NWK 507 Q Answers

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

ICTNWK507 Questions &Answers

1. Briefly define the following classless routing protocols:


EIGRP
OSPF
RIPV2
For each you are to describe:
a. what does the acronym mean
b. what algorithm it uses
c. what IPV4 multicast IP addresses each protocol uses and
d. the limitations of each protocol.

EIGRP: Enhanced Interior Gateway Routing Protocol (EIGRP)is a propelled


separation vector steering convention that is utilized on a PC organize for
mechanizing directing choices and setup. The convention was structured by Cisco
Systems as a restrictive convention, accessible just on Cisco switches.
It uses diffused Update Algorithm (DUAL) to figure the most restricted path to an
objective inside a framework. It improves the productivity of the convention and help
avoid estimation mistakes when endeavoring to decide the best way to a remote
system.
An acronym is the word framed from introductory letters of different words like.
Abbreviation of Enhanced Interior Gateway Routing Protocol is EIGRP.

Acronyms and Abbreviations


Acrony
Description
m
Enhanced Interior Gateway Routing Protocol— While PIX Firewall does not
bolster utilization of this convention, you can set the switches on either side
EIGRP of the PIX Firewall to utilize RIP among them and after that run EIGRP on
the remainder of the system before the switches.

Multicast Address
EIGRP is utilized to send directing data to all EIGRP switches on a system portion.
It utilizes 224.0.0.10 10 IP multicast addresses for steering refreshes.

It utilizes 224.0.0.13Protocol Independent Multicast (PIM) Version 2

Restrictions of EIGRP
 Flat Networks – EIGRP doesn't have an Area like idea, so it isn't great at
managing huge hierarchal system. When running OSPF on a major system, we
can make the system hierarchal by separating the system into zones. In spite of
the fact that we can isolate the system into various EIGRP (AS) space, at that
point import steering table to one another, however it's anything but an ideal
system structure, and not very many system has been planned this way.

•No support for DoD – EIGRP keeps up the contiguousness relationship by


sending HELLO message to one another occasionally, despite the fact that running
on dial up connection. Notwithstanding, the HELLO message may bring the dial
interface up, this isn't what we need on a dial up connection, and particularly the dial
up connection is a reinforcement connect. When we run EIGRP on a dial up
connection, so as to keep this from occurring, we common put a Dialer rundown and
Dialer amass on the interface so as not to give the HELLO a chance to message
bring the dial interface up.

EIGRP uses the Diffusing Update Algorithm (DUAL) to

•improve the efficiency of the tradition


•help neutralize figuring botches when attempting to choose the most ideal path to a
remote framework.

EIGRP decides the estimation of the way utilizing five measurements:


Bandwidth
Minimum Bandwidth (in kilobits per second) along the path from router to destination
network.
Load
Number in range 1 to 255; 255 being saturated
Total Delay
Delay, in 10s of microseconds, along the path from router to destination network
Reliability
Number in range 1 to 255; 255 being the most reliable
MTU
Minimum path Maximum Transmission Unit (MTU) (never used in the metric
calculation)
Reference:
https://en.wikipedia.org/wiki/Enhanced_Interior_Gateway_Routing_Protocol

OSPF
Open Shortest Path First (OSPF) is a directing convention for Internet Protocol (IP)
systems. It utilizes a connection state directing (LSR) calculation and falls into the
gathering of inside passage conventions (IGPs), working inside a solitary self-
sufficient framework (AS). It is characterized as OSPF Version 2 in RFC 2328 (1998)
for IPv4.It uses Shortest-way first count which is generally called Dijkstra figuring, to
choose the course to accomplish each objective.

Acronym Definition
OSPF Open Shortest Path First
OSPF Open Shortest Path Finde
r

 It uses a link state routing (LSR) algorithm and falls into the group of interior gateway
protocols (IGPs), operating within a single autonomous system (AS). It is defined
as OSPF Version 2 in RFC 2328 (1998) for IPv4.

Multicast Address OSPF movement is multicast either to address 224.0.0.5 (for all
OSPF switches) or 224.0.0.6 (for every Assigned Switch).

