Uploaded by KATZ CARRIEZ

Module 9 Reading Organizer - Student Version (1)

advertisement
Name _______________________________________________________ Date ________________
Module 9 – Address Resolution
Introduction to Networks – Semester 1
Student Version
Module 9 Sections:
9.0 Introduction
9.1 MAC and IP
9.2 ARP
9.3 Neighbor Discovery
9.4 Module Practice and Quiz
Required Materials:
Reading Organizer
Packet Tracer Activities:
9.1.3 - Identify MAC and IP Addresses
9.2.9 - Examine the ARP Table
9.3.4 - IPv6 Neighbor Discovery
Labs: None
Module’s 8 – 10 Exam
1
CCNA R&S v7.0 - Semester 1 – Introduction to Networks
Emily Corcoran & Robb Jones
Module 9
Frederick County Career & Tech Center, MD, USA
2
CCNA R&S v7.0 - Semester 1 – Introduction to Networks
Emily Corcoran & Robb Jones
Module 9
Frederick County Career & Tech Center, MD, USA
Page intentionally left blank.
Points__________ / ___64___
Name__________________________________________________________ Date ________________
Module 9 – Address Resolution
Introduction to Networks – Semester 1
Student Version
Note: The Reading Organizer has weighted scoring. Any question with the word explain, define, or
describe in it is expected to have a longer answer and is worth two points each.
After completion of this chapter, you should be able to:
●
●
●
Compare the roles of the MAC address and the IP address.
Describe the purpose of ARP.
Describe the operation of IPv6 neighbor discovery.
9.1 MAC and IP
1. Explain how flat network design operates.
All devices in an organization are assigned an IP address with a matching network ID.
2. Define subnetting.
The process of segmenting a network, by dividing it into multiple smaller network spaces.
3. What device is required to forward traffic between different networks? Router
4. The address plan includes:
a. deciding the needs for each subnet in terms of size
b. how many hosts per subnet
c. how host addresses will be assigned
d. which hosts will require static IP addresses
e. which hosts can use DHCP for obtaining their addressing information
5. What are the three private IP addresses ranges?
a. 10.0.0.0 with
a subnet mask of 255.0.0.0
b. 172.16.0.0 with a subnet mask of 255.240.0.0
c. 192.168.0.0 with a subnet mask of 255.255.0.0
6. Who typically allocates public IP addresses?
Public addresses used to connect to the Internet are typically allocated from a service provider.
7. Two very important factors that will lead to the determination of which private address block is
3
CCNA R&S v7.0 - Semester 1 – Introduction to Networks
Emily Corcoran & Robb Jones
Module 9
Frederick County Career & Tech Center, MD, USA
required, are:
a. the number of subnets required
b. the maximum number of hosts needed per subnet
9.2 ARP
8. Where is the only place you can borrow bits from?
Bits can only be borrowed from the host portion of the address.
9. Explain the guidelines for subnets:
a. Network address–All 0 bits in the host portion of the address.
b. First host address–All 0 bits plus a right-most 1 bit in the host portion of the address.
c. Last host address–All 1 bits plus a right-most 0 bit in the host portion of the address.
D. Broadcast address–All 1 bits in the host portion of the address.
10. What command would you use to give a Gigabit interface the IP address and subnet mask
192.168.1.1 255.255.255.0?
R1(config)#interface gigabitethernet 0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
11. What is the formula for calculating the number of subnets?
2^n (where n = the number of bits borrowed)
12. Enter the correct network address in binary and decimal format.
13. How many usable hosts are available with this network?
14. Define the range of hosts, the broadcast address and the next network address in decimal format.
15. Enter the binary representation of the subnet mask in the octet fields provided.
16. Enter the network address in binary and decimal format in the octet fields.
17. Enter the number of usable hosts.
18. Define the range of
hosts, the broadcast address, and the next network address.
4
CCNA R&S v7.0 - Semester 1 – Introduction to Networks
Emily Corcoran & Robb Jones
Module 9
Frederick County Career & Tech Center, MD, USA
19. There are two considerations when planning subnets. These are:
a. the number of host addresses required for each network
b. the number of individual subnets needed
20. What is the key
to determine the number of subnets and hosts needed in a network?
The key is to balance the number of subnets needed and the number of hosts required for the
largest subnet.
21. How many addresses are needed for point-to-point WAN links?
Two hosts
22. What was subnetting a subnet, or using Variable Length Subnet Mask (VLSM), was designed to
avoid?
Wasting addresses.
23. Traditional subnetting creates subnets of equal size. Each subnet in a traditional scheme uses the
same subnet mask. What does VLSM allow?
VLSM allows a network space to be divided in unequal parts
24. When the number of needed host addresses is known, what formula is used to determine the
hosts?
2^n-2
25. There are three primary considerations when planning address allocation. List and explain each.
a.Preventing Duplication of Addresses–Each host in an internetwork must have a unique address.
