You are on page 1of 13

Amity Campus

Uttar Pradesh
India 201303
ASSIGNMENTS
PROGRAM: BSc IT
SEMESTER-V
: WAN Technologies

Subject Name

Study COUNTRY
: Malawi
Roll Number (Reg.No.) : A1922711031(el)
Student Name
: Ephraim Imfaitenga
INSTRUCTIONS
a) Students are required to submit all three assignment sets.
ASSIGNMENT
Assignment A
Assignment B
Assignment C

DETAILS
Five Subjective Questions
Three Subjective Questions + Case Study
Objective or one line Questions

MARKS
10
10
10

b)
c)
d)
e)

Total weightage given to these assignments is 30%. OR 30 Marks


All assignments are to be completed as typed in word/pdf.
All questions are required to be attempted.
All the three assignments are to be completed by due dates and need to be submitted for
evaluation by Amity University.
f) The students have to attach a scan signature in the form.

Signature:
Date

28th December 2014

Assignment A

Assignment B

PART A
1. Compare MPLS and IPsec-VPNs as WAN technologies?
Answer:

Assignment C

MPLS (multiprotocol label switching) VPN is used for large networks where having multiple types of
protocols would not be an issue. It mostly creates a virtual link between 2 network devices and operates
between Layer 2 and Layer 3, making it more of a packet switching type of device, rather than a routing
device. However it does the similar task as IPsec and can be used in a larger scale.

IPsec (Internet Protocol Security) on the other hand has more security and operates on the
Internet layer of the IP Suite. IPsec analyzes each packet and encrypts the information, of which
MPLS does not do. This can also be used on large networks and is more secure. Based on the
definitions of each, it seems that MPLS would be a faster way to handle the packets and is more
diverse in what it can do.
In a WAN, most likely we would want to use MPLS unless we had a smaller network then we
only use the IP Suite protocols.
Advantages of MPLS
Offers more flexibility at more cost-effective price-points
Disadvantage of MPLS
Routing protocol choice might be limited
The end-to-end convergence is controlled primarily by the service provider
Reliability of Layer 3 MPLS VPN is influenced by the service provider's competence level.
Advantages of IPsec
Security at the network layer level
No application dependency

Disadvantages of IPsec
Compatibility issues
CPU overhead-higher processor loads
Broken Algorithms
2. Is there a way to direct FC3 to use MS-CHAP V2 authentication across a PPP dialup
connection? If so, how?
Answer
Yes there is a way to direct fc3. By doing the following
Firstly do a "man pppd" to see all the options associated with making a ppp connection,
as there are some options there for ms chap and then we need to modify /etc/ppp/chapsecrets with the authentication credentials.
3. What protocol enables dynamic Frame Relay mapping? When LMI Auto sense is in
effect, what message type(s) does the DTE send to the DCE?

Answer:

The Inverse ARP (IARP) enables dynamic Frame Relay mapping.


When LMI Autosense is in operation, the DTE will send three LMI Status messages.
LMI status message, Type q933a
LMI status message, Type ANSI
LMI status message, Type CISCO
And consequently the DCE will respond with one LMI Status message.
LMI status message, Type ANSI
.
4. What is the Frame Relay broadcast queue?
Answer:
The Frame Relay broadcast queue is basically a major feature used in medium to large IP or
Internet Package Exchange (IPX) networks in which routing and Service Advertising Protocol
(SAP) broadcasts must flow across the Frame Relay network. It is managed independently of the
normal interface queue, and has its own buffers, as well as configurable size and service rate.
Because of the timing sensitivities the following two are not transmitted using the broadcast
queue,
Spanning Tree Protocol (STP)
Bridge Protocol Data Units (BPDUs)

5. How many data-link connection identifier (DLCI) s can an interface support? Can
Frame Relay Inverse Address Resolution Protocol (IARP) work without Local
Management Interface (LMI)?
Answer
An interface can support a lot more than one DLCIs given performance and availability
constraints. Just like talking about a number of computers one can put on an Ethernet.

Frame Relay Inverse Address Resolution Protocol (IARP) cannot work without Local
Management Interface (LMI) because it uses LMI to determine which permanent virtual
circuits (PVCs) to map.

