NWK 507 Q Answers
NWK 507 Q Answers
NWK 507 Q Answers
Multicast Address
EIGRP is utilized to send directing data to all EIGRP switches on a system portion.
It utilizes 224.0.0.10 10 IP multicast addresses for steering refreshes.
Restrictions of EIGRP
Flat Networks – EIGRP doesn't have an Area like idea, so it isn't great at
managing huge hierarchal system. When running OSPF on a major system, we
can make the system hierarchal by separating the system into zones. In spite of
the fact that we can isolate the system into various EIGRP (AS) space, at that
point import steering table to one another, however it's anything but an ideal
system structure, and not very many system has been planned this way.
OSPF
Open Shortest Path First (OSPF) is a directing convention for Internet Protocol (IP)
systems. It utilizes a connection state directing (LSR) calculation and falls into the
gathering of inside passage conventions (IGPs), working inside a solitary self-
sufficient framework (AS). It is characterized as OSPF Version 2 in RFC 2328 (1998)
for IPv4.It uses Shortest-way first count which is generally called Dijkstra figuring, to
choose the course to accomplish each objective.
Acronym Definition
OSPF Open Shortest Path First
OSPF Open Shortest Path Finde
r
It uses a link state routing (LSR) algorithm and falls into the group of interior gateway
protocols (IGPs), operating within a single autonomous system (AS). It is defined
as OSPF Version 2 in RFC 2328 (1998) for IPv4.
Multicast Address OSPF movement is multicast either to address 224.0.0.5 (for all
OSPF switches) or 224.0.0.6 (for every Assigned Switch).
Limitations of OSPF: It doesn't scale well as more changes are added to the
coordinating space. By including more switches extends the size and repeat of the
topology invigorates, and besides the time period it takes to find out start to finish
switches.
•It requires more memory to hold the nearness (rundown of OSPF neighbors),
topology and directing tables.
•It requires additional CPU handling to run the OSPF calculation
•It is intricate to arrange and progressively hard to investigate.
•Equal cost load balance is preposterous.
•It transfers on territory 0 to convey on interarea.
Reference: http://net-expert15.blogspot.com/2015/06/ospf-advantage-weakness
features.html
RIPv2
Routing Information Protocol Version 2 – RIPv2. RIPv2 is an awkward, remove
vector steering convention as characterized in RFC 1723. Being a raunchy steering
convention, implies, it incorporates the subnet veil with the system addresses in its
directing updates.
Acronym of RIPV2 is routing information protocol RIP Version 2 RIPV2. Area
Routing Area
Multicast Address: RIPv2 utilizes the IP address 224.0.0.9 while multicasting course
updates to other RIP switches. As in RIPv1, RIPv2 will, naturally, outline IP systems
at system limits.
Imperatives of RIPV2:
The Routing Information Protocol (RIP) is a partition vector, inside entrance (IGP)
controlling tradition used by changes to exchange coordinating information. Tear
uses the skip think about a coordinating measurement.
•RIP adjustment 2 (RIPv2) was made in 1993 and organized in 1998 in RFC 2453
•It fused the ability to pass on subnet information, as such supporting Classless
Inter-Domain Routing (CIDR)
•It supports IPv4 so to speak
•RIPv2 utilizes Multicast Destination Address IPv4 = 224.0.0.9 (Class D)
Reference: https://www.sqa.org.uk/e-learning/NetInf104CD/page_40.html
2.Outline and briefly explain each layer of OSI model.
Answer: The OSI display (Open System Interconnection) show characterizes a PC
organizing structure to execute conventions in seven layers. A convention in the
systems administration terms is a sort of transaction and standard in the middle of
two systems administration
on substances.
3.The capacity of each layer ought to be picked with an eye toward characterizing
universally institutionalized conventions.
4.The layer limits ought to be picked to limit the data stream over the interfaces.
5.It believers the computerized/simple bits into electrical flag or optical signs.
1.Data connection layer synchronizes the data which is to be transmitted over the
physical layer.
4.This layer sends and expects affirmations for edges got and sent individually.
Resending of non-affirmation got outlines is additionally dealt with by this layer.
5.This layer builds up an intelligent layer between two hubs and furthermore deals
with the Frame traffic command over the system. It flags the transmitting hub to stop,
when the casing cushions are full.
1.Network Layer courses the flag through various channels from one hub to other.
2.It goes about as a system controller. It deals with the Subnet traffic.
4.It partitions the active messages into parcels and collects the approaching bundles
into messages for larger amounts.
3.It gets messages from the Session layer above it, convert the message into littler
units and passes it on to the Network layer.
Transport layer breaks the message (information) into little units with the goal that
they are taken care of all the more effectively by the system layer.
1. Session Layer oversees and synchronize the discussion between two distinct
applications.
2.Transfer of information from source to goal session layer surges of information are
stamped and are resynchronized legitimately, so the closures of the messages are
not cut rashly and information misfortune is maintained a strategic distance from.
OSI Model Layer 6: The Presentation Layer
1.Presentation Layer takes care that the information is sent so that the collector will
comprehend the data (information) and will most likely utilize the information.
4.It perfroms Data pressure, Data encryption, Data transformation and so forth.
3.This layer chiefly holds application projects to follow up on the got and to be sent
information.
https://www.studytonight.com/computer-networks/complete-osi-model
Application layer incorporates all the more elevated amount conventions like DNS
(Domain Naming System), HTTP (Hypertext Transfer Protocol), Telnet, SSH, FTP
(File Transfer Protocol), TFTP (Trivial File Transfer Protocol), SNMP (Simple
Network Management Protocol), SMTP (Simple Mail Transfer Protocol) , DHCP
(Dynamic Host Configuration Protocol), X Windows, RDP (Remote Desktop
Protocol) and so on.
