Professional Documents
Culture Documents
Exercise 2
https://wartsila.pkamk.fi/cisco/exploration
Here are the questions and tasks from chapter 1, LAN Design. Submit the
answers in one document to return folder in moodle.
Broadcast transmission like when sender send the same message to all
devices on the LAN. An example of a broadcast transmission is the address
resolution query that the address resolution protocol (ARP) sends to all
computers on a LAN. This ARP mainly used in TCP/IP based networks.
3) Describe the difference between half and full duplex. What does auto setting
do in this context?
The main difference between these two settings, in the half-duplex mode
the devices are can’t send and receiving data at the same time, because it
is a unidirectional communication type. This is similar like walkie-talkie
when just one people can communicate the other. Half-duplex
communications have performance issues too, due to the constant
waiting, because data can only flow in one direction at a time. In full-
duplex communication, data flow is bidirectional, so data can be sent and
received at the same time. Most Ethernet, Fast Ethernet, and Gigabit
Ethernet NICs sold today offer full-duplex capability, and if we want to
communicate in full duplex mode both devices can be able to support this
mode. In this mode these network devices collision circuits must be
disabled. So these devices are collision free, but they can communicate
just point-to-point only.
The auto option sets auto negotiation of duplex mode. With auto
negotiation enabled, the two ports communicate to decide the best mode
of operation, but it may have got unpredictable results, so we must
consider this option very well.
4) How does a switch use MAC address table in switching? How does the MAC
table build up?
5) Define the term collision domain. How does a switch reduce collision
domains?
7) Describe the factors that affect network latency in local area networks. Give
also instructions how to control network latency.
The first good way to improve our network latency if we use switches not
routers, because the routers must analyze Layer 3 data, switches just
analyze the Layer 2 data. Since Layer 2 data is present earlier in the frame
structure than the Layer 3 data, switches can process the frame more
quickly. And also important witch switch we use because en entry level
switch can’t produce more data flow like a better one.
- Store-and-Forward Switching
- Cut-through Switching
The switch keeps a map of frame to port links showing where a packet
needs to be transmitted. The map link is cleared after the frame has been
successfully transmitted.
MAC Address Flooding: The attacker use the MAC table for the hacking,
because this table has got a limited size, and the attacker try to fill this
table with fake addresses. If it is full (the switch act like a hub) and when
the switch got a new address that transmission will be broadcasted and
the attacker will see everything.
CDP Attacks: Cisco devices use this for network discovering and
communicate with other devices. This data flow is not encrypted and
contains valuable information like IP addresses, software version, platform
and the native VLAN. When the attacker gain this information he can start
the typically attack the Denial of Service (DoS) attack. This attack form is
very “popular” nowadays.
Telnet Attacks: The attacker use the Telnet protocol to gain a remote
access on a Cisco switch.
- protect
- restrict
- shutdown
- default
- dynamic
- sticky
One of the good ways to prevent the attacks is if we disable the unused
ports. We can do it simple with the interface range command if we want to
shutdown more ports in one time.