思科ITE第二章

合集下载

思科 FindIT Network Discovery Utility 2.0 快速入门指南说明书

思科 FindIT Network Discovery Utility 2.0 快速入门指南说明书

Cisco Systems, Inc. 思科在全球设有 200 多家办事机构。

地址、电话号码和传真号码 均在思科网站上列出,网址为: /go/offices 。

思科 Small BusinessCisco FindIT Network Discovery Utility 版本 2.0快速入门指南文本部件编号: 78-21387-02本手册中的规定和信息如有变更,恕不另行通知。

我们相信本手册中的所有声明、信息和建议均准确可靠,但不提供任何明示或暗示的担保。

用户应承担使用产品的全部责任。

产品配套的软件许可证和有限担保在随产品一起提供的信息包中提供,且构成本文的一部分。

如果您找不到软件许可或有限担保,请与思科代表联系以索取副本。

思科执行的 TCP 报头压缩是对加州大学伯克利分校 (UCB) 开发的某一程序的修改,它是 UNIX 操作系统的 UCB 公用版的一部分。

保留所有权利。

Copyright © 1981,加利福尼亚州大学董事会。

无论本手册中是否有任何其他担保,这些供应商的所有文档文件和软件均按“原样”提供,可能包含缺陷。

思科及其上述供应商不承担任何明示或暗示的担保, 包括(但不限于)商品适销性、对特定用途的适用性、非侵权担保,或因任何交易、使用或贸易行为而产生的担保责任。

在任何情况下,对于任何间接、特殊、连带发生或偶发的损坏,包括(但不限于)因使用或无法使用本手册而导致的任何利润损失或数据损失/损坏,思科及其供应商概不负责,即使思科及其供应商已获知此类损坏的可能性也不例外。

思科和思科徽标是思科和/或其附属公司在美国和其他国家/地区的注册商标。

要查看思科的商标列表,请访问此 URL:/go/trademarks。

文中提及的第三方商标为其相应所有人的财产。

使用“合作伙伴”一词并不暗示思科和任何其他公司之间存在合作关系。

(1110R)本文档中使用的任何互联网协议 (IP) 地址和电话号码并不代表实际地址和电话号码。

(完整版)思科ite6.0第四章考试答案

(完整版)思科ite6.0第四章考试答案

第四章考试答案1. 而消极的环境因素清理电脑内减少吗?•灰尘•EMI•生锈•防静电2. 哪个组件可以很容易地受到的直接喷射压缩空气清理电脑机箱内部的什么时候?•风扇•散热器•电力供应•CPU•电缆连接器3. 在生产地板,家具工厂笔记本电脑过程监测和报告。

生产楼环境是80华氏度(27摄氏度)左右。

湿度水平相当高70%左右。

空气循环风扇安装在天花板上。

木粉是普遍的。

这条件是最有可能影响在这种环境下使用的一台笔记本电脑吗?•温度•湿度•空气流•尘埃4. 蔬菜罐头工厂生产线使用笔记本电脑的监控。

生产环境有一个环境温度在华氏75度(摄氏24度)。

湿度水平约为30%。

噪音水平很高,由于灌装机械。

笔记本电脑是一个木制的盒子里,紧紧围绕着笔记本电脑三面。

哪个因素最可能影响在这种环境下使用的一台笔记本电脑吗?•房间的温度•湿度•噪音•笔记本电脑的容器5. 科学探险团队使用笔记本电脑。

科学家们正在研究的温度范围从-13华氏度(-25摄氏度)到80华氏度(27摄氏度)。

湿度水平约为40%。

噪音水平很低,但地形是粗糙和时速可以达到45英里(每小时72公里)。

在需要的时候,科学家们停止行走,使用笔记本电脑输入数据。

这条件是最有可能影响在这种环境下使用的一台笔记本电脑吗?•温度•湿度•粗糙的地形•风6. 创建一个预防性维护计划的一部分是什么?•记录每个维护任务的细节和频率•执行硬件升级•丢弃所有取代部分•执行一个法医审计的安全漏洞7. 电脑的技术员执行硬件维护在一个建筑工地。

什么任务应该技术员执行预防性维护计划的一部分?•把灰尘从摄入的粉丝。

•备份数据,格式化硬盘,重新安装数据。

•开发和安装法医跟踪软件。

•执行审计的所有软件安装。

8. 哪个任务应该是硬件维护程序的一部分吗?•审查安全更新。

•更新病毒定义文件。

•调整显示器的最佳分辨率。

•从硬盘中除尘。

•检查并确保任何松散的电缆。

9. 在测试的过程中几个可能的原因的理论问题,应该先测试吗?•最简单和最明显的•那些客户认为是最重要的•最复杂的,难以诊断•随机选择的选择10. 这两个项目可以用来帮助建立一个行动计划解决电脑问题?(选择两个。

思科第二章

思科第二章

1静态路由较之动态路由有哪两项优点(请选择两项。

)正确响应您的响应o由于静态路由不通过网络进行通告,因此比较安全。

o静态路由随着网络不断发展而进行扩展。

o正确实施静态路由所需的网络知识很少。

o静态路由比动态路由使用的路由器资源少。

o静态路由更容易进行大型网络配置。

静态路由需要充分了解整个网络才能正确实施。

它非常容易出错,且不能针对大型网络扩展。

静态路由使用更少的路由器资源,因为更新路由不需要计算。

由于它不通过网络通告,静态路由也比较安全。

此试题参考以下领域的内容:Routing and Switching Essentials静态路由2 请参见图示。

允许 PC A 和 PC B 在路由器 CPU 和网络带宽使用率最低的情况下访问互联网的路由解决方案是什么2请参见图示。

允许 PC A 和 PC B 在路由器 CPU 和网络带宽使用率最低的情况下访问互联网的路由解决方案是什么正确响应您的响应o配置一条从 R1 到 Edge 的静态路由和一条从 Edge 到 R1 的动态路由。

