Professional Documents
Culture Documents
CCNA Final Exam
CCNA Final Exam
b) You have a Class C network, and you need 10 subnets. You wish to have as many addresses available
for hosts as possible. Determine the subnet mask you should use and calculate the available host
address for each subnet. Show the IP calculation.
Answer:
Subnet mask: 255.255.255.240
1111 1111 . 1111 1111 . 1111 1111 . 1111 0000
Available hosts: 14 hosts (24 -2)
c) Define the acronym VLSM. State the reason for using VLSM in an enterprise network?
- Variable Length Subnet Masks; It is used to avoid wasting IP addresses.
d) Complete the syntax for each command line interface shown in Figure 1 through Figure 3
i) Configure privileged exec password (using password ‘class’)
Sw-Floor-1> enable
Sw-Floor-1# configure terminal
Sw-Floor-1(config)# enable secret class
Sw-Floor-1(config)# exit
f) Discuss the problem when a network have a large broadcast domain. Also state three (3) design
consideration when subnetting a network.
- Each router interface connects a broadcast domain and broadcasts are only propagated within
its specific broadcast domain.
- Slow network operations; due to the significant amount of broadcast traffic.
- Slow device operations; because a device must accept and process each broadcast packet.
- Solution? Reduce the size of network to create smaller broadcast domains – subnetting.
- Design consideration:
1) Take the maximum number of subnets required & round up to the nearest power of two.
2) Make sure there are enough host addresses for the organization’s largest subnet.
3) Make sure the organization’s address allocation provides enough bits to deploy required
subnet addressing plan.
Question 2
a) Describe the 4 essential elements to consider when building a reliable network.
o Go for proven network technologies; eg: Multi-Protocol Label Switching (MPLS) allows you
to assign the right priority to every application. Avoids delays in any resulting loss of quality.
o Good network design with built-in security; Traffic is always changing, therefore network’s
design must be reviewed and the data traffic will always need to be reviewed.
o Provide sufficient capacity; eg: Ethernet/Fiber optics.
o Choose the right partner; Work with specialists in networking expertise but also in related
areas such as security, storage and disaster recovery.
b) State the 2 types of cut-through method in switch forwarding operation. Briefly discuss the benefit
of each method.
o Fast-forward switching; Offers the lowest level of latency by forwarding a packet
immediately after reading the destination address.
Disadvantage: packets may contain errors.
o Fragment-free switching; it ensures that enough bytes are read from the source to detect
collision before forwarding. Solves late-collision problem. (stores the first 64 bytes of the
frame and does small error checking) Half of Store-and-forward and Fast-forward switching
**extra
Switch satu lagi – Store-and-forward; receives entire frame, stores the data in buffers and computes
CRC (cyclic redundancy change). If CRC is valid, switch looks up the destination address and forwards
the frame to the correct port. If there is error detected, switch discards the frame. Thus, reducing
the bandwidth consumed by corrupted data.
c) Examine Figure 4, which shows the process of Address Resolution Protocol (ARP). Assumer the initial
states of ARP cache are empty.
i) PC-A communicates with network 172.10.1.0/16 (remote) which resides on the Internet.
Describe the content of PC-A’s ARP cache after the ARP process is completed.
Destination MAC Source MAC Source IP Destination IP
??? 00-0A 192.168.1.110 172.10.1.0
ARP Request
Destination MAC Source MAC Target IPv4 Target MAC
FF-FF 00-0A 192.168.1.1 ???
ARP Reply
Destination MAC Source MAC Target IPv4 Target MAC
00-0A 00-0D 192.168.1.1 00-0D
ii) State the following IPv4 address, which is used when sending the ARP Request.
a) Destination MAC address
FF-FF
b) Source MAC address
00-0A
c) Target IPv4 address
192.168.1.1
iii) PC-C’s communicates with PC-B. State the content of PC-C’s ARP cache when the communication
is completed.
Destination MAC Source MAC Source IP Destination IP
??? 00-0C 192.168.1.50 192.168.1.120
ARP Request
Destination MAC Source MAC Target IPv4 Target MAC
FF-FF 00-0C 192.168.1.120 ???
ARP Reply
Destination MAC Source MAC Sender IPv4 Sender MAC
00-0C 00-0B 192.168.1.120 00-0B
Question 3
a) Compute and determine the most efficient number of hosts per subnet to satisfy the requirement
in Figure 5 based on VLSM approach. State the network address for each subnet. You are instructed
to use the IP 192.168.1.0/24.
b) Briefly describe the function of each layer in TCP/IP Protocol Model. (8 marks)
o Application – Represents data to the user, plus encoding and dialog control.
o Transport – Supports communication between various devices across diverse networks.
o Internet – Determines the best path through the network.
o Network Access – Controls the hardware devices and media that make up the network.
