Pages

Powered By Blogger

mencari

Sabtu, 16 Februari 2013

Sejarah Multimedia

Salam Sejahtera  ^_^

Saya mau sharing tentang Sejarah Multimedia yang cukup penting menurut saya monggo 


·         Istilah multimedia berawal dari teater, bukan computer. Pertunjukan yang memanfaatkan lebih dari satu medium seringkali disebut pertunjukan multimedia.
·         Sistem multimedia dimulai pada akhir 1980-an dengan diperkenalkannya Hypercard oleh Apple pada tahun 1987 dan pengumuman oleh IBM pada tahun 1989 mengenai perangkat lunak audio visual connection(AVC) dan video adhapter card ps/2
·         Pada tahun 1994 diperkerkirakan ada lebih dari 700 produk dan sistem multimedia dipasaran.
·         Multimedia memungkinkan pemakai komputer untuk mendapatkan output dalam bentuk yang jauh lebih kaya dari pada media table dan grafik konvensional. pemakai dapat melihat gambar tiga dimensi, foto, video bergerak atau animasi dan mendengar suara stereo, perekaman suara atau alat musik.
·         Beberapa sistem multimedia bersifat interaktif, memungkinkan pemakai memilih output dengan mouse atau kemampuan layar sentuh untuk mendapatkan dan menjalankan aplikasi itu.
 
Pengertian multimedia
 
Ø  Multi-banyak, Media-sarana berkomunikasi untuk melewatkan informasi.
Ø  Suatu sistem yang terdiri dari perangkat keras, perangkat lunak dan alat – alat lain seperti televisi, monitor video dan sistem piringan optik atau sistem stereo yang dimaksudkan untuk menghasilkan penyajian audio visual yang utuh.
 
Beberapa pakar mengartikan multimedia sebagai berikut :
Multimedia secara umum merupakan kombinasi 3 element yaitu suara,gambar dan teks (Mc Cormick,1996)
Multimedia adalah kombinasi dari paling sedikit 2 media input atau output dari data,media ini dapat audio (suara, musik), animasi, video, teks, grafik, dan gambar (Turban dkk, 2002)
Multimedia merupakan alat yang dapat menciptakan prestasi yang dinamis dan intraktif yang mengkombinasikan teks grafik, animasi, audio dan gambar video (Robin dan Linda, 2001)
Multimedia adalah pemanfaatan computer untuk membuat dan menggabungkan teks, grafik, audio, gambar bergerak (video dan animasi) dengan menggabungkan link dan tool yang memungkinkan pemakai melakukan navigasi, berintraksi, berkreasi dan berkomunikasi (Hofstetter, 2001)
 
“ Multimedia adalah pemanfaatan komputer untuk membuat dan menggabungkan teks, grafik, audio, gambar bergerak (video dan animasi) dengan menggabungkan link dan tool yang memungkinkan pemakai melakukan navigasi, berinteraksi, berkreasi, dan berkomunikasi “
 
Kelebihan Multimedia
 
Dari berbagai media informasi, multimedia memilki suatu kelebihan tersendiri yang tidak dapat digantikan oleh penyajian media informasi lainya.
 
Kelebihan dari multimedia adalah menarik indra dan menarik minat, karena merupakan gabungan antara pandangan,suara dan gerakan.
 
Lembaga riset dan penerbitan komputer yaitu Computer Technology Research (CTR) menyatakan bahwa orang hanya mampu mengingat 20 %  dari yang dilihat  dan 30 % dari yang didengar. Tetapi orang mengingat 50 %  dari yang dilihat dan didengar dan 80 % dari yang dilihat, didengar dan dilakukan sekaligus. 
                                                             
 
 
Komponen Multimedia
 
Menurut James A. Senn, multimedia terbagi dalam beberapa element-element multimedia sebagai berikut :

a.       Teks
Bentuk data multimedia yang paling mudah disimpan dan dikendalikan adalah teks. Teks dapat membentuk kata, surat atau narasi dalam multimedia yang menyajikan bahasa. Kebutuhan teks bergantung kepada penggunaan aplikasi multimedia.

b.      Image (grafik)
Alasan untuk menggunakan gambar dalam presentasi atau publikasi multimedia adalah karena lebih menarik perhatian dan dapat mengurangi kebosanan dibandingkan dengan teks. Gambar dapat meringkas menyajikan data yang kompleks dengan cara yang baru dan lebih berguna. Gambar juga dapat berfungsi sebagai ikon, yang bila dipadukan dengan teks, merupakan opsi yang bisa dipilih.
 
c.       Bunyi (audio)
PC multimedia tanpa bunyi hanya disebut unimedia, bukan multimedia. Bunyi dapat ditambahkan dalam multimedia melalui suara, musik dan efek-efek suara. Seperti halnya grafis, dapat membeli ataupun menciptakan sendiri.
 
d.      Video
Video menyediakan sumberdaya yang kaya dan hidup bagi aplikasi multimedia.
 
e.       Animasi
Dalam multimedia, animasi merupakan penggunaan komputer untuk menciptakan gerak pada layer.

f.       Virtual Reality
Virtual reality merupakan penggunaan multimedia untuk penerapan secara langsung.
 
