...Tell me about yourself. My name is . I attend University of New York. I have completed the associate degree program of Network System Administration. I am pursing to finish the B.A. degree in Network Communication Management in June, and concentration in Cisco. I am 33, no kids, dedicated and ambitious in completing the B.A. degree, and initiating my career in the Network/IT field. My hobbies are working out, studying and preparing myself for future exams, and mastering my hands-on skills in configuring Cisco devices. I also like researching on future technology. I have a passion for sports, computers, and network infrastructure. Right now I am building a wired/wireless LAN in my home to practice on future exams. WHAT DID YOU EJOYED MOST/LEAST ABOUT YOUR PREVIOUS JOB? WHY? Meeting new people, and working with them and witness how they think and reacted in certain situation. That allowed me to experience and witness what to do when certain situations approached at any given time. The most I enjoyed about my previous job was they allowed me to do so many things. Why? My manager called me a floater. Both of them informed my position wasn’t created for other interns, because they both noticed I don’t like to stand still, I like to be mobile and eager to learn. When I started out I wondered why I was in helpdesk, but helped the remote department upgrade PC components and OS, upgrading routers configuration templates. I did this for 6 months. I went to my manager and asked can...
Words: 1404 - Pages: 6
...Study Guide CISCO SYSTEMS NETWORKING Academy CCNA 2 Chapter 1 WANs and Routers One major characteristic of a wide-area network (WAN) is that the network operates beyond the local LAN's geographic scope. It uses the services of carriers, such as regional Bell operating companies (RBOCs), Sprint, and MCI. WANs use serial connections of various types to access bandwidth over wide-area geographies. By definition, the WAN connects devices that are separated by wide areas. WAN devices include the following: • • • • • • Routers, which offer many services, including internetworking and WAN interface ports Switches, which connect to WAN bandwidth for voice, data, and video communication Modems, which interface voice-grade services and channel service units/digital service units Channel service units/data service units (CSUs/DSUs) that interface T1/E1 services and Terminal Adapters/Network Termination 1 (TA/NT1s) TA/NT1s that interface Integrated Services Digital Network (ISDN) services Communication servers, which concentrate on dial-in and dial-out user communication Concept Questions 1. A WAN is used to interconnect local-area networks (LANs) that are typically separated by a large geographic area. A WAN operates at the OSI reference model physical and data link layers. The WAN provides for the exchange of data packets/frames between routers/bridges and the LANs that they support. Draw a WAN that includes three LANs. 1 of 116 CCNA 2 Chapter 1 WANs and Routers 2. Compare and contrast...
Words: 23437 - Pages: 94
...CCNA Exploration 2: Chapter 2 toets antwoorden / CCNA Routing Protocols and Concepts exam 2 answers CCNA Exploration 2: Routing Protocols and Concepts Chapter 2 Exam Answers 1. What happens to a static route entry in a routing table when the outgoing interface is not available? The route is removed from the table. The router polls neighbors for a replacement route. The route remains in the table because it was defined as static. The router redirects the static route to compensate for the loss of the next hop device. 2. The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud? 192.1.1.0/26 and 192.1.1.64/27 192.1.1.128/25 192.1.1.0/23 and 192.1.1.64/23 192.1.1.0/24 192.1.1.0/25 192.1.1.0/24 and 192.1.1.64/24 [pic] 3. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.) ping show arp traceroute show ip route show interface show cdp neighbor detail 4. Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded? Router1 will perform recursive lookup and packet will exit S0/0. Router1 will perform recursive lookup and packet will exit S0/1. There is no matching interface associated with network 172.16.0.0 so packets will...
Words: 1947 - Pages: 8
...IT, Web Routing Name: Institution: Routing A router is a network device capable of passing data between two networks. The most basic reason for using a router is to connect a LAN to the internet (Lowe, 2013). A bridge on the other hand sits between two types of networks, for example between an Ethernet and wireless (Pomerleau, 2009) Routers can be helpful under the following circumstances. To begin with, routers are capable of connecting different network architectures such as Ethernet and Token Ring networks and so if it is expected that the LAN network in our case will need to use different network architectures in the future, then routers will be best choice. Second, a router is more efficient than a bridge because a router will process information that is specifically addressed to it where as a bridge processes all messages it receives. Therefore, a router would increase network data processing speed thus will end up with an efficiently working network when using a router than when using a bridge. Next, routers are advantageous in circumstances when an organization needs to communicate to the external environment and therefore routers are capable of connecting to a Wide Area Network (WAN) such as the internet (Ogletree 2004). The capacity to connect to the external environment enables the organization to be in contact to the government for information on taxation as well as connection to customers, suppliers and even competitors. Furthermore, routers are efficient...