Limitations of OSPF: It doesn't scale well as more changes are added to the
coordinating space. By including more switches extends the size and repeat of the
topology invigorates, and besides the time period it takes to find out start to finish
switches.

•It requires more memory to hold the nearness (rundown of OSPF neighbors),
topology and directing tables.
•It requires additional CPU handling to run the OSPF calculation
•It is intricate to arrange and progressively hard to investigate.
•Equal cost load balance is preposterous.
•It transfers on territory 0 to convey on interarea.

Reference: http://net-expert15.blogspot.com/2015/06/ospf-advantage-weakness
features.html

RIPv2
Routing Information Protocol Version 2 – RIPv2. RIPv2 is an awkward, remove
vector steering convention as characterized in RFC 1723. Being a raunchy steering
convention, implies, it incorporates the subnet veil with the system addresses in its
directing updates.
Acronym of RIPV2 is routing information protocol RIP Version 2 RIPV2. Area
Routing Area

It uses Bellmann-Ford computation Algorithm for choosing the best course.

Multicast Address: RIPv2 utilizes the IP address 224.0.0.9 while multicasting course
updates to other RIP switches. As in RIPv1, RIPv2 will, naturally, outline IP systems
at system limits.

Imperatives of RIPV2:

•15 jump impediment


•Only utilizes jumps starting with one switch then onto the next to gauge the
separation over the connection. Tear does not consider the speed, inertness or cost
of the connection
•In bigger systems, RIP can take too long to even think about converging
•Provides no scrambled verification of steering refreshes

Notwithstanding it uses obstructions of RIPV1. It is bob check limitation, and metric.


The ricochet consider of 16 remains difficult to reach, and the measurement remains
bounce count.

The Routing Information Protocol (RIP) is a partition vector, inside entrance (IGP)
controlling tradition used by changes to exchange coordinating information. Tear
uses the skip think about a coordinating measurement.

•RIP adjustment 2 (RIPv2) was made in 1993 and organized in 1998 in RFC 2453
•It fused the ability to pass on subnet information, as such supporting Classless
Inter-Domain Routing (CIDR)
•It supports IPv4 so to speak
•RIPv2 utilizes Multicast Destination Address IPv4 = 224.0.0.9 (Class D)

Reference: https://www.sqa.org.uk/e-learning/NetInf104CD/page_40.html
2.Outline and briefly explain each layer of OSI model.
Answer: The OSI display (Open System Interconnection) show characterizes a PC
organizing structure to execute conventions in seven layers. A convention in the
systems administration terms is a sort of transaction and standard in the middle of
two systems administration

on substances.

The seven layers are:


Layer 7: The application layer
Layer 6: The presentation layer
Layer 5: The session layer
Layer 4: The transport layer
Layer 3: The network layer
Layer 2: The data-link layer
Layer 1: The physical layer
Principles of OSI Reference Model
The OSI reference model has 7 layers. The principles that were applied to arrive at
the seven layers can be briefly summarized as follows:

1.A layer ought to be made where an alternate deliberation is required.


2.Each layer ought to play out a very much characterized capacity.

3.The capacity of each layer ought to be picked with an eye toward characterizing
universally institutionalized conventions.

4.The layer limits ought to be picked to limit the data stream over the interfaces.

5.The number of layers ought to be sufficiently substantial that particular capacities


need not be put together in a similar layer out of need and little enough that
engineering does not turn out to be unwieldly.

Functions of Different Layers


Following are the functions performed by each layer of the OSI model. This is just an
introduction

OSI Model Layer 1: The Physical Layer

1. Physical Layer is the most minimal layer of the OSI Model.

2.It initiates, keeps up and deactivates the physical association.

3.It is in charge of transmission and gathering of the unstructured crude information


over system.

4.Voltages and information rates required for transmission is characterized in the


physical layer.

5.It believers the computerized/simple bits into electrical flag or optical signs.

6.Data encoding is additionally done in this layer.

OSI Model Layer 2: Data Link Layer

1.Data connection layer synchronizes the data which is to be transmitted over the
physical layer.

2.The fundamental capacity of this layer is to ensure information exchange is sans


mistake starting with one hub then onto the next, over the physical layer.

