Assignment 8
Assignment 8
Assignment 8
Beginner Question
1. Explain Switch
Ans. Switches are networking devices operating at layer 2 or a data link layer of the OSI model.
They connect devices in a network and use packet switching to send, receive or forward data
packets or data frames over the network.
A switch has many ports, to which computers are plugged in. When a data frame arrives at any
port of a network switch, it examines the destination address, performs necessary checks and
sends the frame to the corresponding device(s).It supports unicast, multicast as well as
broadcast communications.
Ans. 1. First, the switch loads a power-on self-test (POST) program stored in ROM. POST checks
the CPU subsystem. It tests the CPU, DRAM, and the portion of the flash device that makes up
the flash file system.
2. Next, the switch loads the boot loader software. The boot loader is a small program stored in
ROM and is run immediately after POST successfully completes.
3. The boot loader performs low-level CPU initialization. It initializes the CPU registers, which
control where physical memory is mapped, the quantity of memory, and its speed.
4. The boot loader initializes the flash file system on the system board.
5. Finally, the boot loader locates and loads a default IOS operating system software image into
memory and hands control of the switch over to the IOS.
Ans. You can access the CLI through a console connection, through Telnet, a SSH, or by using the
browser. You manage the switch stack and the stack member interfaces through the active
switch.
Ans. Cisco IOS (Internetwork Operating System) is a proprietary operating system that runs on
Cisco Systems routers and switches. The core function of Cisco IOS is to enable data
communications between network nodes.
In addition to routing and switching, Cisco IOS offers dozens of additional services that an
administrator can use to improve the performance and security of network traffic. Such services
include encryption, authentication, firewall capabilities, policy enforcement, deep packet
inspection, Quality of Service (QoS), intelligent routing and proxy capability. In Cisco's
Integrated Services Routers (ISRs), IOS can also support call processing and unified
communications services.
Cisco IOS software releases are organized into what Cisco calls "families" and "trains." Each
family shares the same code base and trains are how new IOS releases are delivered.
IOS XE - runs on top of a Linux kernel. IOS XE and IOS share a lot of the same code, but IOS XR is
considered to be a completely different code base.
IOS XR - based on QNX a commercial Unix-like real-time operating system. IOS XR supports
software-defined networking (SDN) and the embedded systems market.
Ans. It is a smart network device that functions as a multiport network bridge. It sends data
packets to designated destination ports using MAC addresses (addresses of the media access
control sublayer). It receives and forwards data packets from the source to the destination
device using the packet switching technology.
enable, enter
Configure terminal, enter
enable Password (Password is cisco) enter,
Logout, enter.
7. Configure Line Password Settings on a switch
Enable, enter
Configure terminal, enter
Line console 0, enter
Password (password is Aryan) enter
8. Configure Password Settings on a switch
Ans. Type the below commands
enable, enter
Configure terminal,
Enter enable Password (Password is Aryan) enter,
Logout, enter.
9. Configure IPv4 on a switch
enable, enter
Configure terminal,
int vlan 1
Ip address 10.0.0.2 255.0.0.0
no shutdown
10.Verifying IPv4 on a switch
Ans. To verify the IP address set on a switch, we can use the show int vlan 1 command:
Ans. A virtual LAN (VLAN) is a logical overlay network that groups together a subset of devices
that share a physical LAN, isolating the traffic for each group. A LAN is a group of computers or
other devices in the same place -- e.g., the same building or campus -- that share the same
physical network.
Ans. VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition
of Virtual Local Area Networks (VLAN) on the whole local area network. To do this, VTP carries
VLAN information to all the switches in a VTP domain. VTP advertisements can be sent over
802.1Q, and ISL trunks.
Ans. The Cisco Discovery Protocol (CDP) is a network discovery tool, which assists network
administrators and engineers in identifying neighboring Cisco devices, particularly those running
lower-layer, transparent protocols.
The Spanning Tree Protocol (STP) is responsible for identifying links in the network and shutting
down the redundant ones, preventing possible network loops. In order to do so, all switches in
the network exchange BPDU messages between them to agree upon the root bridge.
Ans. IPv4 allows for a variation of the network and host segments of an IP address, known as
subnetting, can be used to physically and logically design a network.
Ans. A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network
bits to all 1s. In this way, the subnet mask separates the IP address into the network and host
addresses.
