Appendix C Answers for Additional Exercises Chapter 1 Various answers are possible. Drawings similar to Figure 1.3 with multiple computers are possible. Various answers are possible. Drawings similar to Figures 1.1 and 1.2 are common. One possible location at www.ietf.org/rfc/rfc1918.txt. The address ranges are as follows: 10.0.0.0 to 10.255.255.255 (10/8 prefix) 172.16.0.0 to 172.31.255.255 (172.16/12 prefix) 192.168.0.0 to 192.168.255.255 (192.168/16 prefix) One possible location is http://standards.ieee.org/getieee802/. Some standards are 802.3bc-2009, 802.11n, and 802.15.4. Other standards are also defined, but many are no longer active. Chapter 2 Answers will vary. The most common type is twisted pair. Answers will vary. Networks typically include switches and routers, though some networks may have hubs and routers. You ll also have host devices such as computers and printers. Answers will vary. A typical diagram will look similar to Figure 2.13 without the perimeter network (DMZ). Answers will vary. The status of the Windows 7 firewall can be checked by going to the Control Panel Systems And Security Windows Firewall.
2 Appendix C Answers for Additional Exercises Chapter 3 The drawing should like Figure 3.1 or Figure 3.2. The answer is N=78, e=101, t=116, w=119, o=111, r=114, k=107, i=105, n=110, g=103, space=32, E=69, s=115, s=115, e=101, n=110, t=116, i=105, a=97, l=108, s=115. Students will need access to an ASCII table. One possible source is www.asciitable.com. The drawing should look similar to Figure 3.5. The drawing should look similar to Figure 3.7. Chapter 4 The diagram should be similar to Figure 4.1. LDAP is the primary protocol used to communicate with Active Directory, and Kerberos is the primary authentication protocol used with Active Directory. pressing Enter. Enter arp -a and press Enter at the command prompt to view the ARP cache. SMTP port 25, POP3 port 110, IMAP4 port 143. Chapter 5 pressing Enter. Enter ipconfig and press Enter at the command prompt to identify the IP address. Private IP addresses start with 10, 172.16 through 172 31, and 192.168. A special private IP address range starts with 169.254. Other IP addresses are public. Classful IP addresses: 192.168.20.5 has a subnet mask of 255.255.255.0 and a network ID of 192.168.20.0 172.16.178.17 has a subnet mask of 255.255.0.0 and a network ID of 172.16.0.0 10.80.3.18 has a subnet mask of 255.0.0.0 and a network ID of 10.0.0.0. Classless IP addresses: 192.168.232.222 /26 has a subnet mask of 255.255.255.192 and a network ID of 192.168.232.192
Chapter 6 3 172.16.129.25 /20 has a subnet mask of 255.255.240 and a network ID of 172.16.128.0 10.178.215.111 /11 has a subnet mask of 255.224.0.0 and network ID of 10.160.0.0 Chapter 6 pressing Enter. Enter ipconfig and Enter at the command prompt to identify the IP address. A prefix of 2 indicates it s a global unicast address, fe80 indicates it s a linklocal (automatically assigned) address, and fd indicates it s a unique local address. pressing Enter. Enter ping ::1 and press Enter. The loopback address for IPv4 is 127.0.0.1. Answers will vary. Look for an output similar to Listing 6.1 with a description of Teredo Tunneling Pseudo-Interface. Answers will vary but may be similar to Figure 6.8. Chapter 7 Answers will vary. Many power strips today are also surge protectors, but most surge protectors will also have a label on them indicating they are surge protectors. Follow the steps in the chapter to download and install Network Monitor. Enter TCP in the Display Filter section, and click Apply to filter TCP traffic. Answers will vary. In production environments, routers and switches are often in locked wiring closets or server rooms. In classroom environments, they are often in the classroom. Answers will vary. Plenum-safe cable is identified as UL 910 or E84 certified. However, it s unlikely that the cable run to the computer is plenum safe. Chapter 8 Answers will vary. If a hub is used, it will be a single collision domain and a single broadcast domain. If a switch is used, it will be a separate collision domain for each switch port and a single broadcast domain.
4 Appendix C Answers for Additional Exercises Answers will vary. Switches typically have between 6 and 64 ports. Answers will vary. Most switches will have a port labeled as an uplink port. Answers will vary. Some switches are protected in locked wiring closets or server rooms. Some switches are protected in locked cabinets close to the users. Some switches are not protected. Chapter 9 Launch the command prompt, and enter route print. Answers will vary. The routing table from the route print command includes the default path in the line identified with a network destination of 0.0.0.0. For example, the line may look like this, indicating a metric of 281: Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.114 281 Answers will vary. Launch the command prompt, and enter ipconfig. This will include the default gateway. Answers will vary. If you have Internet access, the router that is your default gateway is connected to at least one other network the path to the Internet. Chapter 10 View the System Properties page. You can use the procedures listed in the Viewing and Modifying a Computer Name section of this chapter. Launch a command prompt, and enter nbtstat - n. Launch a command prompt, and enter ipconfig /displaydns. Launch a command prompt, and enter nbtstat -c. Chapter 11 Answers will vary. If you re using Internet Explorer, you can use the steps in the Understanding Proxy Servers section.
Chapter 12 5 Answers will vary. If you are running Windows 7, you can follow these steps: 1. Click Start Control Panel. 2. Click System And Security. 3. Click Windows Firewall. Answers will vary. If you are running Windows 7, you can follow these steps: 1. Click Start Control Panel. 2. Click System And Security. 3. Click Windows Firewall. This page will show that you are connected to either home or work (private) networks, public networks, or a domain network. Answers will vary but could look like Figures 11.7 and 11.11. They can look exactly the same. The difference lies in the intent where the extranet provides access to resources to only trusted entities. Chapter 12 The drawing should include wired and wireless clients connected through a wireless router, and the router should have connectivity to the Internet. The drawing may be similar to Figure 21.8. The WRT54G router is a Linksys model. It includes a recessed reset button that will reset the wireless router s configuration. Here s one link: http://technically easy.net/2008/01/how-to-reset-linksys-wrt54g-wireless/. Answers should look similar to Table 12.1. Answers should look similar to Table 12.2. Chapter 13 Answers will vary. They could include dial-up, DSL, cable, and satellite. Answers will vary. www.speedtest.net is one source that allows you to check the connection speed without installing any software. Some of the methods include DSL, ISDN, T1, T3, E1, E3, and Ethernet WAN. Answers will vary but will look similar to Figure 13.10.
6 Appendix C Answers for Additional Exercises Chapter 14 Use the ipconfig /flushdns command. Answers will vary. One method is to use ipconfig /all to identify the address of the DNS server and then use ping to check connectivity. Answers will vary. One method is to use ipconfig /all to identify the address of the DNS server and then use tracert to identify the routers. Answers will vary. One method is to use ipconfig /all to identify the address of the DNS server and then use pathping to check for data loss.