Practicas CISCO 3
-
Upload
carlos-ibarra -
Category
Documents
-
view
218 -
download
0
Transcript of Practicas CISCO 3
-
8/13/2019 Practicas CISCO 3
1/5
UANL _____ FCFM
Ing. Mara de Jess Antonia Ochoa Oliva, [email protected]
MASTER OF ENGINEERING IN INFORMATION SECURITY
FINAL EXAM TELECOMMUNICATIONS I
KEY: MSTL1-001
Name.- _______________________________________________________Registration______________Date________
Instructions:Read carefully each requirement and gives the correct answer it. Performs procedurespersonally and be clear in the development, determines your conclusions based on thelessons learned, and it performs the best strategy of assigning IP addresses. Use all theresources you require didactic (colors, pencil, pen, etc.)
Problem 1Using the network diagram and information given create an addressing scheme which utilizesvariable-length subnet masks. This business will be using the class C address 220.10.10.0.Remember to start with your largest groups first. 10 points.
-
8/13/2019 Practicas CISCO 3
2/5
Ing. Mara de Jess Antonia Ochoa Oliva, [email protected]
2
Problem 2Using the network diagram and information given create an addressing scheme which utilizesvariable-length subnet masks. Show the subnet address and CIDR in the boxes below, color orshade the sub-subnets used in the box. This company will be using the class C address
190.10.10.0. Remember to start with your largest groups first. 20 points.
Color in the squares used with different shades to highlight each subnet.
-
8/13/2019 Practicas CISCO 3
3/5
Ing. Mara de Jess Antonia Ochoa Oliva, [email protected]
3
Problem 3Using the network diagram and information given create an addressing scheme which utilizesvariable-length subnet masks. Show the subnet address and CIDR in the circle below, color or
shade the sub-subnets used. This company will be using the class C address 211.56.70.0.Remember to start with your largest groups first. 20 points.
Color in the necessary circle sections used with different shades to highlight each subnet.
-
8/13/2019 Practicas CISCO 3
4/5
Ing. Mara de Jess Antonia Ochoa Oliva, [email protected]
4
Problem 4You are developing a school network with the class C address 193.18.4.0/24. There will bethree computer labs with 30 computers each that need to be on different sub-subnets. Fortyeight classrooms with one computer each that will comprise a single sub-subnet. Theadministrative office and guidance office contain a total of seven computers which will need to
be grouped together. Plan for four more mini labs with six computers to each sub-subnetwork.Divide the network using variable length subnet masks. Complete the information requiredbelow. Remember to work from largest to smallest and make the outline. 40 points.
Subnet Subnet Address Subnet
Mask
(/x)
Subnet Mask
(xxx.xxx.xxx.xxx)
First Usable Host Last Usable
Host
Broadcast
Address
-
8/13/2019 Practicas CISCO 3
5/5
Ing. Mara de Jess Antonia Ochoa Oliva, [email protected]
5
Problem 5Perform the following subnetting scheme: 10 points.
Number of needed subnets: 1000Number of needed usable hosts: 60
Network Address: 165.100.0.0
Address class:
Default subnet mask:
Custom subnet mask:
Total number of subnets:
Total number of host addresses.
Number of usable addresses:
Number of bits borrowed.
What is the 15 subnet range?
What is the subnet number for the 6th
subnet?What is the subnet broadcast address for the6th subnet?
What are the assignable addresses for the9th subnet?
Bonus: Answer with a T if the function corresponds to the TCPprotocol and U, if the function described is for the UDP protocol. (2points c / u = 20 points)____ It sends data to the network until the destination warns is ready to receive them.
____ Protocol is Transport Layer preferred by the developer.
____ Use link mechanisms, timers and acknowledgments and dynamic use of windows to
perform these functions reliable.
____ Manages the data flow and forwards all data segments received as acknowledgment is
received at the destination.
____ No tracks or acknowledges receipt of datagrams at the destination, only received
datagrams sent to the application layer as they arrive, and not forward datagrams lost.
____ Reliability is some overhead in the network in terms of larger segments headers and
increased network traffic between origin and destination that manages data transport.____ Applications such as Web Browser, Email, File Transfer offered in:
____Applications domains System (DNS), streaming video, Voice over IP (IP Vo.) are offered
in:
____ Sequence numbers are used for the receiver to understand the original message, the
data in the segments are reassembled in the original order.
____ The major protocols used in the transport layer are: DNS, SNMP, DHCP, RIP.