You are on page 1of 4

Business Data Networking and Telecommunications, 8th Edition, Panko and Panko

1

HOMEWORK

CHAPTER 10

TCP/IP INTERNETWORKING II
Last name (surname): ________________________________

Given name ________________________________________

DIRECTIONS
To answer a question, place you cursor at the very end of a question and hit Enter. This should put you in the Answer (A) style, which neatly indents your answer.

TEST YOUR UNDERSKJ8TANDING
1. a) Why is IP subnet planning important? b) If you have a subnet part of 9 bits, how many subnets can you have? c) Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet size be? d) How many hosts can you have per subnet? e) Your firm has a 20-bit network part. What subnet part would you select to give at least 10 subnets? f) How many hosts can you have per subnet? 2. a) What is NAT? (Do not just spell it out.) b) Describe NAT operation. c) What are the two benefits of NAT? d) How does NAT enhance security?

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice-Hall

a) What hosts are given static IP addresses? b) Why do these hosts need static IP addresses? c) What are dynamic IP addresses? d) How do clients get dynamic IP addresses? e) Can the client send a DHCP request information to multiple DHCP servers? f) Do DHCP servers update their the configuration information they store automatically? g) What are DHCP scopes? 5.) e) Why must user interface functionality for the SNMP manager be considered carefully in selecting SNMP manager products? 6. and an interface. 7. e) What is a trap? f) Why are firms often reluctant to use Set commands? g) Describe SNMPv1’s poor authentication method. a) At what layer does IPsec operate? b) What layers does IPsec protect? c) Does IPsec protect these layers transparently? Copyright © 2011 Pearson Education. d) Is the MIB a schema or the actual database? (This is a trick question. UDP.Business Data Networking and Telecommunications. IP. which device creates commands? b) Responses? c) Traps? d) Explain the two types of commands. 8th Edition. a) In SNMP. b) Does the manager communicate directly with the managed device? Explain. Panko and Panko 2 e) How does NAT allow a firm to deal with a shortage of IP addresses given to it by its ISP? f) Where are private IP addresses used? g) What are the three ranges of private IP addresses? h) What problems may firms encounter when using NAT? 3. c) Explain the difference between managed devices and objects. 8. a) Is the Domain Name System only used to send back IP addresses for given host names? b) What is a domain? c) Which level of domain name do corporations most wish to have? d) What are DNS root servers? e) How many DNS root servers are there? f) Why do most firms have both a primary and a secondary DNS server? 4. Publishing as Prentice-Hall . TCP. Inc. List one object in each of the following areas: the system. h) Describe SNMPv3’s good authentication method. ICMP. a) List the main elements in a network management system.

site-to-site VPNs. a) What kinds of information are stored in a directory server? b) How is information in directory servers organized? c) What is the purpose of LDAP? d) If Astronomy has a similar directory organization to Business (in Error: Reference source not found). or both? 9. 8th Edition. a) What is Active Directory? b) What is an AD domain? c) What are domain controllers? d) Can a domain have more than one domain controller? e) What are servers called that do not run AD? f) Describe replication among domain controllers in the same domain. give the specification for the telephone extension of Claire Williams (username cwilliams). 11. Inc. Publishing as Prentice-Hall . which provides transparent security to higher layers? b) Which tends to require the installation of digital certificates on many client PCs? c) Which has stronger security? d) Which would you use to give employees remote access to a highly sensitive webserver via the Internet? (This is not a trivial question. g) What is a tree? h) Describe replication among domain controllers at different levels. 12. e) What is the main advantage of tunnel mode? f) What is the main disadvantage of tunnel mode? g) Describe IPsec transport mode. h) What is the main advantage of transport mode? i) What is the main disadvantage of transport mode? j) In which IPsec mode are clients and servers required to have digital certificates? k) Which IPsec mode does not require clients and servers to have digital certificates? l) Is IPsec used for remote-access VPNs.Business Data Networking and Telecommunications. a) How is SSL/TLS limited? b) Why is SSL/TLS inexpensive? c) What are SSL/TLS’s authentication options? d) Does SSL/TLS have the ability to be centrally managed? e) When an SSL/TLS gateway is used. how many SSL/TLS connections does the client have? f) What is webification? g) What is webification’s benefit? h) Why are downloads for SSL/TLS gateway service not likely to be useful on public PCs? 10. Panko and Panko 3 d) Describe IPsec tunnel mode.) Justify your answer. who is an Astronomy staff member. Copyright © 2011 Pearson Education. a) Of the two VPN security technologies discussed in this section.

4. c) Draw the bits for the second host on the third subnet. while 3 is 11. Both DNS servers and DHCP servers send your client PC an IP address. 2 is 10. Distinguish between these two addresses. a) What percentage of a 100 Mbps LAN link’s capacity would the resulting response traffic represent? b) What percentage of a 128 kbps WAN link would the response messages represent? c) What can you conclude from your answers to this question? 3. Panko and Panko 4 i) What is an AD forest? END OF CHAPTER QUESTIONS THOUGHT QUESTIONS 1. It selects an 8-bit subnet part. PERSPECTIVE QUESTIONS 1. a) Draw the bits for the four octets of the IP address of the first host on the first subnet. It selects a 10-bit subnet part. f) Convert this answer into dotted decimal notation. Assume that a manager sends 40 SNMP Get commands each second. 2. (In binary. you receive a DNS error message that the host does not exist. do NOT just come up with one or two possible explanations. e) Draw the bits for the last host on the third subnet. (Hint: Use Windows Calculator. 2. Inc. A firm is assigned the network part 128. Publishing as Prentice-Hall . In your browser. What was the most surprising =-thing to you about the material in this chapter? What was the most difficult thing for you in the chapter? Copyright © 2011 Pearson Education. TROUBLESHOOTING QUESTION 1.) b) Convert this answer into dotted decimal notation. you enter the URL of a website you use daily. f) Convert this answer into dotted decimal notation.Business Data Networking and Telecommunications. e) Draw the bits for the last host on the third subnet.) b) Convert this answer into dotted decimal notation.) d) Convert this into dotted decimal notation. What may have happened? Explain your reasoning.) d) Convert this into dotted decimal notation. c) Draw the bits for the second host on the third subnet. Again. After some delay.171. while 3 is 11. 2 is 10.171. a) Draw the bits for the four octets of the IP address of the first host on the first subnet. (In binary. 8th Edition. A firm is assigned the network part 128. Assume that an average SNMP response message is 100 bytes long. (Hint: Use Windows Calculator.