Professional Documents
Culture Documents
Uttar Pradesh
India 201303
ASSIGNMENTS
PROGRAM: BSc IT
SEMESTER-V
: WAN Technologies
Subject Name
Study COUNTRY
: Malawi
Roll Number (Reg.No.) : A1922711031(el)
Student Name
: Ephraim Imfaitenga
INSTRUCTIONS
a) Students are required to submit all three assignment sets.
ASSIGNMENT
Assignment A
Assignment B
Assignment C
DETAILS
Five Subjective Questions
Three Subjective Questions + Case Study
Objective or one line Questions
MARKS
10
10
10
b)
c)
d)
e)
Signature:
Date
Assignment A
Assignment B
PART A
1. Compare MPLS and IPsec-VPNs as WAN technologies?
Answer:
Assignment C
MPLS (multiprotocol label switching) VPN is used for large networks where having multiple types of
protocols would not be an issue. It mostly creates a virtual link between 2 network devices and operates
between Layer 2 and Layer 3, making it more of a packet switching type of device, rather than a routing
device. However it does the similar task as IPsec and can be used in a larger scale.
IPsec (Internet Protocol Security) on the other hand has more security and operates on the
Internet layer of the IP Suite. IPsec analyzes each packet and encrypts the information, of which
MPLS does not do. This can also be used on large networks and is more secure. Based on the
definitions of each, it seems that MPLS would be a faster way to handle the packets and is more
diverse in what it can do.
In a WAN, most likely we would want to use MPLS unless we had a smaller network then we
only use the IP Suite protocols.
Advantages of MPLS
Offers more flexibility at more cost-effective price-points
Disadvantage of MPLS
Routing protocol choice might be limited
The end-to-end convergence is controlled primarily by the service provider
Reliability of Layer 3 MPLS VPN is influenced by the service provider's competence level.
Advantages of IPsec
Security at the network layer level
No application dependency
Disadvantages of IPsec
Compatibility issues
CPU overhead-higher processor loads
Broken Algorithms
2. Is there a way to direct FC3 to use MS-CHAP V2 authentication across a PPP dialup
connection? If so, how?
Answer
Yes there is a way to direct fc3. By doing the following
Firstly do a "man pppd" to see all the options associated with making a ppp connection,
as there are some options there for ms chap and then we need to modify /etc/ppp/chapsecrets with the authentication credentials.
3. What protocol enables dynamic Frame Relay mapping? When LMI Auto sense is in
effect, what message type(s) does the DTE send to the DCE?
Answer:
5. How many data-link connection identifier (DLCI) s can an interface support? Can
Frame Relay Inverse Address Resolution Protocol (IARP) work without Local
Management Interface (LMI)?
Answer
An interface can support a lot more than one DLCIs given performance and availability
constraints. Just like talking about a number of computers one can put on an Ethernet.
Frame Relay Inverse Address Resolution Protocol (IARP) cannot work without Local
Management Interface (LMI) because it uses LMI to determine which permanent virtual
circuits (PVCs) to map.
6. What are the three types of VPNs? What type of VPNs link outside customers, suppliers,
partners, or communities of interest to an enterprise customer's network over a shared
infrastructure using dedicated connections?
Answer
Remote Access VPN (Virtual Private dial-up network -VPDN). These are user-to-LAN
connections used when employees of a company who are in remote locations need to
connect to the company's private network. This then allows data to be accessed between a
companys private network and remote users through a third party service provider.
Site to Site VPN Intranet based: This type of VPN can be used when multiple Remote
locations are present and can be made to join to a single network. Machines present on
these remote locations work as if they are working on a single network.
Site to Site VPN Extranet based: This type of VPN can be used when several different
companies need to work in a shared environment. E.g. service and Distributors
companies.
Site to Site VPN Extranet VPNs link outside customers, suppliers, partners, or
communities of interest to an enterprise customer's network over a shared infrastructure using
dedicated connections
PART B
1. Which is the most secure encryption algorithm: DES, 3DES, or Diffie-Hellman?
Answer:
3DES is the most secure of the DES combinations, and has a bit slower performance. 3DES
processes each block three times, using a unique key each time.
2. How do cryptography-based keys ensure the validity of data transferred across the
network?
Answer:
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and
transmitting ends, it means the data was modified or corrupted.
3. In a sub netted environment, how does the DHCP server discover what subnet a request
has come from? If a physical LAN has more than one logical subnet, how can different
groups of clients be allocated addresses on different subnets?
Answer:
In a sub netted environment HCP client messages are sent to off-net servers by DHCP relay
agents, which are often a part of an IP router. The DHCP relay agent records the subnet from
which the message was received in the DHCP message header for use by the DHCP server.
Mostly a DHCP relay agent is the same thing as a BOOTP relay agent, and practically speaking,
the latter phrase is correct.
If a physical LAN has more than one logical subnet, groups of clients can be allocated addresses
on different subnets by preconfiguring each client with information about what group it belongs
to. A DHCP feature designed for this is the user class option. To do this, the client software must
allow the user class option to be preconfigured and the server software must support its use to
control which pool a client's address is allocated from.
CASE STUDY
You need to troubleshoot a Cisco router at the Toronto office of How2Pass Inc. The router loses
its configuration each time it is rebooted. You study the output displayed in the exhibit. What is
the cause of the problem?
Exhibit:
----- output omitted ---Cisco 2620 (MPC860) processor (revision 0x200) with
16384/2048K bytes of memory.
Processor board ID JAD05076EF6 (3878188963)
M860 processor: part number 0, mask 49
Bridging software.
X.25 software, Version 3.0.0.
2 Ethernet/IEEE 802.3 interface(s)
2 Serial(sync/async) network interface(s)
2 Low speed serial(sync/async) network interface(s)
32K bytes of non-volatile configuration memory.
