Free Essay

Wan Routers Exam

In:

Submitted By tlong850
Words 1838
Pages 8
1. Give basic explanation of what router do
-A hardware device designed to take incoming packets, analyzing the packets and then directing them to the appropriate locations, moving the packets to another network, converting the packets to be moved across a different type of network interface, dropping the packets, or performing any other number of other types of actions

2. know the differece between crossover, straight through, and rollover cable
Straight through- pins are the same on both sides
Use a straight-through cable when:
-. Connecting a router to a hub
-. Connecting a computer to a swtich
-. Connecting a LAN port to a switch, hub, or computer

This allows for two devices to communicate at the same time. Unlike straight-through cables, we use crossover cables to connect like devices.
-. Connecting a computer to a router
-. Connecting a computer to a computer
-. Connecting a router to a router
-. Connecting a switch to a switch
-. Connecting a hub to a hub

Rollover cables essentially have one end of the cable wired exactly opposite from the other.
-Rollover cables, also called Yost cables, usually connect a device to a router or switch’s console port. This allows a programmer to make a connection to the router or switch, and program it as needed.

3. Know what the backbone network is in relation to frame relay
-Frame Relay often serves to connect local area networks (LANs) with major backbones as well as on public wide-area networks (WANs) and also in private network environments with leased lines over T-1 lines
-It was used sometimes as backbone for other services, such as X.25 or IP traffic. And where FR was used in the USA also as carrier for TCP/IP traffic in Europe backbones for IP networks often used ATM or PoS, later replaced by Carrier Ethernet

4. What is NVRAM
-Non-volatile random-access memory (NVRAM) is random-access memory that retains its information when power is turned off (non-volatile). This is in contrast to dynamic random-access memory (DRAM) and static random-access memory (SRAM), which both maintain data only for as long as power is applied.

5. Know where the running config and the startup config and IOS of a router is stored
-in the NVRAM

6. what does the "show cdp entry [device name]" command do? entry address, platform, hold time, ipaddress, interface

- What does the show cdp interface command do?
Displays information about the interfaces on which CDP is enabled.
The status information and information about CDP timer and holdtime settings is displayed only for TenGigabitEthernet4/1.

-What does the show cdp neighbor command do?
Displays detailed information about neighboring devices discovered using CDP.

7. What frequency range do humans hear?
-20-20,000 Hz

8. What is the purpose of changing the config register and why would you change the register to 0x2102.
The configuration register can be used to change router behavior in several ways, such as:

how the router boots (into ROMmon, NetBoot)

options while booting (ignore configuration, disable boot messages)

console speed (baud rate for a terminal emulation session)

-Change the configuration register to an appropriate setting, such as the factory default 0x2102, in order to solve these problems.

9. How do you display the config register?
The configuration register can be set from configuration mode using the config-register command. From ROMmon, use the confreg command. Issue the show version command to view the current setting of the configuration register

10. Know what "ping" is used for and know how to interpret the results of a ping
-a computer network tool used to test whether a particular host is reachable across an IP network

11. How do you configure the enable secret password on a router? global configuration mode
Here’s an example of setting the enable passwords

Router(config)#enable secret admin

Router(config)#enable password admin

12. Know the boot process for a router
-1. On power on cisco router first will perform the POST( Power on self test). The POST tests the hardware to verify that all components of the device are operational and present. For example, the POST checks for the different interfaces on the router. The POST is stored in and run from ROM (read-only memory).
-2. The bootstrap looks for and loads the Cisco IOS software. The bootstrap is a program in ROM that is used to execute programs. The bootstrap program is responsible for finding where each IOS program is located and then loading the file. By default, the IOS software is loaded from flash memory in all Cisco routers.
-3. The IOS software looks for a valid configuration file stored in NVRAM. which is called as startup-config.
-4. If a startup-config file is in NVRAM, the router will load and run this file. The router is now operational. If a startup-config file is not in NVRAM, the router will start the setup-mode configuration upon bootup.
-5. Any further modification on running router will be stored on RAM, where you need to manually execute command copy running-config startup-config to make your current configuration as a startup-config, every time you boot your router.

