Professional Documents
Culture Documents
(AUTONOUMUS), SULUR.
SCHOOL OF COMPUTER STUDIES (UG)
B.Sc., INFORMATION TECHNOLOGY
ASSIGNMENT
UNIT-I
1. A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The
address pool is configured with 192.168.10.0/24. There are 3 printers on this network that
need to use reserved static IP addresses from the pool. How many IP addresses in the pool are
left to be assigned to other hosts?
SOLUTION:
If the block of addresses allocated to the pool is 192.168.10.0/24, there are 254 IP addresses
to be assigned to hosts on the network. As there are 3 printers which need to have their
addresses assigned statically, then there are 251 IP addresses left for assignment.
2. If a network device has a mask of /28, how many IP addresses are available for hosts on
this network? Explain.
SOLUTION:
A /28 mask is the same as 255.255.255.240. This leaves 4 host bits. With 4 host bits, 16 IP
addresses are possible, but one address represents the subnet number and one address
represents the broadcast address. 14 addresses can then be used to assign to network devices.
3. A network administrator wants to have the same network mask for all networks at a
particular small site. The site has the following networks and number of devices:
IP phones – 22 addresses
SOLUTION:
If the same mask is to be used, then the network with the most hosts must be examined for
the number of hosts, which in this case is 22 hosts. Thus, 5 host bits are needed. The /27 or
255.255.255.224 subnet mask would be appropriate to use for these networks.
SOLUTION:
DHCP Sever
5. Explain the steps involved in configuring a DHCP server through Cisco Packet Tracer for
the following Topology.
SOLUTION:
Step 1: Open packettracer.
Step 2: Choose the end devices and select one server paste.
Step 6: By clicking server choose services go to DHCP option-->click service on-->type pool
name-->type start IP address finally select add.
Step7: Select any client and go for desktop-->click option DHCP automaticlly the IP address
allocated by DHCP server.
6. How to reduce the troubleshooting configuration problems with IPConfig facts explain in
detail.
ipconfig /all to troubleshoot IP configuration problems. The following table describes how
the output for this command changes, based on how IP settings are configured and for
specific problem situations:
If the workstation has received configuration information from the wrong DHCP server or
has configured itself using APIPA, you may need to contact the DHCP server again once the
DHCP problems have been resolved. Use the following commands:
ipconfig /renew to retry the DHCP server request process to obtain IP configuration
parameters.
UNIT-II
1. Find out the following cable types to make the initial connection to the switch or router for
device management in detail.
SOLUTION:
Pin-
Cable Type Use
outs
SOLUTION:
GigabitEthernet (1 GB
Ethernet)
VLAN
3. Illustrate the Trunking facts when you configure VLANs that span multiple switches as
shown in the following diagram.
SOLUTION:
In this example, each switch has two VLANs configured, with one port on each VLAN.
Workstations in VLAN 1 can only communicate with other workstations in VLAN 1. This
means that workstations connected to the same switch in this example cannot communicate
directly with each other. Communications between workstations within each VLAN must
pass through the trunk link to the other switch.
Access ports are connected to endpoint devices (such as workstations), while trunk
ports are connected to other switches.
By default, trunk ports carry traffic for all VLANs between switches. However, you
can reconfigure a trunk port so that it carries only specific VLANs on the trunk link.
When trunking is used, frames that are sent over a trunk port are tagged with the VLAN ID
number so the receiving switch knows which VLAN the frame belongs to. In VLAN tagging:
Tags are appended by the first switch in the path and removed by the last.
A trunking protocol defines the process that switches use to tag frames with a VLAN ID. One
widely implemented trunking protocol is the IEEE 802.1Q standard, which supports a wide
range of switches from many device manufacturers. 802.1Q supports VLAN numbers 1
through 4094.
With 802.1Q trunking, frames from the default VLAN are not tagged, but frames from all
other VLANs are tagged. For example, suppose VLAN 1 is the default VLAN on a switch
(the default setting on most Cisco switches). In this configuration, any frame on VLAN 1 that
is placed on a trunk link will not be assigned a VLAN tag. If a switch receives a frame on a
trunk port that doesn't have a VLAN tag, the frame is automatically put onto VLAN 1
4. Computers A and B are on the same VLAN and are separated by two switches, as shown
below. Computer A sends a frame to Computer B. Find that the composition of the frame as
it travels from A to B?
