You are on page 1of 23

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1!

MSI!301:!LAN!SWITCHING!AND!
WIRELESS!|!SOLVED!
ASSIGNMENT!
AMITY!UNIVERSITY!ONLINE!(AUO)!3rd!SEM!SOLVED!ASSIGNMENT!

SUBMITTED!BY:!Tanuj!Ghimire!
!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 2!
!

!
!
!
!
!
!
!
!
!

Assignment!A!
!
!
!
!
!
!
!
!
!
!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 3!
!

1)!Describe!the!Hierarchical!Network!Model?!Describe!the!benefits!of!the!
Hierarchical!Network!Model.!
!
Ans:!!
!
This!model!simplifies!the!task!of!building!a!reliable,!scalable,!and!less!expensive!hierarchical!
internetwork!because!rather!than!focusing!on!packet!construction,!it!focuses!on!the!three!
functional!areas,!or!layers,!of!your!network:!
!
Core!layer:!This!layer!is!considered!the!backbone!of!the!network!and!includes!the!highFend!
switches!and!highFspeed!cables!such!as!fiber!cables.!This!layer!of!the!network!does!not!route!
traffic!at!the!LAN.!In!addition,!there!is!no!packet!manipulation!that!is!done!by!devices!in!this!
layer.!Rather,!this!layer!is!concerned!with!speed!and!ensures!reliable!delivery!of!packets.!
!
Distribution!layer:!This!layer!includes!LANFbased!routers!and!layer!3!switches.!This!layer!
ensures!that!packets!are!properly!routed!between!subnets!and!VLANs!in!your!enterprise.!This!
layer!is!also!called!the!Workgroup!layer.!
!
Access!layer:!This!layer!includes!hubs!and!switches.!This!layer!is!also!called!the!desktop!layer!
because!it!focuses!on!connecting!client!nodes,!such!as!workstations!to!the!network.!This!layer!
ensures!that!packets!are!delivered!to!end!user!computers.!
!
!
When!we!implement!these!layers,!each!layer!might!comprise!more!than!two!devices!or!a!single!
device!might!function!across!multiple!layers.!The!benefits!of!the!hierarchical!model!include:!
!
High!Performance:!We!can!design!high!performance!networks,!where!only!certain!layers!are!
susceptible!to!congestion.!
!
Efficient!management!&!troubleshooting:!Allows!us!to!efficiently!organize!network!
management!and!isolate!causes!of!network!trouble.!
!
Policy!creation:!We!can!easily!create!policies!and!specify!filters!and!rules.!
!
Scalability:!We!can!grow!the!network!easily!by!dividing!your!network!into!functional!areas.!
!
Behavior!prediction:!When!planning!or!managing!a!network,!the!model!allows!us!to!determine!
what!will!happen!to!the!network!when!new!stresses!are!placed!on!it.!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 4!
!

FIG:!Hierarchical!Network!Model!

!
!
!

