0% found this document useful (0 votes)
96 views42 pages

Elective-I-Fundamental of Networks-Assignment

Here are some common tools used to troubleshoot physical layer connectivity problems: - Cable tester: Used to test copper cables for continuity, opens, shorts, and termination quality. This helps identify faulty cables. - Toner probe and toner: The toner injects a signal into one end of a cable. The toner probe can trace the signal to identify the exact cable. This helps locate cables. - Light meter: Used with fiber optic cables to check for proper light levels and identify breaks or damage in fiber runs. - Optical time domain reflectometer (OTDR): A sophisticated light meter used to locate faults, breaks, or damage in fiber runs by analyzing back-reflected light signals. - Loop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views42 pages

Elective-I-Fundamental of Networks-Assignment

Here are some common tools used to troubleshoot physical layer connectivity problems: - Cable tester: Used to test copper cables for continuity, opens, shorts, and termination quality. This helps identify faulty cables. - Toner probe and toner: The toner injects a signal into one end of a cable. The toner probe can trace the signal to identify the exact cable. This helps locate cables. - Light meter: Used with fiber optic cables to check for proper light levels and identify breaks or damage in fiber runs. - Optical time domain reflectometer (OTDR): A sophisticated light meter used to locate faults, breaks, or damage in fiber runs by analyzing back-reflected light signals. - Loop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

RATHNAVEL SUBRAMANIAM COLLEGE OF ARTS AND

SCIENCE
(AUTONOUMUS), SULUR.
SCHOOL OF COMPUTER STUDIES (UG)
B.Sc. INFORMATION TECHNOLOGY
ASSIGNMENT

S.No Class Batch Semester Subject

2017- ELECTIVE-I- FUNDAMENTALS OF


1 II – B.Sc., IT III
2020 NETWORKS
UNIT-I

NETWORK SIGNALING
1. How does Manchester line code differ from Return-to-Zero and non-return-to-zero.

One such encoding technique is called return-to-zero. With this encoding method, the signal
returns to a zero state between each electrical pulse, as shown here. This method allows for a
digital signal that is self-clocking, meaning it doesn't need a source of synchronization, such as a
separate clock signal being sent, in order to decode the information. This is useful because it
prevents transmission errors with the data.

School of Computer Studies (UG) Page 1


In contrast, another digital encoding technique is called non-return-to-zero. With this signal, 1s
and 0s are represented by a significant change in the signal, typically a change between a
positive voltage and a negative voltage, which looks something like this.

By not returning to a zero state, this method can achieve the same data rate as return-to-zero
with half the bandwidth(amount of data) usage. However, non-return-to-zero is not a self-
clocking signal. This means it requires a separate clock signal in order to prevent transmission
errors.

School of Computer Studies (UG) Page 2


Another digital encoding method is called Manchester encoding. Manchester encoding
combines the information to be sent with a clock signal, which makes it self-clocking. With
Manchester encoding, information is represented by a high-to-low or low-to-high voltage
transition.

For example, this transition from a negative voltage to a positive voltage would be 0 and this
transition from a positive voltage to a negative voltage would be 1. The clocking element is
encoded by having the data transitions always occur at the middle of each bit period.

1. The service company in Chennai has just acquired another branch in the same city. You
are given the task of integrating the two e-mail systems so that messages can be
exchanged between the email servers. However, each network uses an email package
from a different vendor. Brief about TCP/IP protocol which will enable messages to be
exchanged between systems?

2. Based on the diagram which network line code technique is being used and explain the
technique.

School of Computer Studies (UG) Page 3


TWISTED PAIR
1.Draw the Coaxial cable and discuss the composition of it. State the reason why it is named
as coaxial.

Coaxial cabling is made up of four components. In the center is an inner conductor. This inner
conductor is usually made of copper, or copper that's been coated with tin, and it's used to
transmit data.

Surrounding the inner conductor is an insulator--usually made out of PVC.

Outside the PVC insulator is secondary mesh conductor, normally made out of aluminum or
tin-coated copper. This mesh conductor is usually used for grounding, and doesn't transmit
data.

The whole assembly is encased in a secondary, protective PVC sheath.

2.Mention and discuss the situations where we use an RJ-45 Connector.

School of Computer Studies (UG) Page 4


3. The network admin started networking wiring for a new Ethernet network at company's
main office. The project specifications call for category 5e UTP network cabling and RJ-
45 wall jacks. As well, you have a spool of Category 3 network cable in storage. Upon
investigation, it appears very similar to Category 5e wiring. Should you use category 3
cabling as a substitute for category 5e cabling to finish the project? State the reason.

4. The software company adding new wires in the building. The building has a false ceiling
that holds the lights. And would like to run your Ethernet cables in this area. Which type
of cable must can use for this purpose and explain?

School of Computer Studies (UG) Page 5


COAXIAL CABLE
5. Which connector type and cable grade is used to connect a cable modem to the Internet?