SOLUTION:
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The
second switch removes the VLAN ID before forwarding it to Computer B.
SOLUTION:
UNIT-III
1. You manage a server that runs your company website. The web server has reached its
capacity and the number of client requests is greater than the server can handle. Find the
solution so that static web content can be offloaded to a different server, while the web server
continues to process dynamic content?
SOLUTION:
2. Based on the following diagram find the type of the proxy server is handling the client’s
request?
3. Which solution should you use when you have been given a laptop to use for work. You
connect the laptop to your company network, use it from home, and use it while traveling
and also you want to protect the laptop from Internet-based attacks?
SOLUTION:
Host-based firewall
4. Explain in detail about Network Ports that correspond to common Internet services.
SOLUTION:
Well known ports range from 0 to 1023 and are assigned to common protocols and
services.
Registered ports range from 1024 to 49151 and are assigned by ICANN to a specific
service.
Dynamic (also called private or high) ports range from 49152 to 65535 and can be
used by any service on an ad hoc basis. Ports are assigned when a session is
established, and ports are released when the session ends.
The following table lists the well-known ports that correspond to common Internet services:
Port(s) Service
23 TCP Telnet
161 UDP
Simple Network Management Protocol (SNMP)
162 TCP and UDP
443 TCP and UDP HTTP over Secure Sockets Layer (HTTPS)
To protect a server, ensure that only the necessary ports are open. For example, if the server
is being used only for email, then shut down ports that correspond to FTP, DNS, HTTP, etc.
UNIT-IV
1. Draw a neat sketch of WAN structure and explain about the WAN technologies.
SOLUTION:
1. T-carrier systems
2. E-carrier systems
2. Assume that you are travel away from the office. While traveling, you would like to use a
modem on your laptop computer to connect directly to a server in your office and access files
on that server that you need and also you want the connection to be as secure as possible Which
type of connection will you need? Explain.
SOLUTION:
SOLUTION:
Firewalls use access control lists (ACLs) to manage incoming or outgoing traffic. You should
be familiar with the following characteristics of an ACL:
ACL entries:
When created, an ACL usually contains an implicit deny any entry at the end of the
list.
Each router interface can have up to two ACLs for each protocol: one for incoming
traffic and one for outgoing traffic.
Each ACL can be applied to more than one interface. However, each interface can have
only one incoming and one outgoing list.
ACLs can be used to log traffic that matches the list statements.
Many hardware routers, such as those from Cisco, also provide a packet filtering firewall.
These devices are frequently used to fill both network roles (router and firewall) at the same
time.
When you create an ACL on a Cisco device, a deny any statement is automatically added at
the end of the list (this statement does not appear in the list itself). For a list to allow any traffic,
it must have at least one permit statement that either permits a specific traffic type or permits
all traffic not specifically restricted.
There are two general types of access lists used on Cisco devices:
Standard ACLs:
o 1–99
o 1300–1999
Extended ACLs:
o 100–199
o 2000–2699
SOLUTION:
1. Which tool should you use when you have a WAN link that connects two sites? The WAN
link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual
bandwidth of the link.
SOLUTION:
2. Assume that Cisco devices send all log messages for all severity levels to the console. If a
network contains a limited number of devices, this default configuration is usually acceptable.
However, on a large network, it is impractical to visit each device to view log messages.
Instead, you can configure your Cisco devices to redirect logging to a syslog server somewhere
in the network. Write down the commands to implement log redirection.
SOLUTION:
Command Action
(config)#logging
host [address] Specifies the host IP address or hostname of the
(config)#logging syslog server that will receive the messages.
host [hostname]
{Informational | 6} - Informational
messages only
In the following example, the router is configured to redirect log messages with a severity
level of 4 and lower to a syslog server with an IP address of 17.17.8.200:
Router(config)#logging on
Router(config)#logging host 172.17.8.200
Router(config)#logging trap 4
SOLUTION:
%LINEPROTO
4. What must be done to ensure that you are protected against data loss even if you perform
regular backups?
SOLUTION: