Sei sulla pagina 1di 9

Divine Word University

Chapter 4-6 Review | Set 2


Name: Ishmael Faru
Chapter 4/5 Network Access and Ethernet
1. Fill in the table below 6 marks
Physical
Components

Media

UTP
Coaxial
Connecto

Frame Encoding
Technique
Manchester
Encoding
Non-Return Zero
(NRZ) techniques

rs

Signalling
Method

Copper
Cable

Fiber
Optic
Cable

Wireless
Media

Singlemode Fiber
Multimod
e Fiber

Access
Points
Radio
Antennae

Change in
the
electromagn
etic field
Intensity of
the
electromagn
etic field
Phase of
electromagn
etic wave

Pulses of light
Wavelength
multiplexing using
different

A pulse
equals 1
No pulse is 0

DSSS (direct
sequence spread
spectrum)
OFDM (orthogonal
frequency division
multiplexing

Radio Waves

2. Describe the following terms; 4 marks

Divine Word University


(a)

Bandwidth: is the capacity of a medium to carry data. Digital


bandwidth measures the amount of data that can flow from one place
to another in a given amount of time. Bandwidth is typically measured
in kilobits per second (kb/s) or megabits per second (Mb/s).
(b)
Throughput: is the measure of the transfer of bits across the
media over a given period of time.
(c)
Goodput: is the measure of usable data transferred over a given
period of time. Goodput is throughput minus traffic overhead for
establishing sessions, acknowledgements, and encapsulation.
(d)
Latency: refers to the amount of time, to include delays, for data
to travel from one given point to another.
3. There are two main types of fiber optic cables, single-mode and
multimode. Briefly explain the difference between Single-mode fiber
(SMF) and Multimode fiber (MMF). 2 marks
Single-Mode fiber (SMF) cables Consists of a very small core and uses
expensive laser technology to send a single ray of light. Popular in
long-distance situations spanning hundreds of kilometers such as
required in long haul telephony and cable TV applications. Whereas
Multimode fiber (MMF): Consists of a larger core and uses LED emitters
to send light pulses. Specifically, light from an LED enters the
multimode fiber at different angles. Popular in LANs because they can
be powered by low cost LEDs. It provides bandwidth up to 10 Gb/s over
link lengths of up to 550 meters.
4. Explain the functions of two sub-layers of the data-link layer, the LLC
and the MAC sub-layer? 2 marks
LLC sublayer
Handles communications between upper and lower layers.
Takes the network protocol data and adds control information to
help deliver the packet to the destination
MAC sublayer
Constitutes the lower sublayer of the data link layer.
Implemented by hardware, typically in the computer NIC.
Two primary responsibilities
o Data encapsulation

Divine Word University


o Media access control

5. Explain the difference between half-duplex and full-duplex


communication. 2 marks
In a point to point topology, data can flow in one of the two ways:
Half-duplex communication: Both devices can transmit and
receive on the media but cannot do it at the same time. One has
to send and the other receives, and then the other can send for
the other to receive. E.g. the 2A radio communication.
However, the second method involved a very different
technology.
Full duplex communication: Both devices can transmit and
receive on the media simultaneously. E.g. the mobile phones
can send and receive messages at the same time.
6. Briefly explain the difference between CSMA/CD and CSMA/CA. 2
marks
CSMA/CD stands for carrier sense multiple access collision
detection, while CSMA/CA stands for carrier sense multiple
access collision avoidance. As more nodes are added onto a
network, media use increases. This causes competition between
nodes to use media devices. These two methods (CSMA/CD and
CSMA/CA) are used to minimize data collision on media devices.
However they are different in function as listed.
CSMA/CD takes effect after a collision while CSMA/CA takes
effect before the collision. This means that in collision
detection, the sender does not inspect for idle medium
before sending packets but tries to recover data after the
collision occurred. However, in collision avoidance, the
sender makes sure that the medium is free before it starts
sending packets, thus, avoid data collision.
CSMA/CA reduces the possibility of a collision while
CSMA/CD only minimizes the recovery time.
CSMA/CD is typically used in wired networks while
CSMA/CA is used in wireless networks.

Divine Word University

7. The following shows the data-link Ethernet frame common fields. It


comprises of six main fields. Fill in the description for each field. 3
marks
Field
name
Size

Descripti
on

Preamble

Destinatio
n

Source

Type

Data

Frame
Check
Sequenc
e

8 bytes

6 bytes

6
bytes

2 bytes

46-1500
bytes

4 bytes

Used for
synchronization
; also contains a
delimiter to
mark the end of
the timing
information

48 bit
MAC
address for
the
destination
node.

48 bit
MAC
addres
s for
the
source
node

Value to
indicate
which
upper
layer
protocol
will
receive
the data
after the
Ethernet
process is
complete

The PDU
typically an
IPv4
packet, that
is to be
transported
over the
media

A value
used to
check for
damage
frames.