We are all familiar with the base 10 number system that we use in our every day lives. The base
10 number system is just one example of a positional number system. In a positional number
system a number is represented as a series of digits, where each digit position is associated with
a weight. For example, the number representing the year 2003 can be represented as follows:
position 3 2 1 0
As you can see, each weight is the power of 10 to the number position starting at 0. The
For example, the hexadecimal number 123 is represented as follows: 123 = 1 * 162 + 2 * 161 + 3
* 160 * 0 = 1 * 256 + 32 + 3 = 291 (base 10)
In a hexadecimal system, it is necessary to count to 15. To represent the numbers 10 – 15, the
letters A – F are used respectively. To distinguish the different number systems, suffixes or
subscripts are often used.
The following table compares all three systems counting from 0 to 15.
0 0000 0
1 0001 1
2 0010 2
3 0011 3
4 0100 4
5 0101 5
6 0110 6
7 0111 7
8 1000 8
9 1001 9
10 1010 A
11 1011 B
12 1100 C
13 1101 D
14 1110 E
19. Describe the Need for Public IPv4 and Private IP Addressing
Ans. A public IP address identifies you to the wider internet so that all the information you're
searching for can find you. A private IP address is used within a private network to connect
securely to other devices within that same network.
Ans. One part identifies the network (the network number) and the other part identifies the
specific machine or host within the network (the host number). Subnet masks (IPv4) and prefixes
(IPv6) identify the range of IP addresses that make up a subnet, or group of IP addresses on the
same network.
Ans. Connect an ethernet cable to one of the ports at the back of the switch, then connect the
other end to one of the ethernet ports at the back of the router.
Ans.
Ans.
Go to lab A
Enable, enter
Configure terminal, enter
Interface serial 0/0, enter
Ip address 192.168.1.1 255.255.255.0, enter
No shutdown, enter
Exit, enter
Interface fastethernet 0/0, enter
Ip address 192.168.2.1 255.255.255.0, enter
No shutdown, enter
Go to lab B
Enable, enter
Configure terminal, enter
Interface serial 0/0, enter
Ip address 192.168.1.2 255.255.255.0, enter
No shutdown, enter
Exit, enter
Interface fastethernet 0/0, enter
Ip address 192.168.3.1 255.255.255.0, enter
No shutdown, enter
24. Create Static Routes
conf t
int gi0/0/0
ip address 10.10.10.1 255.255.255.248
no shutdown
exit
int gi0/0/1
ip address 192.168.1.1 255.255.255.0
no shutdown
exit
en
conf t
int gi0/0/0
ip address 10.10.10.2 255.255.255.248
no shutdown
exit
int gi0/0/1
ip address 192.168.2.1 255.255.255.0
no shutdown
exit
Ans. Use the Netstat ROUTE/-r command to display routes to the network. Verify whether
TCP/IP has a route to the destination. For information about the Netstat ROUTE/-r command,
see z/OS Communications Server: IP System Administrator's Commands. If there is no route,
proceed to step 3.
Ans. The OSPF protocol is a link-state routing protocol, which means that the routers exchange
topology information with their nearest neighbors. The topology information is flooded
throughout the AS, so that every router within the AS has a complete picture of the topology of
the AS.
Router is highest OSPF priority will become DR and router with second-highest priority will
become BDR. If the priority of the routers are same then, the router with the highest Router ID
is selected as DR and the router with second-highest Router ID is selected as BDR.
Ans. Open Shortest Path First (OSPF) is a link-state routing protocol that was developed for IP
networks and is based on the Shortest Path First (SPF) algorithm. OSPF is an Interior Gateway
Protocol (IGP).
In an OSPF network, routers or systems within the same area maintain an identical link-state
database that describes the topology of the area. Each router or system in the area generates
its link-state database from the link-state advertisements (LSAs) that it receives from all the
other routers or systems in the same area and the LSAs that itself generates. An LSA is a packet
that contains information about neighbors and path costs. Based on the link-state database,
each router or system calculates a shortest-path spanning tree, with itself as the root, using the
SPF algorithm.
Ans. An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an
Internet Protocol Version 6 (IPv6) network. IPv6 is the successor to a previous addressing
infrastructure, IPv4, which had limitations IPv6 was designed to overcome.
Ans. 6to4 tunnels are configured between border routers or between a border router and a
host. The simplest deployment scenario for 6to4 tunnels is to interconnect multiple IPv6 sites,
each of which has at least one connection to a shared IPv4 network. This IPv4 network could be
the global Internet or a corporate backbone.
Ans. Wireless technology provides the ability to communicate between two or more entities
over distances without the use of wires or cables of any sort. This includes communications
using radio frequency (RF) as well as infrared (IR) waves .
