Link State Algorithm
1. Which of the following routing protocols uses Link State Algorithm?
a. RIP
b. DHCP
c. BGP
d. iBGP
e. OSPF
2. Which of the following routing protocols uses Distance Vector Algorithm?
a. RIP
b. DHCP
c. BGP
d. OSPF
e. CIP (Cisco Router Information Protocol)
3. Which of the following routing algorithm implementations does NOT use Distance Vector or Link-State?
a. RIP
b. DHCP
c. BGP
d. OSPF
e. CIP (Cisco Router Information Protocol)
4. Which of the following Data Link protocols ensure guaranteed bandwidth and delivery?
a. Ethernet
b. ATM
c. WiFi
d. PPP
e. TCP
5. Which of the following help detect errors in Ethernet Packets?
a. Parity Bit
b. Error Bit
c. BGP
d. CRC
e. CIP
6. Which Internet Protocol version that we studied has 32 bits in the address field (source address or destination address)?
a. 4
b. 5
c. 6
d. 68
e. XP
7. If we have a 802.11bg wireless network and all of the devices are 802.11g except one which is 802.11b, what is the overall speed of the wireless network?
a. 1Mbps
b. 10Mbps
c. 11Mbps
d. 45Mbps
e. 100Mbps
8. Which of the following 802.11bg channels should be used for the “best” WiFi connectivity?
a. 1,2,3
b. 1,6,11
c. 1,11,23
d. 3G or 4G
e. Any of the 54G channels available
9. Which of the following Network Classes is used by most devices on the Internet?
a. A and B
b. C
c. D and E
d. a and b
e. all of the above
10. If you want to create a network of systems using a private or unregistered IP address scheme which had access to the public Internet, you would set up the Router to do __________ which would do translation an internal address/port to an external address/port.
a. TAP
b. VPN
c. NAP
d. NAT
e. PAT
Part II - True/False Choice: 1 Point Each
1. Two devices on the network can have the SAME IP Address. That is, I can have 2 devices with the IP 192.168.1.1. (NOTE: Don’t argue if this is possible, state if it is legal.)
2. Two devices on the network can have the SAME MAC Address. That is, I can have 2 devices with the MAC 00:01:02:03:04:05. (NOTE: Don’t argue if this is possible, state if it is legal.)
3. ATM is a robust Network Layer/Link Layer technology that implements guaranteed data service between two hosts.
4. DHCP is used to assign an IP Address to devices in the LAN needing one.
5. Private IP Address is routable on the Internet.
6. The Network Class F is used for experimental broadcast networking.
7. Typically, all ZEROs or ALL ONEs in the host address range signify broadcast addresses.
8. The TTL field in the IP Header is used to expire the packet if it has traveled on the network too long.
9. Packets not destined for devices on a LAN should be sent to the gateway address.
10. I’m happy that the exam was postponed a few hours so I could attend the Career Fair.
Part III – Short Answer: Points as Indicated
1. [5] In the given diagram, this is an example of CSMA/CD / CSMA/CA (circle one) where we do
Collision Detection / Collision Avoidance (circle one) because we are broadcasting over a
wired / wireless (circle one) medium.
2. [5] In the given diagram, this is an example of CSMA/CD / CSMA/CA (circle one) where we do
Collision Detection / Collision Avoidance (circle one) because we are broadcasting over a
wired / wireless (circle one) medium.
3. [5] Below is a switch network. Complete the ARP table for the switch that shows the MAC address of the devices (A, B, C, A’, B’, C’) connected to the ports (1, 2, 3, 4, 5, 6).
ARP TABLE
PORT MAC ADDRESS
4. [5] Below is a switch network. Complete the ARP Table for switch S4 that shows the MAC address of the devices (A, B, C, D, E, F, G, H, I) connected to the ports (1, 2, 3).
ARP TABLE
PORT MAC ADDRESS
5. [5] In the network device market, there are “dumb” switches and “smart” switches. Dumb switches are ones that do nothing more than switch Ethernet frames from one port to another, like a dumb hub. Smart switches, on the other hand, do all that dumb switches do AND add additional features (e.g. control port speed, Virtual LANs, etc), and thus has at least 1 IP address assigned to the unit.
Do dumb switches have a MAC Address (YES/NO)? Why or why not?
Do smart switches have a MAC Address (YES/NO)? Why or why not?
6. [10] At your home, you have set up a Linksys Firewall/Wifi Router in a basic configuration. That is, you can surf the Internet from both the Wired and Wireless computers in the house. In starting up a home business, you decide to create a Web Server on your home network to have people access it from the Internet. Your ISP has provided you with a public static IP for your network, which is assigned to your Linksys WAN port. Your ISP has also assigned the Internet Domain Name www.MakeBigBucks.com to your IP Address.
What is the next step in the configuration? In other words, how does client browsers on the Internet access your internal PC Web Server through the Linksys Router? Be as detailed as possible about the configuration you need to set inside your Router.
7. [10] Given the IP Network with CIDR of 172.16/16, answer the following:
a. [2] The RANGE of IP addresses for the network (all IPs!)
b. [2] The Subnet mask for this network.
c. [2] The IP addresses used as BROADCAST addresses in the network.
d. [2] The RANGE of USABLE IP addresses. That is the IP addresses that can be assigned to computer in the network.
e. [2] The most probable IP address assigned to the Gateway/Router in the network.
8. [20] Given the network is shown below, complete the following Ethernet Frame being transmitted. Be sure to complete ALL FIELDS filling in the actual address (e.g. Source Address and Destination Address).
a. [4] Data going from Host A to Host B inside NET 1.
Dest MAC Source MAC Dest IP Source IP
b. [4] Data going from Host B to Host A inside NET 2.
Dest MAC Source MAC Dest IP Source IP
c. [4] Data going from Host A to Host C inside NET 1.
Dest MAC Source MAC Dest IP Source IP
d. [4] Data going from Host C to Host A inside NET 1.
Dest MAC Source MAC Dest IP Source IP
e. [4] Router R is an INTERNAL router. Which of the following Routing are possibly used in this case (cross out the ones that do NOT apply)?
OSPF RIP STATIC Routing BGP
9. [5] How does a network edge device get an IP Address? Explain 2 scenarios how this occurs in an enterprise network like B-W’s network.