Beruflich Dokumente
Kultur Dokumente
Media
UTP
Coaxial
Connecto
Frame Encoding
Technique
Manchester
Encoding
Non-Return Zero
(NRZ) techniques
rs
Signalling
Method
Copper
Cable
Fiber
Optic
Cable
Wireless
Media
Singlemode Fiber
Multimod
e Fiber
Access
Points
Radio
Antennae
Change in
the
electromagn
etic field
Intensity of
the
electromagn
etic field
Phase of
electromagn
etic wave
Pulses of light
Wavelength
multiplexing using
different
A pulse
equals 1
No pulse is 0
DSSS (direct
sequence spread
spectrum)
OFDM (orthogonal
frequency division
multiplexing
Radio Waves
Descripti
on
Preamble
Destinatio
n
Source
Type
Data
Frame
Check
Sequenc
e
8 bytes
6 bytes
6
bytes
2 bytes
46-1500
bytes
4 bytes
Used for
synchronization
; also contains a
delimiter to
mark the end of
the timing
information
48 bit
MAC
address for
the
destination
node.
48 bit
MAC
addres
s for
the
source
node
Value to
indicate
which
upper
layer
protocol
will
receive
the data
after the
Ethernet
process is
complete
The PDU
typically an
IPv4
packet, that
is to be
transported
over the
media
A value
used to
check for
damage
frames.
8. Explain the difference in functionality between the IP address and the MAC address of a
computer. 2 marks
MAC (Media Access Control) and IP (Internet Protocol) are the two addresses that
identify computers in a network. They are used to track data packets to ensure that they
get to where it was intended. The differences between these two addresses are:
An IP address is usually assigned by the network administrator or ISP (Internet
Service Provider), either static one at the beginning or given a dynamic one
automatically each time you connect to the network.
On the other hand, MAC addresses are embedded on the device or the network
card during manufacturing. They are permanent and could not be changed by
anyone as they are meant to identify a specific network interface card no matter
where it is in the world.
Experienced IT people can trace from an IP address to which network that
computer is connected to and consequently its approximate location. This is
possible because IP addresses are used in broadcast packets to initiate
communication.
With a MAC address, this is not possible as the address itself does not contain
information that lets you identify its location.
9. Briefly describe the function of the Address Resolution Protocol. 2 marks
The Address Resolution Protocol (ARP) feature performs a required function in IP
routing. ARP finds the hardware address, also known as the Media Access Control
3. Describe what each of the following router commands will do when used; 2 marks
a. Router(config-line)# password class- this command set the password as class.
b. Router(config)# banner motd# configures the message of the day.
c. Router(config) hostname CL1- configures routers hostname as CL1
d. Router# show ip route shows the ip addresses of routers and routing history.
4. A packet arrives at a router interface. The router goes through a series of steps to
determine where the packet should be forwarded. List the steps of the router forwarding
process. (Hint. There should be five 5 steps) 1 mark
The router de-encapsulates the layer 2 overhead information used by the lower layer uses
the IP address to forward the packets.
The steps involved in packet forwarding on a router are listed in the diagram extracted
from: http://www.highteck.net/EN/Network/OSI_Network_Layer.html
5. The following diagram shows the R1 routers directly connected routing table entries.
What does each of the labeled fields (A, B, C) of the routing table identify? 3 marks
A
C
Labelled Field
A
B
C
Identifies
Identifies how the network was learnt by the router
Identifies the destination network and how it is connected.
Identifies the interface on the router connected to the destination network.
6. The following diagram shows the R1 routers remote network routing table entries. What
does each of the labeled fields (A to F) identify? 3 marks
A
Labelled Field
A
B
C
D
E
F
Identifies
Identifies how the network was learned by the router.
Identifies the destination network
Identifies the administrative distance (trustworthiness) of the route source
Identifies the metric to reach the remote network
Identifies the next hop IP address to reach the remote network.
Identifies the amount of elapsed time since the network was discovered.
7. Explain the boot process of a Cisco router (You may need to draw a suitable diagram to
aid your explanation). 3 marks
When the router is powered on, the ROM BIOS runs POST test.
The ROM BIOS searches for and loads the boot strap file.
8. Refer to the following diagram. Write the configuration commands that will enable you to
configure the router with the following information. 5 marks
configure the hostname to R1
set the configuration mode password as cisco (it must be encrypted)
set the line console password to class and telnet password to mustang
configure the interface 0/0 with this ip address and subnet mask 192.168.10.1
255.255.255.0 (ensure to describe the interface as Link to Lan10 and turn
the interface on)
Configuration Task
configure the hostname to R1
set the configuration mode
password as cisco (it must be
encrypted)
set the line console password
to class and telnet password to
mustang
Command Line
Enable
Conf t
Hostname R1
Enable
Conf t
Enable password cisco
Service password-encryption
Enable secret class
Line console 0
Password class