You are on page 1of 3

1. What are the advantages of using private addressing with NAT?

These addresses are characterized as private because they are not globally
delegated, meaning they are not allocated to any specific organization, and IP
packets addressed by them cannot be transmitted onto the public Internet.
Anyone may use these addresses without approval from a regional Internet
registry (RIR). If such a private network needs to connect to the Internet, it
must use either a network address translator (NAT) gateway, or a proxy
server.

2. Briefly describe wildcard masks.


A wildcard mask is a sequence of numbers that streamlines packet routing
within the subnets of a proprietary network. A subnet can be a geographically
defined local area network (LAN). Alternatively, a subnet may define security
boundaries, departmental boundaries, multicast zones or hardware security
parameters. The use of a mask saves a router the task of having to handle an
entire IP address because the router deals only with the digits selected by the
mask. Wildcard masks are commonly used with Open Shortest Path First
(OSPF) router protocols and in access control lists for Cisco routers.

3. What kind of tasks can you perform on the SDM’s interfaces and
connection screen?
Configuration Overview Area
Interfaces and Connections –
a. the number of connections that are up and down,
b. the total number of LAN and WAN interfaces that are present in the
router, and the number of LAN and WAN interfaces currently
configured on the router.
c. It also displays DHCP information.
Firewall Policies –
d. if a firewall is in place, it displays
e. the number of trusted (inside) interfaces, untrusted (outside) interfaces,
and DMZ interfaces.
f. It also displays the name of the interface to which a firewall has been
applied, and if the NAT rule has been applied to this interface.

4. What are the elements of PPP frame?


PPP contains three main components:
a. HDLC protocol for encapsulating datagrams over point-to-point links.
b. Extensible Link Control Protocol (LCP) to establish, configure, and
test the data link connection.
c. Family of Network Control Protocols (NCPs) for establishing and
configuring different network layer protocols.
i. PPP allows the simultaneous use of multiple network layer
protocols.
ii. Some of the more common NCPs are Internet Protocol Control
Protocol, Appletalk Control Protocol, Novell IPX Control
Protocol, Cisco Systems Control Protocol, SNA Control
Protocol, and Compression Control Protocol.
5. What are the types of encapsulation supported by LMI in Cisco router?
There are several LMI types, each of which is incompatible with the others.
Three types of LMIs are supported by Cisco routers:
a. Cisco - Original LMI extension
b. Ansi - Corresponding to the ANSI standard T1.617 Annex D
c. q933a - Corresponding to the ITU standard Q933 Annex A

6. Briefly describe various frame relay topologies.


A topology is the map or visual layout of the network.
a. You need to consider the topology from to understand the network and
the equipment used to build the network.
Every network or network segment can be viewed as being one of three
topology types: star, full mesh, or partial mesh.
Star Topology (Hub and Spoke)
b. The simplest WAN topology is a star.
c. In this topology, Span Engineering has a central site in Chicago that
acts as a hub and hosts the primary services.
d. The Span has grown and recently opened an office in San Jose. Using
Frame Relay made this expansion relatively easy.
e. When implementing a star topology with Frame Relay, each remote
site has an access link to the Frame Relay cloud with a single VC.
f. The hub at Chicago has an access link with multiple VCs, one for each
remote site.
g. The lines going out from the cloud represent the connections from the
Frame Relay service provider and terminate at the customer premises.
h. Because Frame Relay costs are not distance related, the hub does not
need to be in the geographical center of the network.

A topology is the map or visual layout of the network.


i. You need to consider the topology from to understand the network and
the equipment used to build the network.
Every network or network segment can be viewed as being one of three
topology types: star, full mesh, or partial mesh.
Star Topology (Hub and Spoke)
j. The simplest WAN topology is a star.
k. In this topology, Span Engineering has a central site in Chicago that
acts as a hub and hosts the primary services.
l. The Span has grown and recently opened an office in San Jose. Using
Frame Relay made this expansion relatively easy.
m. When implementing a star topology with Frame Relay, each remote
site has an access link to the Frame Relay cloud with a single VC.
n. The hub at Chicago has an access link with multiple VCs, one for each
remote site.
o. The lines going out from the cloud represent the connections from the
Frame Relay service provider and terminate at the customer premises.
p. Because Frame Relay costs are not distance related, the hub does not
need to be in the geographical center of the network.

7. Briefly describe a virtual private network (VPN).


VPN
A VPN creates a private network over a public network infrastructure while
maintaining confidentiality and security.
VPNs use cryptographic tunneling protocols to provide protection against
packet sniffing, sender authentication, and message integrity.

 The Internet is a worldwide, publicly accessible IP network. Because of its


global proliferation, it is an attractive way to interconnect remote sites.
– However, the fact that it is a public infrastructure poses security risks
to enterprises and their internal networks.
– Fortunately, VPN technology enables organizations to create private
networks over the public Internet infrastructure that maintain
confidentiality and security.
– Organizations use VPNs to provide a virtual WAN infrastructure that
connects branch offices, home offices, business partner sites, and
remote telecommuters to all or portions of their corporate network.

Advantages:
– Cost savings - Organizations can use Internet infrastructure to connect
remote offices and users to the main corporate site.
– Security - Advanced encryption and authentication protocols protect
data from unauthorized access.
– Scalability - Organizations, big and small, are able to add large
amounts of capacity without adding significant infrastructure.

You might also like