Zubin Panna NT2640 IP Networking 1. Given the following routing table on a router, which next hop will the router select given the IP packet with the destination address of : 19.48.254.3? Address/Mask Next hop 19.46.0.0/16 Interface 0 19.47.0.0/16 Interface 1 19.52.43.0/24 Router 1 default Router 2 a) Router 2 b) Router 1 c) Interface 0 d) Interface 1 2. Which one of the following is a feature- of a connectionless protocol like UDP? a) Port Number b) Flow control c) Secure d) Error recovery 3.
It would require more bits Exercise 8.1.3 Would the IP address in Figure 8- 1 be valid as a class C address? Why or why not? The network number is in Class A Exercise 8.1.4 According to the subnet mask, what is the network ID of the IP address shown in Figure 8- 2? 190.8 What is the host ID of the IP address shown in Figure 8- 2? 8.4 What is the binary network ID?
DHCP Server 10.10.0.11 | Question 8 | If the answer to #7 was not the IP address of the SEA-SVR1 computer, why might this have happened? It was | Question 9 | What nodes appear underneath the DHCP scope that you created in Exercise 1? Address Pool, Address Leases, Reservations, Scope Options | Question 10 | What appears in the IP address text box?10.10.0.10 the Ip address of the Domain Controller | Question 11 | What value is configured in the DNS Servers: line? 10.10.0.10 | Question 12 | What value is configured in the DNS Servers: line?10.10.0.10 | Question 13 | What is the default location for DHCP server backups? C:\windows\system32\dhcp\backup\ | Question 14 | What IP address is configured on the SEA-SVR2computer?169.254.209.252 | Question 15 | What appears in the IP address text box?10.10.0.55 | Question 16 | From which DHCP server are you receiving an IP
* c. 15 32. Which of the following commands connects to a computer containing shared files and folders? * b. Net use 33. Which port numbers are most vulnerable to NetBIOS attacks?
Question 43: What is the administrative distance of Routing Information Protocol (RIP) routing protocol? Question 44: Which of the following is a common OSI Layer 3 (network layer) troubleshooting issue? (Choose 2) Question 45: Look at the topology shown below. What is the design issue with this wireless network? Question 46: Consider the network diagram presented below, let’s assume that both switches are capable of auto negotiating Ethernet speeds of 10, 100, and 1000 Mbps.
3. Approximately how many IPv6 addresses are possible?128 bit. IPv6 can theoretically hold 2^128 IP addresses. 4. Why do you think the world is running out of IPv4 addresses?
Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory specification of the base IPv6 protocol suite, but has since been made optional (Wikipedia, 2013). Multicasting is the transmission of a packet to multiple destinations in a single send operation, it is part of
Adam Odegard NT2640 Weak 1 INFORMATION ON IP ADDRESS CLASSES In order for systems to locate each other in a distributed environment, nodes are given explicit addresses that uniquely identify the particular network the system is on and uniquely identify the system to that particular network. When these two identifiers are combined, the result is a globally-unique address. IP address is a code made up of numbers divided by three dots that finds particular computers on the internet. They are 32-bit binary numbers, consisting of 2 sub identifiers, which identify the host and network. It is four octets of numbers from 0-255 represented in decimal form.
Assuming that 802.11n uses the narrower 20-MHz channel and a single stream, which of the following answers matches a particular standard to its maximum bit rate? a. 802.11g: 54 Mbps 3. An enterprise campus LAN uses wired UTP Ethernet and wireless 802.11 LANs at the edge of the LAN. A network engineer uses a WLAN testing tool to view the frames moving through the WLAN, and he notes the speeds of the various frames in a single WLAN that uses a single access point.
4 | 12 | 16 | 4,094 | 11111111.11111111.11110000.00000000255.255.240.0 | /20 | x.y.N*16.0 | 12) Explain the reasoning behind the concepts of “subnet zero”? Subnet Zero If a network address is subnetted, the first subnet obtained after subnetting the network address is called subnet zero. Consider a Class B address, 172.16.0.0. By default the Class B address 172.16.0.0 has 16 bits reserved for representing the host portion, thus allowing 65534 (216-2) valid host addresses. If network 172.16.0.0/16 is subnetted by borrowing three bits from the host portion, eight (23) subnets are obtained.