ICT102-Lab-2 (3).pdf
Document Details
Uploaded by WellEstablishedJasmine
2024
Tags
Full Transcript
ICT102 NETWORKING Week 2: Fundamentals of Ethernet LANs I. Quizzes 1. In the LAN for a small office, some user devices connect to LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in LAN?...
ICT102 NETWORKING Week 2: Fundamentals of Ethernet LANs I. Quizzes 1. In the LAN for a small office, some user devices connect to LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in LAN? a. Only the devices that use cables are using Ethernet. b. Only the devices that use wireless are using Ethernet. c. Both the devices using cables and those using wireless are using Ethernet. d. None of the devices are using Ethernet. 2. Which of the following Ethernet standards defines Gigabit Ethernet over UTP cabling? a. 10GBASE-T b. 100BASE-T c. 1000BASE-T d. None of the other answers is correct. 3. Which of the following is true about Ethernet crossover cables for Fast Ethernet? a. Pins 1 and 2 are reversed on the other end of the cable. b. Pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable. c. Pins 1 and 2 on one end of the cable connect to pins 3 and 4 on the other end of the cable. d. The cable can be up to 1000 meters long to cross over between buildings. e. None of the other answers is correct. 4. Each answer lists two types of devices used in a 100BASE-T network. If these devices were connected with UTP Ethernet cables, which pairs of devices would require a straight- through cable? (Choose three answers.) a. PC and router b. PC and switch c. Hub and switch d. Router and hub e. Wireless access point (Ethernet port) and switch (Networking-ICT102) Semester 2 2024 1 5. Which of the following are advantages of using multimode fiber for an Ethernet link instead of UTP or single-mode fiber? a. To achieve the longest distance possible for that single link. b. To extend the link beyond 100 meters while keeping initial costs as low as possible. c. To make use of an existing stock of laser-based SFP/SFP+ modules. d. To make use of an existing stock of LED-based SPF/SPF+ modules. 6. Which of the following is true about the CSMA/CD algorithm? a. The algorithm never allows collisions to occur. b. Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover. c. The algorithm works with only two devices on the same Ethernet. d. None of the other answers is correct. 7. Which of the following is true about the Ethernet FCS field? a. Ethernet uses FCS for error recovery. b. It is 2 bytes long. c. It resides in the Ethernet trailer, not the Ethernet header. d. It is used for encryption. 8. Which of the following are true about the format of Ethernet addresses? (Choose three answers.) a. Each manufacturer puts a unique OUI code into the first 2 bytes of the address. b. Each manufacturer puts a unique OUI code into the first 3 bytes of the address. c. Each manufacturer puts a unique OUI code into the first half of the address. d. The part of the address that holds this manufacturer’s code is called MAC. e. The part of the address that holds this manufacturer’s code is called the OUI. f. The part of the address that holds this manufacturer’s code has no specific name. 9. Which of the following terms describe Ethernet addresses that can be used to send one frame that is delivered to multiple devices on the LAN? (Choose two answers) a. Burned-in-address b. Unicast address c. Broadcast address d. Multicast address II. Practical Exercise Objectives: ‐ Get familiar with the basic networking tools: ping and traceroute 1. Use ping to test host reachability (Networking-ICT102) Semester 2 2024 2 Are the following hosts reachable from your machine by using ping: www.getfittest.com.au www.mit.edu www.intel.com.au www.tpg.com.au www.hola.hp www.amazon.com www.tsinghua.edu.cn www.kremlin.ru 8.8.8.8 If you observe that some hosts are not reachable, then can you explain why? Check if the addresses unreachable by the ping command are reachable from the Web browser. 2. Use traceroute to understand network topology Note: Include all traceroute outputs in your report. 1. Run traceroute on your machine to www.columbia.edu. How many routers are there between your workstation and www.columbia.edu ? 2. Run traceroute from your machine to the following destinations: (i) www.ucla.edu, (ii) www.u-tokyo.ac.jp, and (iii)www.lancaster.ac.uk. ‐ At which router do the paths from your machine to these three destinations diverge? ‐ Find out further details about this router. (HINT: You can find out more about a router by running the whois command: whois router-IP-address). ‐ Is the number of hops on each path proportional to the physical distance? ‐ HINT: You can find out the geographical location of a server using the following tool - http://www.yougetsignal.com/tools/network-location/ 3. Several servers distributed around the world provide a web interface from which you can perform a traceroute to any other host on the Internet. Here are two examples: (i) http://www.speedtest.com.sg/tr.php and (ii) https://www.telstra.net/cgi-bin/ trace ‐ Run traceroute from both these servers towards your machine and in the reverse direction (i.e. from your machine to these servers). You may also try other traceroute servers from the list at www.traceroute.org. ‐ What are the IP addresses of the two servers that you have chosen? ‐ Does the reverse path go through the same routers as the forward path? ‐ If you observe common routers between the forward and the reverse path, do you also observe the same IP addresses? Why or why not? (Networking-ICT102) Semester 2 2024 3