NTSC System
NTSC (National Television System Committee) merupakan sistem milik Amerika Serikat dengan lebar layar 525 baris,  digunakan di negara Kanada, Greenland, Mexico, Kuba, Jepang, Philipina, Puerto Rico dan beberapa negara di Amerika Selatan.
Resolution :     NTSC              640 X 480
                        NTSC DV       720 X 480
                        NTSC WideScreen  720 X 480
                        NTSC D1        720 X 486
                        NTSC Square Pix   720 X 540
Frame Rate      : 30 fps
 
PAL dan SECAM System
Banyak negara yang menggunakan kedua sistem ini yakni PAL (Phase Alternating Line) atau SECAM (Sequential Color and Memory). Kedua sistem ini memiliki lebar layar 625 baris
Resolution       : PAL D1/DV                                     : 720 X 576
                          PAL D1/DV Square Pix       : 768 X 576
                          PAL D1/DV             WideScreen     : 720 X 576
Frame Rate      : 25 fps
 
 HDTV
HDTV (High Definition Television) adalah standar internasional baru untuk dunia televisi. HDTV dapat digunakan dalam 1.125 baris.
Resolution  1280 X 720
Frame Rate 29.9 Fps
 
Software Multimedia
Software Multimedia
  1. Viewing       : Untuk melihat hasil pemgolahan multimedia (Winamp, power DVD)
2.    Capturing   : Untuk mendapatkan hasil rekaman yang didapat melalui device multimedia. (software scanner, capture, camdig)
  1. Editing        : Untuk mengolah bahan multimedia menjadi senuah sajian (adobe)
  2. Authoring    : Software Multimedia untuk keperluan interaktif (director, flash)
Semoga Bermanfaat ^_^

Rabu, 13 Februari 2013

Tutorial Belajar, Panduan, Sintak dan Printeh SQL


SQL merupakan singkatan dari Strukture Query Language. Yaitu sebuah bahasa yang digunakan untuk mengakses data – data yg tersimpan pada sebuah database. Pengguan SQL dapat dengan bermacam – macam cara, baik dengan penggunaan manual (embedded) atau dengan cara interaktif.

Secara umum SQL hanya memiliki 3 komponen penting, yg digunakan untuk mendefinisikan, memanipulasi serta sebagai pengontrol data yg ada pada sebuah database.
Tutorial Belajar SQL - Panduan SQL - Sintak SQL adalah sebagai berikut:

Data Definisi Language (DDL)
DDL merupakan bahasa atau perintah yg digunakan untuk mendefinisikan data seperti menulis, menghapus dan mengatur atau mengubah data.

Perintah – perintah yang ada pada komponen DDL yaitu CREATE, DROP, dan ALTER.

CREATE
Create digunakan untuk membuat database, membuat tabel, membuat view dan membuat index.

Membuat database
Contoh
Create database namadatabase

Membuat tabel lengkap dengan kolomnya

Contoh
Create table namatabel
(namakolom1 typedata1,
namakolom2 typedata2,
namakolom3 typedata3)

Type data dapat berupa char(), int, numerik dan sebagainya sesuai denga nama kolom.

Membuat view
view merupakan bentuk alternatif penyajian data dari satu tabel atau lebih, beberapa tujuan membuat view adalah meningkatkan keamanan data serta penyederhanaan bagi para pengguna.
Contoh
Create view namaview (kolom1, kolom2, . . . .)
as select statement from namatabel
[with check option]

Keterangan :
Namaview : nama view yang dibuat
Column : nama atribut untuk view
Statement : atribut yang dipilih dari tabel database
Namatabel : nama tabel yang ada pada basis data

Membuat index
yaitu berfungsi untuk membuat index

Contoh
create [unique] index namaindex
on namatabel (namakolom)


DROP
Drop adalah perintah yang di gunakan untuk menghapus data – data yang telah di simpan pada database.

Drop tabel
yaitu menghapus tabel

Contoh
Drop table namatabel

Drop view
menghapus view yang telah di buat

Contoh
Drop view namaview

Drop index
Menghapus index

Contoh
Drop index namaindex

hal yang perlu di ingat adalah penghapusan atau penggunaan perintah view tidak dapat di urungkan.


ALTER
kegunaan dari perintah alter adalah untuk merubah atribut pada suatu tabel

Contoh
Alter table namatabel
Modify (namakolom typekolom) untuk mengganti type kolom dan nama kolom.

alter table namatabel
add (namakolom type kolom[[before, namakolom]]) menambah kolom.

alter table namatabel
drop (namakolom typekolom) untuk menghapus kolom pada sebuah tabel.



Data Manipulation Language (DML)
INSERT
insert berfungsi untuk menambah niali pada suatu tabel.

Contoh sintak
insert into namatabel values (‘value1’, ‘value2’,’ ...’)

keterangan : value adalah nilai yang ingin dimasukkan ke dalam kolom
UPDATE
Berfungsi untuk merubah record atau nilai didalam suatu kolom

Contoh sintak
Update namatabel SET namakolom = recordbaru where kondisi

keterangan recordbaru di ubah sesuai dengan nama nilai baru yang akan di ubah
DELETE
Menghapus record atau nilai didalam suatu kolom pada tabel tertentu

Contoh
DELETE namakolom from namatabel where kondisi


SELECT
select adalah perintah yang di gunakan untuk menampilkan nilai atau recor yang di pilih

Contoh
select namakolom from namatabel

Data Control Language (DCL)
GRANT
grant berfungsi untuk memberikan izin akses kepada pengguna

Contoh
Grant privilages on namatabel to namapengguna

artinya memebrikan izin akses kepada namapengguna
REVOKE
yaitu untuk mencabut izin akses kepada pengguna yang telah di beri izin akses


Contoh
REVOKE privileges ON namatabel from namapengguna

Macam – macam fungsi pada_SQL
Tanda *
digunakan untuk memilih semua isi tabel

Misal
select * from namatabel
FungsiWHERE
berfungsi untuk menentukan suatu pilihan atau kondisi tertentu

Misal
select * from namatabel where namakolom = “kondisi”


Fungsi DISTINC
digunakan untuk menghilangakan nilai ganda pada suatu kolom atau tabel

