Premium Essay

Ccna Intermidiate Level

In: Computers and Technology

Submitted By joeynone2008
Words 380
Pages 2
Pg.279
2)What method is used to tell the subscriber that someone is calling?
Ringing Voltage
4)Explain how rotary dialing send digits to the switch.
The pulses are generated through the making and breaking of the telephone connection, the audible clicks are a side effect of this. As a result, all that is really needed to dial a number with pulse dialing is a switch
6)Why do business customers order ground start signaling lines?
Business systems with such as a PBX or key system are adversely affected in incomingm outgoing call collisions and therefore requre a special signaling method - Groudn start signaling 0 to eliminate the chance of glare.
8)Define in-band signaling and list the three in-band signaling methods used to initiate trunk connections between switches.
10)What is CAS and where is it used? a form of digital signalling systems in modern telecoms networks
12)Define out-of-band signaling communications which occur outside of a previously established communication method or channel
14)Define the following terms:
SSP-service switching point are end points that are used in a telecommunication system which can be interconnected to each other by ss7 links.
STP- Signaling transfer point is a packet switching node that is used to route control messages that are sent in a commnication network.
SCP-Service control point is a standard component of the intelligent network telephone system which is used to control the service.
16)Draw the SS-7 message format by showing the MTP, the ISUP, the TCAP, and the SCCP, and explain the function of each.

Pg.295-296
2)The MG has to be placed in the same location as the MGC
A. True
4)Explain why a company purchases two MGC's even when call volume does not warrant the purchase.
6)An MTA provides all functions except:
e. none of the above
8)Megaco/H.248 and MGCP are primarily used to set up trunks between…...

Similar Documents

Premium Essay

Ccna

...CCNA Notes Introduction Cisco offers two options for obtaining the CCNA certification:   Pass Exam 640-802 OR Pass Exam 640-822 AND Exam 640-816 While you can use these notes to prepare for either exam, the notes are geared towards passing the single exam. I recommend you study all of the material and take the single exam option rather than taking two exams. Cisco Device Icons  The following table lists the specific icons Cisco uses to represent network devices and connections. Represents Icon Hub Bridge Switch Router Access point Network cloud Ethernet connection Serial Line connection Wireless connection Virtual Circuit The OSI Model As you study this section, answer the following questions:       What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives:    103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model......

Words: 73801 - Pages: 296

Premium Essay

Ccna Labs

...(NOTE: this is beyond the current CCNA exam requirements; you will need to configure both NL_B1_RT1 and NL_CORP T1 for this exercise): * Interesting traffic: all subnets at both offices should forward over the VPN connection * Pre-shared key between sites: CBTNuggets-Key!!! * Phase 1 (ISAKMP) Settings: * Encryption: AES-128 * Hashing: SHA1 * Protection: DH2 * Phase 2 (IPSEC) Settings: * Encryption: AES-128 * Hashing: SHA1 * No PFS * NAT: Be sure to adjust NAT appropriately for the VPN connection * Testing * NL_B1_SW1 should be able to ping any of the VLAN interfaces on NL_CORP_SW1 including: * VLAN 2: CORP_VOICE (10.1.2.1) * VLAN 3: CORP_DATA (10.1.3.1) * NL_CORP_SW1 should be able to ping any of the VI.AN interfaces on NL_B1_SW1 including: * VLAN 64: Client VOICE (10.1.64.1) * VLAN 66: Client DATA (10.1.66.1) Phase 4: Routing Using OSPF Scenario Now that the NuggetLabs branch facility Internet and VPN connection is functional, you would like to implement OSPF routing between both offices. Because NuggetLabs is a growing organization, you intend to design their OSPF network for scalability, implementing the corporate office as the backbone and their first branch office as a different area (which allows for summarization in the network). NOTE: To stay (somewhat) within CCNA Exam requirements, assume the......