Words: 1275 - Pages: 6
...CCNA 1 Chapter 1 V4.0 1. Which of the following descriptions are true regarding the management connections on a Cisco router? (Choose three.) They are non-network connections. They are used to connect the router to the rest of the production network. They are synchronous serial ports. They are used for initial router configuration. They are asynchronous serial ports. They are accessed using their assigned IP address. 2. The console port can be used for which of the following? (Choose three.) debugging. password recovery. routing data between networks. troubleshooting. connecting one router to another. 3. Which of the following describes the function of a WAN? connects peripherals in a single location. connects multiple networks in a single building. provides connectivity on a LAN. provides connectivity over a large geographic area. 4. An internetwork must include which of the following? (Choose three.) switching. static addressing. IETF standardization. dynamic or static routing. consistent end-to-end addressing. 5. ABC Company just purchased three new routers to start their company network. Which items are needed to establish a terminal session between a PC and the router for the initial configuration? (Choose three.) straight-through cable. terminal emulation software. rollover cable. RJ-45 to DB-9 connector. V.35 cable. 6. Terminal emulation software, such as HyperTerminal, can be used to configure a router. Which of the following HyperTerminal...
Words: 1042 - Pages: 5
...CCNA 2 Chapter 5 V4.0 1.Refer to the exhibit. The network that is shown is running RIPv1. The 192.168.10.0/24 network was recently added and will only contain end users. What command or set of commands should be entered on Router1 to prevent RIPv1 updates from being sent to the end user devices on the new network while still allowing this new network to be advertised to other routers? -Router1(config-router)# no router rip Router1(config-router)# network 192.168.10.0 -Router1(config-router)# no network 192.168.10.0 *Router1(config-router)# passive-interface fastethernet 0/0 -Router1(config-router)# passive-interface serial 0/0/0 2.Refer to the output from the show ip route command. What can be concluded from the output of this router command? A preferred route to the destination has not been set. *There are two equal cost paths to network 1.0.0.0. -Both interfaces are being used equally to route traffic. -A variance must be set to load-balance across multiple paths. 3.Refer to the exhibit. The Ethernet interface on Router2 goes down and the administrator notices that the route is still in the Router1 routing table. How much longer will Router1 keep the down network in its routing table before marking it as possibly down? -30 seconds -90 seconds -180 seconds -255 seconds 4. What is the default update period in seconds for the RIP routing protocol? -10 -12 -15 -20 -30 -60 5. Which of the following is considered a limitation of RIP v1? *RIP v1 does not...
Words: 1513 - Pages: 7
...Laborotory Work OSPF MULTI AREA CONFIGURATION In this laboratory work you will learn: * Use OSPF MultiArea protocol ; * Encrypted Ospf protocol; Note: The routers used CCNA labs are Cisco 2911 Cable the network as shown in the topology. Attach the devices as shown in the topology diagram, and cable as necessary. Configure PC hosts. Initialize and reload the routers and switches as necessary. Configure basic settings for each router. Configure routing. Configure OSPF on the routers in area 1 with process ID of 100, in area 0 with process ID of 110, in area 2 with 200. R6(config)#router ospf 100 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 192.168.1.0 0.0.0.255 area 1 R6(config)#router ospf 100 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 192.168.1.0 0.0.0.255 area 1 R2(config)#router ospf 110 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 9.0.0.0 0.255.255.255 area 1 R6(config-router)#network 30.0.0.0 0.255.255.255 area 0 R2(config)#router ospf 110 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 9.0.0.0 0.255.255.255 area 1 R6(config-router)#network 30.0.0.0 0.255.255.255 area 0 * On R1 use the following commands #show ip route R1#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter...