Contoh
select distinct namakolom from namatabel
Operator AND
digunakan untuk memilih nilai yang memiliki kondisi sama antara kondisi1 dan kondisi2
contoh sintak
select * from namatabel where kondisi1=’..’ AND kondisi2 = ‘...’
Operator OR
digunakan untuk memilih suatu tabel atau kolom dan menampilkan nilai jika salah satu kondisi  dari kondisi yang di tentukan memenuhi

Contoh
select * from namatabel where kondisi1=’..’ OR kondisi2 = ‘...’
Fungsi NOT
di gunakan untuk memilih suatu nilai pada tabel atau kolom yang tidak sama dengan kondisi yang telah di tentukan

Contoh
selesct * from namatabel where namakolom not = ‘kondisi’
Fungsi ORDER BY
digunakan untuk memilih suatu nilai dari tabel atau kolom dan mengurutkan data tersebut

Contoh
select namakolom from nama tabel
where namakolom = ‘kondisi’
order by namakolompengurut desc/asc

keterangan : namakolompengurut adalah dasar pengurutan
Fungsi GROUP BY
berfungsi untuk menelompokkan suatu data, namun pada pada fungsi ini juga biasanya paling banyak melibatkan operator pembanding dan fungsi perhitungan

Misal
select namakkolom from namatabel
group by namakolomyangakandikelompokkan
having count namakolom >4

keterangan having count adalah fungsi yang digunakan untuk mendukung fungsi group by.
Funsi BETWEEN
fungsi between digunakan untuk memilih nilai di antara kondisi yang di tentukan
Contoh
select * from namatabel where ‘kondisi’ between ‘kondisi’ – ‘kondisi’
Fungsi PERHITUNGAN
a.    Count untuk mengitung jumlah baris atau kolom
b.    Sum di gunakan untuk menjumlahkan suatu nilai yag memiliki type data numerik
c.    Avg berfungsi untuk membuat nilai rata – rata
d.    Max berfungsi untuk mencari nilai terbesar dan
e.    Min untuk mencri nilai terkecil

Contoh sintak
select avg namakolom from namatabel
Fungsi JOIN
INNER JOIN (SIMPLE JOIN)
yaitu bentuk kondisi join dimana di antara 2 atau lebih tabel yang ingin di join memiliki hubungan sehingga semua isi tabel yang di pilih bisa di tampilkan


Contoh
select * from namatabel1 inner join namatabel2
where namatabel1.kondisisama = namatabel1. kondisisama
NON-EQUIJOIN
adalah kondisi join yang tidak menagndung opertor sama dengan (=)

Contoh
select * from namatabel1 inner join namatabel2
where namatabel1.kondisisama and namatabel1. kondisisama
OUTER JOIN
yaitu bentuk nilai join yang memenuhi daari kedua  tabel, Outer join terdiri dari 2 yaitu,
LEFT OUTER JOIN
yaitu di tandai dengan operator (+), tabel asal atau yang memiliki tanda (+) akan dilengkapi dengan tabel yang lainnya dan berada pada sebelah kiri.

Contoh sintak
select tabel1.kolom, tabel2.kolom
from tabel1, tabel2
where tabel1.kolom (+) = tabel2.kolom

atau

select tabel1.kolom, tabel2.kolom
from tabel1 left outer join tabel2
on tabel1.kolom = tabel2.kolom
RIGHT OUTER JOIN
Sama dengan left outer join namun peletakan data atai nilai dari tabel lain berada pada sebelah kanan tabel asal.

Contoh sintak
select tabel1.kolom, tabel2.kolom
from tabel1, tabel2
where tabel1.kolom = tabel2.kolom(+)

atau

select tabel1.kolom, tabel2.kolom
from tabel1 right outer join tabel2
on tabel1.kolom = tabel2.kolom


SELF JOIN
Self join adalah suatu bentuk kondisi join tau penggabungan yang terjadi pada dua tabel yg sama kondisinya dari kedua tabel tersebut dan menambahkan suatu kata dengan kondisi yang sama antara kedua tabel

Contoh sintak
Select tabel1.namakolom ||’ works for’ || tabel2.namakolom
from namatabel1, namatabel2
where namatabel1.kolompersmaantabel1 = namakolom2.kolompersamaantabel2

misalkan akan menghasilkan

rola works for hengki

Rola adalah kondisi yang dipilih pada tabel1
Hengki adalah kondisi dipilih pada tabel2
works for adalah kata yang di tambah dari perintah di atas.


Semoga bermanfaat ^_^


Jumat, 08 Februari 2013

CCNA 2 Chapter 11 2011 V4.0 Answers 100%


CCNA 2 Chapter 11 2011 V4.0 Answers 100%
1.







Refer to the exhibit. All routers are running OSPF. What cost would JAX put in its routing table for the 10.0.0.0/24 network?
2
156
1564
1785
1787
2.

Refer to the exhibit. Router1 and Router2 are running OSPF. The show ip ospf neighbor command reveals no neighbors. What is a possible cause?
OSPF autonomous system IDs do not match.
OSPF process IDs do not match.
OSPF network types are identical.
OSPF hello or dead timers do not match.

3. A fully converged five router OSPF network has been running successfully for several weeks. All configurations have been saved and no static routes are used. If one router looses power and reboots, what information will be in its routing table after the configuration file is loaded but before OSPF has converged?
All routes for the entire network will be present.
Directly connected networks that are operational will be in the routing table.
Because the SPF algorithm has not completed all calculations, no routes will be in the table.
A summary route for all previously learned routes will automatically appear in the routing table until all LSPs have been received by the router.
4.




Refer to the exhibit. What configuration statements would give the results that are shown in the output of the show ip protocols command?
B(config)# int fa0/0
B(config-if)# router-id 192.168.1.5
B(config)# int lo0
B(config-if)# ip address 192.168.1.5
B(config)# router ospf 1
B(config-router)# router-id 192.168.1.5

B (config)# router ospf 1
B(config-router)# ip address 192.168.1.5
5.