Words: 4941 - Pages: 20

Free Essay

Ccna 1 Chapter 4 Study Materials

...1. [pic] ccna 1 chapter 4 answers 100% 2011 Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.) The local host is using three client sessions. The local host is using web sessions to a remote server. The local host is listening for TCP connections using public addresses. The local host is using well-known port numbers to identify the source ports. The local host is performing the three-way handshake with 192.168.1.101:1037. 2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 80 1024 1728 3. Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments source and destination 4. Which is an important characteristic of UDP? acknowledgement of data delivery minimal delays in data delivery high reliability of data delivery same order data delivery 5. [pic] ccna 1 chapter 4 answers 100% 2011 Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? create a Layer 1 jam signal reach a timeout and resend the data that needs to be acknowledged send a RESET bit to the host change the window size in the Layer 4 header 6. ...

Words: 1109 - Pages: 5

Premium Essay

Ccna 3 Pt Lab Manual

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program. PT Activity 1.2.4: Build a Hierarchical Topology Topology Diagram Learning Objectives • • Add devices to a topology. Connect the devices. Introduction Packet Tracer is integrated throughout this course. You must know how to navigate the Packet Tracer environment to complete this course. Use the tutorials if you need a review of Packet Tracer fundamentals. The tutorials are located in the Packet Tracer Help menu. This activity focuses on building a hierarchical topology, from the core to the distribution and access layers. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3 CCNA Exploration LAN Switching and Wireless: LAN Design PT Activity 1.2.4: Build a Hierarchical Topology Task 1: Add Devices to the Topology Step 1. Add the missing distribution layer routers. The routers you need are located in Custom Made Devices. R1 and R3 are 1841 routers. Ctrl-click the 1841 router to add more than one. Press ESC to cancel. R2 is a 2621XM router. Step 2. Add the remaining access layer switches. Following the topology diagram, add nine 2960-24TT switches to complete the rest of the......

Words: 48601 - Pages: 195

Premium Essay

Business- Level and Corporate- Level Strategies

...lifestyle/boutique, signature, select services and extended stay. Marriott own chains such as Marriott Hotels & Resorts, Courtyard by Marriott, Residents Inn, Fairfield Inn, and Marriott Vacation Club International, BVLGARI, The Ritz Carlton just to name a few. The commonality between all of the properties that Marriott International owns is that they all have a clear business-level strategy that allows them to focus on particular customer groups. Analyze the business strategies for the corporation you chose to determine the business level strategy you think is most important to the long –term success of the firm and whether or not you judge this to be a good choice. Justify your opinion. Marriott business strategies vary depending on the lodging segment. Examples include the Residents Inn is focused on customers that need amenities that go beyond the average but allow the traveler to have a sense of freedom, like they are at home or the Marriott Vacation Club International, which is classified as a luxury timeshare operation. The Fairfield Inn chain is currently using a focused cost leadership business-level strategy. In Fairfield Inns, there are several things that allow the Marriott Company to control cost and offer accommodations at a reduced rate to customers. There are usually no full-scale restaurants within in the main hotel. This means that the company does not have to employ staff to run it, which is costly to the bottom line. Also, the company uses value......

Words: 1619 - Pages: 7

Free Essay

Ccna Ch 4

...CCNA 1 Chapter 4 V4.0 Answers Posted in CCNA 1 - Network Fundamentals (V4.0) - 5 March 2010 - 1 comment - 188,626 views 1 Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.) The local host is using three client sessions. The local host is using web sessions to a remote server. The local host is listening for TCP connections using public addresses. The local host is using well-known port numbers to identify the source ports. The local host is performing the three-way handshake with 192.168.1.101:1037. 2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 80 1024 1728 3. Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments source and destination 4. Which is an important characteristic of UDP? acknowledgement of data delivery minimal delays in data delivery high reliability of data delivery same order data delivery 5. Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? create a Layer 1 jam signal reach a timeout and resend the......