6. Which cable type is more immune to EMI, twisted pair or coaxial?


COAXIAL
7. The software company is working with an older 10 Base5 Ethernet network. Which
connector type will most likely encounter and how?

8. Name the below mentioned connectors and show their descriptions.

i)

School of Computer Studies (UG) Page 6


9. You have a small home network connected to the internet using an RG-6 cable. But you
need to replace some other cable type. What cable can be replaced in the place RG-6 and
why?

10. Which connector type will you most likely use in a broadband home internet service that
uses coaxial cable? State the reason.

FIBER OPTIC
11. In the fiber optic cable, how does light waves travel around corners?

Inside of a piece of fiber optic cable is the core. The core is made of extremely fine glass or
plastic that readily transmits light.

School of Computer Studies (UG) Page 7


Around the plastic or glass core is the cladding.

 Light travels in a straight line, but fiber optic networking cable rarely runs in a straight
line.
 If the cable goes around a corner, the light within it will want to keep going straight. The
job of the cladding is to bounce that light back into the center of the core as the
network cable goes around corners.

Surrounding the cladding are several layers of sheathing that protect the cladding and the inner
glass core.

12. Which connector types combine two strands of fiber into a single connector?
Most Ethernet over fiber will use two strands of fiber.
13. Optical fiber would usually be used to connect two buildings across campus from each
other as well both the buildings are several kilometers apart. What type of fiber optic
cable is used for this scenario?

14. Name the below mentioned connector and show their description.

i)

WIRING IMPLEMENTATION
15. Identify the following cable and discuss the standards of this cable.

School of Computer Studies (UG) Page 8


This is a straight through UTP cable, unshielded twisted pair.
Each end has an 8 pin RJ45 connector, let's call this end A and let's call this other end B.
If we're making a straight through UTP cable, then the internal wires within the cable will
connect to the same RJ45 pin on each end of the cable.
In other words, the cables go straight through to the other side. This means that Pin 1 on End A
connects to Pin 1 on End B, Pin 2 on Pin A connects to Pin 2 on End B and so on.
Straight through cables are primarily used to connect computers as well as some other network
devices such as a router to a network switch or to a network hub.

 Let's suppose that we're dealing with a situation where we don't have a switch or a hub
available but we still need to connect two different computers together.

 We're going to connect them straight without a switch in between.

 If I were to connect these two computers together using a straight through cable, we
would have a problem because the receive pins on each side would be connected to each
other and the transmit pins on each side would be connected to each other. That won't
work.

 In essence, when a computer tried to transmit, it would send the data to the other
computers' transmit port. The other computer is not looking for data on its transmit pin,
it's looking for data on its receive pins. What we need to do is construct our cable such
that the transmit pin on one end is wired to the receive pin on the other in this particular
situation.

16. You are working with 25 pair wires and 49 blocks. You have pushed the wires on to the
49 block, Which tool is used for cut off the excess end of each wire? Explain.

17. Network that occupies all three floors of a building. The WAN service provider has
installed the line for the WAN service into the building in a wiring closet on the main

School of Computer Studies (UG) Page 9


floor. You have a wiring closet on the two remaining floors directly above the wiring
closet on the main floor. What would you use to connect the wiring closets together?

TROUBLESHOOTING NETWORK MEDIA


18. For the below mentioned scenario, which polish grade should you use to replace the
existing cable? Network administrator asked to replace a fiber optic cable that is
connecting two switches together. Admin has to inspect the existing fiber cable and
determine that it uses LC connectors. And also notice the cable’s ferrule has a slight slant
to it.

19. Explain the tools used to reduce the troubleshooting physical connectivity problems?
Loopback plugs, smartjacks, cable testers, TDR/OTDR, cable certifiers, toner probes,
multmeters.

20. Consider the 850nm multimode fiber optic cable shown below. Explain the process

School of Computer Studies (UG) Page 10


between the transmitter and receiver.

UNIT III

1. Discuss the network component which connects a device with the transmission media and
allows it to send and receive messages.

2. Define Modem and explain how it works.


Definition: a combined device for modulation and demodulation, for example, between
the digital data of a computer and the analogue signal of a telephone line.

School of Computer Studies (UG) Page 11


A modem is typically used to send digital data over a phone line. The
sending modem modulates the data into a signal that is compatible with the phone line,
and the receiving modem demodulates the signal back into digital data.
Wireless modems convert digital data into radio signals and back.

3. You have a server that has a 100BaseFX network interface card that you need to connect
to a switch. The switch only has 100BaseTX switch ports. Which device is suitable for
the above scenario?

4. What type of modules might a switch use to allow it to modify the media type supported
by a switch port?

5. Give an example of MAC address and explain it.


00:1B:44:11:3A:B7
Explanation: REFER CLASS WORK
6. Differentiate between a bridge and a switch.
1. Bridge is is device which divides a network into two. Switch connects multiple
networks.