o配置一条从 R1 到 Edge 的静态默认路由、一条从 Edge 到互联网的默认路由以及一条从 Edge 到 R1 的路由。

o配置一条从 R1 到 Edge 的动态路由和一条从 Edge 到 R1 的静态路由。

o配置 R1 和 Edge 间的动态路由协议,并通告所有路由。

必须创建两个路由:在 R1 中创建默认路由来访问“边缘”,在“边缘”中创建静态路由以访问返回流量的 R1。

PC A 和 PC B 属于末端网络后,这就是最佳解决方案。

而且,静态路由使用的带宽少于动态路由。

此试题参考以下领域的内容:Routing and Switching Essentials静态路由3 浮动静态路由的正确语法是什么3浮动静态路由的正确语法是什么正确响应您的响应o ip route serial 0/0/0o ip route 120o ip route serial 0/0/0o ip route将浮动静态路由用作备用路由,常常是从动态路由协议学习的路由。

cisco

cisco

Chapter 2 Correct Answers:1. What are the key functions of encapsulation? (Choose three.)allows modification of the original data before transmissionidentifies pieces of data as part of the same communicationenables consistent network paths for communicationensures that data pieces can be directed to the correct receiving end deviceenables the reassembly of complete messagestracks delay between end devices2. What is a primary function of the trailer information added by the data link layer encapsulation?supports error detectionensures ordered arrival of dataprovides delivery to correct destinationidentifies the devices on the local networkassists intermediary devices with processing and path selection3. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)NetworkTransportPhysicalData LinkSession4. Which three statements best describe a Local Area Network (LAN)? (Choose three.)A LAN is usually in a single geographical area.The network is administered by a single organization.The connection between segments in the LAN is usually through a leased connection.The security and access control of the network are controlled by a service provider.A LAN provides network services and access to applications for users within a common organization.Each end of the network is generally connected to a Telecommunication Service Provider (TSP).5. Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?pipingPDUstreamingmultiplexingencapsulation6. What is the primary purpose of Layer 4 port assignment?to identify devices on the local mediato identify the hops between source and destinationto identify to the intermediary devices the best path through the networkto identify the source and destination end devices that are communicatingto identify the processes or services that are communicating within the end devices7. What can be identified by examining the network layer header?the destination device on the local mediathe destination host addressthe bits that will be transferred over the mediathe source application or process creating the data8. What is the purpose of the TCP/IP Network Access layer?path determination and packet switchingdata representation, encoding, and controlreliability, flow control, and error detectiondetailing the components that make up the physical link and how to access itthe division of segments into packets9. Which layer encapsulates the segment into packets?physicaldata linknetworktransport10. Select the statements that are correct concerning network protocols. (Choose three.)define the structure of layer specific PDU'sdictate how to accomplish layer functionsoutline the functions necessary for communications between layerslimit hardware compatibilityrequire layer dependent encapsulationseliminate standardization among vendors11. What is a PDU?corruption of a frame during transmissiondata reassembled at the destinationretransmitted packets due to lost communicationa layer specific encapsulation12. Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP session with "IP Phone 1" at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device "Cell A?"the destination devicean end devicean intermediate devicea media device13. Refer to the exhibit. Which term correctly identifies the device type that is included in the area B?sourceendtransferintermediary14. What device is considered an intermediary device?file serverIP phonelaptopprinterswitch15. Which characteristic correctly refers to end devices in a network?manage data flowsoriginate data flowretime and retransmit data signalsdetermine pathways for data16. Refer to the exhibit. Which set of devices contains only end devices?A, C, DB, E, G, HC, D, G, H, I, JD, E, F, H, I, JE, F, H, I, J17. During the encapsulation process, what occurs at the data link layer?No address is added.The logical address is added.The physical address is added.The process port number is added.18. Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.)Network A -- WANNetwork B -- WANNetwork C -- LANNetwork B -- MANNetwork C -- WANNetwork A -- LAN19. What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?physical, network, application, data link, presentation, session, transportapplication, physical, session, transport, network, data link, presentationapplication, presentation, physical, session, data link, transport, networkapplication, presentation, session, transport, network, data link, physicalpresentation, data link, session, transport, network, physical, application20. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)determine pathways for datainitiate data communicationsretime and retransmit data signalsoriginate the flow of datamanage data flowsfinal termination point for data flow21. Refer to the exhibit. What type of network is shown?WANMANLANWLANIn your opinion (this has no bearing on your grade), please indicate your interest in this course:(1) Not At All Interested(2) Slightly Interested(3) Interested(4) Very Interested(5) Completely InterestedIn your opinion (this has no bearing on your grade), please indicate how enthusiastic you are about the content of this course and the things you’re learning (or have learned):(1) Not At All Enthusiastic(2) Slightly Enthusiastic(3) Enthusiastic(4) Very Enthusiastic(5) Completely EnthusiasticIn your opinion (this has no bearing on your grade), please rate your motivation to do well in this course:(1) Not At All Motivated(2) Slightly Motivated(3) Motivated(4) Very Motivated(5) Completely MotivatedChapter 322. What are two forms of application layer software? (Choose two.)applicationsdialogsrequestsservicessyntax23. What is the purpose of resource records in DNS?temporarily holds resolved entriesused by the server to resolve namessent by the client to during a querypasses authentication information between the server and client24. What three protocols operate at the Application layer of the OSI model? (Choose three.)ARPDNSPPPSMTPPOPICMP25. Which application layer protocols correctly match a corresponding function? (Choose two.)DNS dynamically allocates IP addresses to hostsHTTP transfers data from a web server to a clientPOP delivers email from the client to the server email serverSMTP supports file sharingTelnet provides a virtual connection for remote access26. As compared to SSH, what is the primary disadvantage of telnet?not widely availabledoes not support encryptionconsumes more network bandwidthdoes not support authentication27. What are three properties of peer-to-peer applications? (Choose three.)acts as both a client and server within the same communicationrequires centralized account administrationhybrid mode includes a centralized directory of filescan be used in client-server networksrequires a direct physical connection between devicescentralized authentication is required28. Which email components are used to forward mail between servers? (Choose two.)MDAIMAPMTAPOPSMTPMUA29. What application layer protocol describes the services that are used for file sharing in Microsoft networks?DHCPDNSSMBSMTPTelnet30. Which statements are correct concerning the role of the MTA in handling email? (Choose three.)routes email to the MDA on other serversreceives email from the client's MUAreceives email via the POP3 protocolpasses email to the MDA for final deliveryuses SMTP to route email between serversdelivers email to clients via the POP3 protocol31. How does the application layer on a server usually process multiple client request for services?ceases all connections to the servicedenies multiple connections to a single daemonsuspends the current connection to allow the new connectionuses support from lower layer functions to distinguish between connections to the service 32. Which layer of the OSI model supplies services that allow user to interface with the network?physicalsessionnetworkpresentationapplicationtransport33. What is the automated service that matches resource names with the required IP address?HTTPSSHFQDNDNSTelnetSMTP34. Refer to the exhibit. What is the destination port for the communication that is represented on line 5?8012611553339126552035. What are two characteristics of peer-to-peer networks? (Choose two.)scalableone way data flowdecentralized resourcescentralized user accountsresource sharing without a dedicated server36. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)centralized administrationdoes not require specialized softwaresecurity is easier to enforcelower cost implementationprovides a single point of failure37. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)ASPFTPHTMLHTTPHTTPSIP38. What is the role of the OSI application layer?provides segmentation of dataprovides encryption and conversion of dataprovides the interface between the applications on either end of the networkprovides control of all the data flowing between the source and destination devices39. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.)User accounts are centralized.Security is difficult to enforce.Specialized operating system software is required.File permissions are controlled by a single computer.A computer that responds to a file sharing request is functioning as a server.40. What application layer protocol is commonly used to support for file transfers between a client and a server?HTMLHTTPFTPTelnet41. What are two characteristics of clients in data networks? (Choose two.)use daemonsinitiate data exchangesare repositories of datamay upload data to serverslisten for requests from serversChapter 442. Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.)This is a UDP header.This contains a Telnet request.This contains a TFTP data transfer.The return packet from this remote host will have an Acknowledgement Number of 43693.This is a TCP header.43. With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?0 to 255256 to 10220 to 10231024 to 204749153 to 6553544. Why are port numbers included in the TCP header of a segment?to indicate the correct router interface that should be used to forward a segmentto identify which switch ports should receive or forward the segmentto determine which Layer 3 protocol should be used to encapsulate the datato enable a receiving host to forward the data to the appropriate applicationto allow the receiving host to assemble the packet in the proper order45. Which two options represent Layer 4 addressing? (Choose two.)identifies the destination networkidentifies source and destination hostsidentifies the communicating applicationsidentifies multiple conversations between the hostsidentifies the devices communicating over the local media46. Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?session establishmentsegment retransmitdata transfersession disconnect47. Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)The local host is using three client sessions.The local host is using web sessions to a remote server.The local host is listening for TCP connections using public addresses.The local host is using well-known port numbers to identify the source ports.The local host is performing the three-way handshake with 192.168.101:1037.48. Which information is found in both the TCP and UDP header information?sequencingflow controlacknowledgmentssource and destination port49. Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?encapsulationflow controlconnectionless servicessession establishmentnumbering and sequencingbest effort delivery50. Which is an important characteristic of UDP?acknowledgement of data deliveryminimal delays in data deliveryhigh reliability of data deliverysame order data delivery51. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?1353801024172852. Which event occurs during the transport layer three-way handshake?The two applications exchange data.TCP initializes the sequence numbers for the sessions.UDP establishes the maximum number of bytes to be sent.The server acknowledges the bytes of data received from the client.53. Why is flow control used for TCP data transfer?to synchronize equipment speed for sent datato synchronize and order sequence numbers so data is sent in complete numerical orderto prevent the receiver from being overwhelmed by incoming datato synchronize window size on the serverto simplify data transfer to multiple hosts54. Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?TCPIPUDPHTTPDNS55. During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?The packets will not be delivered.The packets will be retransmitted from the source.The packets will be delivered and reassembled at the destination.The packets will be delivered and not reassembled at the destination.56. What mechanism is used by TCP to provide flow control as segments travel from source to destination?sequence numberssession establishmentwindow sizeacknowledgments57. Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?create a Layer 1 jam signalreach a timeout and resend the data that needs to be acknowledgedsend a RESET bit to the hostchange the window size in the Layer 4 header58. What is dynamically selected by the source host when forwarding data?destination logical addresssource physical addressdefault gateway addresssource port59. Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?applicationpresentationsessiontransportnetwork60. Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.61. What are two features of the User Datagram Protocol (UDP)? (Choose two.)flow controllow overheadconnectionlessconnection-orientedsequence and acknowledgementsChapter 562. When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two.)The router sends an ARP request to determine the required next hop address.The router discards the packet.The router forwards the packet toward the next hop indicated in the ARP table.The router forwards the packet to the interface indicated by the source address.The router forwards the packet out the interface indicated by the default route entry.63. What are the key factors to consider when grouping hosts into a common network? (Choose three.)gatewayspurposephysical addressingsoftware versiongeographic locationownership64. What is a component of a routing table entry?the MAC address of the interface of the routerthe destination Layer 4 port numberthe destination host addressthe next-hop address65. Which three statements are true about routes and their use? (Choose three.)If no route to the destination network is found, the packet is returned to the previous router.If the destination network is directly connected, the router forwards the packet to the destination host.If multiple network entries exist for the destination network, the most general route is used to forward the packet.If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router.If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route.If a host does not have a route manually configured for the destination network, the host will drop the packet.66. Refer to the exhibit. A network administrator notices that there are too many broadcasts on the network. What two steps can the network administrator take to resolve this problem? (Choose two.)Replace S2 with a router.Place all servers on S1.Disable TCP/IP broadcasts.Subnet the 192.168.0.0 /24 network.Disable all unused interfaces on the switches.67. What two characteristics