The birth of wireless technology started with the discovery of electromagnetic waves by
Heinrich Hertz (1857–1894). Guglielmo Marconi (1874–1937) established the very first
commercial RF communications, the wireless telegraph, in the late 1890s—more than fifty years
after the first commercial wired telegraph service that was demonstrated in 1832 by Samuel F.
B. Morse (1791–1872). Marconi was also the first to transmit radio signals to a mobile receiver
on ships in the early 1900s. Wireless technology has always been preceded by wired technology
and is usually more expensive, but it has provided the additional advantage of mobility,
allowing the user to receive and transmit information while on the move.
Another major thrust of wireless technology has been in the area of broadcast communications
like radio, television, and direct broadcast satellite. A single wireless transmitter can send
signals to several hundreds of thousands of receivers as long as they all receive the same
information. Today, wireless technology encompasses such diverse communication devices as
garage-door openers, baby monitors, walkie-talkies, and cellular telephones, as well as
transmission systems such as point-to-point microwave links, wireless Internet service, and
satellite communications.
Ans. A wireless device can refer to any kind of communications equipment that does not require
a physical wire for relaying information to another device. Wireless headphones fitted with a
receiver use either radio frequency (RF) or infrared technology to communicate with a
transmitter that is connected to the sound source, say a television. In most cases, however,
when someone refers to a wireless device, they are speaking of a networking device that can
pass data to other wireless network gear without being physically connected.
Ans. Wireless security is the prevention of unauthorized access or damage to computers or data
using wireless networks, which include Wi-Fi networks. The term may also refer to the
protection of the wireless network itself from adversaries seeking to damage the confidentiality,
integrity, or availability of the network. The most common type is Wi-Fi security, which includes
Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11
standard from 1997.[1] It is a notoriously weak security standard: the password it uses can often
be cracked in a few minutes with a basic laptop computer and widely available software tools. [2]
WEP was superseded in 2003 by WPA, a quick alternative at the time to improve security over
WEP. The current standard is WPA2;[3] some hardware cannot support WPA2 without firmware
upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-
bit key; the longer key length improves security over WEP. Enterprises often enforce security
using a certificate-based system to authenticate the connecting device, following the standard
802.11X.
Ans. Wi-Fi Protected Access Pre-Shared Key or WPA-PSK is a system of encryption used to
authenticate users on wireless local area networks. It's typically utilized by telecom companies
for end user access in home local area networks. WPA-PSK may also be called WPA Personal.
Connect the management port of the switch to the RJ45 port of the PC with an Ethernet
cable like Cat5e and Cat6 cables.
Power on the PC. ...
Type the username and password (admin/admin) in the login interface, then move on to
the configuration menu as shown below.
2. Explain Switch User Mode, Enable (Privileged) Mode and Global Configuration Mode
Ans. To enter global configuration mode, enter the configure command. Global configuration
From privileged EXEC mode, enter the configure command. To exit to privileged EXEC mode,
enter the exit or end command, or press Ctrl-Z. To enter interface configuration mode, enter the
interface configuration command.
Ans. In the simplest terms, a switch is a mechanism that allows us to interconnect links to form
a larger network. A switch is a multi-input, multi-output device that transfers packets from an
input to one or more outputs. Thus, a switch adds the star topology (see Figure 56) to the set of
possible network structures. A star topology has several attractive properties:
Even though a switch has a fixed number of inputs and outputs, which limits the number of
hosts that can be connected to a single switch, large networks can be built by
interconnecting a number of switches.
We can connect switches to each other and to hosts using point-to-point links, which
typically means that we can build networks of large geographic scope.
Adding a new host to the network by connecting it to a switch does not necessarily reduce
the performance of the network for other hosts already connected.
4. Explain SSH
Ans. SSH or Secure Shell is a network communication protocol that enables two computers to
communicate (c.f http or hypertext transfer protocol, which is the protocol used to transfer
hypertext such as web pages) and share data.
Ans. 1. enable
2. configure terminal
3. hostname hostname
4. ip domain-name domain_name
6. end
7. show running-config
Ans. Telnet is a network protocol used to virtually access a computer and to provide a two-
way, collaborative and text-based communication channel between two machines. It follows
a user command Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocol
for creating remote sessions.
show interfaces status command with no arguments. Specify a particular module number to
see information on the ports on that module only. Enter both the module number and the port
number to see detailed information about the specified port.