2. Bridge are software based and switch is a hardware based.

3. Bridge can have upto 16 ports while switch can handle many ports.

School of Computer Studies (UG) Page 12


4. Bridge is rarely used. Switches are frequently used.
7. Differentiate switches over hubs.
A hub is a device that connects multiple Ethernet devices on one network and makes
them act together as a single network. A hub does not gather information and input in one
port results as an output in all ports on the network. A switch is a networking device that
performs the same job as the hub but are considered as a more intelligent hub as it gathers
information about the data packets it receives and forwards it to only the network that it
was intended for.

A hub is a connection point for A switch is multi-port


different segments of a LAN. It networking device that connects
contains multiple ports and network devices together. A
when it receives a packet of switch operates at the data link
definition
information at one port, it copies layer (layer 2) of the OSI model.
this packet to all segments of the A switch filters and then
LAN so that it can be viewed by forwards data packets between
all ports. networks.

Layer Physical Layer (Layer 1) Data Link Layer (Layer 2)

8. What type of device do we use to translate from one network architecture to another?
MEDIA CONVERTERS
9. How does a router differ from a switch or a hub?
Routers might have a single WAN port and a single LAN port and are designed to
connect an existing LAN hub or switch to a WAN. Ethernet switches and hubs can be
connected to a router with multiple PC ports to expand a LAN. ... Somerouters even
have USB ports, and more commonly, wireless access points built into them.

School of Computer Studies (UG) Page 13


10. Which is the best device to deploy to protect your private network from a public
untrusted network?

11. A device wants to send a message to another device with the IP address 115.99.80.157.
IP does not know the hardware address of the destination device. Which protocol can be
used to discover the MAC address?
ARP
12. Give short note on the function of switch. REFER CLASS WORK
13. Name the hardware device that regenerates a signal out all connected ports without
examining the frame or packet contents. Sketch and discuss the roles of that hardware
device. Ans:hub,repeater
14. An 8-port switch receives a frame on port number 1. The frame is addressed to an
unknown device. What will the switch do?

15. Explain the various role of a router. REFER CLASS WORK


16. Explain how does a firewall protect a network?
A firewall is a system that is designed to prevent unauthorized access to or from a private
network. All communication between your computer and internet flows through the
firewall since it lies between your computer network and the Internet.
Internet connection leaves you vulnerable to hackers who want to access your financial
and personal information. Some hackers may be after your high-speed connection so that
they can send malicious viruses and worms, blackening your reputation. Other intruders

School of Computer Studies (UG) Page 14


have the power to destroy your operating system on a whim.

A firewall works as a barrier, or a shield, between your computer network and internet.
When you are connected to the Internet, you are constantly sending and receiving
information. All messages entering or leaving the intranet pass through the firewall,
which examines each message and blocks those that do not meet the specified security
criteria.

Firewalls provide security over a number of online threats such as Remote login, Trojan
backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many
more.
17. Which of the following hardware devices links multiple networks and directs traffic
between networks? ANS:ROUTER
18. You are the network administrator for an IT industry. Recently, you contracted with an
ISP to connect your office network to the internet to provide users with internet access.
While doing, an intruder has invaded your network from the internet on three separate
occasions. What type of network hardware should you implement to prevent this from
happening again?

19. Explain the reason to install a firewall in your network?


A firewall is a system that is designed to prevent unauthorized access to or from a private
network. All communication between your computer and internet flows through the
firewall since it lies between your computer network and the Internet.
Internet connection leaves you vulnerable to hackers who want to access your financial
and personal information. Some hackers may be after your high-speed connection so that
they can send malicious viruses and worms, blackening your reputation. Other intruders
have the power to destroy your operating system on a whim.

School of Computer Studies (UG) Page 15


A firewall works as a barrier, or a shield, between your computer network and internet.
When you are connected to the Internet, you are constantly sending and receiving
information. All messages entering or leaving the intranet pass through the firewall,
which examines each message and blocks those that do not meet the specified security
criteria.

Firewalls provide security over a number of online threats such as Remote login, Trojan
backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many
more.

20. You are an administrator of an IT company’s network. You want to prevent unauthorized
access to your intranet from the internet. How to implement this process?

UNIT-IV
ETHERNET
1. What topologies are used when in the Ethernet, Computers are connected to the network
using networking medium. Discuss it.

Ethernet uses the following networking topologies, depending upon the


Topology specification being implemented:

 Physical bus, logical bus

School of Computer Studies (UG) Page 16


 Physical star, logical bus
 Physical star, logical star

3. Discuss it: Computers Aa, Bb, and Cc are connected to the network medium, all are
sending the transmitting messages at the same time.

Computers A, B, and C are connected to the network medium.

Suppose computer A needs to send a message to computer B. According to the CSMA/CD media
access method, the first thing computer A must do is listen to the transmission medium to see if data
is already being transmitted. This is called carrier sense. It's like using a two-way radio. Before
you talk, you briefly listen to see if anybody else is already talking.