3.Transmitting and getting information outlines successively is overseen by this


layer.

4.This layer sends and expects affirmations for edges got and sent individually.
Resending of non-affirmation got outlines is additionally dealt with by this layer.
5.This layer builds up an intelligent layer between two hubs and furthermore deals
with the Frame traffic command over the system. It flags the transmitting hub to stop,
when the casing cushions are full.

OSI Model Layer 3: The Network Layer

1.Network Layer courses the flag through various channels from one hub to other.

2.It goes about as a system controller. It deals with the Subnet traffic.

3.It chooses by which course information should take.

4.It partitions the active messages into parcels and collects the approaching bundles
into messages for larger amounts.

OSI Model Layer 4: Transport Layer

1.Transport Layer chooses if information transmission ought to be on parallel way or


single way.

2.Functions, for example, Multiplexing, Segmenting or Splitting on the information


are finished by this layer

3.It gets messages from the Session layer above it, convert the message into littler
units and passes it on to the Network layer.

4.Transport layer can be extremely mind boggling, contingent on the system


necessities.

Transport layer breaks the message (information) into little units with the goal that
they are taken care of all the more effectively by the system layer.

OSI Model Layer 5: The Session Layer

1. Session Layer oversees and synchronize the discussion between two distinct
applications.

2.Transfer of information from source to goal session layer surges of information are
stamped and are resynchronized legitimately, so the closures of the messages are
not cut rashly and information misfortune is maintained a strategic distance from.
OSI Model Layer 6: The Presentation Layer

1.Presentation Layer takes care that the information is sent so that the collector will
comprehend the data (information) and will most likely utilize the information.

2.While accepting the information, introduction layer changes the information to be


prepared for the application layer.

3.Languages(syntax) can be distinctive of the two conveying frameworks. Under this


condition introduction layer assumes a job of interpreter.

4.It perfroms Data pressure, Data encryption, Data transformation and so forth.

OSI Model Layer 7: Application Layer

1.Application Layer is the highest layer.

2.Transferring of records irritating the outcomes to the client is additionally done in


this layer. Mail administrations, catalog administrations, organize asset and so forth
are administrations given by application layer.

3.This layer chiefly holds application projects to follow up on the got and to be sent
information.

Benefits of OSI reference display

1.OSI model recognizes well between the administrations, interfaces and


conventions.

2.Protocols of OSI show are great covered up.

3.Protocols can be supplanted by new conventions as innovation changes.

4.Supports association situated administrations just as connectionless


administration.
Bad marks of OSI reference demonstrate

1.Model was contrived before the development of conventions.

2.Fitting of conventions is repetitive assignment.

3.It is simply utilized as a kind of perspective model.

https://www.studytonight.com/computer-networks/complete-osi-model

3.Outline and briefly explain each layer of TCP/IP model.


Answer: TCP/IP remains for Transmission Control Protocol/Internet Protocol. The
TCP/IP demonstrate comprises of 4 layers and is the model that the Internet
depends on. Each layer of the model has a particular occupation to improve the
situation correspondence to occur over the system.

Layer 4. Application Layer


Application layer is the best most layer of four layer TCP/IP show. Application layer
is available on the highest point of the Transport layer. Application layer
characterizes TCP/IP application conventions and how have programs interface with
Transport layer administrations to utilize the system.

Application layer incorporates all the more elevated amount conventions like DNS
(Domain Naming System), HTTP (Hypertext Transfer Protocol), Telnet, SSH, FTP
(File Transfer Protocol), TFTP (Trivial File Transfer Protocol), SNMP (Simple
Network Management Protocol), SMTP (Simple Mail Transfer Protocol) , DHCP
(Dynamic Host Configuration Protocol), X Windows, RDP (Remote Desktop
Protocol) and so on.

Layer 3. Transport Layer


Transport Layer is the third layer of the four layer TCP/IP display. The situation of
the Transport layer is between Application layer and Internet layer. The reason for
Transport layer is to allow gadgets on the source and goal hosts to carry on a
discussion. Transport layer characterizes the dimension of administration and status
of the association utilized while transporting information.