Refer to the exhibit. When OSPF is operational in the exhibited network, what neighbor relationship is developed between Router1 and Router2?
A FULL adjacency is formed.
A 2WAY adjacency is formed.
Router2 will become the DR and Router1 will become the BDR.
Both routers will become DROTHERS.
6. What does OSPF use to calculate the cost to a destination network?
bandwidth
bandwidth and hop count
bandwidth and reliability
bandwidth, load, and reliablity
7.




Refer to the exhibit. The routers in the exhibit are using default OSPF configuration settings to advertise all attached networks. If all of the routers start at the same time, what will be the result of the DR and BDR elections for this single area OSPF network? (Choose three.)
HQ will be DR for 10.4.0.0/16.
Router A will be DR for 10.4.0.0/16.
HQ will be BDR for 10.4.0.0/16.
Router A will be DR for 10.5.0.0/16.
Remote will be DR for 10.5.0.0/16.
Remote will be BDR for 10.5.0.0/16.
8. What does OSPF use to reduce the number of exchanges of routing information in networks where large numbers of neighbors are present? (Choose two.)
root router
backup root router
domain router
backup domain router
designated router
backup designated router
9.




Refer to the exhibit. All routers have been configured with the interface priorities that are shown. All routers were restarted simultaneously. The results of the DR/BDR election are shown. What can be concluded about this network?
Router C cannot win a DR election under any circumstances.
If the link for interface 192.168.1.4 goes down, router B will become the new DR.
The highest router ID was most likely determined via an OSPF router-id statement or statements.
If a new router is added with a higher router ID than router D, it will become the DR.
10.




Refer to the exhibit. Router A is correctly configured for OSPF. Which OSPF configuration statement or set of statements was entered for router B to generate the exhibited routing table?
B(config-router)# network 192.168.1.0 0.0.0.3 area 0
B(config-router)# network 10.16.1.0 0.0.0.224 area 0
B(config-router)# network 10.16.1.0 255.255.255.224 area 0
B(config-router)# network 192.168.1.0 255.255.255.255 area 0
B(config-router)# network 10.0.0.0 255.255.255.255 area 0
11.




Refer to the exhibit. Assuming that the routers have default interface OSPF priorities and no configured loopback interfaces, what two roles will router B play on each network segment? (Choose two.)
DR for network 192.168.1.200
BDR for network 192.168.1.200
DROTHER on 192.168.1.200
DR for network 192.168.1.204
BDR for network 192.168.1.204
DROTHER on network 192.168.1.204
12.




Refer to the exhibit. Routers A, B, C, and D are all running OSPF with default router IDs and OSPF interface priorities. Loopback interfaces are not configured and all interfaces are operational. Router D is the DR and router C is the BDR. What happens immediately after the following commands are entered on router A?
A(config)# interface fa0/0
A(config-if)# ip ospf priority 255
A will become the DR. D will become the BDR.
A will become the DR. C will remain the BDR.
D will remain the DR. A will become the BDR.
D will remain the DR. C will remain the BDR.
13. What range of networks will be advertised in the OSPF updates by the command Router1(config-router)# network 192.168.0.0 0.0.15.255 area 100?
192.168.0.0/24 through 192.168.0.15/24
192.168.0.0/24 through 192.168.15.0/24
192.168.15.0/24 through 192.168.31.0/24
192.168.15.0/24 through 192.168.255.0/24
192.168.16.0/24 through 192.168.255.0/24
14.




Refer to the exhibit. RouterA, RouterB, and RouterC in the diagram are running OSPF on their Ethernet interfaces. Router D was just added to the network. Routers are configured with the loopback interfaces (Lo 0) that are shown in the exhibit. What happens to the OSPF DR/BDR after RouterD is added to the network?
RouterB takes over as DR and RouterD becomes the BDR.
RouterD becomes the BDR and RouterA remains the DR.
RouterD becomes the DR and RouterA becomes the BDR.
RouterC acts as the DR until the election process is complete.
RouterD becomes the DR and RouterB remains the BDR.
There is no change in the DR or BDR until either current DR or BDR goes down.
15.




Refer to the exhibit. How many OSPF adjacencies must be formed to build the complete topology if a DR or BDR were not elected in this OSPF network?
4
5
6
7
10
16. What is the default administrative distance for OSPF?
90
100
110
115
120
17.




Refer to the exhibit. Which command sequence on RouterB will redistribute a gateway of last resort to the other routers in OSPF area 0?
RouterB(config)# router ospf 10 RouterB(config-router)# gateway-of-last-resort 172.16.6.6
RouterB(config)# ip route 0.0.0.0 0.0.0.0 serial 0/0/0
RouterB(config)# ip route 0.0.0.0 0.0.0.0 172.16.6.6
RouterB(config)# router ospf 10
RouterB(config-router)# default-information originate

RouterB(config)# router ospf 10
RouterB(config-router)# default-network 172.16.6.6 0.0.0.3 area 0
RouterB(config)# ip route 0.0.0.0 0.0.0.0 172.16.6.6
RouterB(config)# ip default-route 0.0.0.0 0.0.0.0 172.16.6.6
RouterB(config)# router ospf 10
RouterB(config-router)# redistribute ip default-route
18. Which two statements describe the use of OSPF DR/BDR elections? (Choose two.)
Elections are always optional.
Elections are required in all WAN networks.
Elections are required in point-to-point networks.
Elections are required in broadcast multiaccess networks.
Elections are sometimes required in NBMA networks.
19.




