You are on page 1of 20

CONFIDENTIAL 2 EE/JUN2015/ECE730

QUESTION 1

a) Explain why packet switched networks are more efficient in sending data traffic as

compared to circuit switched networks. Include a suitable diagram to support your


answer.

(10 marks)

b) Differentiate between OSI and TCP/IP protocol suite. Draw a layered model protocol

for a simple LAN shown in Figure Q1b.

(10 marks)

Figure Q1b

QUESTION 2

a) You have been given an IP address block of 10.8.32.0/20. Design a variable length

subnetmask (VLSM) IP addressing scheme that can accommodate the following

network that consists of:

i) Corporate HQ requires 500 hosts;


ii) Sales Office requires 100 hosts;

iii) HR Office requires 50 hosts;

For each subnet, determine the subnet address, subnet mask and available host

range.

(10 marks)

b) Figure Q2b shows a typical enterprise network that implement OSPF as the routing

protocol. Identity the network address and wildcard mask used in the routing statement

for a router BRANCH2.

A static routing protocol need to be configured at the ISP based on the route

summarization.
i) Determine the summarized route to be used.

ii) State two advantages of static routing protocol.

(10 marks)

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL 3 EE/JUN2015/ECE730

Figure Q2b

QUESTION 3

a) List four best practices in implementing virtual local area networks (VLANs) to improve

network performance and network security.

(4 marks)

b) Figure Q3b shows a topology which implements end-to-end VLAN. Redesign the

network using a local VLAN.

(5 marks)

Figure Q3b

c) The purpose of a spanning-tree protocol (STP) is to create a loop free layer two

network. State three problems that can occur in the network if STP is not enabled. For

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL 4 EE/JUN2015/ECE730

the circuit of Figure Q3c, determine the root bridge, root ports, designated and non-

designated ports. Draw a loop free network after STP is converged.

(11 marks)

Figure Q3c

QUESTION 4

a) There are six steps required in designing enterprise networks. Briefly state the six steps

involved.

(3 marks)

b) Figure Q4b shows a three layer hierarchical network topology to support a medium size

enterprise network. Explain how the network below can support network DHCP services

for all VLANs.

(9 marks)

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL 5 EE/JUN2015/ECE730

Figure Q4b

c) Vlan trunking protocol (VTP) is used to manage VLANs in a switched based network. For

the circuit of Figure Q4c, discuss the role of switch SW2 and SW3. Discuss what will
happen if SW2 is changed to client mode.

(8 marks)

QUESTION 5

a) For the circuit of Figure Q5a, consider the wireless router is allowed to connect to port
fa0/5 switch port when accessing the network. You want to restrict the number of users

connected to the router to 4 only. Identify the type of security that can be implemented to

achieve this. Outline steps to implement this.

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL 6 EE/JUN2015/ECE730

(6 marks)

Figure Q5a

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL 7 EE/JUN2015/ECE730

b) Figure Q5b shows a topology that enable inter-vlan routing between different VLANs.

Table 1 and Table 2 shows the IP addressing scheme and HSRP requirements for the

topology. Appendix I shows partial configurations to provide the inter-VLAN routing for the
topology. However, no connection can be established between VLANs. Identify 7

problems and propose solutions to overcome them.

(14 marks)