8. Configure VLAN
Enable, enter
Configure terminal, enter
VLAN (VLAN number), enter
Name “Aryan”, enter
Interface VLAN (VLAN id), enter
Ip address 192.168.0.1 255.255.255.0, enter
No shutdown, enter
9. Verifying VLAN
Ans. Use the show vlan command to verify your VLAN configuration. This command displays all
switchports and their associated VLAN as well as the VLAN status and some extra parameters
that relate to Token Ring and FDDI trunks.
Ans. 1. enable
2. configure terminal
3. interface (interface-id)
Ans. VLANs can be used for different groups of users, departments, functions, etc., without
needing to be in the same geographical area. VLANs can help reduce IT cost, improve network
security and performance, provide easier management, as well as ensuring network flexibility.
Ans. A static VLAN is a group of ports designated by the switch as belonging to the same
broadcast domain. That is, all ports carrying traffic for a particular subnet address would belong
to the same VLAN. Using a VLAN, you can group users by logical function instead of physical
location.
Ans. Dynamic VLANs, as opposed to Static VLANs, do not require the network administrator to
manually assign each switchport to a specific VLAN. But instead, a central server called VLAN
Membership Policy Server (VMPS) is used to handle port configuration of every switch
participating in a VLAN network.
Ans. In the BPDU you can see a field called root path cost. This is where each switch will insert
the cost of its shortest path to the root bridge. Once the switches found out which switch is
declared as root bridge they will look for the shortest path to get there.
Ans.
Ans.
Ans.
Ans. The three default subnet masks are 255.0. 0.0 for Class A, 255.255. 0.0 for class B, and
255.255. 255.0 for Class C.
The initial goal of CIDR was to slow the increase of routing tables on routers across the internet
and decrease the rapid exhaustion of IPv4 addresses. As a result, the number of available
internet addresses has greatly increased.
Ans. When we divide a large IP network into small IP networks this is called Subnetting.
For example when we put more hosts on available IP network due to destruction and broadcast
the network will disturb and not properly work.
In this situation, we mentioned above Subnetting provide an easy way to tackle this situation
through Subnetting we divide a single IP network into multiple small networks. This not only
accomplishes only our host’s need as well as gives us many networking benefits
here are five classes of subnetworks: Class A, Class B, Class C, Class D, and Class E. Each class
relates to a specific range of IP addresses. Classes A, B, and C are used the most often by
different networks.
Subnet classes are made unique by the number of bits their IP addresses have dedicated to a
network and the number of bits dedicated to hosts. They each have a default subnet mask.
Classes can be identified by the number in the first octet of their address.
Note: that 127 is not accounted for because it denotes a loopback address.
Ans. Classful addressing is a technique of allocating IP addresses that divides them into five
categories. Classless addressing is a technique of allocating IP addresses that is intended to
replace classful addressing in order to reduce IP address depletion.
Ans. Variable Length Subnet Mask (VLSM) is a subnet -- a segmented piece of a larger network
-- design strategy where all subnet masks can have varying sizes. This process of "subnetting
subnets" enables network engineers to use multiple masks for different subnets of a single class
A, B or C network.
Ans. Static routing is a form of routing that occurs when a router uses a manually-configured
routing entry, rather than information from dynamic routing traffic.
Ans. The dest-ip-addr variable is the route destination. The dest-mask variable is the network
mask for the route destination IP address. Alternatively, you can specify the network mask
information by entering a forward slash followed by the number of bits in the network mask.
For example, you can enter 10.0.
Ans. This section provides an example of how to configure the Sun Netra CP3240 switch to
support VLAN routing. The configuration of the VLAN router port is similar to that of a physical
port. The main difference is that, after the VLAN has been created, you must use the show ip
vlan command to determine the VLAN’s interface ID so that you can use it in the router
configuration commands.
The diagram in this section shows a Layer 3 switch configured for port routing. It connects two
VLANs, with two ports participating in one VLAN, and one port in the other. The script shows the
commands you would use to configure Sun Netra CP3240 switch to provide the VLAN routing
support shown in the diagram.
vlan database
vlan 10
vlan 20
exit
config
interface 0/1
vlan participation include 10
exit
interface 0/2
vlan participation include 10
exit
interface 0/3
vlan participation include 20
exit
exit
config
vlan port tagging all 10
vlan port tagging all 20
exit
Next specify the VLAN ID assigned to untagged frames received on the ports.
config
interface 0/1
vlan pvid 10
exit
interface 0/2
vlan pvid 10
exit
interface 0/3
vlan pvid 20
exit
exit
Ans. A metric is a measurable value that is assigned by the routing protocol to different routes
based on the usefulness of that route. In situations where there are multiple paths to the same
remote network, the routing metrics are used to determine the overall “cost” of a path from
source to destination.