Words: 973 - Pages: 4

Free Essay

Ccna Routing

...American International University–Bangladesh Continuing Education Center (CEC)  02 8816173 Ext 406  www.cec.aiub.edu CCNA Routing and Switching Course Outline CCENT Introduction to Networks Routing & Switching Essentials Scaling Networks Connecting Networks CCNA CCNA 1 – Introduction to Networks This course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. Chapter 1 2 3 4 5 6 7 8 9 10 11 Topic Exploring the Network Configuring a Network Operating System Network Protocols and Communications Network Access Ethernet Network Layer Transport Layer IP Addressing Subnetting IP Networks Application Layer It’s a Network Students who complete Introduction to Networks will be able to perform the following functions:  Understand and describe the devices and services used to support communications in data networks and the Internet  Understand and describe the role of protocol layers in data networks  Understand and describe the importance of addressing and naming schemes at various layers of data networks in IPv4 and IPv6 environments  Design, calculate, and apply......

Words: 1022 - Pages: 5

Free Essay

Student Ccna Syllabus

...Study Guide CISCO SYSTEMS NETWORKING Academy CCNA 2 Chapter 1 WANs and Routers One major characteristic of a wide-area network (WAN) is that the network operates beyond the local LAN's geographic scope. It uses the services of carriers, such as regional Bell operating companies (RBOCs), Sprint, and MCI. WANs use serial connections of various types to access bandwidth over wide-area geographies. By definition, the WAN connects devices that are separated by wide areas. WAN devices include the following: • • • • • • Routers, which offer many services, including internetworking and WAN interface ports Switches, which connect to WAN bandwidth for voice, data, and video communication Modems, which interface voice-grade services and channel service units/digital service units Channel service units/data service units (CSUs/DSUs) that interface T1/E1 services and Terminal Adapters/Network Termination 1 (TA/NT1s) TA/NT1s that interface Integrated Services Digital Network (ISDN) services Communication servers, which concentrate on dial-in and dial-out user communication Concept Questions 1. A WAN is used to interconnect local-area networks (LANs) that are typically separated by a large geographic area. A WAN operates at the OSI reference model physical and data link layers. The WAN provides for the exchange of data packets/frames between routers/bridges and the LANs that they support. Draw a WAN that includes three LANs. 1 of 116 CCNA 2 Chapter 1 WANs and Routers 2. Compare and......

Words: 23437 - Pages: 94

Free Essay

Intermidiate Marketing

... Team leader rating on the team Please tick 1. Members introduce new ideas to the group Very often [ ] Often [ ] Rarely [ ] Not at all 2. Members build on the ideas of others. [ ] Very often [ ] Often Rarely [ ] Not at all 3. Members suggest new ways of doing things. [ ] Very often Often [ ] Rarely [ ] Not at all 4. Members make sure all possibilities are explored. [ ] Very often Often [ ] Rarely [ ] Not at all 5. Members support and praise other team members. [ ] Very often [ ] Often Rarely [ ] Not at all 6. Members are willing to compromise to obtain a group consensus. [ ] Very often Often [ ] Rarely [ ] Not at all 7. Members try hard to keep up the group's energy level. [ ] Very often Often [ ] Rarely [ ] Not at all 8. Members try to get quiet group members to contribute. [ ] Very often [ ] Often [ ] Rarely Not at all 9. All members participate in problem solving. [ ] Strongly agree Agree [ ] Disagree [ ] Strongly disagree 10. All members participate in the written report. [ ] Strongly agree Agree [ ] Disagree [ ] Strongly disagree Conflict resolution records/report on errant member(s) All group members worked hard on the project. There are any errant members....

Words: 436 - Pages: 2

Free Essay

Ccna

...CCNA 1 Chapter 1 V4.0 1. Which of the following descriptions are true regarding the management connections on a Cisco router? (Choose three.) They are non-network connections. They are used to connect the router to the rest of the production network. They are synchronous serial ports. They are used for initial router configuration. They are asynchronous serial ports. They are accessed using their assigned IP address. 2. The console port can be used for which of the following? (Choose three.) debugging. password recovery. routing data between networks. troubleshooting. connecting one router to another. 3. Which of the following describes the function of a WAN? connects peripherals in a single location. connects multiple networks in a single building. provides connectivity on a LAN. provides connectivity over a large geographic area. 4. An internetwork must include which of the following? (Choose three.) switching. static addressing. IETF standardization. dynamic or static routing. consistent end-to-end addressing. 5. ABC Company just purchased three new routers to start their company network. Which items are needed to establish a terminal session between a PC and the router for the initial configuration? (Choose three.) straight-through cable. terminal emulation software. rollover cable. RJ-45 to DB-9 connector. V.35 cable. 6. Terminal emulation software, such as HyperTerminal, can be used to configure a router. Which of the following......

