Cpe 511 Solution

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CPE 511 SOLUTION

QUESTION ONE
a) List of Network Devices and their functions for a typical campus network
1. Routers - Routers connect multiple networks together. They also connect computers on
those networks to the Internet. It operates at the Network Layer; A router acts a dispatcher;
it determines the best path for data packets using routing tables.
2. Access Points - An access point allows devices to connect to the wireless network without
cables. A wireless network makes it easy to bring new devices online and provides flexible
support and mobility.
3. Network Interface Cards (NICs) - Essential for connecting a device to a network, it provides a
physical interface (e.g., Ethernet port) for communication and enables data exchange
between the device and the network.
4. Switches - Operates at the data link layer, it efficiently forwards data packets based on MAC
addresses, has a better performance than hubs, they are commonly used in local area
networks (LANs).
5. End Devices - An end device is a source or destination device in the network. Examples
include a user's laptop, desktops, servers, printers, etc. End devices are node devices that
serve as a source point or a destination point in the communication that occurs on a
computer network. They can act as a client, a server, or both.
6. Hubs – It is a legacy device, and operates at the physical layer of the OSI model Its primary
function is to interconnect multiple devices within a network, unlike more intelligent devices
like switches, a hub is considered a non-intelligent or dumb device and does not use an IP
address. It acts as a multiport repeater, meaning it receives data signals from connected
devices and broadcasts them to all other connected devices, regardless of the intended
recipient.

b) Various Commands and what they do?


1. no ip domain-lookup – You can use this command to stop the switch from interacting with
any DNS servers entirely. It prevents the switch from performing a DNS resolution process
when a command is mistyped, by default any mistyped command is recognized as a
hostname.
2. Logging synchronous - When this command is enabled, unsolicited messages and debug
output are displayed on a separate line than user input. After the unsolicited messages are
displayed, the CLI returns to the user prompt.
3. Service password-encryption - The service password-encryption command is a command
that encrypts plaintext passwords in the configuration file of a CISCO router or switch. It is
used to prevent unauthorized users from viewing the passwords in the running-config.
4. show run – The full command is “show running-config”, used to display the configuration
information currently running on the terminal. It reveals the settings, parameters, and
commands that define how the switch operates. Network administrators often use this
command for troubleshooting, verification, and documentation purposes.
5. copy run start – short for “copy running-config startup-config” command in Cisco IOS. This
command saves the current running configuration of a network device (such as a router or
switch) to the startup configuration stored in non-volatile random-access memory (NVRAM).
In simpler terms, it ensures that any changes made to the device’s configuration during the
current session are persistently saved even after a reboot.

c) What are the four (4) configuration modes on a Cisco 2960 series switch and state their
peculiarities.
1. User EXEC Mode (User Mode): Switch>
Provides basic access to the switch, allows users to execute limited commands for basic
monitoring and verification. Users cannot modify the switch configuration.
Commands:
Common commands include show, ping, and traceroute.
2. Privileged EXEC Mode (Privileged Mode): Switch#
Offers greater control over the switch than user exec mode. In this mode, users can view and
modify switch settings, it also allows users to execute privileged commands for configuration
and management.
Commands:
configure terminal (to enter global configuration mode) and other advanced commands.
3. Global Configuration Mode: Switch(Config)#
Enables users to configure global settings for the entire switch and changes made here affect
the entire switch.
Commands:
Use interface commands to configure specific interfaces (e.g., Ethernet ports, VLANs).
Set global parameters such as hostname, passwords, time, and logging.
4. Interface Configuration Mode: Swicth(config-if)#
Allows users to configure individual interfaces (e.g., FastEthernet, GigabitEthernet) and
changes made here apply only to the specific interface.
Commands:
Configure interface-specific settings like IP address, speed, duplex, and VLAN membership.

d) Using a suitable diagram, differentiate between a straight-through cable pin-out and a cross-over
cable pin-out.
N/B: You can choose to draw either EIA/TIA T568A or EIA/TIA T568B configurations. Just indicate
which you are drawing.
1. Straight-Through Cable
2. Cross-Over Cable

QUESTION TWO
a.) When a packet from VLAN 10 arrives at Switch B:
Since Switch B has VLAN 100 as its native VLAN, it will treat any untagged traffic (including traffic
from VLAN 10) as part of VLAN 100. The packet from VLAN 10 will be tagged with VLAN 100 and
forwarded over the trunk link. If there is a host in VLAN 100 connected to Switch B, it will receive
the packet.
In summary, Switch B will handle traffic from VLAN 10 by associating it with VLAN 100 (the native
VLAN on Switch B). Keep in mind that this behavior assumes that the trunk link between the
switches is operational and properly configured.
b.) Differentiate between FastEthernet and GigabitEthernet.
Speed:
Fast Ethernet provides a speed of 100 Mbps (megabits per second).
Gigabit Ethernet offers a significantly faster speed of 1 Gbps (gigabit per second)
Configuration Complexity:
Fast Ethernet is relatively simple to configure.
Gigabit Ethernet is more complicated than Fast Ethernet due to its higher data rate and
additional considerations.
Delay:
Fast Ethernet tends to generate more delay compared to Gigabit Ethernet.
Gigabit Ethernet produces less delay than Fast Ethernet.
Coverage Limit:
The coverage limit for Fast Ethernet is up to 10 km.
Gigabit Ethernet can cover distances of up to 70 km
Succession:
Fast Ethernet is the successor of 10-Base-T Ethernet.
Gigabit Ethernet follows Fast Ethernet in terms of technological evolution.
Scalability:
Fast Ethernet is less scalable than Gigabit Ethernet.
Gigabit Ethernet offers better scalability for high-speed networks.
c.) The Student Can
1. Verify VLAN Configuration: Ensure that the VLAN exists in the VLAN database and is active.
2. Check Port Assignments: Verify that the VLAN is associated with at least one active port. If
no ports are assigned, the VLAN interface may remain down.
3. Physical Connectivity: Confirm that the physical connections are intact. Check cables,
connectors, and any intermediate devices (if applicable).
4. Check Native VLAN: If the VLAN interface is associated with a native VLAN on a trunk link,
verify that the native VLAN is correctly configured on both ends of the trunk.
d.) To my understanding, significances can also mean benefits of using something. Check below
QUESTION THREE
a.) You are handed the host IP address, 192.135.250.180/24, transforming into a /29 IP address.
Find the following:
1. Host bits per subnet: 3 bits
2. Number of hosts per subnet: 8
3. Number of usable hosts per subnet: 6 usable hosts
4. Network address of this subnet: 192.135.250.176
5. IPv4 address of the 4th host: 192.135.250.179
6. IPv4 broadcast address on this subnet: 192.135.250.183
7. Subnet Mask of /29: 255.255.255.248
8. Usable host IP Range: 192.135.250.177 - 192.135.250.182
Remember that the network address and broadcast address are reserved, leaving 6 usable hosts
within this /29 subnet.

You might also like