are commonly associated with dynamic routing protocols? (Choose two.)require no device configurationprovide routers with up-to-date routing tablesrequire less processing power than static routes requireconsume bandwidth to exchange route informationprevent manual configuration and maintenance of the routing table68. What statement describes the purpose of a default route?A host uses a default route to transfer data to another host on the same network segment.A host uses a default route to forward data to the local switch as the next hop to all destinations.A host uses a default route to identify the Layer 2 address of an end device on the local network.A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists.69. What information is added during encapsulation at OSI Layer 3?source and destination MACsource and destination application protocolsource and destination port numbersource and destination IP address70. In a connectionless system, which of the following is correct?The destination is contacted before a packet is sent.The destination is not contacted before a packet is sent.The destination sends an acknowledgement to the source that indicates the packet was received.The destination sends an acknowledgement to the source that requests the next packet to be sent.71. Which IP packet field will prevent endless loops?type-of-serviceidentificationflagstime-to-liveheader checksum72. What type of routing uses information that is manually entered into the routing table?dynamicinteriorstaticstandard73. What are three common problems with a large network? (Choose three.)too few broadcastsperformance degradationsecurity issueslimited management responsibilityhost identificationprotocol compatibility74. Which intermediary devices could be used to implement security between networks? (Choose two.)routerhubswitchfirewallaccess pointbridge75. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?destination network addresssource network addresssource MAC addresswell known port destination address76. Refer to the exhibit. All devices shown in the exhibit have factory default settings. How many broadcast domains are represented in the topology that is shown?345781177. Which portion of the network layer address does a router use to forward packets?host portionbroadcast addressnetwork portiongateway address78. What is the purpose of a default gateway?physically connects a computer to a networkprovides a permanent address to a computeridentifies the network to which a computer is connectedidentifies the logical address of a networked computer and uniquely identifies it to the rest of the networkidentifies the device that allows local network computers to communicate with devices on other networks79. If the default gateway is configured incorrectly on the host, what is the impact on communications?The host is unable to communicate on the local network.The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remotenetworks.The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.There is no impact on communications.80. Refer to the exhibit. A network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to forward network packets out the network. Using the netstat -r command, the administrator would identify which address as the address to which all hosts send packets that are destined for an outside network?10.10.10.26127.0.0.110.10.10.610.10.10.1224.0.0.081. Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology that is shown? (Choose two.)192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network.10.0.0.1 is the next-hop address that is used by R1 to route a packet from the 192.168.12.0 network to the 10.0.0.0 network.192.168.0.1 is the next-hop address that is used by R1 to route a packet from the 192.168.12.0 network to the 172.16.0.0 network.172.16.0.1 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 to the 172.16.0.0 network.192.168.0.1 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0network.192.168.0.2 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network.82. Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?192.135.250.1192.31.7.1192.133.219.0192.133.219.1Chapter 683. Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)172.16.4.127 /26172.16.4.155 /26172.16.4.193 /26172.16.4.95 /27172.16.4.159 /27172.16.4.207 /2784. What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts?255.255.0.0255.255.255.0255.255.254.0255.255.248.085. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?172.16.0.0172.16.192.0172.16.192.128172.16.192.160172.16.192.168172.16.192.17686. What is the primary reason for development of IPv6?securityheader format simplificationexpanded addressing capabilitiesaddressing simplification87. What is the network address of the host 172.25.67.99 /23 in binary?10101100. 00011001.01000011.0000000010101100. 00011001.01000011.1111111110101100. 00011001.01000010.0000000010101100. 00011001.01000010.0110001110101100. 00010001.01000011. 0110001010101100. 00011001.00000000.0000000088. What two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away? (Choose two.)1 The router will discard the packet.2 The router will decrement the TTL value and forward the packet to the next router on the path to the destination host.3 The router will send a time exceeded message to the source host.4 The router will increment the TTL value and forward the packet to the next router on the path to the destination host.5 The router will send an ICMP Redirect Message to the source host.89. Which three IP addresses are private? (Choose three.)1 172.168.33.12 10.35.66.703 192.168.99.54 172.18.88.905 192.33.55.896 172.35.16.590. Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask?1 binary adding2 hexadecimal anding3 binary division4 binary multiplication5 binary ANDing91. Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?1 This is a useable host address.2 This is a broadcast address.3 This is a network address.4 This is not a valid address.92. Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic.1 /242 /163 /204 /275 /256 /2893. Refer to the exhibit. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC?1 The IP settings are not properly configured on the host.2 Internet Protocol is not properly installed on the host.3 There is a problem at the physical or data link layer.4 The default gateway device is not operating.5 A router on the path to the destination host has gone down.94. What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?1 an internet2 a network3 an octet4 a radix95. Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server's properties to allow connectivity to the network?1 IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.392 IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.333 IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway: 192.168.10.334 IP address: 192.168.10.39 subnet mask: 255.255.255.248 default gateway: 192.168.10.315 IP address: 192.168.10.254 subnet mask: 255.255.255.0 default gateway: 192.168.10.196. Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks?1 255.255.255.2482 255.255.255.2243 255.255.255.1924 255.255.255.2405 255.255.255.1286 255.255.255.25297. What three facts are true about the network portion of an IPv4 address? (Choose three.)1 identifies an individual device2 is identical for all hosts in a broadcast domain3 is altered as packet is forwarded4 varies in length5 is used to forward packets6 uses flat addressing98. Which statements are true regarding IP addressing? (Choose two.)1 NAT translates public addresses to private addresses destined for the Internet.2 Only one company is allowed to use a specific private network address space.3 Private addresses are blocked from public Internet by router.4 Network 172.32.0.0 is part of the private address space.5 IP address 127.0.0.1 can be used for a host to direct traffic to itself.。

