15 Minutes Class ID:_____________ 1. In IP header, the purpose of Flag field is d. To control fragmentation of packets during transmission. e. To control packet sequencing. f. To identify the upper layer protocols being used 2. Do you think ICMP can identify routers on networks.
Homework Week 2 2. Which layer of the TCP/IP model process request from hosts to make sure a connection is made to the appropriate port? Application Layer 3. What are well-known ports. Ports 1 to 1023 4.
2. The subnet mask of an IP address does which of the following? b. Defines network and host portions of an IP address. It is the portion of the IP address that can be used to produce hosts or user IPs for devices.
B. www.certskills.com 14. C. Node 15. A. Router D. Switch 16. D. SMB network 17. D. Switch 18.
Which of the following is a possible option to allow both nodes to send data? 6. Which of the following facts are in common between both of the Ethernet standards discussed in this chapter, 10 BASE-T and 100 BASE-T? (Choose two answers) 7. Which of the following facts are in common between both of the Ethernet standards discussed in this chapter, 10 BASE-T and 100 BASE-T?
NT1210 5/12/15 Intro to Networking Unit 7 Assignment 1 Homework Questions 1. b. It uses a telco service called packet switching. 2. a. Switched analog circuits b. Dedicated digital circuits 3. c. Routers use Layer 3 and ignore Layers 1 and 2. d. Routers discard old data-link headers and insert new data-link headers as part of their logic, which treats each interface’s lower-layer details as independent from each other.
Question 43: What is the administrative distance of Routing Information Protocol (RIP) routing protocol? Question 44: Which of the following is a common OSI Layer 3 (network layer) troubleshooting issue? (Choose 2) Question 45: Look at the topology shown below. What is the design issue with this wireless network? Question 46: Consider the network diagram presented below, let’s assume that both switches are capable of auto negotiating Ethernet speeds of 10, 100, and 1000 Mbps.
2. Determine the protocol numbers for the protocol names: Protocol | NUMBERS | References | IPv4 (Internet Protocol version 4) | 4 | (Protocol Numbers, 2013) | IPv6 (Internet Protocol version 6) | 41 | | TCP (Transmission Control Protocol) | 6 | | UDP (User Datagram Protocol) | 17 | | ICMP (Internet Control Message Protocol) | 1 | | VRRP (Virtual Router Redundancy Protocol) | 112 | | IPSEC ESP (Internet Protocol Encap Security Payload | 50 | | L2TP (Layer Two Tunneling Protocol) | 115 | | OSPF (Open Shortest Path First) | 89 | | EIGRP (Enhanced Interior Gateway Routing Protocol) | 88 | | 3. Determine the correct ICMP type based on the description provided. ICMP Message Description | Type | Code | Echo | 8 | RFC792 | Echo Reply | 0 | RFC792 | Time Exceeded | 11 | 0 – Time to Live exceeded in Transit1 - Fragment Reassembly Time Exceeded | Port Unreachable | 3 | 3 - Port Unreachable | Fragmentation Needed | 3 | 4 - Fragmentation Needed and Don't Fragment was Set | 4. What are the valid ranges of protocol numbers?
Back in the late 1970's, two projects began independently with the same goal in mind, which was to define a unifying standard for the architecture of networking. One was the ISO, (International Organization for Standardization), the other was the CCITT, (International Telegraph and Telephone Consultative Committee), both of these organizations developed a document that defined similar network models. It was deployed widely as an instructional tool, the OSI Reference Model was intended to serve as the foundation for the establishment of a widely-adopted suite of protocols that would be used by international networks, which became the internet, called the OSI Protocol Suite. 3. What is the history of the TCP/IP model?
Unit 3 Exercise 1: Specifications – Definitions by: Timothy Robertson 1. Application- The technology that will take advantage of cabling systems. Applications include telephone systems, Ethernet, token ring, ATM, etc. 2. Unshielded Twisted Pair- A cable used in computer networking that consists of two shielded wires twisted around each other.