2)!Explain!the!key!features!of!switches!that!are!used!in!hierarchical!
networks?!
!
Ans:!Following!are!the!key!features!of!switches!used!in!hierarchical!networks!
!
Switch!Form!Factors:!!
!
When!you!are!selecting!a!switch,!you!need!to!decide!between!fixed!configuration!or!modular!
configuration,!and!stackable!or!nonFstackable.!Another!consideration!is!the!thickness!of!the!
switch!expressed!in!number!of!rack!units.!
!
Fixed!Configuration!Switches:!
!
Fixed!configuration!switches!are!just!as!you!might!expect,!fixed!in!their!configuration.!
What!that!means!is!that!you!cannot!add!features!or!options!to!the!switch!beyond!those!that!
originally!came!with!the!switch.!The!particular!model!you!purchase!determines!the!features!
and!options!available.!For!example,!if!you!purchase!a!24Fport!gigabit!fixed!switch,!you!cannot!
add!additional!ports!when!you!need!them.!
!
!
!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 5!
!
Modular!Switches:!
!
Modular!switches!offer!more!flexibility!in!their!configuration.!Modular!switches!come!with!
different!sized!chassis!that!allow!for!the!installation!of!different!numbers!of!modular!line!
cards.!The!line!cards!contain!the!ports.!The!line!card!fits!into!the!switch!chassis!like!expansion!
cards!fit!into!a!PC.!The!larger!the!chassis,!the!more!modules!it!can!support.!
!
Stackable!Switches:!
!
Stackable!switches!can!be!interconnected!using!a!special!backplane!cable!that!provides!highF
bandwidth!throughput!between!the!switches.!Cisco!introduced!StackWise!technology!in!one!of!
its!switch!product!lines.!StackWise!allows!you!to!interconnect!up!to!nine!switches!using!fully!
redundant!backplane!connections.!
!
Switch!Performance:!
!
When!selecting!a!switch!for!the!access,!distribution,!or!core!layers,!consider!the!capability!of!
the!switch!to!support!the!port!density,!forwarding!rates,!and!bandwidth!aggregation!
requirements!of!your!network.!
!
Port!Density:!
!
Port!density!is!the!number!of!ports!available!on!a!single!switch.!Fixed!configuration!switches!
typically!support!up!to!48!ports!on!a!single!device,!with!options!for!up!to!four!additional!ports!
for!small!formFfactor!pluggable!(SFP)!devices.!!
!
High!port!densities!allow!for!better!use!of!space!and!power!when!both!are!in!limited!supply.!If!
you!have!two!switches!that!each!contain!24!ports,!you!would!be!able!to!support!up!to!46!
devices!because!you!lose!at!least!one!port!per!switch!to!connect!each!switch!to!the!rest!of!the!
network.!In!addition,!two!power!outlets!are!required.!On!the!other!hand,!if!you!have!a!single!
48Fport!switch,!47!devices!can!be!supported,!with!only!one!port!used!to!connect!the!switch!to!
the!rest!of!the!network,!and!only!one!power!outlet!needed!to!accommodate!the!single!switch.!!
!
Modular!switches!can!support!very!high!port!densities!through!the!addition!of!multiple!switch!
port!line!cards.!For!example,!the!Catalyst!6500!switch!can!support!in!excess!of!1000!switch!
ports!on!a!single!device.!
!
Large!enterprise!networks!that!support!many!thousands!of!network!devices!require!high!
density,!modular!switches!to!make!the!best!use!of!space!and!power.!Without!using!a!highF!
density!modular!switch,!the!network!would!need!many!fixed!configuration!switches!to!
accommodate!the!number!of!devices!that!need!network!access.!This!approach!can!consume!
many!power!outlets!and!a!lot!of!closet!space.!
!
You!must!also!address!the!issue!of!uplink!bottlenecks.!A!series!of!fixed!configuration!switches!
may!consume!many!additional!ports!for!bandwidth!aggregation!between!switches!for!the!
purpose!of!achieving!target!performance.!With!a!single!modular!switch,!bandwidth!
aggregation!is!less!of!an!issue!because!the!backplane!of!the!chassis!can!provide!the!necessary!
bandwidth!to!accommodate!the!devices!connected!to!the!switch!port!line!cards.!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 6!
!
!
Forwarding!Rates:!!
!
As!illustrated!in!Figure!1F20,!forwarding!rates!define!the!processing!capabilities!of!a!switch!by!
rating!how!much!data!the!switch!can!process!per!second.!Switch!product!lines!are!classified!by!
forwarding!rates.!EntryFlayer!switches!have!lower!forwarding!rates!than!enterpriseF!layer!
switches.!Forwarding!rates!are!important!to!consider!when!selecting!a!switch.!If!the!switchF
forwarding!rate!is!too!low,!it!cannot!accommodate!full!wireFspeed!communication!across!all!its!
switch!ports.!Wire!speed!is!the!data!rate!that!each!port!on!the!switch!is!capable!of!attaining
either!100!Mbps!Fast!Ethernet!or!1000!Mbps!Gigabit!Ethernet.!
For!example,!a!48Fport!gigabit!switch!operating!at!full!wire!speed!generates!48!Gbps!of!traffic.!
If!the!switch!supports!a!forwarding!rate!of!only!32!Gbps,!it!cannot!run!at!full!wire!speed!across!
all!ports!simultaneously.!
!
Link!Aggregation:!
!
As!part!of!bandwidth!aggregation,!you!should!determine!if!there!are!enough!ports!on!a!switch!
to!aggregate!to!support!the!required!bandwidth.!For!example,!consider!a!Gigabit!Ethernet!port,!