Refer to the exhibit. What does the “2″ stand for in the router ospf 2 statement?
The number 2 is the autonomous system number.
The number 2 indicates the number of networks advertised by OSPF.
The number 2 identifies this particular instance of OSPF on this router.
The number 2 indicates the priority of the OSPF process on this router.
20.




Refer to the exhibit. The network administrator wants to set the router ID of Router1 to 192.168.100.1. What steps can the administrator take to accomplish this?
shut down the loop back interface
use the OSPF router-id 192.168.100.1 command
use the clear ip ospf process command
nothing, the router-id of Router1 is already 192.168.100.1
21.
Refer to the exhibit. What must be received between neighbors to prevent the dead time that is shown in the exhibit from reaching zero?
any traffic through the router interfaces
routing database updates
hello packets
BPDU packets
22.




Refer to the exhibit. What does the “O*E2″ from the “O*E2 0.0.0.0/0 [110/1] via 192.168.1.1, 00:05:34, Serial0/0″ line represent?
an internal type 2 OSPF route.
an external OSPF route at least two hops away.
an external OSPF route from two different sources.
an external OSPF route that will not increment in cost.
a default route.
The route was distributed into OSPF from a type 2 router.
23.




Refer to the exhibit. Which network command or set of commands will cause OSPF to be enabled for any R1 interface connected to the exhibited subnets?
R1(config-router)# network 10.0.0.0 0.0.0.0 area 0
R1(config-router)# network 10.1.0.0 0.0.0.255 area 0 R1(config-router)# network 10.1.1.0 0.0.0.255 area 0 R1(config-router)# network 10.1.2.4 0.0.0.3 area 0
R1(config-router)# network 10.1.0.0 0.0.0.255 area 0
R1(config-router)# network 10.2.0.0 0.0.0.255 area 0
R1(config-router)# network 10.0.0.0 0.0.255.255 area 0
24.




Refer to the exhibit. What is the cost of the route to the 10.0.0.0 network?
2
110
1786
1.544
25. What three parameters must be indentical between OSPF routers in order to form an adjacency? (Choose three.)
area id
K-values
metric value
hello interval
network type
interface type

CCNA 2 Chapter 10 2011 V4.0 Answers 100%


CCNA 2 Chapter 10 2011 V4.0 Answers 100%
1. What action does a link-state router take immediately upon receipt of an LSP from a neighboring router?
floods the LSP to neighbors
calculates the SPF algorithm
runs the Bellman-Ford algorithm
computes the best path to the destination network
2. Why is it difficult for routing loops to occur in networks that use link-state routing?
Each router builds a simple view of the network based on hop count.
Routers flood the network with LSAs to discover routing loops.
Each router builds a complete and synchronized view of the network.
Routers use hold-down timers to prevent routing loops.

3.







Refer to the exhibit. What kind of information would be seen in an LSP sent from router JAX to router ATL?
hop count
uptime of the route
cost of the link
a list of all the routing protocols in use
4. To achieve network convergence, what three steps does each link state router take? (Choose three.)
use automatic summarization to reduce the size of routing tables
build a Link State Packet (LSP) containing the state of each directly connected link
flood the LSP to all neighbors, who then store all LSPs received in a database
discover neighbors and establish adjacencies using the hello packet sent at regular intervals
construct a complete map of the topology and compute the best path to each destination network
use the DUAL FSM to select efficient, loop-free paths, and insert routes into the routing table
5.




Refer to the exhibit. When Router D is configured to use a link-state routing protocol and is added to the network, what is the first thing that it does to begin learning the network topology?
It sends LSP packets to Routers B and C.
It sends LSP packets to all routers in the network.
It sends Hello packets to all routers in the network.
It sends information about its directly connected neighbors to Routers A and E.
It sends information about its directly connected neighbors to all routers in the network.
It learns about its directly connected networks when its interfaces reach the up state.
6. A new network administrator is given the task of selecting an appropriate dynamic routing protocol for a software development company. The company has over 100 routers, uses CIDR and VLSM, requires fast convergence, and uses both Cisco and non-Cisco equipment. Which routing protocol is appropriate for this company?
RIP version 2
IGRP
EIGRP
OSPF
BGP
7. What two events will cause a link state router to send LSPs to all neighbors? (Choose two.)
30 second timer expires
whenever the network topology changes
immediately after the Bellman-Ford algorithm has run
immediately after the DUAL FSM has built the topology database
upon initial startup of router or routing protocol
8. What is the final step in the link state routing process?
successors are placed into the routing table
SPF computes best path to each destination network
LSPs are flooded to all neighbors to converge the network
DUAL algorithm is run to find best path to destination networks
9.




Refer to the exhibit. What does JAX do with link-state packets from ORL?
sends out its updated routing table to both ORL and BOS routers
sends out the individual link-state packets out the interface connected to BOS
queries BOS to see if it has a better route
only adds it to the local routing table and performs no other actions
10. What two statements correctly describe the link state routing process? (Choose two.)
each router in the area floods LSPs to all neighbors
all routers in the area have identical link state databases
LSPs use the reserved multicast address of 224.0.0.10 to reach neighbors
routing loops are prevented by running the Diffusing Update Algorithm (DUAL)
Reliable Transport Protocol (RTP) is the protocol used by for the delivery and reception of LSPs
11. Which database or table must be identical on all link-state routers within an area in order to construct an accurate SPF tree?
routing table
adjacency table
link-state database
neighbor table
topology database
12.