Without the proper planning and documentation, an address could be assigned to more than one host,
resulting inaccess issues for both hosts.
b. Providing and Controlling Access–Some hosts, such as servers, provide resources to internal hosts as
well as to external hosts. The Layer 3 address assigned to a server can be used to control access to that
server. If, however, the address is randomly assigned and not well documented, controlling access is
more difficult.
5
CCNA R&S v7.0 - Semester 1 – Introduction to Networks
Emily Corcoran & Robb Jones
Module 9
Frederick County Career & Tech Center, MD, USA
c. Monitoring Security and Performance–Similarly, the security and performance of network hosts and
the network as a whole must be monitored. Aspart of the monitoring process, network traffic is
examined for addresses that are generating or receiving excessive packets. If there is proper planning
and documentation of the
network addressing, problematic network devices can be easily found.
26. W
ithin a network, there are different types of devices, including:
a. End user clients
b. Servers and peripherals
c. Hosts that are accessible from the Internet
d. Intermediary devices
e. Gateway
Cisco Semester 1
–
Introducti
on to Networks 5.0
Robb Jones
Chapter 9
Frederick County Career & Tech Center, MD
7
9.3 Design Considerations for IPv6
27. An IPv6 addres
s space is not subnetted to conserve addresses. Why is it subnetted?
It is subnetted to support hierarchical, logical design of the network.
28. An IPv6 address block with a /48 prefix has 16 bits for subnet ID. How many addresses are available
6
CCNA R&S v7.0 - Semester 1 – Introduction to Networks
Emily Corcoran & Robb Jones
Module 9
Frederick County Career & Tech Center, MD, USA
using t
he 16 bit subnet ID?
65,536 /64 subnets
How many bits are borrowed from the interface ID in this scenario?
None
29. How many addresses are available in each IPv6 /64 subnet?
Roughly eighteen quintillion addresses
30. In IPv4 you can borrow bits from
the host portion of an address Where can you borrow bits from in
IPv6 to create additional IPv6 subnets?
The interface ID
31. Explain why are bit borrowed in IPv6?
This is typically done for security reasons to create fewer hosts per subnet and not n
ecessarily
to create additional subnets.
32. When extending the subnet ID by borrowing bits from the interface ID, the best practice is to
subnet on a ___
nibble boundary___
.
33. What is a nibble?
It is 4 bits or one hexadecimal digit.
8
34. Sub
netting on nibble boundaries means only using nibble aligned subnet masks. Starting at /64, the
7
CCNA R&S v7.0 - Semester 1 – Introduction to Networks
Emily Corcoran & Robb Jones
Module 9
Frederick County Career & Tech Center, MD, USA
nibble aligned subnet masks are:
a. /68
b. /72
c. /76
d. /80
e. /84
f. /88
g. /92
35. It is possible to subnet within a nibble boundary, within a hexadecimal
digit, but it is not
recommended or even necessary. Explain why.
Subnetting within a nibble takes away the advantage easily determining the prefix from the
interface ID
9.3 Neighbor Discovery
5b.
anythe wildcard will match any address
37.
Write in the correct wildcard mask for each statement.
38.
Explain the guidelines for using ACLs.
a.
Use ACLs in firewall routers positioned between your internal network and an external
network such as the Internet.
b.
Use ACLs on a router positioned between two parts of your network to control traffic
8
CCNA R&S v7.0 - Semester 1 – Introduction to Networks
Emily Corcoran & Robb Jones
Module 9
Frederick County Career & Tech Center, MD, USA
entering or exiting a specific part of your intern
al network.
c.
Configure ACLs on border routers, that is, routers situated at the edges of your networks. This
provides a very basic buffer from the outside network, or between a less controlled area of
your own network and a more sensitive area of your
network.
6
d.
Configure ACLs for each network protocol configured on the border router interfaces.
39. List and explain the three Ps.
a.
One ACL per protocol
–
To control traffic flow on an interface, an ACL must be defined for each protocol enabled o
n the
interface.
b.
One ACL per direction
–
ACLs control traffic in one direction at a time on an interface. Two separate ACLs must be
created to control inbound and outbound traffic.
c.
One ACL per interface
–
ACLs control traffic for an interface, for example, GigabitEthernet 0/0
50.
Explain
the
two commands
that
are required to completely remove an ACL from a router?
8
a. To remove an ACL
from an interface, first enter the
no ip access
group
command on the
interface.
b. Then enter the global
9
CCNA R&S v7.0 - Semester 1 – Introduction to Networks
Emily Corcoran & Robb Jones
Module 9
Frederick County Career & Tech Center, MD, USA
no access
list
command to remove the entire ACL
.
51.
What is the advantage of naming an ACL?
Naming an ACL makes it easier to understand its functi
on
52. Capitali
zing ACL names is not required, so why should you do it anyway?
It
makes them stand out when viewing the running
config output.
53. Where can remark commands be placed in an ACL?
The remark can go before or after a
permit
or
deny
statement.
10
CCNA R&S v7.0 - Semester 1 – Introduction to Networks
Emily Corcoran & Robb Jones
Module 9
Frederick County Career & Tech Center, MD, USA
Download