which!carries!up!to!1!Gbps!of!traffic.!If!you!have!a!24Fport!switch,!with!all!ports!capable!of!
running!at!gigabit!speeds,!you!could!generate!up!to!24!Gbps!of!network!traffic.!If!the!switch!is!
connected!to!the!rest!of!the!network!by!a!single!network!cable,!it!can!forward!only!1!Gbps!of!
the!data!to!the!rest!of!the!network.!Due!to!the!contention!for!bandF!width,!the!data!would!
forward!more!slowly.!That!results!in!1/24th!wire!speed!available!to!each!of!the!24!devices!
connected!to!the!switch.!Wire!speed!describes!the!theoretical!maxiF!mum!data!transmission!
rate!of!a!connection.!
!
Link!aggregation!helps!to!reduce!these!bottlenecks!of!traffic!by!allowing!up!to!eight!switch!
ports!to!be!bound!together!for!data!communications,!providing!up!to!16!Gbps!of!data!
throughput!when!Gigabit!Ethernet!ports!are!used.!With!the!addition!of!multiple!10!Gigabit!
Ethernet!uplinks!on!some!enterpriseFlayer!switches,!160!Gbps!throughput!rates!can!be!
achieved.!Cisco!uses!the!term!Ether!Channel!when!describing!aggregated!switch!ports.!Keep!in!
mind!that!Ether!Channel!reduces!the!number!of!available!ports!to!connect!network!devices.!
!
Power!over!Ethernet:!
!
Power!over!Ethernet!(PoE)!allows!the!switch!to!deliver!power!to!a!device!over!the!existing!
Ethernet!cabling.!PoE!ports!on!a!switch,!IP!phone,!access!point,!and!wireless!LAN!controller!
look!the!same!as!any!switch!port.!
!
PoE!allows!you!more!flexibility!when!installing!wireless!access!points!and!IP!phones!because!
you!can!install!them!anywhere!you!can!run!an!Ethernet!cable.!You!do!not!need!to!consider!how!
to!run!ordinary!power!to!the!device.!You!should!select!a!switch!that!supports!PoE!only!if!you!
are!actually!going!to!take!advantage!of!the!feature!because!it!adds!considerF!able!cost!to!the!
switch.!
!
!
!
!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 7!
!
Layer!3!Functionality:!
!
Typically,!switches!operate!at!Layer!2!of!the!OSI!reference!model,!where!they!deal!primarily!
with!the!MAC!addresses!of!devices!connected!to!switch!ports.!Layer!3!switches!are!also!known!
as!multilayer!switches.!
!
3)!What!are!the!benefits!of!VLAN?!Explain!different!types!of!VLAN.!
!
Ans:!VLAN!(Virtual!Local!Network)!is!a!logically!separate!IP!subFnet!which!allow!multiple!IP!
networks!and!subnets!to!exist!on!the!sameFswitched!network.!
!
VLAN!is!a!logical!broadcast!domain!that!can!span!multiple!physical!LAN!segments.!It!is!a!
modern!way!administrators!configure!switches!into!virtual!localFarea!networks!(VLANs)!to!
improve!network!performance!by!separating!large!Layer!2!broadcast!domains!into!smaller!
ones.!!
!
By!using!VLAN!a!network!administrator!will!be!able!to!group!together!stations!by!logical!
function,!or!by!applications,!without!regard!to!physical!location!of!the!users.!
!
Each!VLAN!functions!as!a!separate!LAN!and!spans!one!or!more!switches.!This!allows!host!
devices!to!behave!as!if!they!were!on!the!same!network!segment.!!
!
For!traffic!to!move!between!VLANs,!a!layer!3!device!(router)!is!required.!
!!
VLAN!has!three!major!functions:!
!!
I.
Limits!the!size!of!broadcast!domains!
II.
Improves!network!performance!
III.
Provides!a!level!of!security!
!
Types!of!VLANS:!!
!
Default!VLAN:!This!is!basically!where!ALL!ports!belongs!to!by!default,!this!is!technically!VLAN!
1!and!it!can't!be!deleted!from!the!switch.!On!some!(old!)!Catalyst!switches!you!can't!even!
disallow!VLAN!1!from!trunk!ports.!
!
Data!VLAN:!This!is!the!"normal"!VLAN!where!the!traffic!is!carried!and!where!the!client!data!
goes!through!the!LAN.!
!
Native!VLAN:!The!native!VLAN!is!an!802.1Q!only!concept.!Traffic!belonging!to!the!native!VLAN!
is!not!tagged.!Note!that!by!default!VLAN!1!(which!is!the!default!VLAN)!is!the!native!VLAN!on!
ALL!Catalyst!switches.!You!can!designate!any!VLAN!as!your!native!on!your!switch!and!note!
that!it!need!to!match!on!both!ends!of!the!trunk!connection.!
!
!!
!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 8!
!
Voice!VLAN:!The!voice!VLAN!is!where!the!QoS!policies!are!applied!in!order!to!prioritize!this!
traffic!to!send!it!through!the!LAN.!The!voice!traffic!it's!always!distinguished!from!the!data!
traffic!on!the!LAN.!
!
Management!VLAN:!This!is!used!on!a!LAN!for!management!purposes.!Example!of!this!would!
be!to!use!it!on!a!OutFofFBand!(OOB)!implementations.!This!VLAN!normally!carries!sensitive!
traffic!from!a!control!perspective;!some!of!the!protocols!that!are!carried!on!this!VLAN!are:!FTP,!
TFTP,!Telnet,!SSH,!SCP,!and!others.!
!
Special!VLANs:!These!VLANs!are!basically!used!for!special!cases!on!your!LAN.!An!example!of!a!
special!case!VLAN!would!be!VLAN!0,!which!is!used!in!conjunction!with!802.1p.!I!would!say!that!
VLAN!1!fits!in!this!"special"!category!too.!
!
Reserved!VLANs:!There!are!some!VLANs!that!are!reserved!internally!on!your!switch!in!order!
to!use!them!on!other!environments!like!FDDI,!Token!Ring.!The!specific!VLANs!used!for!these!
two!types!of!networks!are!from!1002!F!1005.!
!
Private!VLANs:!it's!a!technology!that!has!some!new!concepts/category!of!VLANs,!but!these!are!
not!a!CCNA!R&S!related!topic.!
!
!