The principle conventions included at Transport layer are TCP (Transmission


Control Protocol) and UDP (User Datagram Protocol).

Layer 2. Internet Layer


Web Layer is the second layer of the four layer TCP/IP show. The situation of
Internet layer is between Network Access Layer and Transport layer. Web layer
pack information into information parcels known as IP datagrams, which contain
source and goal address (legitimate location or IP address) data that is utilized to
advance the datagrams among hosts and crosswise over systems. The Internet
layer is additionally in charge of steering of IP datagrams.

Bundle exchanging system relies on a connectionless internetwork layer. This layer


is known as Internet layer. Its main responsibility is to enable hosts to embed parcels
into any system and have them to convey autonomously to the goal. At the goal side
information bundles may show up in an unexpected request in comparison to they
were sent. It is the activity of the higher layers to improve them so as to convey them
to appropriate system applications working at the Application layer.

The primary conventions included at Internet layer are IP (Internet Protocol), ICMP
(Internet Control Message Protocol), ARP (Address Resolution Protocol), RARP
(Reverse Address Resolution Protocol) and IGMP (Internet Group Management
Protocol).

Layer 1. Network Access Layer


Network Access Layer is the principal layer of the four layer TCP/IP show. System
Access Layer characterizes subtleties of how information is physically sent through
the system, including how bits are electrically or optically motioned by equipment
gadgets that interface legitimately with a system medium, for example, coaxial link,
optical fiber, or contorted pair copper wire.

The conventions incorporated into Network Access Layer are Ethernet, Token Ring,
FDDI, X.25, Frame Relay and so on.

The most mainstream LAN design among those recorded above is Ethernet.
Ethernet utilizes an Access Methodcalled CSMA/CD (Carrier Sense Multiple
Access/Collision Detection) to get to the media, when Ethernet works in a mutual
media. An Access Method decides how a host will put information on the medium.

IN CSMA/CD Access Method, each host has meet access to the medium and can
put information on the wire when the wire is free from system traffic. At the point
when a host needs to put information on the wire, it will check the wire to discover
whether another host is as of now utilizing the medium. On the off chance that there
is traffic as of now in the medium, the host will pause and if there is no traffic, it will
put the information in the medium. Be that as it may, if two frameworks place
information on the medium at a similar occasion, they will crash into one another,
wrecking the information. In the event that the information is devastated amid
transmission, the information should be retransmitted. After impact, each host will sit
tight for a little interim of over and over the information will be retransmitted.

4.Explain the term routing and switching.


Evaluate how business use routing and switching

Switches are used to interface distinctive devices on a comparable


framework inside a structure or grounds. For example, a switch can interface
PCs, printers and servers, making an arrangement of shared resources. The
switch would fill in as a controller, empowering the distinctive contraptions to
impart information and chat to each other. Through information sharing and
resource task, switches put aside some money and augmentation
effectiveness. Switch is the framework contraption that interfaces device
together on a framework using pack changing to get, process and forward
date to the objective devices.

Routers are used to coordinate various frameworks. For example, our would
use a change to relate our composed PCs to the Internet and thusly share an
Internet relationship among various customers. The switch will go about as a
dispatcher, picking the best course for our information to go with the objective
that we get it quickly.
Switches look at the data being sent over a framework, change how it is
packaged and send it to another framework or over a substitute sort of
framework. They interface our business to the outside world, shield our
information from security threats, and can even pick which PCs get need over
others. Switch is the sort out device that propels data packages between PC
frameworks (generally between changes to unequivocal objective). It gives
development planning fnxson web (Layer3).

Routing and Switching of networking devices are the structure squares of all
business interchanges from information to voice and video to remote access. They
can improve organization main concern by empowering organization to expand
profitability ,decrease business costs, and improve security and client
administrations. The utilization of steering and exchanging innovations empowers
staff to have equivalent access to all business applications, data and devices, even
those situated in various areas. It can build the profitability of workers by keeping
everybody associated with similar devices. It can likewise give access to cutting
edge applications and empower administrations, for example, IP voice, video
conferencing and remote systems.
Specifically, routers and switches support:

 Sharing applications

 Speeding access to information

 Redesigning customer advantage

 . Diminishing working costs

 Upgrading security

 Engaging remote affiliations


.
http://www.omnisecu.com/tcpip/tcpip-model.php

5.Explain briefly IPV4.


