IP datagram being sent from node B to node D. Match the source/destination network- or link-layer address at the location (5)by choosing a value from the pulldown list. [Note: You can find more examples of problems similar to this here.]
arrow_forward
3. Write the commands to configure the OSPFV3 in the following topology diagram.
Area 1
Area 0
Fa0/0
2001:DB8:1:12:/64
2001:DB8:1:1:/64
Fa0/0
So/o
::1
::2
R2
::2
::1
So/0
R1
::1
SO/0
::3
Area 14
Fa0/0
::1
Fa0/1
so/1
::4
2001:DB8:1:13::/64
R3
2001:DB8:1:14::/64
Fa0/0
R4
::4 Fa0/1
2001:DB8:1:4::/64
4.
a) Router R1
b) Router R2
c) Router R3
d) Router R4
2001:DB8:1:23:/64
arrow_forward
3. Write the commands to configure the OSPFV3 in the following topology diagram.
Area 1
Area 0
Fa0/0
2001:DB8:1:12::/64 A
2001:DB8:1:1::/64
Fa0/0
So/O
:1
::2
So/0
R2
::2
::1
R1
so/0
::1
SO/1
::3
::1
Area 14
Fa0/0
Fa0/1
::3
::4
2001:DB8:1:14:/64
2001:DB8:1:13::/64
R3
Fa0/0
R4
::4 Fa0/1
2001:DB8:1:4::/64
4.
a) Router R1
b) Router R2
c) Router R3
d) Router R4
4. Answer the following questions based on Layer 3 VLAN Configuration.
Routero
Fa0/0 10.10. 10.1/24
no switchportFa0/3 10. 10.10.2/24
trunk
Fa0/1
trunk
Multilayer
trunk
Fa0/1
Fa0/2
trunk
access vlan 2
Fa0/1
Fa0/2 Switcho
Switc access vlan 3
Fa0
Fa0/2
192. 168.3.0/24 (VLAN 3)
192. 168.2.0/24 (VLAN 2)
Fa0
PCO
PC1
a) Write the steps to configure VLAN in Layer 3 Switches.
b) How many VLANS are there in the above topology diagram
c) Identify the trunk link in the above topology diagram
d) How many sub-interfaces to be created in Router 0
e) Do we need any Routing Protocol or Static Route to be configured to communicate
from PC0 to PC1?…
arrow_forward
Consider the following virtual circuit network with three reserved virtual circuits:
уC1: H1, А, С, Е, Н2
VC2: H3, A, F, D, H4
ус3: НЗ, А, F, D, E, H2
Host H4
Host H3
Нost H2
Host H1
Draw the routing table of router D and the routing table of router C.
*you may design a table using the HTML editor or write the content of routing table
record by record (record per line).
arrow_forward
CSE1A
Eighth Question
arrow_forward
2. Subnetting a subnet or using variable-length subnet mask (VLSM) was designed to maximize addressing efficiency. You are required to subnet,
based on the number of hosts, including router interface and WAN interface and WAN connections for the following scenario:
•Toronto: 60 host addresses
•Montreal: 28 host addresses
•Ottawa: 12 host addresses
•Vancouver: 12 host addresses
•WAN1: 2 host addresses
•WAN2: 2 host addresses
•WAN3: 2 host addresses
Using the given address block of 192.168.15.0/24, you can design an address scheme for the network to meet its requirements and save potential
addresses. The data for Toronto is given to help you to fill the remaining all other columns.
Name
Toronto
Montreal
Ottawa
Vancouver
WAN1
WAN2
WAN3
Required no
of addresses
60
28
12
12
~~
2
2
2
Subnet Address
192.168.15.0
Address
Range
.1 - .62
Broadcast
Address
.63
Network/ Prefix
192.168.15.0 /26
19
arrow_forward
SUBNET ADDRESSING
Consider the router and the two attached subnets below (A and B). The number of hosts is also shown below. The subnets share the 23 high-order
bits of the address space: 144.145.110.0/23
:
A
175 hosts
QUESTION 2 OF 10
Answer
How many hosts can there be in this address space?
144.145.110.0/23
B
Assign subnet addresses to each of the subnets (A and B) so that the amount of address space assigned is minimal, and at the same time leaving the
largest possible contiguous address space available for assignment if a new subnet were to be added. Then answer the questions below.
84
hosts
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- show the complete soluarrow_forwardDraw a network design that you think will be useful in the future for the industry that you have visited. Network should include the following requirements: 3 routers 4 switches 10 PCs 4 VLANs. Suitable IP addressing scheme in tabular form (assume as many hosts as necessary for each department). Indicate where do you use static routing, dynamic routing protocols (name the protocols, RIP, EIGRP, OSPF, etc.), Access Control List (ACL) as per the network preferences. Justify your choices.arrow_forward4. The original HTTP protocol used TCP/IP as the underlying protocol. For each page, graphic, or applet, a separate TCP connection was constructed, used, and terminated. This caused several problems: one referred to as the elephant and mice problem and two aspects of connection overhead. Describe both problems. Why were separate connections used? Would UDP rather than TCP be a good alternative? What solution would you propose to these problems to improve HTTP performance?arrow_forward
- Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. This company will be using the class C address 222.10.150.0. Remember to start with your largest groups first. WAN ADDRESS: Boston 12 Hosts LAN ADDRESS: Toyko GATEWAY ADDRESS: IP ADDRESS RANGE: LAN ADDRESS: GATEWAY ADDRESS: IP ADDRESS RANGE: WAN ADDRESS: 24 Hosts London 37 Hosts LAN ADDRESS: LAN ADDRESS: GATEWAY ADDRESS: IP ADDRESS RANGE: GATEWAY ADDRESS: IP ADDRESS RANGE:arrow_forwardWith reference to the Internet MIB-II group Figure below, state the object Identifier for the following nodes:arrow_forwardw ith reference to the Internet MIB-II group Figure below, state the object Identifier for the following nodes: Internet Experimental mib-2 system ip icmp tcp transmissionarrow_forward
- With reference to the Internet MIB-II group Figure below, state the object Identifier for the following nodes: · Internet · Experimental · mib-2 system · ip · icmp · tcp · transmission.arrow_forwardHelp pleasearrow_forwardCreate a spanning tree for the given topology. Label all ports with their status i.e. Root, designated or block. Note: STP link costs are shown in bracketsarrow_forward
- Refer to the exhibit. There are 3 LAN networks in the diagram. The network address given is 192.168.1.0/24. Your task is to do subnetting to support 62 hosts for each network.arrow_forward4- The Transmission Control Protocol (TCP) is known to be one of the most important protocol used in computer networks. It helps to understand and analyse the protocol most effectively and monitor and capture the traffic using a protocol analyser. Using Wireshark capture, analyse the TCP, identify source and destination MAC address, source and destination IP address, and show the full working out of your experiment in a logical structure.arrow_forwardUsing the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. This company will be using the class C address 192.168.16.0. Re- member to start with your largest groups first. LAN ADDRESS: WAN ADDRESS: GATEWAY ADDRESS: IP ADDRESS RANGE: Baltimore 60 Hosts Washington D.C 120 Hosts LAN ADDRESS: GATEWAY ADDRESS: IP ADDRESS RANGE: WAN ADDRESS: Frederick 20 Hosts LAN ADDRESS: GATEWAY ADDRESS: IP ADDRESS RANGE:arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education