6. What are the three types of VPNs? What type of VPNs link outside customers, suppliers,
partners, or communities of interest to an enterprise customer's network over a shared
infrastructure using dedicated connections?
Answer

The three types of VPN are

Remote Access VPN (Virtual Private dial-up network -VPDN). These are user-to-LAN
connections used when employees of a company who are in remote locations need to
connect to the company's private network. This then allows data to be accessed between a
companys private network and remote users through a third party service provider.
Site to Site VPN Intranet based: This type of VPN can be used when multiple Remote
locations are present and can be made to join to a single network. Machines present on
these remote locations work as if they are working on a single network.
Site to Site VPN Extranet based: This type of VPN can be used when several different
companies need to work in a shared environment. E.g. service and Distributors
companies.

Site to Site VPN Extranet VPNs link outside customers, suppliers, partners, or
communities of interest to an enterprise customer's network over a shared infrastructure using
dedicated connections

PART B
1. Which is the most secure encryption algorithm: DES, 3DES, or Diffie-Hellman?
Answer:
3DES is the most secure of the DES combinations, and has a bit slower performance. 3DES
processes each block three times, using a unique key each time.
2. How do cryptography-based keys ensure the validity of data transferred across the
network?
Answer:
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and
transmitting ends, it means the data was modified or corrupted.

3. In a sub netted environment, how does the DHCP server discover what subnet a request
has come from? If a physical LAN has more than one logical subnet, how can different
groups of clients be allocated addresses on different subnets?
Answer:
In a sub netted environment HCP client messages are sent to off-net servers by DHCP relay
agents, which are often a part of an IP router. The DHCP relay agent records the subnet from
which the message was received in the DHCP message header for use by the DHCP server.

Mostly a DHCP relay agent is the same thing as a BOOTP relay agent, and practically speaking,
the latter phrase is correct.
If a physical LAN has more than one logical subnet, groups of clients can be allocated addresses
on different subnets by preconfiguring each client with information about what group it belongs
to. A DHCP feature designed for this is the user class option. To do this, the client software must
allow the user class option to be preconfigured and the server software must support its use to
control which pool a client's address is allocated from.

CASE STUDY
You need to troubleshoot a Cisco router at the Toronto office of How2Pass Inc. The router loses
its configuration each time it is rebooted. You study the output displayed in the exhibit. What is
the cause of the problem?
Exhibit:
----- output omitted ---Cisco 2620 (MPC860) processor (revision 0x200) with
16384/2048K bytes of memory.
Processor board ID JAD05076EF6 (3878188963)
M860 processor: part number 0, mask 49
Bridging software.
X.25 software, Version 3.0.0.
2 Ethernet/IEEE 802.3 interface(s)
2 Serial(sync/async) network interface(s)
2 Low speed serial(sync/async) network interface(s)
32K bytes of non-volatile configuration memory.
16384K bytes of processor board System flash (Read/Write)
Configuration register is 0x2142
Answer:
The cause of the problem is that: The configuration register is misconfigured.

PART C
1.Which PPP authentication methods will you use when configuring PPP on an interface of a
Cisco router? (Select two options.)
A. SSL
B. SLIP
C. PAP
D. LAPB
E. CHAP

F. VNP
2.If NVRAM lacks boot system commands, where does the router look for the Cisco IOS by
default?
G. ROM
H. RAM
I. Flash
J. Bootstrap
K. Startup-.config
3. What could be the rationale behind using passive-interface command when configuring a
router?
a. Allows interfaces to share common IP addresses.
b. Allows an interface to remain up without the aid of keepalives.
c. Allows a router to send routing and not receive updates via that interface.
d. Allows a routing protocol to forward updates that is missing its IP address.
e. Allows a router to receive routing updates on an interface but not send updates via that
interface.
4. Which of the following are benefits of segmenting a network with a router? (Select all that
apply)
a. Broadcasts are not forwarded across the router.
b. All broadcasts are completely eliminated.
c. Adding a router to the network decreases latency.
d. Filtering can occur based on Layer 3 information.
e. Routers are more efficient than switches and will process the data more quickly.
f. None of the above.

5. If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the


maximum number of hosts allowed on this subnet?
a. 2046
b. 8190
c. 4094
d. 4096
e. 1024
6. The Frame Relay circuit between router A and router B is experiencing congestion. Which
types of notification are used to alleviate the congestion? (Choose three)
a. DE
b. BECN