Words: 1042 - Pages: 5

Premium Essay

Ccna Chapter 6

...280 prefix aggregation page 285 network prefix page 286 contiguous page 294 discontiguous address assignment page 280 supernet page 280 private addressing page 281 high-order bits page 282 supernetting page 294 This is a prepublication draft of the manuscript. The final book will publish in December and will be available for purchase at http://www.ciscopress.com/title/9781587132063. raft Manuscript Draft Ma cript Draft Manuscript Dra Manuscript Draft Manuscri raft Manuscript Draft Ma uscript Draft Manuscript raft Manuscript Draft Ma script Draft Manuscript D ft Manuscript Draft Manu ript Draft Manuscript Dra Manuscript Draft Manuscri t Draft Manuscript Draft M nuscript Draft Manuscript 280 Routing Protocols and Concepts, CCNA Exploration Companion Guide Prior to 1981, IP addresses used only the first 8 bits to specify the network portion of the address, limiting the Internet—then known as ARPANET—to 256 networks. Early on, it became obvious that this was not going to be enough address space. In 1981, RFC 791 modified the IPv4 32-bit address to allow three different classes or sizes of the networks: ■ ■ ■ Class A addresses, which used 8 bits for the network portion of the address Class B addresses, which used 16 bits for the network portion of the address Class C addresses, which used 24 bits for the network portion of the address This format became known as classful IP addressing. The initial development of classful addressing solved the......

Words: 10468 - Pages: 42

Free Essay

Chapter 11 Ccna

...ANS: T PTS: 1 REF: 310 MULTIPLE CHOICE 6. ANS: B PTS: 1 REF: 302 7. ANS: D PTS: 1 REF: 302 8. ANS: C PTS: 1 REF: 304-305 9. ANS: A PTS: 1 REF: 305 10. ANS: D PTS: 1 REF: 308 11. ANS: A PTS: 1 REF: 308 12. ANS: C PTS: 1 REF: 310 13. ANS: B PTS: 1 REF: 310 14. ANS: A PTS: 1 REF: 312 15. ANS: B PTS: 1 REF: 312 16. ANS: C PTS: 1 REF: 313 17. ANS: D PTS: 1 REF: 314 18. ANS: B PTS: 1 REF: 317 19. ANS: D PTS: 1 REF: 318 20. ANS: C PTS: 1 REF: 318 21. ANS: A PTS: 1 REF: 319 22. ANS: D PTS: 1 REF: 319 23. ANS: A PTS: 1 REF: 321 24. ANS: C PTS: 1 REF: 322-323 25. ANS: B PTS: 1 REF: 324 26. ANS: A PTS: 1 REF: 324 COMPLETION 27. ANS: High-Level Data Link Control (HDLC) High-Level Data Link Control HDLC PTS: 1 REF: 303 28. ANS: LCP link configuration PTS: 1 REF: 305 29. ANS: Consultative Committee on International Telephony and Telegraphy (CCITT) Consultative Committee on International Telephony and Telegraphy CCITT PTS: 1 REF: 308 30. ANS: Frame Relay access device (FRAD) Frame Relay access device FRAD PTS: 1 REF: 310 31. ANS: Data Link Connection Identifier (DLCI) Data Link Connection......