13. What is a LATA (telecommunications book page 79)
-Local access and transport area (LATA) is a term used in U.S. telecommunications regulation

14. What is a static route and how do you configure a static route and a "floating static" route?

-Static routing is a concept describing one way of configuring path selection of routers in computer networks. It is the type of routing characterized by the absence of communication between routers regarding the current topology of the network

One way for the router to know the path to such networks is to configure a static route, which adds this particular route to the routing table.

To configure a static route, issue the ip route prefix mask {ip-address | interface-type interface-number [ip-address]} [distance] [name] [permanent] [tag tag] command in global configuration mode.

For example, issue the command ip route 192.168.20.0 255.255.255.0 192.168.17.254 to configure a static route for the network 192.168.20.0/24 pointing to the next-hop IP address 192.168.17.254.

Configuring a floating static route is very easy and its done by a command you already know; ip route n.n.n.n s.s.s.s nh.nh.nh.nh but you add a number to the end of the command ranging between 1-255 whereas 255 is “unreachable”. Any route given the administrative distance of 255 WILL NOT be installed in the routing table under any circumstances. Keep in mind the default administrative distance of a static route is 1.

15. Where is the bootstrap code stored and what is it used for
Stored in the Rom

16. 4 major pieces of hardware on a telphone receiver set - (telecommuncation book page 75) voice coil the magnet the diaphragm signal cone

17. how many signaling changes occur in a waveform changing at a 2400 baud per second rate. (telecommuncations book page 94)
2

18. Stages of processing analog-to-digital conversion (telecommunication book page 101)
-sampling, quantizing, and encoding

19. purpose of IPv6
- to get more IP's

20. What protocol uses VPI and VCI (telecommunications book page 180)
-ATM protocol

21. know what is diplayed in the "show version" command
-how version command displays the IOS version number and its internal name

22. Know your osi model and what happens at each layer

7. Application Network process to application
6. Presentation Data representation, encryption and decryption, convert machine dependent data to machine independent data
5. Session Interhost communication, managing sessions between applications
4. Transport End-to-end connections, reliability and flow control
3. Network Path determination and logical addressing
2. Data link Physical addressing
1. Physical Media, signal and binary transmission

23. Where is the clock rate applied
-To configure the clock rate for the hardware connections on serial interfaces such as network interface modules (NIMs) and interface processors to an acceptable bit rate, use the clockrate command in interface configuration mode

24. what is the difference between a static route and dynamic route
Static routing:
Manually set up a route in a dormant manner.

Stable.

Has no impact made by traffic and transmission failures.

Creates no traffic derived from routing protocols.

dynamic routing:

Automatically sets up a route.

Can respond to the changes of the network.

Can automatically select the optimized route.

Can automatically select the backup route.

25. what is a routing protocol
-A routing protocol specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network. IGRP and EIGRP BGP

26. command required to establish an entry password into the user mode
To set a local password to control access to various privilege levels, use the enable password command in global configuration mode. To remove the password requirement, use the no form of this command.

enable password [level level] {password | [encryption-type] encrypted-password}

27. IP Address structure - what two parts make up the ip address the network part and the machine part.

28. what is administrative distance, and what is the value for RIP
-Administrative distance is the measure used by Cisco routers to select the best path when there are two or more different routes to the same destination from two different routing protocols.

29. how do you view the amount of memory on a router
To determine the amount of Flash and DRAM on a Cisco router, issue the show version command.

30. 3 most common dynamic routing protocols
-Distance vector routing protocols
-Link state routing protocols
-RIP v2

31. what is a distance vector protocol
A distance vector routing protocol advertises the number of hops to a network destination (the distance) and the direction in which a packet can reach a network destination (the vector).

32. know some well known ports - telnet port 23, snmp 161, ftp 20, tftp 69, dns 53

33. how do you define a frame relay circuit - (telecommunications book page 173)
-

34. what is a csu/dsu used for
-A CSU/DSU (Channel Service Unit/Data Service Unit) is a digital-interface device used to connect a Data Terminal Equipment device or DTE, such as a router, to a digital circuit, such as a T1 line

35. what commands will deny dns access, hint - you need two access list commands

36. what type of terminal is telnet

ANSI. Other valid terminal types are VT52, VT100, and VTNT.

37. Reveiw a wildcard mask

38. what command do you used to veiw access-lists

Router# show access-lists ? ACL number WORD ACL name compiled Compiled access-list statistics rate-limit Show rate-limit access lists | Output modifiers

39. SONET Levels - (telecommunications book page 219) section, line and path

40. What is Extended Super Frame (ESF) - (telecommunications book page 205)

A ds-1 framing method that uses 24 frames per master frame.