4)!A!pointXtoXpoint!connection!with!different!vendor!routers!using!HDLC!as!
the!Encapsulation!type!cannot!establish!a!connection.!When!you!change!the!
encapsulation!type!on!both!routers!to!PPP,!the!connection!is!established.!
Why!did!the!routers!establish!a!connection!with!PPP!and!not!with!HDLC?!
!
!
Ans:!HDLC!is!a!vendorFspecific!protocol!that!is!not!compatible!with!other!vendors!versions!of!
HDLC.!Because!PPP!is!an!open!standard!protocol!that!functions!in!multivendor!environment,!
the!communicating!routers!were!allowed!to!establish!a!connection.!
!

5)!What!are!the!downsides!to!password!recovery?!
!
Ans:!First, if your passwords are encrypted, you cannot see them or recover them. This is

why you should always have a backup of all working configurations for devices in a
production network. The second drawback is that anyone with physical access to a device
can follow these steps and take control of a device. Therefore, physical security for network
devices is essential.

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 9!
!

ASSIGNMENT!B!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1
!

0!

1) !
(A)!Describe!the!benefits!and!purpose!of!VTP?!
!

Ans:!VLAN!Trunking!Protocol!or!VTP!refers!to!a!messaging!protocol!responsible!for!managing!
the!renaming,!deletion!and!addition!of!VLANs!(Virtual!Local!Area!Networks).!Cisco!VLAN!
Trunking!Protocol!lowers!administration!in!switched!networks.!The!following!are!major!
benefits!of!VLAN!Trunking!Protocol.!
!
I. Better!network!management:!
!
VTP!lowers!the!possible!inconsistencies!in!configuration!that!normally!come!about!once!
modifications!are!made!in!a!network.!Such!inconsistencies!may!lead!to!security!violations!
since!VLANs!have!the!capability!of!cross!connecting!when!matching!names!are!utilized.!
!
II. Maintains!consistency!
!
The!VLAN!Trunking!Protocol!offers!the!benefit!of!maintaining!configuration!consistency!
throughout!the!whole!network.!This!is!credited!to!the!fact!that!VTP!utilizes!trunk!frames!
for!managing!any!changes!made!to!the!VLANs!in!that!particular!network.!This!is!attained!
through!the!use!of!a!central!switch!found!in!the!server!mode.!!!
!
III. Manages!Cisco!switches!
!
Another!vital!advantage!of!VLAN!Trunking!Protocol!is!that!it!provides!an!effective!
method!of!managing!Cisco!switches!like!one!group!for!configuration!purposes.!This!
means!that!if!the!VTP!has!been!enabled!on!a!Cisco!switch,!creating!a!VLAN!on!a!single!
switch!then!makes!the!VLAN!accessible!to!all!the!switches!in!that!VTP!domain.!The!switch!
can!only!be!a!part!of!one!VTP!domain!at!a!single!time.!
!

(B)!Explain!the!purpose!and!operation!of!ACLs?!Explain!the!filtering!
process?!

!
Ans:!Access!Control!List!(ACL)!are!filters!that!enable!you!to!control!which!routing!updates!or!
packets!are!permitted!or!denied!in!or!out!of!a!network.!They!are!specifically!used!by!network!
administrators!to!filter!traffic!and!to!provide!extra!security!for!their!networks.!This!can!be!
applied!on!routers!(Cisco).!
!
ACLs!provide!a!powerful!way!to!control!traffic!into!and!out!of!your!network;!this!control!can!
be!as!simple!as!permitting!or!denying!network!hosts!or!addresses.!!You!can!configure!ACLs!for!
all!routed!network!protocols.!
!
The!most!important!reason!to!configure!ACLs!is!to!provide!security!for!your!network.!
However,!ACLs!can!also!be!configured!to!control!network!traffic!based!on!the!TCP!port!being!
used.!
!
!
!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1
!

1!

