How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 class C network?

How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 class C network?

B. 6 networks and 30 hosts.
C. 8 networks and 32 hosts.
D. 32 networks and 18 hosts.
E. 14 networks and 14 hosts.
F. None of the above

Answer: E

Explanation:
A 28 bit subnet mask (11111111.11111111.11111111.11110000) applied to a class C network uses a 4 bits for networks, and leaves 4 bits for hosts. Using the 2n-2 formula, we have 24-2 (or 2x2x2x2-2) which gives us 14 for both the number of networks, and the number of hosts.


Incorrect Answers:
A. This would be the result of a /29 (255.255.255.248) network.
B. This would be the result of a /27 (255.255.255.224) network.
C. This is not possible, as we must subtract two from the subnets and hosts for the network and broadcast addresses.
D. This is not a possible combination of networks and hosts.

Which of the following is an example of a valid unicast host IP address?Which of the following is an example of a valid unicast host IP address?

Which of the following is an example of a valid unicast host IP address?

A. 172.31.128.255./18
B. 255.255.255.255
C. 192.168.24.59/30
D. FFFF.FFFF.FFFF
E. 224.1.5.2
F. All of the above


Answer: A

Explanation
The address 172.32.128.255 /18 is 10101100.00100000.10|000000.11111111 in binary,
so this is indeed a valid host address.


Incorrect Answers:
B. This is the all 1's broadcast address.
C. Although at first glance this answer would appear to be a valid IP address, the /30 means the network mask is 255.255.255.252, and the 192.168.24.59 address is the broadcast address for the 192.168.24.56/30 network.

D. This is the all 1's broadcast MAC address
E. This is a multicast IP address.

You have a Class C network, and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following s

You have a Class C network, and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?

A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. None of the above


Answer: C
Explanation:
Using the 2n-2 formula, we will need to use 4 bits for subnetting, as this will provide for 24-2 = 14 subnets. The subnet mask for 4 bits is then 255.255.255.240.

Incorrect Answers:
A. This will give us only 2 bits for the network mask, which will provide only 2 networks.
B. This will give us 3 bits for the network mask, which will provide for only 6 networks.
D. This will use 5 bits for the network mask, providing 30 networks. However, it will provide for only for 6 host addresses in each network, so C is a better choice.

Which two of the addresses below are available for host addresses on the subnet 192.168.15.19/28?

A. 192.168.15.17
B. 192.168.15.14
C. 192.168.15.29
D. 192.168.15.16
E. 192.168.15.31
F. None of the above

Answer: A, C


Explanation:
The network uses a 28bit subnet (255.255.255.240). This means that 4 bits are used for the networks and 4 bits for the hosts. This allows for 14 networks and 14 hosts (2n-2).
The last bit used to make 240 is the 4th bit (16) therefore the first network will be 192.168.15.16. The network will have 16 addresses (but remember that the first address is the network address and the last address is the broadcast address). In other words, the networks will be in increments of 16 beginning at 192.168.15.16/28. The IP address we are given is 192.168.15.19. Therefore the other host addresses must also be on this
network. Valid IP addresses for hosts on this network are:

192.168.15.17-192.168.15.30.



Incorrect Answers:
B. This is not a valid address for this particular 28 bit subnet mask. The first network address should be 192.168.15.16.
D. This is the network address.
E. This is the broadcast address for this particular subnet.

1. PDUs at the Network layer of the OSI are called what?

1. PDUs at the Network layer of the OSI are called what?

A. Transport
B. Frames
C. Packets
D. Segments


ANS :
C. Protocol Data Units are used to define data at each layer of the OSI model. PDUs at the Network layer are called packets.