Computer A listens to the medium, determines that it is clear, and transmits its message to computer
B. When the message is sent to computer B, it also arrives at computer C because we're using a
physical bus topology.

Computer B receives the message and determines that it is addressed to itself, so it accepts that
message and processes it. Computer C realizes that the message is not addressed to it, so it
discards the message.

Suppose computer C has a message to send to computer B. It would go through the same process.
First, it listens to the medium to determine if it is busy. This time, computer A is in the middle of a
transmission. Computer C can tell that there's a signal being transmitted on the wire. It waits a
random period of time and then listens again. While it waits, computer A finishes its transmission and
the transmission medium becomes clear. Computer C determines that the medium is now free and
can transmit the message to computer B.

4. What is jam signal ? What occurs in the network medium if jam signal happens?

jam signal to inform all hosts that a collision has occurred.

After the jam signal, the devices perform a back-off, where they each wait a random amount of time
before starting the process all over again.

Ideally, if computer A and computer C send a jam signal at the same time, then they both back off
at the same time.

Because the back-off time is random, one of them should back off a little longer than the other.

Let's say computer C backs off a shorter amount of time. After the back-off period, it senses the wire
again, notices that it's not being used, and then transmits its message. Computer A backs-off for a longer
period and then senses the wire. It notices that computer C is already transmitting and must wait to
transmit.

School of Computer Studies (UG) Page 17


5. What is Carrier Sense Multiple Access Collision Detect (CSMA/CD)?
REFER CLASS WORK
6. In Ethernet network, what is the need for replacing a hub with a switch?

To eliminate collisions. A switch offers a guaranteed transmission path between two connected
devices. This network has four devices connected through a switch. When one device needs to send a
message, logical circuits inside of the switch automatically close off and send that message to just the
destination device. Instead of the message being sent out to all the devices, the message goes only to
the destination device. A switch can simultaneously switch multiple messages. For example, we
have a dedicated path between these two devices, yet these two devices can also establish a dedicated
path for communications. The communication path is used only between the two devices; it isn't used
by any other devices. Collisions are completely eliminated as a result.

Without collisions, there's no need for carrier sense or collision detection. Devices, as soon as they are
ready to transmit, simply transmit. They also do not try to sense collisions.

When you're using a switch, the media access method isn't used. It's still there in the specifications,
but the devices don't need it. Switched Ethernet networks are much faster than hub-based networks.
As you add more devices to the network, the number of collisions remains at zero.

7. Sketch and illustrate the devices that are supported on an Ethernet network?
Devices used on Ethernet networks include:

 NICs
 Hubs (obsolete)
 Switches
 Routers

School of Computer Studies (UG) Page 18


8. What is the purpose of the backoff on Ethernet networks?
After the jam signal, the devices perform a back-off, where they each wait a random amount
of time before starting the process all over again.
Ideally, if computer A and computer C send a jam signal at the same time, then they both
back off at the same time.
Because the back-off time is random, one of them should back off a little longer than the other.

Let's say computer C backs off a shorter amount of time. After the back-off period, it senses the wire
again, notices that it's not being used, and then transmits its message. Computer A backs-off for a longer
period and then senses the wire. It notices that computer C is already transmitting and must wait to
transmit.

9. How can you eliminate collisions on an Ethernet network?


To eliminate collisions. A switch offers a guaranteed transmission path between two
connected devices. This network has four devices connected through a switch. When one
device needs to send a message, logical circuits inside of the switch automatically close off and
send that message to just the destination device. Instead of the message being sent out to all
the devices, the message goes only to the destination device. A switch can simultaneously
switch multiple messages. For example, we have a dedicated path between these two
devices, yet these two devices can also establish a dedicated path for communications. The
communication path is used only between the two devices; it isn't used by any other devices.
Collisions are completely eliminated as a result.
Without collisions, there's no need for carrier sense or collision detection. Devices, as soon as
they are ready to transmit, simply transmit. They also do not try to sense collisions.

School of Computer Studies (UG) Page 19


When you're using a switch, the media access method isn't used. It's still there in the
specifications, but the devices don't need it. Switched Ethernet networks are much faster than
hub-based networks. As you add more devices to the network, the number of collisions remains at
zero.

10. What device is used to enable full-duplex communications with Ethernet?


switch
ETHERNET SPECIFICATIONS
11. Company A tasked with designing a high-speed Ethernet network. Your client’s
building already has 500-ohm shielded twisted pair wiring installed. Due to budget
constraints, they have been asked you to reuse the existing wiring instead of installing
new fiber-optic cabling. Which Ethernet standard could you implement in this
situation?
10 G BASE T
12. Network that uses 1000BaseT Ethernet. You find that one device communicates on the
network at only 100 Mbps. Which tool should you use to test the drop cable and the
connection to the network?
1. Name the Ethernet standards that use fiber optic cabling and illustrate the Ethernet
naming conventions.