How!ACLs!works:!
!
A!router!acts!as!a!packet!filter!when!it!forwards!or!denies!packets!according!to!filtering!rules.!
As!a!Layer!3!device,!a!packetFfiltering!router!uses!rules!to!determine!whether!to!permit!or!
deny!traffic!based!on!source!and!destination!IP!addresses,!source!port!and!destination!port,!
and!the!protocol!of!the!packet.!These!rules!are!defined!using!access!control!lists!or!ACLs.!
!
!To!simplify!how!ACL!or!a!router!uses!packet!filtering!work,!imagine!!a!guard!stationed!at!a!
locked!door.!The!guard's!instruction!is!to!allow!only!people!whose!names!appear!on!a!quest!
list!to!pass!through!the!door.!The!guard!is!filtering!people!based!on!the!condition!of!having!
their!names!on!the!authorized!list.!
!!
When!a!packet!arrives!at!the!router,!the!router!extracts!certain!information!from!the!packet!
header!and!makes!decisions!according!to!the!filter!rules!as!to!whether!the!packet!can!pass!
through!or!be!dropped.!Packet!filtering!process!works!at!the!Network!layer!of!the!Open!
Systems!Interconnection!(OSI)!model,!or!the!Internet!layer!of!TCP/IP.!
!

2)!Describe!and!compare!the!Ethernet!concepts!and!techniques!used!by!
LAN!switches.!
!
Ans:!Switches!are!sometimes!called!multiport!bridges!or!switching!hubs.!Switches!make!
decisions!based!on!MAC!addresses!and!therefore,!are!Layer!2!devices.!In!contrast,!hubs!
regenerate!the!Layer!1!signals!out!of!all!ports!without!making!any!decisions.!Since!a!switch!has!
the!capacity!to!make!path!selection!decisions,!the!LAN!becomes!much!more!efficient.!Usually,!
in!an!Ethernet!network!the!workstations!are!connected!directly!to!the!switch.!Switches!learn!
which!hosts!are!connected!to!a!port!by!reading!the!source!MAC!address!in!frames.!The!switch!
opens!a!virtual!circuit!between!the!source!and!destination!nodes!only.!This!confines!
communication!to!those!two!ports!without!affecting!traffic!on!other!ports.!!
!
In!contrast,!a!hub!forwards!data!out!all!of!its!ports!so!that!all!hosts!see!the!data!and!must!
process!it,!even!if!that!data!is!not!intended!for!it.!!!HighFperformance!LANs!are!usually!fully!
switched.!
!
A!switch!concentrates!connectivity,!making!data!transmission!more!efficient.!Frames!
are!switched!from!incoming!ports!to!outgoing!ports.!Each!port!or!interface!can!provide!
the!full!bandwidth!of!the!connection!to!the!host.!
!
On!a!typical!Ethernet!hub,!all!ports!connect!to!a!common!backplane!or!physical!
connection!within!the!hub,!and!all!devices!attached!to!the!hub!share!the!bandwidth!of!
the!network.!If!two!stations!establish!a!session!that!uses!a!significant!level!of!
bandwidth,!the!network!performance!of!all!other!stations!attached!to!the!hub!is!
degraded.!
!
To!reduce!degradation,!the!switch!treats!each!interface!as!an!individual!segment.!When!
stations!on!different!interfaces!need!to!communicate,!the!switch!forwards!frames!at!
wire!speed!from!one!interface!to!the!other,!to!ensure!that!each!session!receives!full!
bandwidth.!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1

2!

!
To!efficiently!switch!frames!between!interfaces,!the!switch!maintains!an!address!table.!
When!a!frame!enters!the!switch,!it!associates!the!MAC!address!of!the!sending!station!
with!the!interface!on!which!it!was!received.!

!
The!main!features!of!Ethernet!switches!are:!
!
Isolate!traffic!among!segments!
Achieve!greater!amount!of!bandwidth!per!user!by!creating!smaller!collision!domains!
!
The!first!feature,!isolate!traffic!among!segments,!provides!for!greater!security!for!hosts!on!the!
network.!Each!segment!uses!the!CSMA/CD!access!method!to!maintain!data!traffic!flow!among!
the!users!on!that!segment.!Such!segmentation!allows!multiple!users!to!send!information!at!
the!same!time!on!the!different!segments!without!slowing!down!the!network.!
!
By!using!the!segments!in!the!network!fewer!users!and/or!devices!are!sharing!the!same!
bandwidth!when!communicating!with!one!another.!Each!segment!has!its!own!collision!
domain.!Ethernet!switches!filter!the!traffic!by!redirecting!the!datagrams!to!the!correct!port!or!
ports,!which!are!based!on!Layer!2!MAC!addresses.!
!
The!second!feature!is!called!micro!segmentation.!Micro!segmentation!allows!the!creation!of!
dedicated!network!segments!with!one!host!per!segment.!Each!hosts!receives!access!to!the!full!
bandwidth!and!does!not!have!to!compete!for!available!bandwidth!with!other!hosts.!Popular!
servers!can!then!be!placed!on!individual!100FMbps!links.!Often!in!networks!of!today,!a!Fast!
Ethernet!switch!will!act!as!the!backbone!of!the!LAN,!with!Ethernet!hubs,!Ethernet!switches,!or!
Fast!Ethernet!hubs!providing!the!desktop!connections!in!workgroups.!As!demanding!new!
applications!such!as!desktop!multimedia!or!video!conferencing!become!more!popular,!certain!
individual!desktop!computers!will!have!dedicated!100FMbps!links!to!the!network.!
!

