Está en la página 1de 5

Name: Lebohang J Tladi Icas no: 45539 Module Networks 101 Question One 1.

1 Refer to the shown figure 1.1 Figure 1.1

1.2

Refer to the shown figure 1.2 Figure 1.2

1.3

If the corrupted destination address does not match any station address in the network layer, the packet is lost. If the corrupted destination address matches on of the workstations, the frame is delivered to wrong station. The error detection mechanism, available in most data link layer protocols, will find the error and discard the frame. In both cases the source will somehow be informed using one of the data link control mechanisms. Before using the destination address in an intermediate or destination node, the packet goes through error checking that may help the node find the corruption with a high probability and discard the packet, normally the upper layer protocol will inform the source to resend packet. Most protocols issue a special error message that is sent back to the source. The errors between the nodes can be detected by data link layer control, but the error at the node (between input port and output port) of the node cannot be detected by the data link layer. Network layer interface because it describes the physical connections medium between hosts and its responsible for packet frame contents over different interfaces and low level protocols. Network layer it allows a movement of packets from source to destination to provide internetworking through Dialog control, then the session layer allows two systems to enter into a dialog to establish communication between two processes in either half-duplex or fullduplex. Application layer interface because it defines the communication format between the two (client and server) processes, and it provides the services necessary to perform specific user functions on the network. Translation is the process of running programs in two systems is usually exchanging information in the form of character strings, numbers. Encryption i.e. to carry sensitive information, a system must be able to ensure privacy. Data compression reduces the number of bits contained in the information.

1.4

1.5 1.6

1.7

1.8

Name: Lebohang J Tladi Icas no: 45539 Module Networks 101 Qustion two 2.1 Refer to the shown figure 2.1 Figure 2.1

LAN 1 B1 B4 B3 B2 B2

B1

LAN 2

B4

LAN 3

B3

LAN 1

B1

LAN 2

LAN 1

B3

LAN 2

B4 B4

B2

LAN 3

B3

B2

LAN 3

B3

Question three 3.1 DHCP server cannot be able to set-up appropriate configuration parameters for given network and you will experience problems with range or pool of available IP addresses, the correct subnet masks, plus gateway and name server address wont. Address in a network cannot be assigned to hosts. Then the DHCP wont be able to get its IP address and will not able to lease a new address. IP conflicts between two computers will normally render either one or both of them unusable for network operation. IP address that are already active on a local network, will receive pop-up error messages. It wont be able to request its DNS host record being updated and a DNS server wont provide clients with the valid IP address of the target host. Go to control panel/network connection/then right click on the connection you use and select properties, then after In the dialog labelled this connection uses the following items highlighting Internet protocol version 4 (IPv4) and click the newly selectable properties button from here you will be able to select configuration by DHCP (obtain an IP address automatically) or manual configuration (use the following IP address 1. A valid IP address, then right click subnet mask, correct gateway IP, and an actual DNS sever IP.)

3.2

Name: Lebohang J Tladi Icas no: 45539 Module Networks 101 3.3 Yes you can be able to modify the addressing properties remotely because remote networking is a type of network communication that enables users to access resources that are not at their physical locations provided that remote computer uses an established connection mechanism to attach to the network, and it dials in to a single machine or it can be a full-service connection with the same functionality the user would have at the office. It only needs to take one of three basic forms: remote access, remote control and terminal services. The above situation can be used with a form of remote control. Remote control uses a special software package that enables a remote client to take over a host computer on the network, once connected the remote client can send a keyboard and mouse data and receive screen information. All job processing and execution happens on the host computer. Question four 4.1 I would recommend that all the buildings to use a Fiber Optic Cable because it comprises light-conducting glass, encased in plastic fibers and surrounded by a protective cladding and a durable outer shealth. It can support data rates up to 4 Gbps which is great for building 4 for video conferencing, and it doesnt carry electricity which is ideal for the buildings 1, 2, 3 to be used in hazardous, high-voltage, or secure environments in the medical instrument building. The media to connect the buildings would be a T1 line because of an end to end point solution to a Fiber Optic Cable which runs a distance ranging from 2km to 25km if the buildings are not in a close radius. The company should request a media type that is a T-carrier leased line, cable modem, DSL, Frame Relay that are supporting high-speed broadband connection.

4.2

4.3

Question five 5.1 Nestat-nav is the utility that can be used. The Netstat utility shows the status of each active network connection Netstat will display statistics for both TCP and UDP, including protocol, local address, foreign address, and the TCP connection state, because UDP is connectionless, no connection information will be shown for UDP packets. Netstat is full-featured program with options arranged into groups-each of which shows a particular type of information about the operation of TCP/IP protocol suite. Netstat is more limited in function but still shows important information about the active connections. There are several options available to use with netstat command e.g. nestat a it display all connection and listening ports. To solve this problem, you can use the ARP utility to view your local ARP table and see which TCP/IP address is resolved to which MAC address. To display the entire current ARP table, use the ARP command with the a switch, like this: arp a Youll see something similar to the following: Interface: 204.153.163.3 on Interface 2 Internet Address Physical Address Type 204.153.163.2 00a0c9d4bcdc dynamic 204.153.163.4 00a0c0aab145 dynamic From this output, you can tell which MAC address is assigned to which IP address. Then for static assignments, by examining your network documentation, you can tell which workstation has the IP address and if it is indeed supposed to have it. For DHCP assigned

5.2

Name: Lebohang J Tladi Icas no: 45539 Module Networks 101 addresses, you can begin to uncover problems with multiple DHCP scopes or servers giving out identical addresses and other somewhat common configuration issues. Question six 6.1.1 The default gateway for the network with client 2 and client 5 is set in correctly and probably the subnet mask for clients 2 and client 5 is being set incorrectly The default subnet mask of class B is 255.255.0.0. The company requires a minimum of 300 sub-networks so we have to use at least 512 sub-networks (because 512 is the minimum power of 2 and greater than 300). Therefore we need to get 9 bits for network mask (29=512), leaving 7 bits for hosts which is 27-2 = 126 > 50 hosts per subnet.

6.1.2

Name: Lebohang J Tladi Icas no: 45539 Module Networks 101

References
http://www.answers.com/topic/tone-generator#ixzz1XMPzZGrZ Data Communications and Networking Behrouz A. Forouzan.fourth edition Network Guide CANON LATIN AMERICA, INC. 703 Waterford Way Suite 400 Miami, Florida 33126 U.S.A. Oracle Solaris 10 9/10 Installation Guide: Network-Based Installations The TCP/IP Guide (http://www.TCPIPGuide.com) Version 3.0 - Version Date: September 20, 2005 Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved. Testbusters.Net NET+ Certification 2005 Exam Objectives System Administration Guide: IP Services STREAMS Programming Guide Writing Device Drivers

PC TRAINING & BUSINESS COLLEGE LEARNER GUIDE MODULES: NETWORKS 101 (1ST SEMESTER)

También podría gustarte