Refer to the exhibit. Which statement correctly describes the path traffic would take from the 10.0.0.0/24 network to the 192.168.1.0/24 network if a link-state routing protocol was in use?
BOS -> ATL because this path is the least hops
BOS -> ATL because this path is highest cost
BOS -> ORL -> JAX -> ATL because this path is the lowest cost
traffic would load balance across all links
13. What feature do modern link-state protocols provide to minimize processing and memory requirements?
splitting routing topologies into smaller areas
assigning lower process priorities to route calculations
using update timers to restrict routing updates
strict split horizon rules to reduce routing table entries
14. What speeds up convergence in a network using link-state routing?
updates triggered by network changes
updates sent at regular intervals
updates sent only to directly connected neighbors
updates that include complete routing tables
15. Which algorithm is run by link-state routing protocols to calculate the shortest path to destination networks?
DUAL
Dijkstra
Bellman-Ford
Diffie-Hellman
16. What are some of the advantages of using a link-state routing protocol instead of a distance vector routing protocol? (Choose two.)
The topology database eliminates the need for a routing table.
Frequent periodic updates are sent to minimize the number of incorrect routes in the topological database.
Routers have direct knowledge of all links in the network and how they are connected.
After the inital LSA flooding, they generally require less bandwidth to communicate changes in a topology.
Link-state protocols require less router processor power than distance vector protocols.
17.




Refer to the exhibit. If all routers and interfaces are configured to use a link-state routing protocol, from which routers will router D receive hello packets?
A and E
B and C
A, B, C, and E
C only
18. Which two routing protocols use Dijkstra’s shortest path first algorithm? (Choose two.)
RIPv1
RIPv2
IS-IS
BGP
EIGRP
OSPF
19. When are link-state packets sent to neighbors?
every 30 seconds
every 180 seconds
after the holddown time expires
when a link goes up or down
when a routing loop occurs
20. What are two advantages of using a link-state routing protocol instead of a distance vector routing protocol? (Choose two.)
The topology database eliminates the need for a routing table.
Each router independently determines the route to each network.
Link-state protocols require less router processor power than distance vector protocols.
After the inital LSP flooding, they generally require less bandwidth to communicate changes in a topology.
Frequent periodic updates are sent to minimize the number of incorrect routes in the topological database.
21. To achieve network convergence, what three steps does each link state router take? (Choose three.)
use automatic summarization to reduce the size of routing tables
build a Link State Packet (LSP) containing the state of each directly connected link
flood the LSP to all neighbors, who then store all LSPs received in a database
send hello packages at regular intervals to discover neighbors and establish adjacencies
construct a complete map of the topology and compute the best path to each destination network
use the DUAL FSM to select efficient, loop-free paths, and insert routes into the routing table

CCNA 2 Chapter 9 2011 V4.0 Answers 100%


CCNA 2 Chapter 9 2011 V4.0 Answers 100%
1. What two actions will the EIGRP DUAL FSM take if a link to a network goes down? (Choose two.)
put the route into passive mode
query neighbors for a new route
search routing table for a feasible successor
run the SPF algorithm to find a new successor
search topology table for a feasible successor
2.

Host 192.168.1.66 in the network illustrated is unable to ping host 192.168.1.130. How must EIGRP be configured to enable connectivity between the two hosts? (Choose two.)
R1(config-router)# network 192.168.1.128
R1(config-router)# auto-summary
R1(config-router)# no auto-summary
R2(config-router)# no auto-summary
R2(config-router)# auto-summary
R2(config-router)# network 192.168.1.64

3.

Refer to the exhibit. The company is using EIGRP with an autonomous system number of 10. Pings between hosts on networks that are connected to router A and those that are connected to router B are successful.
However, users on the 192.168.3.0 network are unable to reach users on the 192.168.1.32 network. What is the most likely cause of this problem?

IP classless is enabled and is causing the packet to drop.
The command network 192.168.1.32 was not issued on router C.
The routers are not configured in the same EIGRP routing domain.
Automatic summarization of the networks is causing the subnetted routes to be dropped.
4. What information is maintained in the EIGRP topology database for a destination route? (Choose three.)
the routing protocol
the feasible distance of the route
the highest cost of the route
the SRTT value for the route
the route cost as advertised by the neighboring router
the physical address of the gateway interface
5. On a router running EIGRP, what database would maintain a list of feasible successors?
routing table
neighbor table
topology table
adjacency table
6.

Refer to the exhibit. What is indicated by the P at the beginning of the topology entry?
the route is in a stable state
the route is a preferred route
DUAL is searching for a better route to this destination
the exit interface is in passive mode and EIGRP advertisements are blocked
7. In the command router eigrp 20, what is the purpose of the number 20?
specifies the administrative distance for all EIGRP routes
identifies the autonomous system number this EIGRP process will advertise
determines what metric is added to all advertised routes
indicates the number of addresses in the EIGRP routing domain
8.

Refer to the exhibit. In the topology table, what do the numbers 3011840 and 3128695 represent?
the route metric that is applied to those EIGRP routes for this router
the trustworthiness of the routing information source
the composite of the hop count and bandwidth to that destination network
the total metric for that network as advertised by the EIGRP neighbor
9. Which two statements describe characteristics of EIGRP? (Choose two.)
EIGRP is a distance vector routing protocol.
EIGRP supports classless routing and VLSM.
EIGRP is classified as a link-state routing protocol.
EIGRP uses TCP for reliable delivery of EIGRP update packets.
With EIGRP, loop-free paths are achieved through the use of hold-down timers.
EIGRP sends a periodic update every 30 minutes.
10.

Refer to the exhibit. Network 192.168.0.0/28 goes down. What type of packet does Router2 immediately send to Router1 and Router3?
a query for network 192.168.0.0/28
an acknowledgment packet to 224.0.0.9
an update packet that is sent to 255.255.255.255
a packet that contains the new routing table for R2
unicast update packets to 192.168.1.1 and 192.168.2.1
11.