3)!
!
A)!The!router!IOS!images!should!be!stored!on!a!TFTP!server!on!the!
network.!A!network!TFTP!server!can!be!used!to!restore!lost!or!corrupted!
IOS!images!to!network!devices.!In!your!own!words,!answer!the!following!
questions!about!IOS!image!management.!What!information!is!required!
when!using!the!copy!command!to!upload!or!download!a!system!image!file?!
!
Ans:!The!command!requires!that!you!to!enter!the!IP!address!of!the!remote!TFTP!server!and!
the!name!of!the!source!and!destination!system!image!files.!
!
!
!

B)!What!happens!to!a!router!when!the!IOS!is!deleted!from!flash?!
!
Ans:!When!an!IOS!on!a!router!is!accidentally!deleted!from!flash,!the!router!is!still!operational!
because!the!IOS!is!running!in!RAM.!However,!it!is!crucial!that!the!router!is!not!rebooted!at!this!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1

3!

time!because!it!would!not!be!able!to!find!a!valid!IOS!in!flash.!If!the!router!is!rebooted,!it!can!no!
longer!load,!and!IOS!will!automatically!boot!in!ROMmon!mode.!

!
!
Case!study!
!
2) Refer!to!Figure!1!for!all!the!questions!in!this!command!exercise.!Figure!
1!Network!Topology!for!Questions!I!Through!IV!

I) Allow only Host A from the 172.16.1.0/27 subnet access to the E-Mail server. Use the last
usable number in the extended list range. Host A should not have access to any of the
other servers. Write all the commands below.
Ans:
R1(config)# access-list 199 permit tcp host 172.16.1.2 host 192.168.100.130
R1(config)# access-list 199 deny tcp any any
R1(config)# int s0/0/0
R1(config-if)# ip access-group 199 in

!
!
II) Allow only Host B access to the Internet, and deny everyone else. Use an extended named
ACL to accomplish this task, and name the ACL Internet. Write all the commands below.
Ans:

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1

4!

!
R1(config)# ip access-list extended Internet
R1(config-ext-nacl)# permit tcp host 172.16.1.3 any eq 80
R1(config-ext-nacl)# exit
R1(config)# int fa0/0
R1(config-if)# ip access-group Internet in

III) No one from the 172.16.1.0/27 subnet is allowed access to the File Server, but all other
traffic should be permitted. Use an extended named ACL to accomplish this task, and
name the ACL No_Access. Write all the commands below.
Ans:
R1(config)# ip access-list extended No_Access
R1(config-ext-nacl)# deny 172.16.1.0 0.0.0.31 host 192.168.100.131
R1(config-ext-nacl)# permit any any
R1(config-ext-nacl)# exit
R1(config)# int fa0/0
R1(config-if)# ip access-group No_Access in
IV) Allow only hosts on the R3 LAN to communicate with hosts on the R1 LAN. They are
allowed access to the Internet, but deny them access to the servers on the R2 LAN. Use
the first usable number in the extended IP range to accomplish this task. Write all the
commands below.
Ans:
R3(config)# access-list 100 permit tcp 172.16.1.32 0.0.0.31 172.16.1.0 .0.0.0.31
R3(config)# access-list 100 permit tcp 172.16.1.32 0.0.0.31 any eq 80
R3(config)# int fa0/0
R3(config-if)# ip access-group 100 in

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1

5!

ASSIGNMENT!C!
!

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1
!

6!

1. Which layer of the hierarchical network design model is referred to as the high-speed
backbone of the internetwork, where high availability and redundancy are critical?
A. Access layer
B. Core layer
C. Data-link layer
D. Distribution layer
2. Which feature supports higher throughput in switched networks by combining multiple
switch ports?
A. Convergence
B. Redundant links
C. Link aggregation
D. Network diameter
3. Which hierarchical design model layer controls the flow of network traffic using policies and
delineates broadcast domains by performing routing functions between virtual LANs
(VLANs)?
A. Application
B. Access
C. Distribution
D. Network
E. Core
4. What is the likely impact of moving a conventional company architecture to a completely
converged network?
A. Local analog phone service can be completely outsourced to cost-effective providers.
B. The Ethernet VLAN structure is less complex.
C. A shared infrastructure is created resulting in a single network to manage.
D. QoS issues are greatly reduced.
E. There is less bandwidth competition between voice and video streams.
5. Configuring communication between devices on different VLANs requires the use of which
layer of the OSI model?
A. Layer 1
B. Layer3
C. Layer4
D. Layer 5
6. Which layer of the OSI model does an access layer LAN switch use to make a forwarding
decision?
A. Layer 1
B. Layer 2

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1
!