How many bits, octets, list the IP address for all classes?
Answer: Web Protocol Version 4 (IPv4) is the fourth update of the Internet Protocol
and a broadly utilized convention in information correspondence over various types
of systems. IPv4 is a connectionless convention utilized in parcel exchanged layer
systems, for example, Ethernet. It gives the sensible association between system
gadgets by giving distinguishing proof to every gadget. There are numerous
approaches to arrange IPv4 with a wide range of gadgets – including manual and
programmed setups – relying upon the system compose.

IPv4 depends on the best-exertion display. This model ensures neither conveyance
nor shirking of copy conveyance; these angles are taken care of by the upper layer
transport.
IPv4 address utilize spotted decimal configuration. It comprises of four octets spoken
to by decimal numbers isolated by period.
Standards in IPv4:
 Each have on system must have one of a kind location.
 First and last location of system are held and can't be utilized as host
address.

IPv4 is characterized and indicated in IETF production RFC 791. It is utilized in the
parcel exchanged connection layer in the OSI display. IPv4 utilizes 32-bit addresses
for Ethernet correspondence in five classes: A, B, C, D and E. Classes A, B and C
have an alternate piece length for tending to the system have. Class D addresses
are saved for multicasting, while class E addresses are saved for sometime later.
Class A has subnet cover 255.0.0.0 or/8, B has subnet veil 255.255.0.0 or/16 and
class C has subnet cover 255.255.255.0 or/24. For instance, with a/16 subnet cover,
the system 192.168.0.0 may utilize the deliver scope of 192.168.0.0 to
192.168.255.255. System hosts can take any address from this range; in any case,
address 192.168.255.255 is saved for communicated inside the system. The most
extreme number of host delivers IPv4 can relegate to end clients is 232.
6.Convert 192.168.10.30 and 255.255.255.0 to binary
Answer:
192.168.10.30 = 11000000 10101000 00001010 00011110
255.255.255.0 = 11111111 11111111 11111111 00000000

7.List all three debug commands you can use for EIGRP
Commands are follows:
•Debug eigrp neighbors
It confirms whether a neighbor is arranged as sub-switch or not.
•Debug eigrp bundles
Empowering troubleshoot order air conditioning help to confirm the transmission and
gathering of EIGRP hi bundles at least.
•Debug ip eigrp notices
It shows data and notice for an EIGRP steering process.

8.What is router CLI?


Answer:CLI (direction line interface) is a methods for collaborating with a PC
program where the client (or customer) issues directions to the program as
progressive lines of content (order lines).

Explain the following command modes and list the appropriate commands that you
would use to enter those modes

A)user EXEC

This is the essential mode when you signed in switch. On employment condition, it is
generally secret word secured. We require a legitimate username and secret key to
get to this mode. We have three opportunities to enter a legitimate secret key, before
association endeavor is can't. On LAB condition, we could get to this mode
specifically (except if we have arranged it for secret word).
B)Privileged EXEC

Privileged exec mode is the main exec mode. Same as user exec mode on job
environment, this mode is also password protected. You have to enter the password
to access this mode. In lab environment, it's usually unprotected. You can access
this mode by executing enable command at user exec mode.

C)Global Configuration
Global configuration mode is the following access level in IOS mode grouping. This
mode is utilized to design gadget all around, or to enter in component like interface,
conventions particular setup mode. Utilize arrange terminal order at special
executive mode to get to worldwide setup mode.

D)Interface Configuration
Interface configuration mode is utilized to design interface related settings.
Numerous settings are empowered on a for every interface premise like as
sequential port, Ethernet. Interface design directions influence interface related
settings, for example, empower or incapacitate interface, data transfer capacity,
clock rate and so on. To design or change these setting, you have to enter in
interface particular mode. To get to interface arrangement mode utilize following
direction.Router(config)# interface type number

You might also like