Card Set Information

2012-12-06 09:38:58
Chapter Network Managemetn

Chapter 5 network management Lab
Show Answers:

  1. How would you know if a cable is a crossover cable?
    • Crossover cable recognition
    • For flat 10BASET cables, where you can see the colors of the shielding on each wire, hold the connectors on each end side by side with the tabs at the back. If the color of the shielding on the wire attached to pin 1, on the far left of the connector on the left, is the same as that attached to pin 8, on the far right of the right connector, it is a crossover cable
    • If the connectors are DB 25 or DB 9 there is no color guide that you can see. The best way to check these is to use a Data Line Monitor such as one from Black Box Inc. Plug the cable into a serial connector on a PC. Attach the Data Line Monitor to the other end of the cable. The serial connector on the PC transmits on pin 2. If the light next to pin 3 on the Data Line Monitor lights, then you know you have a crossover cable.
  2. What is a DTE and what is a DCE?
    A DTE is Data Terminal Equipment such as a PC. A DCE is Data Circuit Terminating Equipment such as a modem
  3. When is a crossover cable necessary when configuring a device?
    Local configuration of a device can be done by connecting a PC serial connector to the console connector on the device. The PC is a DTE. If the device is a DCE, a crossover cable is necessary. You will not always know if a device you are configuring is set up as a DCE so you may have to first try a crossover cable and if that does not work, a direct cable.
  4. What is the advantage of being to do out of band management of a device?
    If the network is down you can still do management
  5. What is the principle way that hubs are distinguished from switches?
    Hubs transmit data received on any port out of all other ports while a switch only passes the data to the port that is mapped to the destination address in the received packet.
  6. Community Names must be recongnized by the device SNMP agent and know by the Management Station. How do you think this cooperation arrenged?
    NMS software can send a GetRequest message to the device asking for the Community Name. If the Management Station hosting the NMS has an approved network address, the community name will be returned in a GetResponse message
  7. Why is it important to identify WRITE managers on CISCO switches?
    Because, for example, WRITE managers can reconfigure the switch map table to send packets to devices that should not have access to them.
  8. When an ethernet address is associated with a switch port, to waht device does that address refer?
    It refers to a device that is accessible through that port.
  9. What is the difference between static address and a dynamic address?
    A static address is a permanent address that is configured by a human. A dynamic address is one that is learned by the switch.
  10. How is dynamic address obtained by a device?
    Dynamic addresses are learned from the source addresses received at a port. Dynamic addresses can be configured to have a lifetime so as not to clutter the switch map table.
  11. What is a Restricted Static Address?
    A Restricted Static Address is one that can be accessed only by packets with source addresses configured in the restriction.
  12. What is meant by Address Aging Time?
    Address Aging Time is the time within which a packet from the associated device address must be received on the port to which it is connected or the address will be dropped by the switch map table.
  13. What capability is provided by switch Monitor Port?
    A switch Monitor Port is one to which copies of packets transmitted or received by other ports can be sent. The Monitor Port can be connected to probe in order to collect statistics about the ports being monitored.
  14. What is a principal difference in the way RIP routers and OSPF routers communicate with neighbor routers?
    RIP routers send their entire routing table to all directly attached (neighboring) routers. OSPF routers only send changes in their routing table thus substantially reducing such traffic.
  15. What is the advantage of creating an SNMP Access List on a router?
    An access list configures the network addresses of devices that the router will route. The advantage is that this limits routing to trusted addresses.
  16. What is the difference between MIB-2 and RMON MIB variables?
    MIB-2 variables are specific to devices. RMON MIB variables are specific network traffic