Figure Q5b

VLAN GATEWAY(/24) VLAN NAME DLS1 DLS2

VLAN 1 172.16.1.1 default 172.16.1.2 172.16.1.3

VLAN 10 172.16.10.1 student 172.16.10.2 172.16.10.3

VLAN 20 172.16.20.1 staff 172.16.20.2 172.16.20.3

VLAN 30 172.16.30.1 admin 172.16.30.2 172.16.30.3


VLAN 40 172.16.40.1 guest 172.16.40.2 172.16.40.3

Table 1

VLAN ACTIVE STANDBY

VLAN 1 DLS1 DLS2

VLAN 10 DLS1 DLS2

VLAN 20 DLS2 DLS1


VLAN 30 DLS1 DLS2

VLAN 40 DLS2 DLS1

Table 2

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL 8 EE/JUN2015/ECE730

END OF QUESTIONS

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

Step 1 10.8.32 0 20
identify major network

Step 2 determine network bit and host bit basedon mask

10 8 0010 0000 00000000 20

8 bit 8 bit 4 bit 4bit 8 bit

20 bitNETWORK 12 bit HOST

120
availabe based on host
of IP

Step 3 determine number addresses

addressable IP 212 4096

host needed

Step 4 determine number


of

host needed 650 hosts

Step 5 allocate host for HQ 500 host

to support 500host

allocate 9 bit of host

host allocated 29 2 510 hosts

network broadcast

10 8 0010 OOOO OOOO OOOO

current NA 10.8.32 O

y 9 bit

magic

3rdoctet

① NA
10 8 32.0 23 ④BA 10 8 33.255 23

②SM
255.235 254 0

⑤ IP
range 10 8 32 I 10.8 33 254

next
NA i lo 8 32 magic O
10 8 34.0

steps anocatehost
for
sales office too hosts

to support 100hosts allocate 7 bit of host

host allocated 27 2 126 hosts

current NA 10 8 34.0 10 8 0010 0010 oooo oooo

it

magic121

4thoctet
① NA i
lo u 8 ④ BA

34 0 25 10 8 34 127

②SM
255.255 255 128

⑤ IP
range 10.8.34 I 10.8.34 126

magic
③next
NA 10.8.34 0 112 10 8 34 128

4th

Step 7 allocate host for HR 50 hosts

to support sohosts allocate G bit of host

host allocated 26 2 62 hosts

current NA 10.8.34 128 10 8 00100070


001

001,0

magic
61

4thoctet


NA
10 8 34.128 26 BA 10.8.34 191
② SM


255.255.255 192
⑤ IP range 10.8.34 129

lo 8 34 190

magic
③next
NA 10 8 34 128 6,4 10.8 34.192

4h

10.8.34 192 IO 8 47 255

free address
c

range

At BRANCH 2

192.168.1 00110000

Link 7 IP 192 168 I 48 30 Twidcard

SM i set all network to 1 all host to 0

255.255.255 252

NA 192 168 I 48

wildcard I I 3 4thoctet

Link 2 IP 192 168 I 140 30 192168 I 7000 1100wildcard

5M set all network to 1 all hostto 0

255.255255 252

wildcard 2 I 3 4thoctet

Link 3 IP 17216 80 0 20 172.16 01010000.00000000


wildcard

SM 255.255 240 0

wildcard 24 I 15 3rdoctet

wildcard I I 25.5 4thoctet

fummaykoate

Class B

172 16.96 O 01100000

172.16
180.0 01 01 0000

3rd 4

64

summary 172 16 64.0 18

172.16 64.0 255.255.192.0 sO O 1


Ip route

Class C

192 168 I 48 00000001 00110000

192 1684440 00000001 1000 I 100

192 1.68 I 240 oooo 0001 111.10000

3rd4th 9

Summary 192 168 l O 24

192 168 1.0 255.255.255 O 50 0 1

ip route

LOCAL VLAN
t tI

a
FEI FEI FEI

HE
AHo l Ho Tao

Ho El Ho Ho

RP

RB DP 19 th P

NDP NDP

DP

1919
Dp
7

RP pp RP pp

DP DP
DP 19 19

19
Xmopy Top

ig Xmpp

T
L L
I

II

4 NDP
X
RB DP la µ pp
NDP Rp
19 X 19
DP Dp
1.9 4
RP pp RP pp

DP DP
DP 19 19
19
Xnopy Top

ig Xmpp

II

T
L

II

6 steps = PPDIO
① Prepare
→ establish org requirements
→ develop network strategy
→ propose high-level conceptual architecture
→ justify financial

② Plan
→ identify requirements
→ characterizing sites
→ assessing existing network
→ milestone / task management

③ Design
→ derived from planning stage
→ comprehensive detailed design
→ availability, reliability, security, scalability, performance

④ Implement
→ building network based on design specs
→ ensuring no disruption of existing network / create vulnerability

⑤ Operate
→ final test of design
-7 maintain network health
→ high availability & reduce expenses
→ fault detection, correction & monitor

⑥ Optimize
→ proactive management
→ identify & resolve issues
→ troubleshoot
→ network redesign if too many problems / errors arise
new applications identified.

23 B
DHCPServer
L2
r
Lz 7h DHCPRELAY 4V
µ
IPHELPER

T
u

DHCP CLIENT

DHCP DISCOVER broadcast

DHCP OFFER unicast

① Client request for IP address by sending DHCP DISCOVER broadcast message.


② Gateway DL2 doesn’t allow the broadcast message from VLAN60 & VLAN50 to
pass through.
③ Configure DL2 with IP HELPER to enable the multilayer switch to for ward
DHCP broadcasts to the DHCP Ser ver (DL1) IP HELPER acts as a relay.
④ DHCP server picks up the request and offer IP address using DHCP OFFER in the
form of a unicast message.
⑤Client accepts the offer by sending DHCP REQUEST broadcast.
⑥ Server acknowledge the acceptance by sending DHCPACK unicast.

Roles of SW2 Role of SW3

→ mode transparent → mode client


→ handle 10 VLANs → handles 33 VLANs
→ domain name LAB2 → domain name LAB1
→ create, modify, delete → cannot create, modify, delete VLANS
LOCAL VLANs only → sends & forwards advert.
→ forwards advertisements → sync VLAN config
→ does not sync VLAN config

if VLAN 2 changed to client mode, it would be able

to send & forward advertisement and

sync VLAN config with VLAN10 under SW10

use DHCP lease limit


for example: DHCP least starts from
192.168.1.2 → 192.168.1.5

use Interface Descriptor Block (IDB)


to limit maximum number of interfaces a router can handle

use MAC Address filter


control devices that are allowed to connect to an AP .

You might also like