7!

C. Layer 3
D. Layer 4
7. Which hierarchical design characteristic would be recommended at both the core and
distribution layers to protect the network in the case of a route failure?
A. PoE
B. Redundancy
C. Aggregation
D. Access lists
8. At which hierarchical layer are switches normally not required to process all ports at wire
speed?
A. Core layer
B. Distribution layer
C. Access layer
D. Entry layer
9. For organizations that are implementing a voice over IP solution, what functionality should
be enabled at all three layers of the hierarchical network?
A. Power over Ethernet
B. Quality of service
C. Switch port security
D. Inter-VLAN routing
10 Link aggregations should be implemented at which layer of the hierarchical network?
A. Core only
B. Distribution and core
C. Access and distribution
D. Access, distribution, and core
11. What statement best describes a modular switch?
A. A slim-line chassis
B. Allows interconnection of switches on redundant backplane
C. Defined physical characteristics
D. Flexible characteristics
12. Which layer of the hierarchical design model provides a means of connecting devices to the
network and controlling which devices are allowed to communicate on the network?
A. Application
B. Access
C. Distribution
D. Network
E. Core

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1
!

8!

13. What purpose does authentication serve in a WLAN?


A. Converts clear text data before transmission
B. Indicates which channel the data should flow on
C. Determines that the correct host is utilizing the network
D. Allows the host to choose which channel to use
14 If a network administrator enters these commands on a switch, what will be the result?
Switch1(config-line)# line console 0
Switch1(config-line)# password cisco
Switch1(config-line)# login
A. To secure the console port with the password cisco
B. To deny access to the console port by specifying 0 lines are available
C. To gain access to line configuration mode by supplying the required password
D. To configure the privilege exec password that will be used for remote access
15 Which command line interface (CLI) mode allows users to configure switch parameters,
such as the hostname and password?
A. User EXEC mode
B. Privileged EXEC mode
C. Global configuration mode
D. Interface configuration mode
16 What happens when the transport input ssh command is entered on the switch vty lines?
A. The SSH client on the switch is enabled.
B. Communication between the switch and remote users is encrypted.
C. A username/password combination is no longer needed to establish a secure remote connection to
the switch.
D. The switch requires remote connections via proprietary client software.
17 A network administrator uses the CLI to enter a command that requires several
parameters. The switch responds with % Incomplete command. The administrator cannot
remember the missing parameters. What can the administrator do to get the parameter
information?
A. Append ? to the last parameter
B. Append a space and then ? to the last parameter
C. Use Ctrl-P to show a parameter list
D. Use the Tab key to show which options are available
18 When a switch receives a frame and the source MAC address is not found in the switching
table, what action will be taken by the switch to process the incoming frame?
A. The switch will request that the sending node resend the frame.

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 1
!

9!

B. The switch will issue an A R P request to confirm that the source exists.
C. The switch will map the source MAC address to the port on which it was received.
D. The switch ends an acknowledgement frame to the source MAC of this incoming frame.
19 Which statement is true about the command banner login Authorized personnel Only
issued on a switch?
A. The command is entered in privileged EXEC mode.
B. The command will cause the message Authorized personnel Only to display before a user logs in.
C. The command will generate the error message Ambiguous command: banner motd to be
displayed.
D. The command will cause the message End with the character % to be displayed after the
command is entered into the switch.
20. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit
respond after the back-off period has expired?
A. The hosts return to a listen-before-transmit mode.
B. The hosts creating the collision have priority to send data.
C. The hosts creating the collision retransmit the last 16 frames.
D. The hosts extend their delay period to allow for rapid transmission.
21. Where is the startup configuration stored?
A. DRAM
B. NVRAM
C. ROM
D. Startup-config.text
22 Which statement is true when VTP is configured on a switched network that incorporates
VLANs?
A. VTP is only compatible with the 802.1Q standard.
B. VTP adds to the complexity of managing a switched network.
C. VTP allows a switch to be configured to belong to more than one VTP domain.
D. VTP dynamically communicates VLAN changes to all switches in the same VTP domain.
23 A network administrator is replacing a failed switch with a switch that was previously on
the network. What precautionary step should the administrator take on the replacement
switch to avoid incorrect VLAN information from propagating through the network?
A. Enable VTP pruning.
B. Change the VTP domain name.
C. Change the VTP mode to client.
D. Change all the interfaces on the switch to access ports.
24 What does a client mode switch in a VTP management domain do when it receives a
summary advertisement with a revision number higher than its current revision number?

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 2
!

0!