School of Computer Studies (UG) Page 20


2. You are planning a network for an school campus. Due to the size of the building and the
distance between them, you have elected to use 100BaseFL hubs, cabling, and
network interface cards. Give the maximum length of the network cable between a
workstation and a hub. Justify you answer. \

3. State the appropriate cable type is suitable for the below situations:
i) to connect a router to the uplink port on a switch
ii) to connect two switches together using their uplink ports
iii) to connect a workstation to a regular port on a hub or a switch
ANS:

School of Computer Studies (UG) Page 21


i) cross-over ii) cross-over iii)straight through
CONNECTING NETWORK DEVICES
1. How to connect the wires within the connectors? You want to create a rollover cable that
has an RJ-45 connector on both ends.

4. The company has four computers that need to communicate with each other and the
internet. The ISP’s cable modem has only one RJ45 port. You need to set up the
network with the following in mind:
 Speed as little money as possible.
 Do not purchase unnecessary equipment.
 Computers need to have a gigabit connection to the network.
 New devices should not require management or configuration.
You examine each computer and notice only one of the four computers has a wireless
NIC; they all have Ethernet NICs. What should you purchase? Why?

School of Computer Studies (UG) Page 22


TROUBLESHOOTING PHYSICAL CONNECTIVITY
1. What happens if there is a cable break on a physical bus topology?

2. What are the tools that are used to measure the voltage, amps, and ohms of various
devices.

5. Name and explain about the device that allows the service provider to remotely test the
local loop?

School of Computer Studies (UG) Page 23


6. You are moving a client to a new location with an Ethernet network and the client
system did not have difficulty accessing the network. During the relocation, you attach a
patch cable from the client system to the wall jack and from the patch panel to the
switch. Once connected you do not get a link light on the network card or the switch.
What problem you suspect and illustrate the reason behind the problem?

7. You are creating an Ethernet network for the company A. One of the department is
located in a different building that is located 150 meters from the main wiring closet.
You connect a single Cat6e cable to connect the wiring closet to the shipping building.
Briefly explain the conditions that you most likely to experience.

School of Computer Studies (UG) Page 24


UNIT-V
IP ADDRESSES
41. List the IP address classes with its range of values. And give the appropriate order to
represent the IP address class.

42. Which two of the following IP addresses are Class B addresses? Point out the reason for
identifying that as Class B addresses.
i) 224.15.55.2 ii) 190.65.2.0 iii) 129.0.0.0 iv) 115.33.0.0
ANS: ii) 190.65.2.0 iii) 129.0.0.0
43. Give any two IP addresses have a default subnet mask of 255.255.0.0.
ANS: 168.16.5.1, 191.168.2.15

School of Computer Studies (UG) Page 25


44. You manage a subnet that uses the subnet address of 198.162.1.0/23. For this statement
which of the following method describes how addressing is configured for the subnet?
Describe that method.
i) Supernetting ii) Subnetting iii) Classful iv) Private

45. Which organization is responsible for allocating public IP addresses? Discuss.

46. What do you meant by variable-length subnet masking?

School of Computer Studies (UG) Page 26


Classless addresses, on the other hand, use a custom mask value to separate the
network and host portions of the IP address. Classless addressing is made possible
using Classless Inter-Domain Routing (CIDR). CIDR allows you to use only part of an
octet for the network address. This is called partial subnetting, or variable-length
subnet masking (VLSM).

47. How the network portion of an IP address identified?

The IP address actually includes two different addresses; the subnet address and
the host address. Part of the IP address identifies the subnet, and the other part
identifies the host. Where this division occurs is the function of the subnet mask.

A subnet mask looks like an IP address; it has four octets. The subnet mask
identifies which portion of the IP address is the subnet address and which is the
host address. Wherever you see 255 you know that this octet is part of the
network address. In this example, the subnet address is 167.12.0.0, while the host
address, indicated by zeros in the subnet mask, is 155.16. You can have multiple
hosts on the same subnet, and each host must have a different host address. All
hosts on the same subnet share the same subnet address, but must have unique
host addresses.

48. Detail about CIDR notation.


49. Company A manage a server that uses an IP address of 192.168.255.188 with a mask of
255.255.0.0. What is the address type follow by the above statement? Why?

School of Computer Studies (UG) Page 27


50. You have decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to
create four separate subnets. What are the possible network IDs will be assigned to these
subnets in this configuration?

51. Small network connected to the internet as shown in the diagram. You need to configure
the default gateway address on Wrk1 so that it can communicate with hosts on the
internet. Which address would you use for the default gateway address? State the reason.

School of Computer Studies (UG) Page 28


52. A small network with a single subnet connected to the internet as shown in the exhibit.
The router has been assigned the two addresses shown.

You need to manually configure the workstation to connect to the network. The
workstation should use RouterA as the default gateway, and DNS1 as the DNS server
address. Write the appropriate parameters to configure the workstation’s TCP/IP
settings.

53. Recently created a new network segment for development. Because the hosts are now on
a different network segment, they no longer contact the DHCP server. Both segments are
connected via a router. What will be action has to be taken in order to fix this problem?

