Practicas CISCO 3

download Practicas CISCO 3

of 5

Transcript of Practicas CISCO 3

  • 8/13/2019 Practicas CISCO 3

    1/5

    UANL _____ FCFM

    Ing. Mara de Jess Antonia Ochoa Oliva, [email protected]

    MASTER OF ENGINEERING IN INFORMATION SECURITY

    FINAL EXAM TELECOMMUNICATIONS I

    KEY: MSTL1-001

    Name.- _______________________________________________________Registration______________Date________

    Instructions:Read carefully each requirement and gives the correct answer it. Performs procedurespersonally and be clear in the development, determines your conclusions based on thelessons learned, and it performs the best strategy of assigning IP addresses. Use all theresources you require didactic (colors, pencil, pen, etc.)

    Problem 1Using the network diagram and information given create an addressing scheme which utilizesvariable-length subnet masks. This business will be using the class C address 220.10.10.0.Remember to start with your largest groups first. 10 points.

  • 8/13/2019 Practicas CISCO 3

    2/5

    Ing. Mara de Jess Antonia Ochoa Oliva, [email protected]

    2

    Problem 2Using the network diagram and information given create an addressing scheme which utilizesvariable-length subnet masks. Show the subnet address and CIDR in the boxes below, color orshade the sub-subnets used in the box. This company will be using the class C address

    190.10.10.0. Remember to start with your largest groups first. 20 points.

    Color in the squares used with different shades to highlight each subnet.

  • 8/13/2019 Practicas CISCO 3

    3/5

    Ing. Mara de Jess Antonia Ochoa Oliva, [email protected]

    3

    Problem 3Using the network diagram and information given create an addressing scheme which utilizesvariable-length subnet masks. Show the subnet address and CIDR in the circle below, color or

    shade the sub-subnets used. This company will be using the class C address 211.56.70.0.Remember to start with your largest groups first. 20 points.

    Color in the necessary circle sections used with different shades to highlight each subnet.

  • 8/13/2019 Practicas CISCO 3

    4/5

    Ing. Mara de Jess Antonia Ochoa Oliva, [email protected]

    4

    Problem 4You are developing a school network with the class C address 193.18.4.0/24. There will bethree computer labs with 30 computers each that need to be on different sub-subnets. Fortyeight classrooms with one computer each that will comprise a single sub-subnet. Theadministrative office and guidance office contain a total of seven computers which will need to

    be grouped together. Plan for four more mini labs with six computers to each sub-subnetwork.Divide the network using variable length subnet masks. Complete the information requiredbelow. Remember to work from largest to smallest and make the outline. 40 points.

    Subnet Subnet Address Subnet

    Mask

    (/x)

    Subnet Mask

    (xxx.xxx.xxx.xxx)

    First Usable Host Last Usable

    Host

    Broadcast

    Address

  • 8/13/2019 Practicas CISCO 3

    5/5

    Ing. Mara de Jess Antonia Ochoa Oliva, [email protected]

    5

    Problem 5Perform the following subnetting scheme: 10 points.

    Number of needed subnets: 1000Number of needed usable hosts: 60

    Network Address: 165.100.0.0

    Address class:

    Default subnet mask:

    Custom subnet mask:

    Total number of subnets:

    Total number of host addresses.

    Number of usable addresses:

    Number of bits borrowed.

    What is the 15 subnet range?

    What is the subnet number for the 6th

    subnet?What is the subnet broadcast address for the6th subnet?

    What are the assignable addresses for the9th subnet?

    Bonus: Answer with a T if the function corresponds to the TCPprotocol and U, if the function described is for the UDP protocol. (2points c / u = 20 points)____ It sends data to the network until the destination warns is ready to receive them.

    ____ Protocol is Transport Layer preferred by the developer.

    ____ Use link mechanisms, timers and acknowledgments and dynamic use of windows to

    perform these functions reliable.

    ____ Manages the data flow and forwards all data segments received as acknowledgment is

    received at the destination.

    ____ No tracks or acknowledges receipt of datagrams at the destination, only received

    datagrams sent to the application layer as they arrive, and not forward datagrams lost.

    ____ Reliability is some overhead in the network in terms of larger segments headers and

    increased network traffic between origin and destination that manages data transport.____ Applications such as Web Browser, Email, File Transfer offered in:

    ____Applications domains System (DNS), streaming video, Voice over IP (IP Vo.) are offered

    in:

    ____ Sequence numbers are used for the receiver to understand the original message, the

    data in the segments are reassembled in the original order.

    ____ The major protocols used in the transport layer are: DNS, SNMP, DHCP, RIP.