Similar Documents

Premium Essay

It 282 Week 7-Individua-Personal Computers on the Internetl

...Copy Paste Link in Your Browser https://hwguiders.com/downloads/282-week-7-individua-personal-computers-internetl/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) Personal Computers on the Internet A personal computer can be connected to LAN (Local Area Network) by using a router. This type of network is a private network that links computers at a single location, such as at a home or office building. A computer with the LAN connection is allowed to different network components like files, software and devices like printers and fax machines with in the private area. A computer can be connected to a router using Ethernet cable, or a router can communicate wirelessly using radio waves. The Internet is wider than the LAN, basically it is network of networks, and it connects the different networks (LANs and/or MANs) available worldwide and makes them public. The internet connection is called WAN (Wide Area Network) that connects millions of smaller networks with over a billion computers connected at any given time. The most basic difference between a LAN and the Internet then, is that a LAN is private and localized, while the Internet is public and worldwide. A LAN is connected to a router using Ethernet cable but the internet links millions of networks through T1 telephone lines, fiber optic cable and other technologies. ...

Words: 3252 - Pages: 14

Premium Essay

Nt2640

...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics...

Words: 2573 - Pages: 11

Premium Essay

Nt2640

... Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport, and Application Layers 24 Unit 3: IP Subnetting and Basic Router Configuration 34 Unit 4: IP Routing with Connected, Static, and RIP-2 Routes 44 Unit 5: IP Troubleshooting and EIGRP 53 Unit 6: Subnet Design 62 Unit 7: Advanced IP Routing Topics and OSPF 69 Unit 8: Advanced IP Topics 79 Unit 9: LANs 88 Unit 10: WANs 98 Unit 11: Course Review and Final Examination 107 COURSE SUPPORT...

Words: 22068 - Pages: 89

Premium Essay

Networking

...IT130 Introduction to Networking Final Exam Study Guide These are the facts from which your exam questions will be drawn. If you know these facts, you will do well on the exam. All models are a simplified representation of the real thing, having at least all the major functions of the real item. What constitutes a major rather than a minor function is open to opinion. Most networks use a cable known in the industry as an unshielded twisted pair (UTP), usually containing four pairs of wires that can transmit and receive data. Cabling and hubs operate at the Layer 1 (Physical) layer of the OSI model. In the command window, when the utility to show the IP address and other NIC information is run, the MAC address is listed as the Physical address in the third section of the information. All NICs on the same network must use the same frame type, or they will not be able to comunicate with other NICs. 67.21.321.4 is not a valid IP address, as the third octet (321) is greater than 255. IP uses a rather unique dotted decimal notation (sometimes referred to as a dotted-octet numbering system) based on four 8-bit numbers. Each 8-bit number ranges from 0-255, and the four numbers are separated by periods. The TCP/IP model has four layers (Link, Internet, Transport, Application), unlike the OSI model which has seven layers. Transmission Control Protocol (TCP) is a connection-oriented protocol, meaning, it requires verification that a good connection has been established before transmission...

Words: 1908 - Pages: 8

Premium Essay

Computer

...IT130 Introduction to Networking Final Exam Study Guide These are the facts from which your exam questions will be drawn. If you know these facts, you will do well on the exam. All models are a simplified representation of the real thing, having at least all the major functions of the real item. What constitutes a major rather than a minor function is open to opinion. Most networks use a cable known in the industry as an unshielded twisted pair (UTP), usually containing four pairs of wires that can transmit and receive data. Cabling and hubs operate at the Layer 1 (Physical) layer of the OSI model. In the command window, when the utility to show the IP address and other NIC information is run, the MAC address is listed as the Physical address in the third section of the information. All NICs on the same network must use the same frame type, or they will not be able to comunicate with other NICs. 67.21.321.4 is not a valid IP address, as the third octet (321) is greater than 255. IP uses a rather unique dotted decimal notation (sometimes referred to as a dotted-octet numbering system) based on four 8-bit numbers. Each 8-bit number ranges from 0-255, and the four numbers are separated by periods. The TCP/IP model has four layers (Link, Internet, Transport, Application), unlike the OSI model which has seven layers. Transmission Control Protocol (TCP) is a connection-oriented protocol, meaning, it requires verification that a good connection has been established before transmission...