School of Computer Studies (UG) Page 29


54. A small company with 14 client systems and a network printer. Because there are only a
limited number of networked systems, you decide to use APIPA addressing for the
network. With APIPA configured, all systems are able to communicate with each other
but you are having trouble while configuring internet access. What is the likely cause of
the problem?

ALTERNATING IP ADDRESS
55. Mention the disadvantages of Static IP Assignment.

The slightest network change, such as a new DNS server address, requires a
significant amount of effort on the part of the network administrator.

This strategy also uses IP addresses inefficiently. This is a concern the


organization uses registered IP addresses, which can be hard to obtain. If the static
assignment method is used, addresses are immediately consumed when it is assigned to
hosts, whether they're actually needed or not.

Suppose that on the network two of the hosts are used by dayshift workers, and two of
the hosts are used by nightshift workers. We only need two IP addresses at any given
time. During the day, just two hosts are on, and during the night just two hosts are
on. If static IP address assignments are used, then all four addresses are consumed,
whether or not they're actually in use.

School of Computer Studies (UG) Page 30


Using a static IP address assignment strategy has its place, especially when managing
servers and other network infrastructure devices. We want to assign servers and routers
static IP addresses that don't change.

56. How does DHCP works?

A DHCP server is a special server configured to pass out IP addresses and other IP configuration
information to network clients. It ensures that each client is assigned a unique IP address.

 When a DHCP client system boots, it contacts the DHCP server for IP configuration
information. The DHCP server is configured with a range of IP addresses it can assign to
hosts. These ranges are called scopes.
o The DHCP server can be configured to prevent specific addresses in the range
from being assigned to clients. This is called an exclusion.
o You can also configure a DHCP server to deliver the same address to a specific
host each time it requests an address. This is called a reservation.
 The DHCP server can also be configured to pass out other IP configuration information, such
as the default gateway and DNS server addresses.
 The DHCP server assigns the IP address and other information to the client. The assignment
is called alease, and it includes a lease time that identifies how long the client can use the IP
address.
o Periodically, the client contacts the DHCP server to renew the lease on the IP
address. The client will also attempt to renew the lease on the same IP address if it
reboots.
o The DHCP lease process uses broadcast frames at Layer 2. For this reason, DHCP
requests do not pass through routers to other subnets by default. To enable DHCP
broadcasts between subnets, enable IP helper or DHCP relay on the appropriate
routers.
 Any client configured to use DHCP can get an IP address from any server configured for
DHCP, regardless of its operating system.

41. How do you know if a host is using an APIPA address?


When troubleshooting connectivity problems, if you see that a host has an address starting
with 169, you know it's an APIPA address. It had to take over because the DHCP server
wasn't available.

42. Which IP configuration parameters are set when APIPA is used? Which parameters are
not set?

School of Computer Studies (UG) Page 31


43. In which scenarios would an alternate IP configuration simplify IP configuration?

44. What will be the IP address ranges is reserved for Automatic Private IP Addressing?
Explain.

For example, suppose host A gets an address of 192.168.1.25 from the DHCP
server. Then a network cable gets damaged and the DHCP server is no longer
accessible. At this point, host Band C are powered on. Because they can't contact
the DHPC server, they select an address out of the APIPA address range, such
as 169.254.0.1 and 169.254.0.2. In this situation, hosts B and C are able to
communicate because of APIPA. However, host A can't communicate with hosts B
and C. Most network infrastructure devices have static IP addresses assigned and
are not affected by a DHCP server outage. Suppose this server has an IP address
of 192.168.1.2 statically assigned to it. After the DHCP server goes down, host
A can still communicate with the server.

However, hosts B and C cannot. The default gateway router has an IP address of
192.168.1.254 statically assigned to it. After the DHCP outage, host A can still go
out through the default gateway to other networks, including the Internet. APIPA
does not assign a gateway router address, nor is the statically assigned address
on the router on the same logical network as the APIPA-assigned host
addresses. Hosts B and C can only communicate on the local network
segment. They can't access other networks, nor do they have Internet access.

UNIT-IV

1. A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The
address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need
to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to
be assigned to other hosts?

SOLUTION:

If the block of addresses allocated to the pool is 192.168.10.0/24, there are 254 IP addresses to
be assigned to hosts on the network. As there are 3 printers which need to have their addresses
assigned statically, then there are 251 IP addresses left for assignment.

2. If a network device has a mask of /28, how many IP addresses are available for hosts on this
network? Explain.

School of Computer Studies (UG) Page 32


SOLUTION:

A /28 mask is the same as 255.255.255.240. This leaves 4 host bits. With 4 host bits, 16
IP addresses are possible, but one address represents the subnet number and one address
represents the broadcast address. 14 addresses can then be used to assign to network devices.