Words: 1093 - Pages: 5
...1. User EXEC * Router> Privileged EXEC * Router# Global Configuration Router (config) # Line Configuration Interface Configuration Router Configuration Router (config-line) # Router (config-if) # Router (config-router) # 2. Document the router prompt and full command to change the name of Austin’s router to AUS. * Router(config)#hostname AUS 2. Document the router prompt and full commands to configure AUS with the two global passwords that can be used to enter privileged EXEC mode. Use class as the password. AUS(config)#enable password class AUS(config)#enable secret class 3. If both are configured, which can serve as the password, and do you need to configure both? If both are configured, the enable secret password can be used. The enable password command is ignored. Therefore, you do not need to configure both. The enable password is still supported by the IOS for legacy purposes. Document the router prompt and full commands to configure the console port on AUS. Use the password cisco. * AUS(config)#line console 0 * AUS(config-line)#password cisco * AUS(config-line)#login * AUS(config-line)#exec-timeout 30 0 <--Optional * AUS(config-line)#logging synchronous <--Optional 5. Document the router prompt and full commands to configure the Telnet lines on AUS. Use the password cisco. AUS(config)#line vty 0 4 AUS(config-line)#password cisco AUS(config-line)#login AUS(config-line)#exec-timeout 30 0 <--Optional ...
Words: 2593 - Pages: 11
...1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 70 Vocabulary Exercise: Completion on...
Words: 2825 - Pages: 12
...CMIT 350 WAN and SOHO Skills Implementation Use this document as a guide for formatting and organizing your CMIT 350 Skills Implementation challenge. Title Page Professionalism will be key to your success and advancement in your academic and professional career. Use the title page to identify relevant information such as your name, the course, professor, and submission/completion date. Document Index/Contents Organization will allow your document to be divided into key areas of consideration and allows an overall structure to be placed over the submission. Sample text: I. Site “XXXXXXXX” Challenges and Implementation II. Site “XXXXXXXX” Challenges and Implementation III. Site “XXXXXXXX” Challenges and Implementation IV. Bibliography Site “XXXXXXXXXX” Challenge and Implementation (Provide a section for each site, as suggested in your table of contents.) Site Details and Challenges (Summary) Here, you will simply summarize the site requirements and/or challenges you are attempting to overcome. You will not need to implement solutions or discuss your approach at this point. This information is provided to you and can simply be organized and restated as you understand it. Think of this area as what needs to be corrected. Suggested length would be one or two paragraphs. Sample text: As described in the scenario, the xUMUC site was developed without any VLAN structure, and administrators have found the need to isolate broadcast traffic from a layer-2 perspective. Site...
Words: 663 - Pages: 3
...Routing & Router Configuration A Report to Critically Compare a Number of Routing Protocols; Including RIP v2, EIGRP & OSPF Paul McDermott CCNA 2 Table of Contents 1.0 Abstract 3 2.0 Introduction 4 3.0 Protocol overview 5 3.1 RIP v2 Overview 5 3.2 EIGRP Overview 6 3.3 OSPF Overview 6 4.0 Protocol Comparison 10 4.1 Topology Overview 10 4.2 Protocol Types 10 4.3 Administration Distance 10 4.4 Protocol Tables 11 4.5 Algorithm 11 4.6 Metric 12 4.7 Periodic Updates 12 4.8 Hierarchical / Scalable 12 4.9 Load Balance 13 4.10 Comparison Table 14 5.0 Conclusion 15 6.0 References 16 Abstract The following report is a critical comparison of three routing protocols; RIPv2, EIGRP and OSPF, detailing the protocol features, as well as their similarities and differences. The report takes an in-depth look at the technical elements and algorithms used in these protocols, such as Bellman Ford, DUAL, and the Dijkstra Algorithm; and how these algorithms are used to calculate the routing metric. The report also discusses the fact that EIGRP is the most desirable protocol to use on Cisco based routers, while OSPF can be used across different router manufacturers. While looking at the technical considerations that are needed in choosing a routing protocol for a desired network the report will also look into the CPU/memory requirements, and how difficult the protocol is to install and maintain...
