Internetworking Basics

Descripción

Chapter 2 of the Cisco Data Center objectives
sirhulk1
Test por sirhulk1, actualizado hace más de 1 año
sirhulk1
Creado por sirhulk1 hace casi 11 años
141
0

Resumen del Recurso

Pregunta 1

Pregunta
Network Segmentation is the breaking up of a large network into smaller networks.
Respuesta
  • True
  • False

Pregunta 2

Pregunta
What causes LAN traffic on the network (Choose three)
Respuesta
  • Too many hosts in a broadcast or collision domains.
  • Broadcast storms.
  • High network bandwidth.
  • Adding hubs for connectivity to the network.

Pregunta 3

Pregunta
What functions does routers provide?
Respuesta
  • They break up broadcast domains.
  • Routers do not break up collision domains.
  • Routers provide packet switching and packet filtering.
  • Routers provide internetwork communication.

Pregunta 4

Pregunta
The diagram shows a group of networks connected to a router. How many collision domains and broadcast domains totaled?
Respuesta
  • There are 2 broadcast domains and 7 collision domains.
  • There are 2 broadcast domains and 8 collision domains.
  • There are 3 broadcast domains and 8 collision domains.

Pregunta 5

Pregunta
Bridges are software based and Switches are hardware based (ASICs)
Respuesta
  • True
  • False

Pregunta 6

Pregunta
What statements best defined the OSI Model?
Respuesta
  • It is a hierarchical design and it divides the network communication process into smaller and simpler components thus aiding component development, design and troubleshooting.
  • It allows multiple-vendor development through standardization of network components and allows various types of network hardware and software to communicate.
  • Any changes in one layer can affect the other layer process.
  • It prevents changes in one layer from affecting other layers, so it does not hamper development.

Pregunta 7

Pregunta
The OSI is not a physical model but rather a blueprint set of guidelines that application developers can use to create and implement applications that run on a network. It also provides a framework for creating and implementing networking standards, devices and internetworking schemes.
Respuesta
  • True
  • False

Pregunta 8

Pregunta
The OSI model is divided into two groups, one is the top three upper layers (Application, Presentation, Session) which define how the applications within the end stations will communicate with each other. The bottom four layers (Transport, Network, Data Link, Physical) define how data is transmitted end to end.
Respuesta
  • True
  • False

Pregunta 9

Pregunta
What does the application layer's function in the OSI model?
Respuesta
  • Provides Dialog control and keeps different applications' data separate.
  • Presents data and handles processing such as encryption, compression, and translation services.
  • Provides logical addressing which routers use for path determination.
  • Provides a user interface. Also is associated with File, print, message, database, and application services. Applications do not reside in the application layer but rather interfaces with application layer protocols.

Pregunta 10

Pregunta
Application layer protocols involve HTTP, FTP, DNS, IMAP, Telnet, SSH, POP, SMTP, SMNP, and LDAP.
Respuesta
  • True
  • False

Pregunta 11

Pregunta
What is the function of the Presentation layer?
Respuesta
  • Is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities.
  • It segments and reassembles data into a data stream It also responsible for providing mechanisms for multiplexing upper layer applications, establishing sessions, and tearing down virtual circuits. Its finally hides details of any network-dependent information from the higher layers by providing transparent data transfer.
  • The layer presents data to the Application layer and is responsible for data translation and code formatting. Data encryption and compression are additional functions of this layer.

Pregunta 12

Pregunta
Since the Presentation layer is essentially a translator and provides coding and conversion functions, an example of this data transfer technique is converting EBCDIC to ASCII format.
Respuesta
  • True
  • False

Pregunta 13

Pregunta
In the OSI model what are the functions of the Session layer?
Respuesta
  • This layer of the OSI Model is where users actually communicate to the computer. Its also responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist.
  • This layer of the OSI Model segments and reassembles data into a data stream. Its also responsible for providing mechanisms for multiplexing upper layer applications, establishing sessions, and tearing down virtual circuits.
  • This layer of the OSI model is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities. This layer also provides a dialog control between devices or nodes. It coordinates communication between systems by offering three different modes: Simplex, Half Duplex, and Full Duplex. This layer basically keeps different applications' data separate from other applications' data.