3. A network administrator wants to have the same network mask for all networks at a particular
small site. The site has the following networks and number of devices:

IP phones – 22 addresses

PCs – 20 addresses needed

Printers – 2 addresses needed

Scanners – 2 addresses needed

The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site.
Which single subnet mask would make the most efficient use of the available addresses to use
for the four sub networks?

SOLUTION:

If the same mask is to be used, then the network with the most hosts must be examined for the
number of hosts, which in this case is 22 hosts. Thus, 5 host bits are needed. The /27 or
255.255.255.224 subnet mask would be appropriate to use for these networks.

4. You have a network with 50 workstations. You want to automatically configure workstations
with the IP address, subnet mask and default gateway values. Which device should you use?
Explain.

SOLUTION:

DHCP Sever

5. Explain the steps involved in configuring a DHCP server through Cisco Packet Tracer for the
following Topology.

School of Computer Studies (UG) Page 33


SOLUTION:
Step 1: Open packettracer.

Step 2: Choose the end devices and select one server paste.

Step 3: And choose switch and paste.

Step 4: And collect N number of client pc and paste finally.

Step 5: All the devices connected to the cable copper straight through.

Step 6: By clicking server choose services go to DHCP option-->click service on-->type pool
name-->type start IP address finally select add.

Step7: Select any client and go for desktop-->click option DHCP automaticlly the IP address
allocated by DHCP server.

6. How to reduce the troubleshooting configuration problems with IPConfig facts explain in
detail.

ipconfig /all to troubleshoot IP configuration problems. The following table describes how the
output for this command changes, based on how IP settings are configured and for specific
problem situations:

Condition ipconfig /all Output

Static IP If the workstation is configured with static IP information, the


Configuration following conditions will exist:

School of Computer Studies (UG) Page 34


 The DHCP Enabled line will show No.

 The DHCP Server line will not be shown.

If the workstation has received configuration information from a


DHCP server, the following conditions will exist:
DHCP
 The DHCP Enabled line will show Yes.
Configuration
 The DHCP Server line will show the IP address of the
DHCP server that sent the configuration information.

A rogue DHCP server is an unauthorized DHCP server on the


network. Symptoms of a rogue DHCP server include:

 Conflicting IP addresses on the network

 Incorrect IP configuration information on some hosts


Rogue DHCP
Server To identify a rogue DHCP server using ipconfig, verify the DHCP
server address. If this address is not the address of your DHCP
server, you have a rogue DHCP server.

When you have a rogue DHCP server on the network, some hosts
will likely receive configuration information from the correct
DHCP server and others from the rogue DHCP server.

Your DHCP server can send out various IP configuration values,


like the IP address and mask. If network hosts are configured with
Incorrectly incorrect IP values (such as incorrect default gateway or DNS
Configured server addresses), first verify that the workstations are contacting
DHCP Server the correct DHCP server. If the correct server is being used, go to
the DHCP server to verify that it is sending out correct
configuration information.

If the workstation used APIPA to set configuration information,


APIPA the following conditions will exist:
Configuration
 The DHCP Enabled line will show Yes.

School of Computer Studies (UG) Page 35


 The DHCP Server line will not be shown.

 The IP address will be in the range of 169.254.0.1 to


169.254.255.254, with a mask of 255.255.0.0.

 The Default Gateway line will be blank.

 The DNS Servers line will not include any IPv4 addresses.

When APIPA is used, the workstation sets its own IP address and
mask. It does not automatically configure default gateway or DNS
server values. When APIPA is being used:

 Communication is restricted to hosts within the same


subnet (there is no default gateway set).

 Hosts can communicate with other hosts that have used


APIPA. If some hosts are still using an address assigned by
the DHCP server (even if the DHCP server is down), those
hosts will not be able to communicate with the APIPA
hosts.

 Name resolution will not be performed (there are no DNS


server addresses configured).

If the workstation has been configured using an alternate


configuration, the following conditions will exist:

 The DHCP Enabled line will show Yes.

Alternate  The DHCP Server line will not be shown.


Configuration
 The IP address and subnet mask will be values other than
the APIPA values.

 Default gateway and DNS server addresses will be


configured using the alternate configuration values.

If the workstation has received configuration information from the wrong DHCP server or has
configured itself using APIPA, you may need to contact the DHCP server again once the DHCP
problems have been resolved. Use the following commands:

 ipconfig /release to stop using the current dynamic IP configuration parameters.

School of Computer Studies (UG) Page 36


 ipconfig /renew to retry the DHCP server request process to obtain IP configuration
parameters.

UNIT-V

1. Find out the following cable types to make the initial connection to the switch or router for
device management in detail.

SOLUTION:

Pin-
Cable Type Use
outs

Use a rollover Ethernet cable to


connect the device's console port to
1'8 the serial port on a PC. Connect the
2'7 RJ45 end to the console port and
3'6 connect the serial end to the PC. A
4'5 rollover cable is also called
5'4 a console cable.
6'3
7'2 Many newer Cisco devices use a
Rollover Ethernet Cable
8'1 USB for the console connector and
can be accessed with any standard
USB cable.