Ans. OSPF uses a reference bandwidth of 100 Mbps for cost calculation. The formula to
calculate the cost is reference bandwidth divided by interface bandwidth. For example, in the
case of Ethernet, it is 100 Mbps / 10 Mbps = 10. cost is used on the interface, it overrides this
formulated cost.
Ans. IPv6 enables the increased use of summary routes and hierarchical routing. IPv6
fragmentation and reassembly are handled by the sender and receiver, not routers on the path,
making routing even more efficient. Instead of broadcasting to all nodes on a Layer 2 domain,
multicast is used.
Ans. An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an
Internet Protocol Version 6 (IPv6) network. IPv6 is the successor to a previous addressing
infrastructure, IPv4, which had limitations IPv6 was designed to overcome.
32. Explain IPv6 Routing Protocols
Ans. Routing in IPv6 is almost identical to IPv4 routing under CIDR. The only difference is the
addresses are 128-bit IPv6 addresses instead of 32-bit IPv4 addresses. With very
straightforward extensions, all of IPv4's routing algorithms, such as OSPF, RIP, IDRP, IS-IS, can
be used to route IPv6.
Ans. A wireless access point (WAP) is a hardware device or configured node on a local area
network (LAN) that allows wireless capable devices and wired networks to connect through a
wireless standard, including Wi-Fi or Bluetooth. WAPs feature radio transmitters and antennae,
which facilitate connectivity between devices and the Internet or a network.
Ans. IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and
specifies the set of media access control (MAC) and physical layer (PHY) protocols for
implementing wireless local area network (WLAN) computer communication
Ans. A Independent Basic Service Set (IBSS) forms an ad hoc, independent, self-contained
network with station-to-station traffic flowing directly, receiving data transmitted by another
station, and only filtering traffic based on the MAC address of the receiver (see Figure 5.3).
Ans. What can you do to minimize the risks to your wireless network
Restrict access.
Install a firewall.
Ans.
2. Setting hostnames
Ans. Enable
Conf t
exit
3. Setting banners
Ans. Enable
Conf t
exit
4. Setting passwords
Ans. Enable
Conf t
exit
Saving :- write
Ans. Enable
Conf t
Int vlan1
exit
7. Configuring SSH
Ans. Enable
Conf t
login local
ip ssh version 2
exit
8. Configuring Telnet
Ans.
Ans. A Layer 3 switch is basically a switch that can perform routing functions in addition to
switching. A client computer requires a default gateway for layer 3 connectivity to remote
subnets.
Ans. With dynamic IP configurations, client devices lease an IP configuration from a Dynamic
Host Configuration Protocol (DHCP) server. This server is configured with a pool of available IPs
and other settings. Clients contact the server and temporarily borrow an IP address
configuration.
Ans. 802.1Q is the networking standard that defines virtual LANs (VLANs) on an Ethernet
network. VLANs are logical networks that share a single physical connection using 802.1Q
tagged frames. An Ethernet frame can contain an 802.1Q tag, with fields that specify VLAN
membership and user priority.
Ans. The switchport mode command allows us to configure the trunking operational mode on a
Layer 2 interface on a Cisco IOS device. By entering the command switchport mode access we
configure the interface to operate in access mode. This ensures that the interface will pass
traffic for a single VLAN only.
Ans. Enable
Conf t
exit
Ans. Inter-VLAN routing refers to the movement of packets across the network between hosts in
different network segments. VLANs make it easier for one to segment a network, which in turn
improves the performance of the network and makes it more flexible, since they are logical
connections.
Ans. Dynamic routing, also called adaptive routing, is a process where a router can forward
data via a different route for a given destination based on the current conditions of the
communication circuits within a system.
Ans. A routing loop is a common problem with various types of networks, particularly computer
networks. They are formed when an error occurs in the operation of the routing algorithm, and
as a result, in a group of nodes, the path to a particular destination forms a loop.
Switch 1 :-
Enable
Conf t
Vlan 10
Exit
Vlan 20
Exit
Switch 2 :-
Enable
Conf t
Vlan 10
Exit
Vlan 20
Exit
Now you can ping any pc and check if pc are communicating or not
Exit
19. Explain and configure PAGP
Ans.