Pregunta 14

Pregunta
What functions and services does the Transport Layer of the OSI model offer?
Respuesta
  • This layer manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that this layer must transport traffic between devices that are not locally attached.
  • This layer segments and reassembles data into a data stream. It provides end to end data transport services and can establish a logical connection between the sending host and destination host on an internetwork. Examples are TCP and UDP.
  • This layer provides the physical transmission of the data and handles error notification, network topology and flow control. It formats the message into pieces each called a data frame.

Pregunta 15

Pregunta
Flow control is data integrity maintained at the Transport layer. It prevents a sending host on one side of the connection from overflowing the buffers in the receiving host.
Respuesta
  • True
  • False

Pregunta 16

Pregunta
What is connection-oriented communication?
Respuesta
  • Its a connection that guarantees a way to establish communication through certain entities that provide retransmission of data.
  • Its an established session (Virtual Circuit) that is setup from the transmitting sender and receiving host using what is called a three-way-handshake or call setup. Data is then transferred until finished then a call termination takes place to tear down the virtual circuit.

Pregunta 17

Pregunta
What is windowing?
Respuesta
  • Windowing controls how information is passed through the network using a transmitting technique that controls data flow.
  • Windows are used to control the amount of outstanding, unacknowledged data segments. The size of the window controls how much data is transferred from one end of the device to the other.

Pregunta 18

Pregunta
A feature of Windowing that ensures reliable data segment delivery from the transmitting machine to the receiving machine is called "Positive Acknowledgement with Retransmission". This technique is used by the receiving machine to send acknowledgement message to the sender when it receives data.
Respuesta
  • True
  • False

Pregunta 19

Pregunta
During windowing once the sender transmits data segments it sets a timer and waits for the acknowledgment before sending the next round of segments. If the timer expires without an acknowledgement then it retransmits if the timer expires without an acknowledgement from the receiving host.
Respuesta
  • True
  • False

Pregunta 20

Pregunta
What best describes the Network layer?
Respuesta
  • This layer transmits bits into bytes and bytes into frames. It provides the physical transmission of the data and handles error notification, network topology and flow control.
  • This layer communicates directly with the various types of actual communication media. It specifies the electrical , mechanical , procedural and functioning requirements for activating, maintaining, deactivating a physical link between end systems. This is where you find the DTE and DCE specifications.
  • This layer manages device addressing, tracks the location of the devices on the network., and determines the best way to move data, which means that the Network layer must transport traffic between devices that aren't locally attached. Two types of packets in this layer are routed protocols and routing protocols.

Pregunta 21

Pregunta
What is a routing protocol?
Respuesta
  • Routing protocols are used to transport user data through the internetwork. They are assigned to an interface and determine the method of packet delivery. Examples are IP and IPv6.
  • Routing Protocols are used to update neighboring router about the networks connected to all routers within the internetwork. Examples of routing protocols are OSPF, RIP, EIGRP, and RIPv2

Pregunta 22

Pregunta
What is a routed protocol?
Respuesta
  • Routed Protocols are used to update neighboring router about the networks connected to all routers within the internetwork. Examples of routing protocols are OSPF, RIP, EIGRP, and RIPv2
  • Routed protocols are used to transport user data through the internetwork. They are assigned to an interface and determine the method of packet delivery. Examples are IP and IPv6.

Pregunta 23

Pregunta
What are the functions of the Data Link Layer?
Respuesta
  • Its the layer where users actually communicates with the computer. Applications do not reside in this layer but it interfaces with application protocols. Examples are HTTP, DNS, SMTP, SMNP, Telnet, SSH, Print, database and application services.
  • Its the layer that is responsible for setting up, managing and then tearing down sessions between Presentation layer entities. It coordinates communication between systems and services by offering three modes: Simplex, Half Duplex, and Full Duplex.
  • This layer provides the physical transmission of the data and handles error notification, network topology, and flow control. This layer also ensures messages being delivered to the assigned device via hardware addresses with the devices examples of Switches and Bridges.

Pregunta 24

Pregunta
Bridges reside in layer 2 which are hardware-based devices using ASIC integration (Application Specific Integrated Circuits)
Respuesta
  • True
  • False

Pregunta 25

Pregunta
What are the two sublayers at the Data Link layer? (Choose two)
Respuesta
  • Media Access Control (802.3) defines how packets are placed on the media. Physical addressing is defined here as well as logical topologies which is the signal path through a physical topology. Provides error notification, and optional flow control.
  • 802.1Q is an IEEE standard that supports layer 2 virtual local area networks. The standard defines a system of VLAN tagging for Ethernet frames.
  • Logical Link Control (LLC) 802.2 is responsible for identifying Network layer protocols and then encapsulating them. An LLC header tells the Data Link layer what to do with a packet once a frame is received.

Pregunta 26

Pregunta
Transparent Bridging on Layer 2 is when a filter table on a switch or bridge is built, the device will forward frames only to the segment where the destination hardware address is located. If the destination device is on the same segment as the frame the layer 2 device will block the frame from going to any other segments. If the destination is on a different segment then the frame can be transmitted only to that segment.
Respuesta
  • True
  • False

Pregunta 27

Pregunta
When a switch interface receives a frame with a destination hardware address that isn't found on the filter table, it will forward the frame to all connected segments.
Respuesta
  • True
  • False

Pregunta 28

Pregunta
What functions are performed from the Physical Layer of the OSI Model?
Respuesta
  • Physical Layer sends and receives bits.
  • This layer specifies the electrical, mechanical, procedural, and functional requirements for activating, maintaining, and deactivating a physical link between end systems.
  • This layer identifies the interface between the data terminal equipment (DTE) and the data communication equipment (DCE). The DCE is usually located at the service provider and DTE is the attached device.
  • This layer provides end to end connection using voltage standards.

Pregunta 29

Pregunta
Hubs are called multi-port repeaters.
Respuesta
  • True
  • False

Pregunta 30

Pregunta
What are the functions and advantages of Routers? (Choose three)
Respuesta
  • Routers perform packet switching, filtering and path selection.
  • Routers break up broadcast domains and reduce broadcast traffic.
  • Routers do not break up collision domains
  • Routers facilitate internetwork communications.

Pregunta 31

Pregunta
What is Ethernet?
Respuesta
  • Ethernet is a trademark for a family of Ethernet technologies for Local Area Networks (LANs) was introduced in 1980 and standardized in 1985 as IEEE 802.3
  • Ethernet is a contention based media access method that allows all hosts on a network to share the same bandwidth of a link.
  • Ethernet is a protocol that provides end to end delivery method.

Pregunta 32

Pregunta
What is a cut-through method in Ethernet?
Respuesta
  • Cut-Through is a Ethernet architecture switching device technology. A cut-through device begins forwarding a frame after examining only the first part of its header
  • Cut-Through is a Ethernet architecture switching device technology. A cut-through device will buffer the entire frame before forwarding it .

Pregunta 33

Pregunta
What is Store and Forward technology?
Respuesta
  • Store and Forward is an Ethernet switch architecture technology that begins to forward a data packet once it reads the header part of the frame.
  • Store and Forward is an Ethernet switch architecture technology that will first buffer the entire frame before making a forwarding decision.

