You are on page 1of 3

RATHNAVEL SUBRAMANIAM COLLEGE OF ARTS AND SCIENCE

(AUTONOMOUS) SULUR, COIMBATORE- 641 402


SCHOOL OF COMPUTER STUDIES (UG)
B.Sc. INFORMATION TECHNOLOGY
ADVANCED IP SERVICES
Semester-V
Batch : 2016-2019

Assignment-I (UNIT-I)

1. Examine the concept of VLAN by creating two Broadcast Domains with two physical switches
and No VLANs.

2. Illustrate the common reasons for choosing to create smaller broadcast domains
VLANs.
VIRTUAL TAGGING CONCEPTS

3. How trunking creates one link between switches that supports as many VLANs?

VLAN TRUNK

4. You have implemented VLAN trunking on your network. You have two switches that are both
configured dynamic auto mode. You discover that they are not trunking. Which of the trunking
configuration options can be used to make these two switched trunk successfully?

VLAN TRUNKING CONFIGURATION

5. You have entered the following command to enable dynamic trunking configuration. If the
switch interface is connected to another switch, what will it attempt to do?
Switch(config-if)#switchport mode dynamic desirable

6. Exhibit three statements that are correct with regard to the IEEE 802.1Q standard?

Assignment-II (UNIT-II)

1. You are currently using EIGRP on your network. Which of the following would you gain by
switching to OSPF?

1. Hierarchical network design


2. Open standard
2. Devise the OSPF hello packet Information in detail.

3. RTR1, RTR2 and RTR3 have been configured to use the OSPF protocol. RTR1 and RTR2 are
neighbors; RTR3 and RTR2 are also neighbors. RTR2 fails to receive a hello packet from RTR3
within the dead interval. Find what happens next?

RTR2 declares RTR3 to be down

4. You want to prevent all interfaces on a router from sending or responding to OSPF Hello
messages. What command should you use?

5. What are DRs and BDRs used for when using the OSPF routing protocol? Explain.

6. Assume that you want two routers to share routing information with each other using the
OSPF routing protocol. What happen for these two routers to become neighbors over their serial
interfaces?

i. They must be configured with matching areas.


ii. They must have a shared data link.

Assignment-III (UNIT-III)

1. Your company is running IGRP using an AS of 10. You want to configure EIGRP on the network
but want to migrate slowly to EIGRP and don't want to configure redistribution. What command
would allow you to migrate over time to EIGRP without configuring redistribution?

2. What Does the Word Serno Mean on the end of an EIGRP Topology entry When you issue the
Show Ip Eigrp Topology Command?

3. Is it normal that EIGRP takes over 30 Seconds to Converge? Explain.

4. What percent of bandwidth and processor resources does eigrp use? Explain.

5. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
R1 and R2 could not establish an EIGRP adjacency. What is the problem?

6. Assuming that EIGRP is enabled on both routers and automatic summarization is enabled, what
must be configured to ensure that R1 will be able to reach the 2.2.2.0/24 network?
Assignment-IV (UNIT-IV)

1. Describe the attributes that extended ACLs can used to filter network traffic.

i. Extended ACLs can filter network traffic based on source protocol

ii. Extended ACLs can filter network traffic based on destination hostname or host IP
address.

2. What command could you use to create an access list that denies all TCP traffic originating from
any host on network 192.168.1.0 that is destined for any host on network 199.66.220.0?

access-list deny tcp 192.168.1.0 0.0.0.255 199.66.220.0 0.0.0.255

3. Assume that you want to create an ACL that prevents traffic from network A that is sent to host
1. You want the ACL applied after the routing decision is made. What would be the part of your
design?

4. A network administrator needs to configure a standard ACL so that only the workstation of the
administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router.
Which two configuration commands can achieve the task?

Assignment-V (UNIT-V)

1. Draw a neat sketch of Generic 802.1x Authentication Flows and EAP and Radius Protocol Flows
with 802.1x.

2. Write down the commands for AAA Authentication to restrict the other users to a network.
3. Explain the structure of DHCP Snooping Binding Database enabled switch with a neat sketch.
4. Distinguish between TACACS+ and RADIUS.

5. Which command will apply DHCP snooping globally after enabling the DHCP Snooping feature?

****

You might also like