思科第4学期第2章答案

思科第4学期第2章答案

1一家拥有 10 名员工的小型公司使用单个 LAN 在计算机之间共享信息。

哪种 类型的 Internet 连接适合此公司?由当地电话服务提供商提供的拨号连接能够使公司方便且安全地连接员工的虚拟专用网络通过当地服务提供商建立的私有专用线路通过当地服务提供商提供的宽带服务(如 DSL )答案 说明 最高分值correctness of response Option 42对于这种小型办公室,比较适合通过被称为数字用户线路 (DSL) 的常见宽带服务实现 Internet 连接,这种服务由当地的电话服务提供商提供。

由于员工人数很少,带宽的问题并不突出。

如果公司较大,在远程站点有分支机构,则专用线路会更加适合。

如果公 司员工需要通过 Internet 与公司联系,则采用虚拟专用网。

2哪种网络情况需要使用 WAN ?员工工作站需要获取动态分配的 IP 地址。

员工在出差时需要通过 VPN 连接到公司电子邮件服务器。

分支机构的员工需要与同一园区网络上的另一座建筑物内的公司总部共享文件。

员工需要访问托管在其建筑物内 DMZ 中的公司 Web 服务器上的网页。

答案 说明 最高分值correctness of response Option 22当出差的员工需要通过 WAN 连接到公司电子邮件服务器时,VPN 将通过 WAN 连接在员工笔记本电脑与公司网络之间创建一个安全隧道。

通过 DHCP 获取动态 IP 地址是 LAN 通信的功能。

在企业园区的不同建筑物之间共享文件可通过 LAN 基础设施来实现。

DMZ 是企业 LAN 基础设施内一个受保护的网络。

3当使用数字租用线路来提供客户与服务提供商之间的连接时,需要使用哪两种 设备?(请选择两项。

)接入服务器CSU第 2 层交换机DSU拨号调制解调器答案说明最高分值correctness of responseOption 2 and Option 4 are correct.2数字租用线路需要通道服务单元 (CSU) 和数据服务单元 (DSU)。

思科网络课件计算机网络双语教程第二章

思科网络课件计算机网络双语教程第二章
Communicating over the Network
Network Fundamentals – Chapter 2
ITE PC v4.0 Chapter 1
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Public
1
Objectives
–Benefits include • assists in protocol design • fosters competition • changes in one layer do not affect other layers • provides a common language
ITE PC v4.0 Chapter 1
ITE PC v4.0 Chapter 1
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Public
5
Network Structure
End Devices and their Role in the Network
–End devices form interface with human network & communications network
Explain network protocols
Network protocols are used
to allow devices to
communicate
successfully
ITE PC v4.0 Chapter 1
© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Chap 2 Summary

Cisco Chap 2 Summary

Types of Cables1.Connecting a DTE to a DCE2.Connecting two DTEs directly to eac h otherSpecification for DTE/DCE interface1.Mechanical/Physical (number of pins & connector type)2. Electrical (Define voltage level for 0 and 1 )3. Functional (Func performed by assigning meaning to S ignalLine)4. Procedural (Sequence of ev ents for transmitting data )Null Modem- Comm method to directly c onnect two DTEs using RS-232 serial cableNull Modem Connection- Transmit (Tx) and rec eive (Rx) lines are crosslinkedWAN Encapsulation Protocols1.HDLC2.PPP3.SLIP4.X.25 or LAPB5.Frame Relay6.ATMSerial Line Internet Protocol (SLIP)- A standard protoc ol f or point-to-point serial connections using TCP/IP.X.25/Link Access Procedure, Balanced (LAPB)- X.25 specifies LAPB, a data link lay er protocol- Predecessor to Frame Relay.Frame Relay- Eliminates some of the time-consuming processes (such as error correction and flow control) employed in X.25ATM- The cell relay in w hich dev ices send multiple servic e ty pes (v oice, v ideo, or data) in f ixed-leng th (53-byte) cells.Fixed-length Cells- Allow proc essing to occ ur in hardw are, thereby reducing transit delay s. - 53 bytesHigh-level Data Link Control (HDLC)-Default enc ap type on point-point c onn, when link uses 2 Cisc o devices - Bit-oriented sy nchronous data link layer protocol developed by the ISO - Current standard is ISO13239- Devfrom Synchro Data Link Control (SDLC) standard proposed in 1970s- Provides both c onnection-oriented and connectionless service- Defines a Lay er 2 framing structure that allows f or flow control and errorcontrol throug h the use of acknow ledgments- Uses a frame delimiter/flag to mark the beg inning &end of each frameHLDC Frame Types1.Flag2.Address3.Control4.Protoc ol5.Data6.FCSFlag- Field that initiates and terminates error check ing- The frame always starts and ends with an 8-bit f lag f ield- The bit pattern is 01111110Address- Field that contains the HDLC address of the secondary station- Can contain a specific address, a group address, or a broadcast addressControl- HDLC defines 3 types of frames, each w/a diffcontrol field format:rmation (I) frame - Carry upper layer inf o & some control info2.Supervisory (S) frame-Prov ide control information.3.Unnumbered (U) frame -Support ctrl purposes & arn’t sequencedProtocol- HDLC protocol specif ies the protoc ol type enc apsulated w/in the fram eData-Contains a Path Info Unit (PIU) Exchang e Identific ation (XID) infoFrame Check Sequenc e (FCS)- Precedes the ending f lag delimiter and is usually a cyclic redundancycheck (CRC) calc ulation remainderCisco HLDC (cHDLC)-Proprietary- Frames contain a field for identifying the network protocol beingencapsulated- Default enc ap method used by Cisco devices on sy nchronous serial lines- PPP Encapsulation is used to connec t to a non-Cisco devic e- Used as a point-to-point protoc ol on leased lines bet 2 Cisc o devicesencapsulation hdlc command-SYNTAX: encapsulation hdlc- Used cmd in priv ileg ed mode to re-enable HDLCshow interfaces serial command-show interfaces serial0/0/0-Display s information specific to serial interfaces- When HDLC is conf igured, "Enc apsulation HDLC" is shown- Verify proper configuration of HDLC or PPP encapsulationshow ip int brief command-Used in troubleshooting a serial interfac e-5 possible problem states can be identified1.Serial x is down, line protocol is dow n2.Serial x is up, line protoc ol is down3.Serial x is up, line protoc ol is up (looped)4.Serial x is up, line protoc ol is down (disabled)5.Serial x is administrativ ely down, line protocol is downTroubleshooting a Serial Interface (See Reference)Serial Line Internet Protocol (SLIP)- Standard protocol for point-point serial connusing a variation of TCP/IP- Predecessor of PPPPoint-to-Point Protocol (PPP)- Successor to SLIP providing router-router and host-network conn ov ersynchro and asynchro circ uits- Provides multiprotocol LAN-WAN connections handling TCP/IP, IPX, andAppleTalk simultaneously- Used over Twisted Pair,Fiber-Optic Lines, and Satellite Transm ission- Provide transport over ATM, Frame Relay,ISDN&Optical Link- Allows y ou to authenticate connections using either PAP/CHAP- Allows the simultaneous use of multiple netw ork layer protocols- Does not impose any restrictions regarding transmission rate other thanthose imposed by the partic ular DTE/DCE interface in use- Most of the w ork done by PPP is at the data link and network layers bythe LC P and NCPsLCP-Sets up the PPP c onnection and its parameters-Establishes, config ures, and tests the data-link connection-Establishes the point-to-point link-Negotiates and sets up c ontrol options on the WAN data link, w hich arehandled by the NC Ps-Provides automatic c onfig uration of the interfac es at each end,including:-Handling varying limits on packet size-Detecting common misconf iguration errors-Terminating the link-Determining w hen a link is functioning properly or when it is failingNCP-Handle hig her lay er protocol conf igurations, and the LC P terminates thePPP connection-Include functional f ields c ontaining standardized codes to indicate thenetwork lay er protoc ol that PPP enc apsulatesPPP Features Not Available in HDLC1.The link quality management feature monitors the quality of the link. Iftoo many errors are detected, PPP tak es the link down.2.PPP supports PAP and CHAP authenticationPPP Components1.HDLC protocol for encapsulating datag rams ov er point-to-point links.2.Extensible LC P to estab, conf igure, and test the data link connection.3.Family of Network Control Protocols (NC Ps) f or establishing andconfiguring different network lay er protoc olsPPP Configuration on Physical Layer1.Asynchronous serial2.Synchronous serial3.HSSI4.ISDNPhases of Establishing a PPP SessionPhase 1: Link establishment and configuration negotiation- LCP must 1st open the connection and neg otiate configuration optionsPhase 2: Link quality determination (optional)- LCP tests the link to determine w hether the link quality is sufficient tobring up netw ork layer protocols.Phase 3: Netw ork layer protocol conf iguration negotiation- After LC P has finished the link quality determ ination phase,theappropriate NCP can separately config ure the network layer protocols,and bring them up and take them down at any timeClasses of LCP Frames1.Link-establishment frames2.Link-maintenance frames3.Link-termination framesLink-EstablishmentFrames-Estab&Conf ig a link-Configure-Request, C onfig ure-Ack, Configure-Nak, and Config ure-Rej ectLink-Maintenance Frames- Manage and debug a link- Code-Reject, Protocol-Reject, Echo-Request, Ec ho-Reply, & Discard-ReqLink-Termination Frames-Terminate a link-Terminate-Request and Terminate-AckLCP Packet Contents1.Code- field identifying the ty pe of LCP packet2.Identifier- field so that requests and replies c an be matched3.Length - field indicating the size of the LCP packet4.Data - Packet ty pe-specif ic dataAAA/TACACS- Dedicatedserverusedtoauthenticateusers.。

思科Tetration Analytics产品手册说明书

思科Tetration Analytics产品手册说明书

产品手册Cisco Tetration AnalyticsCisco Tetration Analytics™平台可提供全面的可视性、基于行为的应用见解和零信任模式迁移,实现了高效的数据中心运营。

产品概述借助需要快速部署应用的虚拟化、容器化和工作负载移动技术以及支持应用组件之间不断变化的通信模式,现代数据中心实现了动态化运营。

得益于这些技术进步,东 - 西流量占数据中心流量的比例达到 76%。

此外,当今的数据中心还要求网络具备高可用性,并可以消除计划停机。

这种动态环境带来了三项主要挑战:●提供对数据中心基础设施中的流量的全面可视性并实现长期保留数据,以便进行调查和分析●了解数据中心内部所有应用的通信和依赖性●建立白名单策略模型,实时识别行为偏差,并执行调查分析操作全新的 Cisco Tetration Analytics 平台可使用算法方法收集丰富的流量遥感勘测数据并执行高级分析,从而成功应对这些挑战。

此平台可在数据中心扩展时以线速收集这种丰富的遥感勘测数据。

该算法方法包括无人管理式机器学习技术和行为分析,可提供全面解决方案。

此平台具备以下优势:●每秒能够处理数百万数据流,在几分钟内即可应用智能算法并提供切实可行的见解●无需汇聚即可捕捉并存储数千亿条遥感勘测记录,从而支持长期调查分析●提供对应用组件及其通信和依赖性的全面可视性,实现网络内部零信任模式使用传感器收集丰富的 Cisco Tetration 遥感勘测数据。