Refer to the exhibit. Which command will advertise the 192.168.1.64/30 network but not the 192.168.1.32 network on router A?
network 192.168.1.0
network 192.168.1.0 255.255.255.0
network 192.168.1.64 0.0.0.3
network 192.168.1.64 0.0.0.7
network 192.168.1.64 0.0.0.255
12. What administrative distance would a router assign to a default route in EIGRP that is learned from a source external to the autonomous system?
1
5
70
90
170
190
13. In which of the following tables does the EIGRP DUAL algorithm store the primary route to a destination? (Choose two.)
routing
topology
neighbor
path
shortest path
14. Which of the following types of routes will be denoted by EX in EIGRP routing table entries? (Choose two.)
routes learned from other routing protocols
routes learned from any non-adjacent EIGRP routers
any route with a hop count metric higher than 224
EIGRP routes that originate in different autonomous systems
all passive routes in the routing table
15. Which term defines a collection of networks under the administrative control of a single entity that presents a common routing policy to the Internet?
autonomous system
contiguous networks
process ID
BGP
16.

Refer to the exhibit. EIGRP is the only routing protocol enabled on this network. No static routes are configured on this router. What can be concluded about network 198.18.1.0/24 from the exhibited output?
A route to network 198.18.1.0/24 is not listed in the routing table.
Packets that are destined for 198.18.1.0/24 will be forwarded to 198.18.10.6.
EIGRP will perform equal cost load balancing across two paths when forwarding packets to 198.18.1.0/24.
The router with interface 172.16.3.2 is a successor for network 198.18.1.0/24.
17.

Refer to the exhibit. All interfaces have been configured with the bandwidths that are shown in the exhibit. Assuming that all routers are using a default configuration of EIGRP as their routing protocol, what path will packets take from the 172.16.1.0/16 network to the 192.168.200.0/24 network?
A,B,E
A,C,E
A,D,E
Packets will load balance across the A,B,E and A,C,E paths.
Packets will load balance across the A,B,E and A,D,E paths.
Packets will load balance across the A,C,E and A,D,E paths.
18. By default, which two metrics are used by EIGRP to determine the best path between networks?
MTU
load
delay
bandwidth
reliability
19. Which of the following statements describes the bounded updates used by EIGRP?
Bounded updates are sent to all routers within an autonomous system.
Partial updates are sent only to routers that need the information.
The updates are sent to all routers in the routing table.
Updates are bounded by the routers in the topology table.
20. The show ip eigrp topology command output on a router displays a successor route and a feasible successor route to network 192.168.1.0/24. In order to reduce processor utilization, what does EIGRP do when the primary route to this network fails?
The router sends query packets to all EIGRP neighbors for a better route to network 192.168.1.0/24.
The DUAL FSM immediately recomputes the algorithm to calculate the next backup route.
Packets that are destined for network 192.168.1.0/24 are sent out the default gateway instead.
The backup route to network 192.168.1.0/24 is installed in the routing table.
21.




Refer to the exhibit. Based on the output of show ip eigrp neighbors, what are two possible problems with adjacencies between Router1 and Router2? (Choose two.)
The routers are configured with different EIGRP process IDs.
Automatic summarization was disabled.
The hello timer for R1 was altered.
The serial interfaces for both routers are in different networks.
No feasible successors were found.
22.




Refer to the exhibit. This is the debug output from 2 directly connected EIGRP routers. They are not forming an adjacency. What is the cause?
one router is a non-cisco router
they have different autonomous-system numbers
they are using difference sequence numbers
they are sending incorrect hello types

CCNA 2 Chapter 8 2011 V4.0 Answers 100%



CCNA 2 Chapter 8 2011 V4.0 Answers 100%
1.

Refer to the exhibit. Router B receives a packet with a destination address of 10.16.1.97. What will router B do?
drop the packet
forward the packet via the route to 10.16.1.0
forward the packet via the route to 10.16.1.64
use the default route
2. A network is converged and the routing tables are complete. When a packet needs to be forwarded, what is the first criterion used to determine the best path in the routing table?
the route with the smallest AD
the route with the longest address and mask match to the destination
the route with the highest bandwidth
the route with the best combination of AD and lowest cost

3.

Refer to the exhibit. Which statement correctly describes this network?
EIGRP is being used
There is at least one parent and one child route
192.168.2.0, 192.168.3.0, and 192.168.4.0 networks are child routes
Traffic going to 172.16.3.0 will be directed to s 0/0/1
4.

Refer to the exhibit. Router1 has been issued the ip classless command. What happens to packets destined to host 172.16.3.10?
they are dropped
sent to default gateway
forward out interface Serial0/0/1
forward out interface FastEthernet 0/0
5. The following entry is displayed in the routing table:
R 192.168.8.0/24 [120/2] via 192.168.4.1, 00:00:26, Serial0/0/1
What type of route is this?

a level 1 parent route
a level 1 supernet route
a level 1 ultimate network route
a level 2 child route
a level 2 ultimate child route
6. What determines if the router implements a classless route lookup process?
Child routes are present in the routing table.
A classless routing protocol has been configured on the router.
The command ip classless is enabled on the router.
Multiple routes with different masks to the same destination are in the routing table.
Routing table entries have a next-hop IP address and an exit interface for each child route.
7.

Refer to the exhibit. How many routes in this output qualify for use as ultimate routes?
3
4
5
6
7
8.

Refer to the exhibit. What protocol was used to distribute the routing information for the network 172.16.1.4?
RIPv1
RIPv2
EIGRP
OSPF
9.

Refer to the exhibit. What can be determined from this output?
The router will have to perform recursive lookups to forward a packet destined for 192.168.2.213/24.
The parent route for these networks was removed from the routing table.
A route to 192.168.0.0/25 would be classified as a supernet route for the routes listed in the routing table.
All of the routes listed are network routes.
10.