Words: 1908 - Pages: 8

Free Essay

Student Ccna Syllabus

...Chapter 1 WANs and Routers One major characteristic of a wide-area network (WAN) is that the network operates beyond the local LAN's geographic scope. It uses the services of carriers, such as regional Bell operating companies (RBOCs), Sprint, and MCI. WANs use serial connections of various types to access bandwidth over wide-area geographies. By definition, the WAN connects devices that are separated by wide areas. WAN devices include the following: • • • • • • Routers, which offer many services, including internetworking and WAN interface ports Switches, which connect to WAN bandwidth for voice, data, and video communication Modems, which interface voice-grade services and channel service units/digital service units Channel service units/data service units (CSUs/DSUs) that interface T1/E1 services and Terminal Adapters/Network Termination 1 (TA/NT1s) TA/NT1s that interface Integrated Services Digital Network (ISDN) services Communication servers, which concentrate on dial-in and dial-out user communication Concept Questions 1. A WAN is used to interconnect local-area networks (LANs) that are typically separated by a large geographic area. A WAN operates at the OSI reference model physical and data link layers. The WAN provides for the exchange of data packets/frames between routers/bridges and the LANs that they support. Draw a WAN that includes three LANs. 1 of 116 CCNA 2 Chapter 1 WANs and Routers 2. Compare and contrast WANs and LANs layer by layer. 3. Routers and the...

Words: 23437 - Pages: 94

Premium Essay

Engineer

...EECE 350/450 Computer Networks Spring 2013 Course information   Catalogue Description   A course that outlines data communications; wide area networks; circuit and packet switching; routing; congestion control; local area networks; communications architecture and protocols; internetworking.   Pre-requisites   By topic: •  Programming language (such as C++) •  Basic understanding of probability theory and data structures •  Basic understanding of the internal operations of computers   By course: •  STAT 230 Probability and Random Variables, and EECE 330 Data Structures and Algorithms. Instructor   Ayman Kayssi                   Office: 404, Raymond Ghosn Building (RGB) Office Hours: Monday 2 – 3:30 pm and by appointment Extension: 3499 Email: ayman@aub.edu.lb Web: aub.edu/~ayman Messaging: +961 3 965 258 LinkedIn: lb.linkedin.com/in/aymankayssi Twitter: akayssi Facebook: akayssi Course objectives   The objectives of this course are to give students:   An understanding of the basic principles of computer networking   An overview of the main technologies used in computer networks   An overview of internetworking principles and how the Internet protocols, routing, and applications operate   The basic background in computer networks that will allow them to practice in this field, and that will form the foundation for more advanced courses in networking   The basic skills needed to write network applications. Topics covered in this course ...

Words: 1522 - Pages: 7

Premium Essay

Ccna

...CCNA Notes Introduction Cisco offers two options for obtaining the CCNA certification:   Pass Exam 640-802 OR Pass Exam 640-822 AND Exam 640-816 While you can use these notes to prepare for either exam, the notes are geared towards passing the single exam. I recommend you study all of the material and take the single exam option rather than taking two exams. Cisco Device Icons  The following table lists the specific icons Cisco uses to represent network devices and connections. Represents Icon Hub Bridge Switch Router Access point Network cloud Ethernet connection Serial Line connection Wireless connection Virtual Circuit The OSI Model As you study this section, answer the following questions:       What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives:    103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach ...

Words: 73801 - Pages: 296

Premium Essay

Cisco Router Exam Chapter 2

...CCNA Exploration 2: Chapter 2 toets antwoorden / CCNA Routing Protocols and Concepts exam 2 answers CCNA Exploration 2: Routing Protocols and Concepts Chapter 2 Exam Answers 1. What happens to a static route entry in a routing table when the outgoing interface is not available? The route is removed from the table. The router polls neighbors for a replacement route. The route remains in the table because it was defined as static. The router redirects the static route to compensate for the loss of the next hop device. 2. The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud? 192.1.1.0/26 and 192.1.1.64/27 192.1.1.128/25 192.1.1.0/23 and 192.1.1.64/23 192.1.1.0/24 192.1.1.0/25 192.1.1.0/24 and 192.1.1.64/24 [pic] 3. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.) ping show arp traceroute show ip route show interface show cdp neighbor detail 4. Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded? Router1 will perform recursive lookup and packet will exit S0/0. Router1 will perform recursive lookup and packet will exit S0/1. There is no matching interface associated with network 172.16.0.0 so packets will...