The Cisco Three-Layer Hierarchical Model

Most of us were exposed to hierarchy early in life. Anyone with older siblings learned what it was like to be at the bottom of the hierarchy. Regardless of where you first discovered hierarchy, today most of us experience it in many aspects of our lives. It is hierarchy that helps us understand where things belong, how things fit together, and what functions go where. It brings order and understandability to otherwise complex models. If you want a pay raise, for instance, hierarchy dictates that you ask your boss, not your subordinate. That is the person whose role it is to grant (or deny) your request. So basically, understanding hierarchy helps us discern where we should go to get what we need.Hierarchy has many of the same benefits in network design that it does in other areas of life.

When used properly, it makes networks more predictable. It helps us define which areas should perform certain functions. Likewise, you can use tools such as access lists at certain levels in hierarchical networks and avoid them at others.
Let’s face it: large networks can be extremely complicated, with multiple protocols, detailed configurations, and diverse technologies. Hierarchy helps us summarize a complex collection of details into an understandable model. Then, as specific configurations are needed, the model dictates the appropriate manner to apply them.

The following are the three layers and their typical functions:
> The core layer: Backbone
> The distribution layer: Routing
> The access layer: Switching

Each layer has specific responsibilities. Remember, however, that the three layers are logical and are not necessarily physical devices. Consider the OSI model, another logical hierarchy. The seven layers describe functions but not necessarily protocols, right? Sometimes a protocol maps to more than one layer of the OSI model, and sometimes multiple protocols communicate within a single layer. In the same way, when we build physical implementations of hierarchical networks,
we may have many devices in a single layer, or we might have a single device performing functions at two layers. The definition of the layers is logical, not physical.

What is Data Encapsulation?

When a host transmits data across a network to another device, the data goes through encapsulation:

it is wrapped with protocol information at each layer of the OSI model. Each layer
communicates only with its peer layer on the receiving device. To communicate and exchange information, each layer uses Protocol Data Units (PDUs).

These hold the control information attached to the data at each layer of the model. They are usually attached to the header in front of the data field but can also be in the trailer, or end, of it. Each PDU is attached to the data by encapsulating it at each layer of the OSI model, and each has a specific name depending on the information provided in each header. This PDU information
is read only by the peer layer on the receiving device. After it’s read, it’s stripped off, and the data is then handed to the next layer up.
Figure 1.23 shows the PDUs and how they attach control information to each layer. This figure demonstrates how the upper-layer user data is converted for transmission on the network. The data stream is then handed down to the Transport layer, which sets up a virtual circuit to the receiving device by sending over a synch packet. Next, the data stream is broken up into smaller pieces, and a Transport layer header (a PDU) is created and attached to the header of the data field; now the piece of data is called a segment. Each segment is sequenced so the data stream can be put back together on the receiving side exactly as it was transmitted.
Each segment is then handed to the Network layer for network addressing and routing through the internetwork. Logical addressing (for example, IP) is used to get each segment to the correct network. The Network layer protocol adds a control header to the segment handed down from the Transport layer, and what we have now is called a packet or datagram. Remember that the Transport and Network layers work together to rebuild a data stream on a receiving host, but it’s not part of their work to place their PDUs on a local network segment—which is the only way to get the information to a router or host.

It’s the Data Link layer that’s responsible for taking packets from the Network layer and placing them on the network medium (cable or wireless). The Data Link layer encapsulates each packet in a frame, and the frame’s header carries the hardware address of the source and destination hosts. If the destination device is on a remote network, then the frame is sent to a router to be routed through an internetwork. Once it gets to the destination network, a new frame is used to get the packet to the destination host.

What is Connection-Oriented Communication?

In reliable transport operation, a device that wants to transmit sets up a connection-oriented communication with a remote device by creating a session. The transmitting device first establishes a connection-oriented session with its peer system, which is called a call setup, or a threeway handshake. Data is then transferred; when finished, a call termination takes place to tear down the virtual circuit.

Looking at it, you can see that both hosts application programs begin by notifying their individual operating systems that a connection is about to be initiated. The two operating systems communicate by sending messages over the network confirming that the transfer is approved and that both sides are ready for it to take place. After all of this required synchronization takes place, a connection is fully established and the data transfer begins.