c. DLCI 100 is down


d. CIR
e. FECN
7. At which OSI layer does data translation and code formatting occur?
a. Network
b. Physical
c. Data link
d. Transport
e. Session
f. Presentation
8. Which one of the following is a reason to use a hardware address?
a. To transmit a packet from one local device to another local device.
b. To transmit a frame from one interface to another interface.
c. To obtain a vendor code/serial number from the user.
d. To transmit data from one local device to remote device across Internet.
e. To contain logical information about a device to use an end-to-end transmission.
9. What does the concept route aggregation mean when one talks about using variable subnet
masking?
a. Combining routes to multiple networks into one super net.
b. Deleting unusable addresses through the creation of many subnets.
c. Calculating the available host addresses in the AS.
d. Reclaiming unused space by means of changing the subnet size.
10. What PPP protocol provides dynamic addressing, authentication, and multilink?
a. HDLC
b. LCP
c. NCP
d. X.25
11. Study the network topology exhibit carefully, in particular the two switches SW1, SW2, and
the router RT3. Which statements are true in this scenario? (Select two)
a. The hosts on the 192.168.1.0 network form one collision domain, and the hosts on the
192.168.2.0 network form a second collision domain.
b. Each host is in a separate collision domain.
c. All the devices in both networks will receive a broadcast to
255.255.255.255 sent by host A.
d. Only the devices in network 192.168.1.0 will receive a broadcast to
255.255.255.255 sent by host A.
e. All the devices on both networks are members of the same collision domain.

12. What is the purpose of Inverse ARP?


a. It is used to map a known DLCI to an IP address
b. It is used to map a known DLCI to a MAC address
c. It is used to map a known IP address to a MAC address
d. It is used to map a known MAC address to an IP address
e. It is used to map a known MAC address to DLCI
13. You want to configure a router for load balancing across 4 unequal cost paths on your
network. Which of the following routing protocols can you use? (Choose two)
a. RIP v1
b. RIP v2
c. OSPF
d. IGRP
e. EIGRP
f. VLSM
14. At what layer data is split into segments
a. Transport
b. LAN
c. Session
d. Data Link
15. Host A is communicating with the server. What will be the source MAC address of the
frames received by Host A from the server?
a. The MAC address of Host A.
b. The MAC address of the server network interface.
c. The MAC address of router interface E1.
d. The MAC address of router interface E0.
16. What switching method examines the destination MAC address as the frame is being
received and then begins forwarding the frame prior to receiving the entire frame?
a. Fragment Free
b. Store and Forward
c. Modified Cut Through
d. Cut Through
17. You work as network administrator at Brain dump. Your trainee is configuring a router with
both physical and logical interfaces. He asks you what factor determines the OSPF router ID.
What should you tell him?
a. The lowest IP address of any interface.
b. The highest IP address of any interface.
c. The highest IP address of any logical interface.

d. The middle IP address of any logical interface.


e. The lowest IP address of any physical interface.
f. The highest IP address of any physical interface.
g. The lowest IP address of any logical interface.
18. Which of the following routes will be used to forward data in a situation where a routing
table contains static, RIP, and IGRP routes destined to the same network with each set to its
default administrative distance?
a. The IGRP route
b. The static route
c. The RIP route
d. All three will load balance.
19. What is the basic characteristic of switches and hubs?
A. Hubs cannot filter frames.
B. Using hubs is costly with regard to bandwidth availability.
C. Switches do and cannot forward broadcasts.
D. Switches are more efficient than hubs in processing frames.
E. Switches increase the number of collision domains in the network.
20. When you consider half-duplex and full-duplex Ethernet, what are unique for half duplex
Ethernet? (Select two options.)
e. Half-duplex Ethernet operates in a shared collision domain.
f. Half-duplex Ethernet operates in an exclusive broadcast domain.
g. Half-duplex Ethernet has efficient throughput.
h. Half-duplex Ethernet has lower effective throughput.
i. Half-duplex Ethernet operates in an exclusive collision domain.
21. Which of the following about Routing Protocols is correct? (Choose all that apply)
A. RIP 2 is a Distance Vector Protocol
B. The RIP 1 uses bandwidth and delay as the metric
C. RIP 1 uses subnet mask
D. The holdown timer value for RIP is 240 sec
E. The Update timer value of IGRP is 90 sec
22. What command is used to delete the configuration stored in NVRAM?
a. erase startup-config
b. erase running-config
c. delete nvram
d. erase nvram
23. What is the maximum number of hops that OSPF allows before marking a network as
unreachable?