Words: 4222 - Pages: 17
...RESUME K.Santosh Reddy Voice no: +91-9738833103 +91-800884149 Email-id: 123santoshreddy@gmail.com |ASPIRATIONS: | Looking for an opportunity to increase my competence, to develop, strive to utilize my potential and at the same time to contribute the aims of the company. |EDUCATIONAL BACKGROUND: | |Course |Institute/University |Percentage(%) |Year of Passing | |B.Tech (ECE) |BIT Institute of Technology(JNTU), |65.3 |2011 | | |Hindupur. | | | |Intermediate |Sri Chaitanya Jr.college, Tirupathi. |85.0 |2007 | |SSC |Sri valmeeki Residential Highschool, Kadiri. |87.0 |2005 | |WORK EXPERIENCE: ...
Words: 322 - Pages: 2
...Unit 8 1. List the major design issues of network layer 2. What is static routing? 3. Give example of dynamic routing algorithm 4. What are deadlocks 5. How the task of interconnecting all the subnets is achieved? 1. service provided to transport layer, routing, congestion prevention, internetworking, etc 2. Routing algorithm e into account the current topology changes, traffic changes, etc. 3. Distance vector routing. 4. Deadlock is a situation where the movements of packets in part or whole of the subnet comes to a standstill, which is jammed 5. The task of interconnecting all the subnets is achieved with the help of various networking devices ------------------------------------------------- 1. What is the type of routing algorithm called when the subnet uses virtual circuits internally? 2. Which routing dominates the Internet? 3. Define stability of routing algorithm 4. State and explain the optimality principle 5. Does the sink tree contain any loops? 1. session routing 2. Dynamic routing 3. A stable routing algorithm reaches or converges equilibrium. 4. Refer to section 8.3.4 ------------------------------------------------- 5. The sink tree does not contain any loops 1. Where are routing tables placed? 2. What are the different metrics used to find the route? 3. List the different labels used for the nodes in shortest path algorithm 4. Give one measure to control large packets when flooding is used 5. What is selective flooding? ...
Words: 475 - Pages: 2
...Main functions of the McAfee Web Gateway appliance Filtering web traffic is a complex process. The main functions of the appliance contribute to it in different ways: • Filtering web objects — Special anti-virus and anti-malware functions on the appliance scan and filter web traffic and block web objects when they are infected. Other functions filter requested URLs, using information from the Global Threat Intelligence™ system, or do media type and HTML filtering. They are supported by functions that do not filter themselves, but do such jobs as counting user requests or indicating the progress made in downloading web objects. • Filtering users — This is done by the authentication functions of the appliance, using information from internal and external databases and methods such as NTLM, LDAP, RADIUS, Kerberos, and others. In addition to filtering normal users, the appliance also gives you control over administrator rights and responsibilities. • Intercepting web traffic — This is a prerequisite for any filtering of web objects or users. It is achieved by the gateway functions of the appliance, using different network protocols, such as HTTP, HTTPS, FTP, Yahoo, ICQ, and Windows Live Messenger. As a gateway, the appliance can run in explicit proxy mode or in transparent bridge or router mode. • Monitoring the filtering process — The monitoring functions of the appliance provide a continuous overview of the filtering process. They include a dashboard, displaying...
Words: 755 - Pages: 4
...(Name) (Instructors’ name) (Course) (Date) Network Management and Security A telecommunication Management Network, commonly known as TMN, is an infrastructure that provides interfaces for connection between several types of operating systems and telecommunications equipment, so as to manage the telecommunication service and network. This is from Glenn Warnock and Nathoo Amin (215). Also, it enables the functioning of the management information, which is exchanged through these interfaces. On the other hand, 5620 SAM is widely used for developing distributed systems, as it provides the infrastructure for interoperability of several object oriented management applications. With this application, the 5620 enables applications of operating systems to interoperate with the service access manager, allowing it to provide connections, isolate and manage network issues across an Alcatel network (225). With this, users can access management information transparently and independent of the hardware and software platform. This therefore enhances the portability of applications, which are developed across the multiple platforms of management. The principles and concepts of the TMN that can be matched with the features and functions of the 5620 platforms include the specification translation and the interaction translation. Redundancy is also an important feature. It is the automatic transfer of data network to stand by, and protects the network against hardware failure, software...
Words: 2230 - Pages: 9