While the information is being transferred between hosts, the two machines periodically check in with each other, communicating through their protocol software to ensure that all isgoing well and that the data is being received properly.

What is The Transport Layer?

The Transport layer segments and reassembles data into a data stream. Services located in the Transport layer both segment and reassemble data from upper-layer applications and unite it onto the same data stream. They provide end-to-end data transport services and can establish a logical connection between the sending host and destination host on an internetwork.

Some of you are probably familiar with TCP and UDP already. (But if you’re not, no worries— I’ll tell you all about them in Chapter 2, “Internet Protocols.”) If so, you know that both work at the Transport layer, and that TCP is a reliable service and UDP is not. This means that application developers have more options because they have a choice between the two protocols when working with TCP/IP protocols.

The Transport layer is responsible for providing mechanisms for multiplexing upper-layer applications, establishing sessions, and tearing down virtual circuits. It also hides details of any network-dependent information from the higher layers by providing transparent data transfer.

What is The Session Layer?

The Session layer is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities. This layer also provides dialogue control between devices, or nodes. It coordinates communication between systems, and serves to organize their communication by offering three different modes: simplex, half duplex, and full duplex. To sum up, the Session layer basically keeps different applications’ data separate from other applications’ data.

The following are some examples of Session layer protocols and interfaces (according to Cisco):

Network File System (NFS) Developed by Sun Microsystems and used with TCP/IP and Unix workstations to allow transparent access to remote resources.

Structured Query Language (SQL) Developed by IBM to provide users with a simpler way to define their information requirements on both local and remote systems.

Remote Procedure Call (RPC) A broad client/server redirection tool used for disparate service environments. Its procedures are created on clients and performed on servers.

X Window Widely used by intelligent terminals for communicating with remote Unix computers, allowing them to operate as though they were locally attached monitors.

AppleTalk Session Protocol (ASP) Another client/server mechanism, which both establishes and maintains sessions between AppleTalk client and server machines. Digital Network Architecture Session Control Protocol (DNA SCP) A DECnet Session layer protocol.

What is The Presentation Layer?

The Presentation layer gets its name from its purpose: It presents data to the Application layer and is responsible for data translation and code formatting.

This layer is essentially a translator and provides coding and conversion functions. A successful data-transfer technique is to adapt the data into a standard format before transmission. Computers are configured to receive this generically formatted data and then convert the data back into its native format for actual reading (for example, EBCDIC to ASCII). By providing translation services, the Presentation layer ensures that data transferred from the Application layer of one system can be read by the Application layer of another one.


The OSI has protocol standards that define how standard data should be formatted. Tasks
like data compression, decompression, encryption, and decryption are associated with this
layer. Some Presentation layer standards are involved in multimedia operations too. The following serve to direct graphic and visual image presentation:

PICT A picture format used by Macintosh programs for transferring QuickDraw graphics.
TIFF Tagged Image File Format; a standard graphics format for high-resolution, bitmapped
images.

JPEG Photo standards brought to us by the Joint Photographic Experts Group.

Other standards guide movies and sound:
MIDI Musical Instrument Digital Interface (sometimes called Musical Instrument Device
Interface), used for digitized music.

MPEG Increasingly popular Moving Picture Experts Group standard for the compression and
coding of motion video for CDs. It provides digital storage and bit rates up to 1.5Mbps.

QuickTime For use with Macintosh programs; manages audio and video applications.

RTF Rich Text Format, a file format that lets you exchange text files between different word
processors, even in different operating systems.

what is World Wide Web (WWW)?

World Wide Web (WWW) Connects countless servers (the number seems to grow with each passing day) presenting diverse formats. Most are multimedia and can include graphics, text, video, and sound. (And as pressure to keep up the pace mounts, websites are only getting slicker and snappier. Keep in mind, the snazzier the site, the more resources it requires. You’ll see why I mention this later.) Netscape Navigator and IE simplify both accessing and viewing websites
A groan grasps the peanut near the offending anthology.