第一版中包含两种类型的传感器:硬件和软件(主机)传感器。

借助这两种传感器,该解决方案可同时支持现有(棕地)和新增(绿地)数据中心基础设施。

图 1 显示 Cisco Tetration Analytics 平台的高级架构。

图 1. Cisco Tetration Analytics 平台架构Cisco Tetration Analytics 平台包含三个主要功能层:●数据收集层:该层主要由轻型传感器组成,它们可作为分析平台的“眼睛”和“耳朵”。

思科第一学期第二章答案

思科第一学期第二章答案

1 下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)正确响应您的响应确定数据传输路径发起数据通信重新定时和重新传输数据信号发送数据流管理数据流数据流最后的终止点此试题参考以下领域的内容:CCNA Exploration: 网络基础知识• 2.1.6 网络介质2 请选择关于网络协议的正确陈述。

(选择三项。

)正确响应您的响应定义特定层PDU 的结构规定实现协议层功能的方式概述层与层之间通信所需的功能限制了对硬件兼容性的需要需要取决于协议层的封装过程杜绝厂商之间的标准化此试题参考以下领域的内容:CCNA Exploration: 网络基础知识• 2.3.2 网络协议• 2.4.1 使用分层模型的优点• 2.4.6 发送和接收过程3 封装的两个功能是什么?(选择两项)正确您的响应响应跟踪终端设备之间的延迟为通信提供统一的网络路径在传输前可以修改原始数据标识属于同一通信的数据片段确保数据片段可以转发到正确的接收端设备此试题参考以下领域的内容:CCNA Exploration: 网络基础知识• 2.2.4 网络表示方式4 数据链路层封装添加的报尾信息有何主要功能?正确响应您的响应支持差错校验确保数据按照顺序到达确保送达正确目的标识本地网络中的设备帮助中间设备进行处理和路径选择此试题参考以下领域的内容:CCNA Exploration: 网络基础知识• 2.4.6 发送和接收过程• 2.4.7 OSI 模型5 OSI 模型哪两层的功能与TCP/IP 模型的网络接入层相同?(选择两项)正确响应您的响应网络层传输层物理层数据链路层会话层此试题参考以下领域的内容:CCNA Exploration: 网络基础知识• 2.4.8 比较OSI 模型与TCP/IP 模型6 什么是PDU?正确响应您的响应传输期间的帧损坏在目的设备上重组的数据因通信丢失而重新传输的数据包特定层的封装此试题参考以下领域的内容:CCNA Exploration: 网络基础知识• 2.3.3 协议簇和行业标准7 以下哪种特征正确代表了网络中的终端设备?正确响应您的响应管理数据流发送数据流重新定时和重新传输数据信号确定数据传输路径此试题参考以下领域的内容:CCNA Exploration: 网络基础知识• 2.1.4 终端设备及其在网络中的作用8请参见图示。

思科第二学期第二章习题答案

思科第二学期第二章习题答案

1下列哪一个地址可以用来总结网络172.16.1.0/24、172.16.2.0/24、172.16.3.0/24 和172.16.4.0/24?172.16.0.0/21172.16.1.0/22172.16.0.0 255.255.255.248172.16.0.0 255.255.252.02请参见图示。

目的地为172.16.0.0 网络的数据包会被如何转发?Router1 会执行递归查找,数据包将从S0/0 接口发出。

Router1 会执行递归查找,数据包将从S0/1 接口发出。

没有与172.16.0.0 网络关联的匹配接口,因此数据包将被丢弃。

没有与172.16.0.0 网络关联的匹配接口,因此数据包将采用“最后选用网关”,从S0/2 接口发出。

3指向下一跳IP 的静态路由在路由表中会显示怎样的管理距离和度量?管理距离为0,度量为0管理距离为0,度量为1管理距离为1,度量为0管理距离为1,度量为14两个独立子网上的主机之间无法通信。

网络管理员怀疑其中一个路由表中缺少路由。

可以使用哪三条命令来帮助排查第 3 层连通性问题?(选择三项。

)pingshow arptracerouteshow ip routeshow interfaceshow cdp neighbor detail5请参见图示。

为使主机 A 能够连接到172.16.0.0 网络上的主机B,应在Router1 上配置哪种静态路由?ip route 192.168.0.0 172.16.0.0 255.255.0.0ip route 172.16.0.0 255.255.0.0 192.168.0.1ip route 172.16.0.0 255.255.0.0 S0/0/1ip route 172.16.0.0 255.255.0.0 S0/0/06Router# show cdp neighbors命令会显示下列哪些内容?(选择三项。

(企业形象)(实例教程)CISCO模拟一看就会教程CPT(优质)

(企业形象)(实例教程)CISCO模拟一看就会教程CPT(优质)

(企业形象)(实例教程)CISCO模拟一看就会教程CPT网路设备模拟器Packet Tracer教程第一章认识Packet Tracer软件 (1)第二章交换机的基本配置与管理 (2)第三章交换机的端口配置与管理 (3)第四章交换机的Telnet远程登陆配置 (5)第五章交换机的端口聚合配置 (7)第六章交换机划分Vlan配置 (9)第七章三层交换机基本配置 (12)第八章利用三层交换机实现VLAN间路由 (13)第九章快速生成树配置 (16)第十章路由器的基本配置 (19)第十一章路由器单臂路由配置 (21)第十二章路由器静态路由配置 (23)第十三章路由器RIP动态路由配置 (25)第十四章路由器OSPF动态路由配置 (28)第十五章路由器综合路由配置 (31)第十六章标准IP访问控制列表配置 (34)第十七章扩展IP访问控制列表配置 (36)第十八章网络地址转换NAT配置 (39)第十九章网络端口地址转换NAPT配置 (41)第一章认识Packet Tracer软件Packet Tracher介绍●Packet Tracer是Cisco公司针对CCNA认证开发的一个用来设计、配置和故障排除网络的模拟软件。