16384K bytes of processor board System flash (Read/Write)
Configuration register is 0x2142
Answer:
The cause of the problem is that: The configuration register is misconfigured.
PART C
1.Which PPP authentication methods will you use when configuring PPP on an interface of a
Cisco router? (Select two options.)
A. SSL
B. SLIP
C. PAP
D. LAPB
E. CHAP
F. VNP
2.If NVRAM lacks boot system commands, where does the router look for the Cisco IOS by
default?
G. ROM
H. RAM
I. Flash
J. Bootstrap
K. Startup-.config
3. What could be the rationale behind using passive-interface command when configuring a
router?
a. Allows interfaces to share common IP addresses.
b. Allows an interface to remain up without the aid of keepalives.
c. Allows a router to send routing and not receive updates via that interface.
d. Allows a routing protocol to forward updates that is missing its IP address.
e. Allows a router to receive routing updates on an interface but not send updates via that
interface.
4. Which of the following are benefits of segmenting a network with a router? (Select all that
apply)
a. Broadcasts are not forwarded across the router.
b. All broadcasts are completely eliminated.
c. Adding a router to the network decreases latency.
d. Filtering can occur based on Layer 3 information.
e. Routers are more efficient than switches and will process the data more quickly.
f. None of the above.
a. 15
b. 16
c. 255
d. Unlimited
e. 99
24. Which routing protocol would allow a network administrator scalability, VLSM support and
minimize overhead if the network administrator wants to merge different networks all using
routers from multiple vendors?
a. VTP
b. RIP
c. IGRP
d. EIGRP
e. OSPF
25. Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when
Rtr1 receives a routing update that contains a higher cost path to a network already in its routing
table?
a. The update information will replace the existing routing table entry.
b. The update information will be added to the existing routing table.
c. The existing routing table entry will be deleted from the routing table and
all routers will exchange routing updates to reach convergence.
d. The update will be ignored and no further action will be taken.
26. Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when
Rtr1 receives a routing update that contains a higher cost path to a network already in its routing
table?
a. The update information will replace the existing routing table entry.
b. The update information will be added to the existing routing table.
c. The existing routing table entry will be deleted from the routing table and
all routers will exchange routing updates to reach convergence.
d. The update will be ignored and no further action will be taken.
27. What switching method examines the destination MAC address as the frame is being
received and then begins forwarding the frame prior to receiving the entire frame?
a. Modified Cut Through
b. Store and Forward
c. Cut Through
d. Fragment Free
28. Given the the following network diagram, assume that port 1 through 3 are assigned to
VLAN 1 and ports 4 through 6 are assigned to VLAN 2 on each switch. The switches are
interconnected over a trunked link. Which of the following conditions would verify VLAN and
trunk operation? (choose 3)
a. A. Host 1-1 can ping Host 1-2
b. B. Host 1-1 can ping Host 4-2
c. C. Host 1-1 can not ping Host 1-2
d. D. Host 4-1 can not ping Host 1-2
e. E. Host 4-1 can ping Host 4-2
29. By looking at the configuration, which additional command must be issued on the Branch
router before interesting traffic will be sent to the Remote router?
Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit
a. (config-if)# dialer-group 1
b. (config-if)# dialer-list 1
c. (config-if)# dialer map 1
d. (config-if)# dialer-route 1
30. You are the network administrator of the Router Sim global software Company. You receive a
call from a user who is unable to reach a server at a remote site. After further review you
discover the following info:
Local PC 190.0.3.35/24
Default Gateway 190.0.3.1
Remote Server 190.0.5.250/24
You then conduct the following tests from the offending local PC: Ping 127.0.0.1 - Unsuccessful
Ping 190.0.3.35 - Successful
Ping 190.0.3.1 - Unsuccessful
Ping 190.0.5.250 - Unsuccessful
Which of the following problems would create the test results listed above?
a. TCP/IP not correctly installed
b. Local physical layer problem
c. NIC not functioning
d. Remote physical layer problem
31. Choose three reasons why the networking industry uses a layered model. (Choose 3)
a. Allow changes in one layer to occur without changing other layers
b. To get Gigabit speeds on LANs
c. Clarify what general functions is to be done rather than how to do it
d. To create filter tables on LANs
e. Order network troubleshooting steps
32. What is a disadvantage to using bridges in your network?
A. Filters by MAC address
B. Stops broadcast storms
C. Doesn't stop broadcast storms
D. Can only use up to 4 bridges in any LAN
33. Which wireless data communication type has a high data rate but is limited to very short
distances?
a. Infrared
b. Broadband Personal Communication Service (PCS)
c. Narrowband
d. Spread spectrum
34. Ethernet networks are broadcast domains and collision domains. How the hosts on an
Ethernet network will know when to resume transmissions after a collision has occurred?
(Choose all that apply)
a. The router on the segment will signal that the collision has cleared.
b. The jam signal indicates that the collision has been cleared.
c. The hosts will attempt to resume transmission after a time delay has expired.
d. The destination host sends a request to the source for retransmission.
e. An electrical pulse indicates that the collision has cleared.
35. Which command must be entered when connecting two routers without external DCE
devices via a serial link?
a. Serial up.
b. Dte rate.
c. Dce rate.
d. Clock rate.
e. Line protocol up.
38 .In _________, the configuration is balanced. The link is point-to-point, and each station can
function as a primary and a secondary.
a. ABM
b. NRM
c. ARM
d. NBM
39 .In PPP, the ________ is responsible for establishing, maintaining, configuring, and
terminating links
a.NCP
b.LCP
c.CHAP
d. PAP
40. In PPP, _______ is a three-way hand-shaking authentication protocol in which the password
is kept secret; it is never sent online.
a.NCP
b.LCP
c.CHAP
d.PAP