Words: 2989 - Pages: 12

Free Essay

Ccna

... გაუმჯობესებულ მოთმინების უნარს ხარვეზებისადმი. 1000BASE-T Ethernet იგი უზრუნველყოფს კატეგორია 5 ან უფრო ახალი კაბელით და ოთხივე წყვილის გამოყენებით სრულ-დუპლექსურ გადაცემას. გიგაბიტ Ethernet თითოეული წყვილზე იძლევა 125მბიტ/წამამდე სიჩქარეს, ოთხივე წყვილზე 500მბიტ/წამამდე სიჩქარეს.. თითოეული წყვილი მუშაობს სრულ-დუპლექსურ რეჟიმში და აორმაგებს 500მბიტ/წამს 1000მბიტ/წამამდე. 1000BASE-T იყენებს 4D-PAM5 კოდირებას, რათა მიიღოს 1გიგაბიტ/წამში გამტარუნარიანობა. ეს კოდირების სქემა იძლევა სიგნალის ოთხივე წყვილზე ერთდროულად გადაცემის საშუალებას. ის 8-ბიტიან ბაიტს გარდაქმნის ოთხივე წყვილში ერთდროულად გადაცემად კოდურ სიმბოლოდ(4D), რომლებიც იგზავნებიან გამტარის თითოეულ წყვილზე, ისევე როგორც PAM5-ის (5-level 157 Pulse Amplitude Modulated PAM5)შემთხვევაში.ეს იმას ნიშნავს, რომ თითოეული სიმბოლო აღნიშნავს ორ ბიტ ინფორმაციას. იმის გამო რომ ინფორმაცია მოგზაურობს ერთდროულად 4 განსხვავებულ გზაზე(წყვილზე), უნდა მოხდეს კადრების დაყოფა გადამცემთან და შეერთება მიმღებთან. დაავირდით სურათს ნახაზი 89. 1000BASE-T Ethernet საშუალებას გვაძლევს გავაგზავნოთ და მივიღოთ ინფორმაცია ერთი და იგივე კაბელზე ერთდროულად. ეს ტრაფიკი მუდმივად იწვევს კოლიზიებს. კოლიზიების მიზეზი არის კომპლექსური ვოლტაჟის მიმდევრობები(ექო) რომელიც მოყვება გადაცემულ სიგნალს. მიმღები იყენებს გამოცდილ ხერხებს როგორიც არის ექოს გაუქმება, პირველი დონის გადაგზავნიის შეცდომის გამოსწორებას (FEC) და წინდახედულად ვოლტაჟის დონნების 158 არჩევას, ამ ხერხების......

Words: 23016 - Pages: 93

Premium Essay

Ccna

... CCNA Portable Command Guide Second Edition Scott Empson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii CCNA Portable Command Guide, Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing July 2007 Library of Congress Cataloging-in-Publication Data Empson, Scott. Portable command reference / Scott Empson. -- 2nd ed. p. cm. ISBN 978-1-58720-193-6 (pbk.) 1. Computer networks--Examinations--Study guides. 2. Internetworking (Telecommunication)--Examinations--Study guides. 3. Electronic data processing personnel--Certification. I. Title. TK5105.5.E4352 2007 004.6--dc22 2007023863 ISBN-13: 978-1-5872-0193-6 ISBN-10: 1-58720-193-3 Warning and Disclaimer This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is......

Words: 64092 - Pages: 257

Premium Essay

Level

...reviewer to read further. Because your initial problem description is so important, we provide the following eight guidelines to help you create a fo­ cused and effective opening statement. Show the problem's importance. The opening statement should convince the reviewer that the project is important. For example: Just as overseas adaptations of the United States' social-psychological discoveries have contributed to their industrial success, so our failure to use that knowledge has com­ pounded our problems in competing with foreign goods. This project seeks modifica­ tions in the use of this knowledge that will be effective in our culture. The reason I think this is possible is . or A universal problem at federal, statl', and local levels is ensuring that funds intended for a progwm are used to enhance it rather than merely substituted for program funds al­ ready allocated. Accountants are extremely resourceful at moving money around to de­ feat legislative provisions intended to ensure enhancement. This project will search for successful legislative practices, both here and abroad, that accountants haven't been able to defeat. Contrast these brief examples with the opening statements in Warters's paragraph 1 in chapter 11, which gets to the problem in the third sentence. But 48 ADVICE COMMON TO MOST PROPOSALS DESCRIPTION OF THE PROBLEM 49 even Warters could be sharpened; consider this alternative first sentence: "If therapists who treat men who......

Words: 4660 - Pages: 19