Words: 1947 - Pages: 8

Premium Essay

2640

...Midterm Exam: Review 1. What describes a collision domain? Devices connected to an Ethernet hub. 2. Given the following routing table on a router, which next hop will the router select given the IP packet with the destination address of : 202.8.40.254 202.8.0.0/16 interface 0 202.8.40.0/24 interface 1 202.8.40.128/25 Router 1 Default router 2 202.8.40.128/25 3. What protocols operate at the OSI Transport (4) layer? TCP and UDP 4. What operates at the OSI Physical (1) layer? Hub 5. The process of a DNS server adding a UDP header to the contents of a DNS query response, followed by adding an IP header, and then adding a data link header and trailer is an example of what? Data Encapsulation 6. Which OSI layer defines the function of the representation of data to upper layers, with an example being ASCII? Layer 6 Presentation Layer 7. A broadcast address is an address that only a single host listens to on the network. False 8. When a Telco provides a cable handoff for a TDM circuit such as a DS1/T1 at the demarc the interface type is a? RJ-48 9. What layer 2 protocols commonly used in WANs? PPP and HDLC 10. What is the term used to describe the connection of a Point-to-Point WAN provided by a Telco over a TDM circuit? Lease Line 11. What address belongs to the Class A network range? 126.254.1.45 12. How many bits comprise the network portion of a Class C address? (assume default class mask) 24 bits ...

Words: 1032 - Pages: 5

Premium Essay

Network Design Paper

...expansion to the original location in San Francisco, WAN links has been developed for the Denver and the Houston region. XUMUC has been given the 172.16.0.0 network. Considerations and Questions In planning for this network, I was faced with many questions on how to apply the learned material to the network. How do I allocate IP addresses for the current network and for the preparation for network growth? Which routing protocol should I use? Does the routing protocol need to be Cisco proprietary or open standard? How stringent must the network security be? Does the network need contingency plans in place? The network had to be designed as broad as possible without falling for the allure of tending to every minute detail such as creating access lists and security measures such as TACACS or AAA. Assumptions include sharing the number of hosts between the San Francisco routers. I evenly allocated 430 IP addresses for each of the San Francisco routers. I also created 5 VLANs for the 4 departments and for management. I also kept network security limited to access lists with stringent security at the summarization points and for the routers connecting to those points. Part I: Designing the IP addressing scheme based on network specifications Figure 1 shows the 3 subnetworks designed for the infrastructure. Summarization points are located at the Denver Campus router from SF1 router and at the Houston1 router from the SF2 router. I also wanted to keep the networks summarized...

Words: 1015 - Pages: 5

Premium Essay

Microsoft

...M I C R O S O F T T E C H N O L O G Y A S S O C I AT E Student Study Guide EXAM 98-366 Networking Fundamentals Preparing for MTA Certification for Cert ca n Certification MICROSOFT TECHNOLOGY ASSOCIATE (MTA TECHNOLOGY ASSOCIATE (MTA) ECHNOLOGY C (MTA A) STUDENT STUDY GUIDE F UDY FOR IT PROS 98-366 Networking Fundamentals Authors Shari Due (Networking). Shari is an IT Network Specialist Instructor at Gateway Technical College in Racine, Wisconsin where she has worked for the past 15 years. Previously, she worked for Digital Equipment Corporation (DEC) in Elk Grove, Illinois. She holds a Bachelor of Science from the University of Wisconsin-Parkside in Math and Economics with a minor in Computer Science and a MBA from the University of Wisconsin-Eau Claire. Shari’s current industry certifications include: Comptia Server+, Linux+, A+, Network+, and i-Net+. Her past certifications include: MCSE-NT 4.0, CCNA, and Pathworks for Macintosh. She is a Cisco Certified Instructor for Cisco’s Network Academy and teaches the CCNA curriculum. She is the author of Advanced WordPerfect Using Macro Power: A Guide for VMS and DOS Users from Digital Press. Patricia Phillips (Lead Author and Project Manager). Patricia taught computer science for 20 years in Janesville, Wisconsin. She served on Microsoft’s National K-12 Faculty Advisory Board and edited the Microsoft MainFunction website for technology teachers for two years. For the past five years she has worked with Microsoft in...