a. 15
b. 16
c. 255
d. Unlimited
e. 99

24. Which routing protocol would allow a network administrator scalability, VLSM support and
minimize overhead if the network administrator wants to merge different networks all using
routers from multiple vendors?
a. VTP
b. RIP
c. IGRP
d. EIGRP
e. OSPF
25. Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when
Rtr1 receives a routing update that contains a higher cost path to a network already in its routing
table?
a. The update information will replace the existing routing table entry.
b. The update information will be added to the existing routing table.
c. The existing routing table entry will be deleted from the routing table and
all routers will exchange routing updates to reach convergence.
d. The update will be ignored and no further action will be taken.
26. Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when
Rtr1 receives a routing update that contains a higher cost path to a network already in its routing
table?
a. The update information will replace the existing routing table entry.
b. The update information will be added to the existing routing table.
c. The existing routing table entry will be deleted from the routing table and
all routers will exchange routing updates to reach convergence.
d. The update will be ignored and no further action will be taken.
27. What switching method examines the destination MAC address as the frame is being
received and then begins forwarding the frame prior to receiving the entire frame?
a. Modified Cut Through
b. Store and Forward
c. Cut Through
d. Fragment Free

28. Given the the following network diagram, assume that port 1 through 3 are assigned to
VLAN 1 and ports 4 through 6 are assigned to VLAN 2 on each switch. The switches are
interconnected over a trunked link. Which of the following conditions would verify VLAN and
trunk operation? (choose 3)
a. A. Host 1-1 can ping Host 1-2
b. B. Host 1-1 can ping Host 4-2
c. C. Host 1-1 can not ping Host 1-2
d. D. Host 4-1 can not ping Host 1-2
e. E. Host 4-1 can ping Host 4-2
29. By looking at the configuration, which additional command must be issued on the Branch
router before interesting traffic will be sent to the Remote router?
Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit
a. (config-if)# dialer-group 1
b. (config-if)# dialer-list 1
c. (config-if)# dialer map 1
d. (config-if)# dialer-route 1
30. You are the network administrator of the Router Sim global software Company. You receive a
call from a user who is unable to reach a server at a remote site. After further review you
discover the following info:
Local PC 190.0.3.35/24
Default Gateway 190.0.3.1
Remote Server 190.0.5.250/24
You then conduct the following tests from the offending local PC: Ping 127.0.0.1 - Unsuccessful
Ping 190.0.3.35 - Successful
Ping 190.0.3.1 - Unsuccessful
Ping 190.0.5.250 - Unsuccessful

Which of the following problems would create the test results listed above?
a. TCP/IP not correctly installed
b. Local physical layer problem
c. NIC not functioning
d. Remote physical layer problem
31. Choose three reasons why the networking industry uses a layered model. (Choose 3)
a. Allow changes in one layer to occur without changing other layers
b. To get Gigabit speeds on LANs
c. Clarify what general functions is to be done rather than how to do it
d. To create filter tables on LANs
e. Order network troubleshooting steps
32. What is a disadvantage to using bridges in your network?
A. Filters by MAC address
B. Stops broadcast storms
C. Doesn't stop broadcast storms
D. Can only use up to 4 bridges in any LAN
33. Which wireless data communication type has a high data rate but is limited to very short
distances?
a. Infrared
b. Broadband Personal Communication Service (PCS)
c. Narrowband
d. Spread spectrum
34. Ethernet networks are broadcast domains and collision domains. How the hosts on an
Ethernet network will know when to resume transmissions after a collision has occurred?
(Choose all that apply)
a. The router on the segment will signal that the collision has cleared.
b. The jam signal indicates that the collision has been cleared.
c. The hosts will attempt to resume transmission after a time delay has expired.
d. The destination host sends a request to the source for retransmission.
e. An electrical pulse indicates that the collision has cleared.
35. Which command must be entered when connecting two routers without external DCE
devices via a serial link?
a. Serial up.
b. Dte rate.
c. Dce rate.
d. Clock rate.
e. Line protocol up.

36. What is a trunk link?


a. A link that is only part of one VLAN and is referred to as the native VLAN of the port
b. A link that can carry multiple VLANs
c. A switch port connected to the Internet
d. Data and voice capability on the same interface
37.In _________, the station configuration is unbalanced. We have one primary station and
multiple secondary stations.
a. ABM
b. NRM
c. ARM
d. NBM

38 .In _________, the configuration is balanced. The link is point-to-point, and each station can
function as a primary and a secondary.
a. ABM
b. NRM
c. ARM
d. NBM
39 .In PPP, the ________ is responsible for establishing, maintaining, configuring, and
terminating links
a.NCP
b.LCP
c.CHAP
d. PAP
40. In PPP, _______ is a three-way hand-shaking authentication protocol in which the password
is kept secret; it is never sent online.
a.NCP
b.LCP
c.CHAP
d.PAP

You might also like