Ans. Enable
Conf t
Exit
exit
Ans.
Ans.
Ans. Network address is first address in the network and it is used for identification network
segment. All the IP addresses, using the same network address part, are in the same network
segment. Because network address is first address in the network, it can not be random IP
address, but it must mach with network mask in a binary view, for last bits in the network
address must be zeros, as long as mask has zeros.
Broadcast address is the last address in the network, and it is used for addressing all the nodes
in the network at the same time. It means that IP packet, where the destination address is
broadcast address, is sent to all nodes of the IP network. It is important for remote
announcements in network segment. In some cases it is used for attacking purposes by hackers
or can cause problems in bigger network segments.
Ans. A classful network is an obsolete network addressing architecture used in the Internet from
1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. The method
divides the IP address space for Internet Protocol version 4 (IPv4) into five address classes based
on the leading four address bits.
Ans.
Ans.
28. Given the no of hosts as 126, 50, 20 and 5 Find IP address and subnet mask using class
(192.168.1.0) 29.Explain this Network
Ans.
A Routed protocol is a protocol by which data can be routed. In the case of Routed protocols, we
require an addressing scheme and subnetting.
Addressing scheme will be used to determine the network to which a host belongs and to
identifying that host on that particular network.
Important to share that Routed protocols are routed by Routing protocols to gather routing
information for networks.
Routing Protocols :–
Routing protocols are used to distribute routing information across routers on a network. When each
router or Layer 3 device knowing about the networks connected to other Router, then each one can
determine the best path to take to deliver your traffic.
Ans. An interior gateway protocol (IGP) is a dynamic route update protocol used between
routers that run on TCP/IP hosts within a single autonomous system. The routers use this
protocol to exchange information about IP routes. Some of the more common interior gateway
protocols are: Routing Information Protocol (RIP)
Ans. Distance vector :- The distance vector routing algorithm works by having each router
maintain a routing table, giving the best-known distance from source to destination and which
route is used to get there. These tables are updated by exchanging the information with the
neighbor having a direct link.
Link state :- The Link State Routing Algorithm is an interior protocol used by every router to
share the information or knowledge about the rest of the routers on the network. The link state
routing algorithm is a distributed algorithm using which every router computes its routing table.
Hybrid :- Hybrid Access Networks refer to a special architecture for broadband access networks
where two different network technologies are combined to improve bandwidth. A frequent
motivation for such Hybrid Access Networks to combine one xDSL network with a wireless
network such as LTE.
Ans.
Ans. A wildcard mask is a mask of bits that indicates which parts of an IP address are available
for examination. In the Cisco IOS, they are used in several places, for example: To indicate the
size of a network or subnet for some routing protocols, such as OSPF.
Ans. There are three types of participant address: postal, email, and web address. Three types
of address can be recorded for participants: postal address, email address, and web address.
As in classful addressing, some blocks of addresses or some addresses in each block have been
reserved for the special purpose & that's why they are termed as special IP addresses. The
special addresses of classful addressing were inherited by the classless addressing when it was
introduced in 1996.
Ans.
Ans. RIPng :- The Routing Information Protocol next generation (RIPng) is an interior gateway
protocol (IGP) that uses a distance-vector algorithm to determine the best route to a
destination, using hop count as the metric.
EIGRPv6 :- The Enhanced Interior Gateway Routing Protocol (EIGRP) for IPv6 – EIGRPv6. EIGRP
is an enhanced version of the IGRP developed by Cisco.
EIGRP for IPv6 works in the same way as EIGRP IPv4 where they can be configured and
managed separately.
OSPFv3 :- OSPFv3 is a routing protocol for IPv4 and IPv6. It is a link-state protocol, as opposed to
a distance-vector protocol. Think of a link as being an interface on a networking device. A link-
state protocol makes its routing decisions based on the states of the links that connect source
and destination machines.
Ans. 6to4 tunnels are configured between border routers or between a border router and a
host. The simplest deployment scenario for 6to4 tunnels is to interconnect multiple IPv6 sites,
each of which has at least one connection to a shared IPv4 network. This IPv4 network could be
the global Internet or a corporate backbone.
Ans. Committees :- The IEEE 802 LAN/MAN Standards Committee develops and maintains
networking standards and recommended practices for local, metropolitan, and other area
networks, using an open and accredited process, and advocates them on a global basis.
Subcommittees :-
Ans. The topology of a wireless network is simply the way network components are arranged. It
describes both the physical layout of devices, routers, and gateways, and the paths that data
follows between them.