The primary conventions included at Internet layer are IP (Internet Protocol), ICMP
(Internet Control Message Protocol), ARP (Address Resolution Protocol), RARP
(Reverse Address Resolution Protocol) and IGMP (Internet Group Management
Protocol).
The conventions incorporated into Network Access Layer are Ethernet, Token Ring,
FDDI, X.25, Frame Relay and so on.
The most mainstream LAN design among those recorded above is Ethernet.
Ethernet utilizes an Access Methodcalled CSMA/CD (Carrier Sense Multiple
Access/Collision Detection) to get to the media, when Ethernet works in a mutual
media. An Access Method decides how a host will put information on the medium.
IN CSMA/CD Access Method, each host has meet access to the medium and can
put information on the wire when the wire is free from system traffic. At the point
when a host needs to put information on the wire, it will check the wire to discover
whether another host is as of now utilizing the medium. On the off chance that there
is traffic as of now in the medium, the host will pause and if there is no traffic, it will
put the information in the medium. Be that as it may, if two frameworks place
information on the medium at a similar occasion, they will crash into one another,
wrecking the information. In the event that the information is devastated amid
transmission, the information should be retransmitted. After impact, each host will sit
tight for a little interim of over and over the information will be retransmitted.
Routers are used to coordinate various frameworks. For example, our would
use a change to relate our composed PCs to the Internet and thusly share an
Internet relationship among various customers. The switch will go about as a
dispatcher, picking the best course for our information to go with the objective
that we get it quickly.
Switches look at the data being sent over a framework, change how it is
packaged and send it to another framework or over a substitute sort of
framework. They interface our business to the outside world, shield our
information from security threats, and can even pick which PCs get need over
others. Switch is the sort out device that propels data packages between PC
frameworks (generally between changes to unequivocal objective). It gives
development planning fnxson web (Layer3).
Routing and Switching of networking devices are the structure squares of all
business interchanges from information to voice and video to remote access. They
can improve organization main concern by empowering organization to expand
profitability ,decrease business costs, and improve security and client
administrations. The utilization of steering and exchanging innovations empowers
staff to have equivalent access to all business applications, data and devices, even
those situated in various areas. It can build the profitability of workers by keeping
everybody associated with similar devices. It can likewise give access to cutting
edge applications and empower administrations, for example, IP voice, video
conferencing and remote systems.
Specifically, routers and switches support:
Sharing applications
Upgrading security
IPv4 depends on the best-exertion display. This model ensures neither conveyance
nor shirking of copy conveyance; these angles are taken care of by the upper layer
transport.
IPv4 address utilize spotted decimal configuration. It comprises of four octets spoken
to by decimal numbers isolated by period.
Standards in IPv4:
Each have on system must have one of a kind location.
First and last location of system are held and can't be utilized as host
address.
IPv4 is characterized and indicated in IETF production RFC 791. It is utilized in the
parcel exchanged connection layer in the OSI display. IPv4 utilizes 32-bit addresses
for Ethernet correspondence in five classes: A, B, C, D and E. Classes A, B and C
have an alternate piece length for tending to the system have. Class D addresses
are saved for multicasting, while class E addresses are saved for sometime later.
Class A has subnet cover 255.0.0.0 or/8, B has subnet veil 255.255.0.0 or/16 and
class C has subnet cover 255.255.255.0 or/24. For instance, with a/16 subnet cover,
the system 192.168.0.0 may utilize the deliver scope of 192.168.0.0 to
192.168.255.255. System hosts can take any address from this range; in any case,
address 192.168.255.255 is saved for communicated inside the system. The most
extreme number of host delivers IPv4 can relegate to end clients is 232.
6.Convert 192.168.10.30 and 255.255.255.0 to binary
Answer:
192.168.10.30 = 11000000 10101000 00001010 00011110
255.255.255.0 = 11111111 11111111 11111111 00000000
7.List all three debug commands you can use for EIGRP
Commands are follows:
•Debug eigrp neighbors
It confirms whether a neighbor is arranged as sub-switch or not.
•Debug eigrp bundles
Empowering troubleshoot order air conditioning help to confirm the transmission and
gathering of EIGRP hi bundles at least.
•Debug ip eigrp notices
It shows data and notice for an EIGRP steering process.
Explain the following command modes and list the appropriate commands that you
would use to enter those modes
A)user EXEC
This is the essential mode when you signed in switch. On employment condition, it is
generally secret word secured. We require a legitimate username and secret key to
get to this mode. We have three opportunities to enter a legitimate secret key, before
association endeavor is can't. On LAB condition, we could get to this mode
specifically (except if we have arranged it for secret word).
B)Privileged EXEC
Privileged exec mode is the main exec mode. Same as user exec mode on job
environment, this mode is also password protected. You have to enter the password
to access this mode. In lab environment, it's usually unprotected. You can access
this mode by executing enable command at user exec mode.
C)Global Configuration
Global configuration mode is the following access level in IOS mode grouping. This
mode is utilized to design gadget all around, or to enter in component like interface,
conventions particular setup mode. Utilize arrange terminal order at special
executive mode to get to worldwide setup mode.
D)Interface Configuration
Interface configuration mode is utilized to design interface related settings.
Numerous settings are empowered on a for every interface premise like as
sequential port, Ethernet. Interface design directions influence interface related
settings, for example, empower or incapacitate interface, data transfer capacity,
clock rate and so on. To design or change these setting, you have to enter in
interface particular mode. To get to interface arrangement mode utilize following
direction.Router(config)# interface type number