Use a straight-through Ethernet


cable to connect an Ethernet port on
1'1
a router to an Ethernet port on a hub
2'2
or switch. The router can then be
3'3
accessed from another PC
6'6
connected to the same network,
Straight-through Ethernet Cable using a VTY connection.

School of Computer Studies (UG) Page 37


If the router has an AUI port,
connect one end to an AUI
transceiver before connecting to the
router.

Use a crossover Ethernet cable to


connect an Ethernet port on a router
directly to the NIC in a PC.
1'3 Establish a VTY session from the
2'6 PC to connect to the device.
3'1
6'2 If the router has an AUI port,
connect one end to an AUI
Crossover Ethernet Cable transceiver before connecting to the
router.

2. 17. Refer and Exhibit the following image illustrates some of the configuration modes
available on a Cisco switch. Explain.

SOLUTION:

School of Computer Studies (UG) Page 38


Mode Details CLI Mode Prompt

The switch has multiple interface


modes, depending on the physical (or
logical) interface type. For this course,
you should be familiar with the
following switch interface modes:

 Ethernet (10 Mbps Ethernet)

 FastEthernet (100 Mbps


Ethernet)

 GigabitEthernet (1 GB
Interface Ethernet) Switch(config-if)#
Configuration
 VLAN

The VLAN interface configuration


mode is used to configure the switch
IP address, and for other management
functions. It is a logical management
interface configuration mode, rather
than the physical interface
configuration modes used for the
FastEthernet and GigabitEthernet
ports.

Details of the config-vlan mode


include the following:

 It can be used to perform all


VLAN configuration tasks.
Config-vlan  Changes take place Switch(config-vlan)#
immediately.

Do not confuse the config-vlan mode


with the VLAN interface
configuration mode.

School of Computer Studies (UG) Page 39


Details of the VLAN configuration
mode include the following:

 It allows you to configure a


subset of VLAN features.

 Changes do not take effect


until you save them, either
before or while exiting the
VLAN configuration mode.
Switch(vlan)#
Configuration
 Changes are not stored in the
regular switch configuration
file.

For most modern Cisco switches, it is


recommended that you configure
VLAN parameters from config-vlan
mode, as VLAN configuration mode
is being deprecated (phased out).

Use this mode to configure parameters


Line
for the terminal line, such as the Switch(config-line)#
Configuration
console, Telnet, and SSH lines.

3. Illustrate the Trunking facts when you configure VLANs that span multiple switches as
shown in the following diagram.

School of Computer Studies (UG) Page 40


SOLUTION:

In this example, each switch has two VLANs configured, with one port on each VLAN.
Workstations in VLAN 1 can only communicate with other workstations in VLAN 1. This
means that workstations connected to the same switch in this example cannot communicate
directly with each other. Communications between workstations within each VLAN must pass
through the trunk link to the other switch.

Additional facts regarding trunking and VLANs are as follows:

 Access ports are connected to endpoint devices (such as workstations), while trunk ports
are connected to other switches.

 An access port can be a member of only a single VLAN.

 Trunk ports are members of all VLANs on the switch by default.

 Any port on a switch can be configured as a trunk port.

 By default, trunk ports carry traffic for all VLANs between switches. However, you can
reconfigure a trunk port so that it carries only specific VLANs on the trunk link.

When trunking is used, frames that are sent over a trunk port are tagged with the VLAN ID
number so the receiving switch knows which VLAN the frame belongs to. In VLAN tagging:

 Tags are appended by the first switch in the path and removed by the last.

 Only VLAN-capable devices understand the frame tag.

 Tags must be removed before a frame is forwarded to a non-VLAN capable device.

School of Computer Studies (UG) Page 41


A trunking protocol defines the process that switches use to tag frames with a VLAN ID. One
widely implemented trunking protocol is the IEEE 802.1Q standard, which supports a wide
range of switches from many device manufacturers. 802.1Q supports VLAN numbers 1 through
4094.

With 802.1Q trunking, frames from the default VLAN are not tagged, but frames from all other
VLANs are tagged. For example, suppose VLAN 1 is the default VLAN on a switch (the default
setting on most Cisco switches). In this configuration, any frame on VLAN 1 that is placed on a
trunk link will not be assigned a VLAN tag. If a switch receives a frame on a trunk port that
doesn't have a VLAN tag, the frame is automatically put onto VLAN 1

4. Computers A and B are on the same VLAN and are separated by two switches, as shown
below. Computer A sends a frame to Computer B. Find that the composition of the frame as it
travels from A to B?

SOLUTION:

Computer A sends a normal frame. The first switch appends a VLAN ID to the frame.
The second switch removes the VLAN ID before forwarding it to Computer B.

5. Assume that you have just connected four switches as shown below. Find the default switch
configuration and which switch will become the root bridge?

SOLUTION:

School of Computer Studies (UG) Page 42

You might also like