●Packer Tracer模拟器软件比Boson功能强大,比Dynamips操作简单,非常适合网络设备初学者使用。

学习任务1、安装Packer Tracer;2、利用一台型号为2960的交换机将2pc机互连组建一个小型局域网;3、分别设置pc机的ip地址;4、验证pc机间可以互通。

实验设备Switch_2960 1台;PC 2台;直连线PC1IP:192.168.1.2Submask:255.255.255.0Gateway:192.168.1.1PC2IP:192.168.1.3Submask:255.255.255.0Gateway:192.168.1.1PC1 ping PC2 ReplyPC2 ping PC1 ReplyPC2 ping Gateway Timeout第二章交换机的基本配置与管理实验目标●掌握交换机基本信息的配置管理。

思科第二

思科第二

1如图所示的网络在路由流量时存在问题,怀疑这可能是编址方案所造成。

该图中使用的编址方案存在什么问题?指定给Router1 的Ethernet0 接口的地址是该子网的广播地址。

在Router1 和Router2 之间的串行链路上配置的子网与指定给Router3 上Ethernet0 的子网有重叠。

Router1 的Serial0 接口与Router2 的Serial0 位于不同的子网。

指定给Router2 上Ethernet0 的子网与指定给Router3 上Ethernet0 的子网有重叠。

2请参见图示。

网络管理员要将一个带有50 台主机的新子网添加至R3。

要保证新子网可获得足够地址,同时尽量减少为其分配哪个子网地址?192.168.1.0/24192.168.1.48 /28192.168.1.32/27192.168.1.64/263出现路由环路的两个原因是什么?(选择两项)收敛速度缓慢静态路由配置错误路由通过两种路由协议获知在同一台路由器上同时使用静态路由和动态路由连接到Internet 的路由器上缺少默认路由4下列哪两项是路由器的功能?(选择两项。

)连接多个IP 网络。

通过使用第 2 层地址控制数据流。

确定发送数据包的最佳路径。

管理VLAN 数据库。

扩大广播域。

5哪三项是CDP 的特性?(选择三项。

)测试第 2 层连通性提供安全层工作在OSI 第2 层和第3 层默认在每个接口上启用用于调试第 4 层连通性问题提供关于已启用CDP 的直连设备的信息6下列有关路由器上的启动配置的说法,哪两项是正确的?(选择两项)路由器使用启动配置文件来启动POST。

如果找不到Cisco IOS,路由器会进入设置模式。

引导程序在NVRAM 中搜索启动配置。

如果找不到启动配置文件,路由器会进入ROMMON 模式。

如果默认位置没有启动配置文件,路由器会搜索TFTP 服务器。

7路由器启动时,如果没有boot system命令,则查找Cisco IOS 的默认顺序是什么?ROM、TFTP 服务器、闪存闪存、TFTP 服务器、ROM闪存、NVRAM、TFTP 服务器NVRAM、TFTP 服务器、闪存8请参见图示。

思科网络技术学院教程:网络基础知识课件-第2章-网络通信

思科网络技术学院教程:网络基础知识课件-第2章-网络通信

44
2.5.1 Addressing in the Network
每个数据片段必须包含充分的标识信息才能到达正确目 的地. 为了将数据从一台主机上运行的源应用程序成功传送到 另一台主机上运行的目的应用程序,必须包含几种不同 类型的地址.
思科网络技术学院理事会.


18
2.2.1 局域网
为家庭、建筑或园区提供服务的网络视为局域网(LAN) 网络基础架构在以下方面可能存在巨大差异:
•覆盖的区域大小
•连接的用户数量
•可用的服务数量和类型
思科网络技术学院理事会.

19
2.2.2 广域网
思科网络技术学院理事会.

11
2.1.4 终端设备及其在网络中的作用
终端设备包括:
•网络打印机 •VoIP 电话 •安全摄像头 •移动手持设备(如无线条码扫描仪、PDA) •计算机(工作站、笔记本电脑、文件服务器、Web 服务器)
思科网络技术学院理事会.
思科网络技术学院理事会.

25
2.3.2网络协议
网络设备共享有关于其 他网络之间通信的信息 时使用的流程.
思科网络技术学院理事会.

26
2.3.2网络协议
设备之间传送错误消息 和系统消息的方式与时 间.
思科网络技术学院理事会.
思科网络技术学院理事会.

42
2.4.8 比较 OSI 模型与 TCP/IP 模型
比较 OSI 模型与 TCP/IP 模型
思科网络技术学院理事会.

43
2.5 网络编址
思科网络技术学院理事会.

网络通信
Network Fundamentals – Chapter 2

网络设备Cisco Icon II

网络设备Cisco Icon II

Woman End User
Woman Sitting来自6Other(1)
Presentation_ID
© 2002, Cisco Systems, Inc. All rights reserved.
7
Packet® Icon Library
Current as of February 14, 2002
File Cabinet
Man and Woman
Globe Cell Phone Modem
Handheld Device Central Site with Access Server Inventory
Monitor
PDA
Presentation_ID
© 2002, Cisco Systems, Inc. All rights reserved.
Packet Icons: Products
Appliance General Cisco 6705 Integrated Access Device Cisco 6732 Integrated Access Device Cisco 7500 Series Router Cisco 7505 Router Cisco 7507 Router Cisco Aironet Access Point Cisco Broadband Service Manager Cisco BTS 10200 Softswitch Cisco Cache Engine Cisco Catalyst 6500 Series Router Cisco Catalyst 8500 Series Switch
Session Number Presentation_ID
© 2002, Cisco Systems, Inc. All rights reserved.
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
相关文档
最新文档