c) Compute the broadcast address of the following IPv4 addresses. (2 marks each)
i) 172.16.0.1/23
10101100 . 00010000 . 00000000 . 00000001 (IP 172.16.0.1)
11111111 . 11111111 . 11111110 . 00000000 (CIDR/Net mask)
10101100 . 00010000 . 00000000 . 00000000 (Network Address – AND, darab)
172 . 16 . 0 . 0
ii) 172.16.0.1/24
10101100 . 00010000 . 00000000 . 00000001 (IP 172.16.0.1)
11111111 . 11111111 . 11111111 . 00000000 (CIDR/Net mask)
10101100 . 00010000 . 00000000 . 00000000 (Network Address – AND, darab)
172 . 16 . 0 . 0
10101100 . 00010000 . 00000000 . 00000000 (Network Address)
00000000 . 00000000 . 00000000 . 11111111 (Inverted CIDR)
10101100 . 00010000 . 00000000 . 11111111 (Broadcast Address – OR, tambah)
172 . 16 . 0 . 255
iii) 172.16.0.1/25
10101100 . 00010000 . 00000000 . 00000001 (IP 172.16.0.1)
11111111 . 11111111 . 11111111 . 10000000 (CIDR/Net mask)
10101100 . 00010000 . 00000000 . 00000000 (Network Address – AND, darab)
172 . 16 . 0 . 0
Question 4
a) Describe the limitations of using IPv4 address compared to IPv6. (6 marks)
b) Figure 6 shows a topology and CLI for R1. Complete the command with the correct syntax.
i) State the content MAC Table i.e. port number and MAC address, after PC-B sends a packet
to PC-A. Assume that the MAC Table is initially empty. (2 marks)
*Ethernet frame enters a port; MAC Address Table will update the port number and the
MAC address.
ii) Identify the PCs that received the packet when PC-B initially sends packet to PC-A. Then state
the transmission method used. (3 marks)
Since the MAC Table is initially empty, the packets will be forwarded to all ports
except for the incoming port. This is known as an unknown unicast.
Transmission method used is broadcast. (KIV)
iii) Later when PC-A respond with a packet sent to PC-B, state the transmission method used.
Explain your reason. (4 marks)
The transmission method used is unicast because the MAC address of PC-B is already in the
MAC table of the switch. Therefore the packet can be sent to the specific port.
Extra Notes.
1) Comparison between TCP & UDP
TCP UDP
Reliable. Absolute guarantee that the data Unreliable. No guarantee that the
transferred arrives in the same order in which it messages/packets sent would reach at all.
was sent.
Speed for TCP is slower than UDP. Faster because error recovery is not attempted.
“Best effort” protocol.
Does error checking. Incorrect packets are Does error checking but just discard the incorrect
retransmitted from source to destination. packet without retransmitting.
More fields. Fewer fields.
HTTP, HTTPs, FTP, SMTP/POP, Telnet, DNS, DHCP, TFTPT, SNMP
4) Binary BCD
1) 111012
*Convert binary to decimal first. Then from decimal, binarykan each number.
111012 2910 00102 10012 00101001BCD
- Console; a physical management port that provides out-of-band access to Cisco device. Refers to
access via dedicated management channel used for maintenance purposes only.
Advantage; accessible even w/o networking services configured. Configuration commands for
setting up the switch/router can be entered on the connected computer that runs a terminal
emulation-software.
- Secure Shell (SSH); a method for remotely establishing a secure CLI connection thru a virtual
interface over a network. SSH requires an active networking services on the device including an active
interface configured with an address.
Advantage; recommended because it is secured. SSH provides encrypted password authentication
and transport of session data. This keeps user ID and password private.
- Telnet; an insecure method of remotely establishing a CLI session thru a virtual interface over a
network. It does not provide a securely encrypted connection – authentication, passwords and
commands are sent over the network in plaintext.
Extra; Telnet server & Telnet client can be used to establish Telnet sessions with other devices.
- DNS Hierarchy
i) Uses hierarchical system (root at the top, branches below).
ii) The naming structure is broken down into small, manageable zones.
iii) Each DNS server responsible for managing name-to-IP mappings for that small portion of the
DNS structure.
iv) If request doesn’t match the records/zones, it is forwarded to other servers for translation.
v) Top-level domains - .com, .org, .au, .co, .my
- Nslookup command
i) Allows user to manually place DNS queries
ii) Can be used to troubleshoot name resolution issues
iii) Has many options available for extensive testing and verification of the DNS process
iii) Determine the possible IP address and Subnet Mask which can be assigned to R1’s and R2’s
Se0/1/0 interface.
Answer: 209.165.200.225 and 209.165.200.226
*Cari network and broadcast, to get the usable hosts.
9) IPv4 vs IPv6
Describe 3 techniques used which enable IPv4 and IPv6 to communicate and coexist in the
network.
- Dual Stack; allows IPv4 & IPv6 to coexist on the same network segment. These
devices run both IPv4 and IPv6 protocol stacks simultaneously.
- Tunneling; A method of transporting an IPv6 packet over an IPv4 network. The
packet is encapsulated inside an IPv4 packet, similar to other data types.
- Translation; Network Address Translation (NAT64) allows IPv6 devices to
communicate with IPv4 enabled devices using a translation technique similar to NAT
for IPv4. An IPv6 packet is translated to an IPv4 packet and vice versa.
IPv4 vs IPv6
IPv4 IPv6
32 bit length 128 bit length
Binary numbers represented in decimals Binary numbers represented in hexadecimals
Fragmentation is done by sender and forwarding Fragmentation is done only by sender.
routers.
ARP is available to map IPv4 addresses to MAC. ARP is replaced with Neighbor Discovery Protocol
(NDP)
Static or DHCP address is required to configure IP. Auto-configuration of addresses is available.