Words: 12317 - Pages: 50

Free Essay

Not at the Moment

...Dilshad V Email: dilshad6@gmail.com Mob: +91 999 58 63 844 Network Support & Resource Coordinator Cisco ID: CSCO12363028 CAREER To obtain a challenging position that explores my Technical skills to its maximum extent. To continually upgrade myself to the utmost levels of quality and expertise, thereby enabling the organization to achieve its target and growth. EDUCATIONAL QUALIFICATION  MCA from Bharathiar University – On going  Bachelor Degree in Computer Science from Calicut University  Cisco Certified Network Associate Routing & Switching (Completed with 90+ Percent marks)  Cisco Certified Network Associate Voice (Course Completed - Exam Pending)  Cisco Certified Network Professional Voice (Course Completed - Exam Pending)  Microsoft Certified MCITP (Course Completed - Exam Pending)  DotNet (C#) EXPERIENCE Company : Pearson Education Services Pvt Ltd, Bangalore, India Designation : Period : Network Support & Resource Coordinator October 2012 to till date Company Profile: Pearson is a UK based international media company with world-leading businesses in education, business information and consumer publishing, having its operations at more than 60 countries Duties and Responsibilities  Assists in the planning, design, documentation, and implementation of various systems to include desktop PC’s, servers, network equipment, and software applications.  Trouble shooting the technical errors  ...

Words: 506 - Pages: 3

Premium Essay

Routing the Telephone to a Ne Neighborhood

...NT2640 MIDTERM EXAM: QUESTIONS NAME:_jordan Lewis________________________DATE:__07/29/14_______________ 1. How many usable host addresses are contained in a Class C network? (Assume default class mask.) a) 655356 b) 128 c) 512 d) 254 2. Which of the following describes a collision domain? a) The process of a bridge learning MAC addresses to be able to filter instead of flooding b) The separation of two IP subnets by a router c) Devices connected to an Ethernet hub d) Devices connected to an Ethernet switch operating in full duplex mode 3. Given the following routing table on a router, which next hop will the router select given the IP packet with the destination address of 202.8.40.254? Address/Mask Next hop 202.8.0.0/16 Interface 0 202.8.40.0/24 Interface 1 202.8.40.128/25 Router 1 default Router 2 a) Router 1 b) Router 2 c) Interface 0 d) Interface 1 4. Which of the following two protocols operate at the OSI Transport layer? a) IP and ARP b) TCP and UDP c) UDP and IP d) ARP and ICMP 5. The process of a DNS server adding a UDP header to the contents of a DNS query response, followed by adding an IP header, and then adding a data link header and trailer is an example of what? a) Adjacent layer interface b) Data encapsulation c) Same layer interaction d) Packet reordering 6. The term autonomous system (AS) defines the collection of metrics for routes to a particular network. a) True b) False 7. Given 5 bits of mask for the host portion...

Words: 1737 - Pages: 7

Premium Essay

Haha

...NT1210 - Final Exam Study Sheet 1. A byte is a group of 8 bits (a “word”) 2. When using a truth table, 1 and 0 equal false. 3. Parentheses in mathematical ensure that whatever operation is inside the parentheses is performed first. 4. Any device connected to a network is a node on a network. 5. Which physical topologies has the inherent weakness of a single point of failure? Star 6. In this sample Web address, which part identifies the protocol being used? http 7. What is basic to every networking standard? Documentation of ideas that all network users must agree to use 8. Why is the TCP/IP model divided into layers? To make it easier to understand how networks work To make it easier to write protocols for networks . To make it easier to create standards for networks 9. Which layer of the OSI model (shown below) is responsible for encryption and compression? Presentation 10. What does the following graphic illustrate? A. How to connect a car battery B. A diagram of atomic particles *C. A closed electrical circuit * D. An open electrical circuit 11. A network encoding scheme is the way the keys on a keyboard are interpreted by the CPU as letters. 12. What causes full duplex to transmit and receive simultaneously? There are four wires: one wire pair for receiving and another for transmitting. 13. Based on the other entries in the table, complete the missing cell in the table below: Cable Type |...

Words: 1256 - Pages: 6