8. Explain the difference in functionality between the IP address and the MAC address of a
computer. 2 marks
MAC (Media Access Control) and IP (Internet Protocol) are the two addresses that
identify computers in a network. They are used to track data packets to ensure that they
get to where it was intended. The differences between these two addresses are:
An IP address is usually assigned by the network administrator or ISP (Internet
Service Provider), either static one at the beginning or given a dynamic one
automatically each time you connect to the network.
On the other hand, MAC addresses are embedded on the device or the network
card during manufacturing. They are permanent and could not be changed by
anyone as they are meant to identify a specific network interface card no matter
where it is in the world.
Experienced IT people can trace from an IP address to which network that
computer is connected to and consequently its approximate location. This is
possible because IP addresses are used in broadcast packets to initiate
communication.
With a MAC address, this is not possible as the address itself does not contain
information that lets you identify its location.
9. Briefly describe the function of the Address Resolution Protocol. 2 marks
The Address Resolution Protocol (ARP) feature performs a required function in IP
routing. ARP finds the hardware address, also known as the Media Access Control

Divine Word University


(MAC) address, of a host from its known IP address. ARP maintains a cache (table) in
which MAC addresses are mapped to IP addresses.
10. Cisco switches have two frame forwarding methods, store-and-forward and cut-through.
What is the difference between the two? 2 marks
The store and forward switch receives the entire frame, and computes the CRC (Cyclic
Redundancy Check). If the CRC is valid, the switch looks up the destination address,
which determines the outgoing interface. The frame is then forwarded out the correct
port.
On the other hand, a cut through switch starts forwarding parts of a frame as soon as it
receives the destination address, instead of waiting for the entire frame. At a minimum,
the destination address of the frame must be read before the frame can be forwarded.

Chapter 6 Network Layer


1. What is the primary function of the network layer? 1 mark
The primary function of the Network layer is to perform routing services.
The Network layer is concerned with the following functions:
a) Communication with the Transport layer above
b) Encapsulation of transport data (segments) into Network layer Protocol Data Units
(packets).
c) Management of connectivity and routing between hosts or networks.
d) Communication with the data link layer below.
2. Within a production network, what is the purpose of configuring a switch with a default
gateway address? 1 mark
Configuring a switch with a default gateway address will enable packets originating from
the switch to be forwarded directly to the destination devices in a remote network, as well
as allowing telnet access from devices in a remote network.

Divine Word University

3. Describe what each of the following router commands will do when used; 2 marks
a. Router(config-line)# password class- this command set the password as class.
b. Router(config)# banner motd# configures the message of the day.
c. Router(config) hostname CL1- configures routers hostname as CL1
d. Router# show ip route shows the ip addresses of routers and routing history.
4. A packet arrives at a router interface. The router goes through a series of steps to
determine where the packet should be forwarded. List the steps of the router forwarding
process. (Hint. There should be five 5 steps) 1 mark
The router de-encapsulates the layer 2 overhead information used by the lower layer uses
the IP address to forward the packets.
The steps involved in packet forwarding on a router are listed in the diagram extracted
from: http://www.highteck.net/EN/Network/OSI_Network_Layer.html

Divine Word University

5. The following diagram shows the R1 routers directly connected routing table entries.
What does each of the labeled fields (A, B, C) of the routing table identify? 3 marks

A
C

Labelled Field
A
B
C

192.168.10.0/24 is directly connected, GigabitEthernet0/0

Identifies
Identifies how the network was learnt by the router
Identifies the destination network and how it is connected.
Identifies the interface on the router connected to the destination network.

6. The following diagram shows the R1 routers remote network routing table entries. What
does each of the labeled fields (A to F) identify? 3 marks

A
Labelled Field
A
B
C
D
E
F

Identifies
Identifies how the network was learned by the router.
Identifies the destination network
Identifies the administrative distance (trustworthiness) of the route source
Identifies the metric to reach the remote network
Identifies the next hop IP address to reach the remote network.
Identifies the amount of elapsed time since the network was discovered.

7. Explain the boot process of a Cisco router (You may need to draw a suitable diagram to
aid your explanation). 3 marks
When the router is powered on, the ROM BIOS runs POST test.
The ROM BIOS searches for and loads the boot strap file.

Divine Word University


The boot loader program now loads all the IOS files from the flash to the RAM.
The IOS loads startup configuration stored in NVRAM to the running configuration.
The Router also connects to the FTP server and console port for further configuration or
access modes as commanded.

8. Refer to the following diagram. Write the configuration commands that will enable you to
configure the router with the following information. 5 marks
configure the hostname to R1
set the configuration mode password as cisco (it must be encrypted)
set the line console password to class and telnet password to mustang
configure the interface 0/0 with this ip address and subnet mask 192.168.10.1
255.255.255.0 (ensure to describe the interface as Link to Lan10 and turn
the interface on)

Configuration Task
configure the hostname to R1
set the configuration mode
password as cisco (it must be
encrypted)
set the line console password
to class and telnet password to
mustang

Command Line
Enable
Conf t
Hostname R1
Enable
Conf t
Enable password cisco
Service password-encryption
Enable secret class
Line console 0
Password class

Divine Word University


Login
Line vty 0 4
Login
Password mustang
configure the interface 0/0
with this ip address and
subnet mask 192.168.10.1
255.255.255.0 (ensure to
describe the interface as Link
to Lan10 and turn the
interface on)

Interface gigabitethernet 0/0


Ip address 192.168.10.1 255.255.255.0
Description Link to LAN-10
No shutdown

Potrebbero piacerti anche