Pregunta 34

Pregunta
Congestion Avoidance are flow control techniques that monitor network traffic loads in an effort to anticipate and avoid congestion at common network bottlenecks.
Respuesta
  • True
  • False

Pregunta 35

Pregunta
What is RFC 1918 Private Addressing for Class A ?
Respuesta
  • 10.0.0.0 - 10.255.255.255 range using 10.0.0.0/8
  • 172.16.0.0 - 172.31.255.255 range using 172.16.0.0/20
  • 192.168.0.0 - 192.168.255.255 range using 192.168.0.0/16

Pregunta 36

Pregunta
What is RFC 1918 Private Addressing for Class B ?
Respuesta
  • 10.0.0.0 - 10.255.255.255 range using 10.0.0.0/8
  • 172.16.0.0 - 172.31.255.255 range using 172.16.0.0/20
  • 192.168.0.0 - 192.168.255.255 range using 192.168.0.0/16

Pregunta 37

Pregunta
What is RFC 1918 Private Addressing for Class C ?
Respuesta
  • 10.0.0.0 - 10.255.255.255 range using 10.0.0.0/8
  • 172.16.0.0 - 172.31.255.255 range using 172.16.0.0/20
  • 192.168.0.0 - 192.168.255.255 range using 192.168.0.0/16

Pregunta 38

Pregunta
What is IPv6?
Respuesta
  • Its a 32 bit decimal-dotted network address
  • Its a 64 bit colon-delimited hexadecimal address
  • Its a 128 bit colon-delimited hexadecimal address

Pregunta 39

Pregunta
How many fields in an IPv6 address?
Respuesta
  • There are sixteen 8 bit fields separated by colon in hexadecimal format
  • There are thirty two 8 bit fields separated by colon in hexadecimal format
  • There are eight 16 bit fields separated by a delimited colon in hexadecimal format

Pregunta 40

Pregunta
What are the rules of leading zeros and shortening representation of IPv6
Respuesta
  • You can suppress all leading zeroes in IPv6 with double colons
  • You can only suppress on set of leading zeroes in IPv6 with double colons

Pregunta 41

Pregunta
Is there a Time to live (TTL) in IPv6?
Respuesta
  • There is a Time to Live (TTL) in IPv6 which the maximum is 255
  • The Time to Live (TTL) has been renamed to hop-count which is the default is 64 and can go up to 255.

Pregunta 42

Pregunta
What are some features of IPv6 ? (Choose three)
Respuesta
  • IPv6 provides three address types which are unicast (address for a single interface), multicast (one to many), anycast (one to nearest)
  • IPv6 address types are global, reserved, link-local, and site-local.
  • IPv6 has a 32 bit colon-delimited hexadecimal.
  • Every IPv6 enabled interface contains at least one loopback and one link-local address.

Pregunta 43

Pregunta
What is Link-Local address for IPv6?
Respuesta
  • Dynamically created on all IPv6 interfaces by using a specific link-local prefix (FE80::/10) and a 64-bit interface identifier.
  • one to nearest IPv6 address type.
  • All anycast nodes should provide uniform service.

Pregunta 44

Pregunta
What are three reasons to migrate from IPv4 to IPv6.
Respuesta
  • Hosts can be assigned an IP address with the use of DHCP
  • IPv6 can provide enough IP addresses to assign more than 4 million IP addresses to every person on earth.
  • IPv6 eliminates the requirement for NAT.
  • Hosts can be assigned without the use of DHCP.
Mostrar resumen completo Ocultar resumen completo

Similar

Open Systems Interconnect (OSI) Model
sirhulk1
TCP/IP and the DoD Model
sirhulk1
Cisco 3 Layer Model
sirhulk1
Computational Conversions
sirhulk1
PALABRAS A-...
JL Cadenas
Fórmulas Física
Diego Santos
Concepto y funciones del área de Recursos Humanos
Erika Caro
FLUJOGRAMA
albaluciagpb30
como elaborar un mapa mental
Maria Gineth Arenas
3. La independencia de la América Hispana (1808-1826)
albavillenerals
CAN, MUST , COUNTABLE AND UNCOUNTABLE NOUNS
Paula Lopez