A. It suspends forwarding until a subset advertisement update arrives.


B. It issues an advertisement request for new VLAN information.
C. It increments the revision number and forwards it to other switches.
D. It deletes the VLANs not included in the summary advertisement.
E. It issues summary advertisements to advise other switches of status changes.
25 What causes a VTP configured switch to issue a summary advertisement?
A. A five-minute update timer has elapsed.
B. A port on the switch has been shutdown.
C. The switch is changed to the transparent mode.
D. A new host has been attached to a switch in the management domain.
26. How are VTP messages sent between switches in a domain?
A. Layer 2 broadcast
B. Layer 2 multicast
C. Layer 2 unicast
D. Layer 3 broadcast
E. Layer 3 multicast
F. Layer 3 unicast
27. What statement describes the default propagation of VLANs on a trunked link?
A. Only the native VLAN
B. VLANs 1 to 1005
C. Only VLAN 1
D. All VLANs
E. No VLANs
28 Switch port fa0/1 was manually configured as a trunk, but now it will be used to connect a
host to the network. How should the network administrator reconfigure switch port Fa0/1?
A. Disable DTP.
B. Delete any VLANs currently being trunked through port Fa0/1.
C. Administratively shut down and re-enable the interface to return it to default.
D. Enter the switch port mode access command in interface configuration mode.
29 What is a valid consideration for planning VLAN traffic across multiple switches?
A. Configuring inter switch connections, as trunks will cause all hosts on any VLAN to receive
broadcasts from the other VLANs.
B. A trunk connection is affected by broadcast storms on any particular VLAN that is carried by that
trunk.
C. Restricting trunk connections between switches to a single VLAN will improve efficiency of port
usage.
D. Carrying all required VLANs on a single access port will ensure proper traffic separation.

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 2
!

1!

30. What statement about the 802.1q trunking protocol is true?


A. 802.1q is Cisco proprietary.
B. 802.1q frames are mapped to VLANs by MAC address.
C. 802.1q does NOT require the FCS of the original frame to be recalculated.
D. 802.1q will not perform operations on frames that are forwarded out access ports.
31. Which access method does a wireless access point use to allow for multiple user
connectivity and distributed access?
A. CSMA/CD
B. Token passing
C. CSMA/CA
D. Polling
32. A network administrator is removing several VLANs from a switch. When the
administrator enters the no VLAN 1 command, an error is received. Why did this command
generate an error?
A. VLAN 1 can never be deleted.
B. VLAN 1 can only be deleted by deleting the vlan.datfile.
C. VLAN 1 cannot be deleted until all ports have been removed from it.
D. VLAN 1 cannot be deleted until another VLAN has been assigned its responsibilities.
33. What happens to the member ports of a VLAN when the VLAN is deleted?
A. The ports cannot communicate with other ports.
B. The ports default back to the management VLAN.
C. The ports automatically become a part of VLAN 1.
D. The ports remain a part of that VLAN until the switch is rebooted. They then become members of
the management VLAN.
34. What switch port modes will allow a switch to successfully form a trunking link if the
neighboring switch port is in dynamic desirable mode?
A. Dynamic desirable mode
B. On or dynamic desirable mode
C. On, auto, or dynamic desirable mode
D. On, auto, dynamic desirable, or no negotiate mode
35. What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2
and assign it to VLAN 3?
A. Enter the no vlan 2 and the vlan 3 commands in global configuration mode.
B. Enter the switch port access vlan3 command in interface configuration mode.
C. Enter the switch port trunk native vlan 3 commands in interface configuration mode.

MSI$301:$LAN$SWITCHING$AND$WIRELESS$|$SOLVED$ASSIGNMENT! 2
!

2!

D. Enter the no shutdown in interface configuration mode to return it to the default configuration and
then configure the port for VLAN 3.
36 Which statement or set of paired statements correctly compares STP with RSTP?
A. STP and RSTP have the same BPDU format and flag field information.
B. STP specifies backup ports. RSTP has only root ports, alternate ports, and designated ports.
C. STP port states are independent of port roles. RSTP ties together the port state and port role.
D. STP waits for the network to converge before placing ports into forwarding state. RSTP places
designated ports into forwarding state immediately.
37 How can a network administrator influence which STP switches become the root bridge?
A. Configure all the interfaces on the switch as the static root ports.
B. Change the BPDU to a lower value than that of the other switches in the network.
C. Assign a lower IP address to the switch than that of the other switches in the network.
D. Set the switch priority to a smaller value than that of the other switches in the network.
38 In which STP state does a port record MAC addresses but not forward user data?
A. Blocking
B. Learning
C. Disabling
D. Listening
E. Forwarding
39 When PVST+ was developed; the Bridge ID was modified to include which information?
A. Bridge priority
B. MAC address
C. Protocol
D. VLAN ID
40 What is the first step in the process of convergence in a spanning tree topology?
A. Election of the root bridge
B. Blocking of the non-designated ports
C. Selection of the designated trunk port
D. Determination of the designated port for each segment

You might also like