Refer to the exhibit. The graphic contains partial contents of the routing table on router E. Router E is running version 12.3 of the IOS and is configured for default routing behavior. Router E receives a packet to forward. Which route in the routing table will be searched first and why?
172.16.1.0/25 because it is the first ultimate route
0.0.0.0/0 because it is the lowest network number
172.16.0.0/25 because it is the first level 1 route
172.18.0.0/15 because it has the shortest mask
11.

Refer to the exhibit. Router1 is running IOS version 12.2. What will the network administrator need to do so that packets for unknown child routes of 172.16.0.0/24 will not be dropped?
issue the ip default-network command
use a classful routing protocol such as RIPv1
enable either OSPF or ISIS as the routing protocol
issue the ip classless command
do nothing, ip classless is on by default
12.

Refer to the exhibit. With the ip classless command issued, what will router R2 do with a packet destined for host 172.16.4.234?
drop the packet
send packet out Serial 0/0/1
send packet to network 0.0.0.0
send packet out FastEthernet 0/0
13. A router has the following entries in its routing table:
S 192.168.0.0/24 [1/0] via 192.168.128.2
O 192.168.0.0/25 [110/2175] via 172.16.1.1, 00:02:15, FastEthernet0/1
D 192.168.0.0/25 [90/22455] via 172.16.2.2, 00:12:15, Serial0/0/0
R 192.168.0.0/26 [120/2] via 172.16.3.3, 00:00:15, Serial0/0/1
The router receives a packet that is destined for a host with the address 192.168.0.58. Which route would this router use to forward the packet?

the static route
the OSPF route
the EIGRP route
the RIP route
14.

Refer to the exhibit. What parent network will automatically be included in the routing table when the three subnets are configured on Router1?
172.16.0.0/16
172.16.0.0/24
172.16.0.0/30
172.16.1.0/16
172.16.1.0/24
15.

Refer to the exhibit. What subnet mask will Router1 apply to child routes of the 172.16.0.0/24 network?
0.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
16.

Refer to the exhibit. The network administrator has discovered that packets destined for servers on the 172.16.254.0 network are being dropped by Router2. What command should the administrator issue to ensure that these packets are sent out the gateway of last resort, Serial 0/0/1?
ip classless
no ip classless
ip default-network 0.0.0.0
ip default-gateway 172.16.254.1
ip route 0.0.0.0 0.0.0.0 Serial 0/0/1
17.

Refer to the exhibit. A packet destined for host 128.107.0.5/16 is processed by the JAX router. After finding the static route in the routing table that matches the destination network for this packet, what does the router do next?
searches for a default route to forward the packet
drops the packet since the static route does not have an exit interface
performs a recursive lookup to find the exit interface used to forward the packet
sends a request to neighboring routers for the location of the 128.107.0.0 network
18. What occurs when no ip classless is implemented on the router?
The router will only support classful IP addressing.
The router will only support classful routing protocols.
The router will use a default route, if present, when a matching route is not found in the routing table.
The router will assume it has knowledge of all subnets in the network and will not search beyond child routes for a better match.
19. A route to a destination network is learned from multiple routing protocols. What is used by a Cisco router to select the preferred route to the destination that will be installed in the routing table?
metric
route prefix
update timer
administrative distance

CCNA 2 Chapter 7 2011 V4.0 Answers 100%


CCNA 2 Chapter 7 2011 V4.0 Answers 100%
1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.)
10.0.0.0/8
127.0.0.0/8
169.254.0.0/16
172.16.0.0/12
192.168.0.0/16
209.165.201.0/27
2.

Refer to the exhibit. Routers East and West are configured using RIPv1. Both routers are sending updates about their directly connected routes. The East router can ping the West router serial interface and West can ping the serial interface of East. However, neither router has dynamically learned routes from the other. What is most likely the problem?
A gateway of last resort is required.
Subnetting is not supported by RIPv1.
VLSM is not supported by RIPv1.
One of the routers needs a clock rate on the serial interface.

3.

Refer to the exhibit. What effect will the commands that are shown have on RIP updates for Router1?
Only version 2 updates are sent to 255.255.255.255.
Only version 2 updates are sent to 224.0.0.9.
Both version 1 and version 2 updates are sent to 224.0.0.9.
Both version 1 and version 2 updates are sent to 255.255.255.255.
4.

Refer to the exhibit. What can be concluded from the output shown in the exhibit?
The routing table is limited to 2 routes.
The LAN interfaces are participating in the routing process.
One update has been sent out of each serial interface and 2 have been received.
The no auto-summary has not been configured on this router.
5. What are two reasons to implement RIP version 2 rather than RIP version 1? (Choose two.)
RIP version 2 supports VLSM.
RIP version 2 supports more than 16 routers.
RIP version 2 supports classful (and not classless) routing.
RIP version 2 supports routing update authentication.
RIP version 2 supports multi-areas.
RIP version 2 uses the Dijkstra algorithm rather than the Bellman-Ford algorithm.
6.

Refer to the exhibit. RIPv1 is configured as the routing protocol for the network that is shown. The following commands are used on each router:
router rip
network 10.0.0.0
network 172.16.0.0
When this configuration is complete, users on the LAN of each router are unable to access the remote LANs. Why?
The network statements are configured incorrectly.
A routing loop has been created.
RIPv1 is unable to route to discontiguous subnets of a major network.
RIPv1 is unable to route networks with a /24 subnet mask.
7. A network administrator installed four new routers that are running RIPv2. Router1 is a boundary router in the RIPv2 network and has a default route configured. Once the network has converged, the network administrator enters Router1(config-router)# default-information originate on Router1. How will this affect the network?
prevents Router1 from forwarding updates about networks that are not directly connected
causes all routers in the network to synchronize routing updates with Router1
forces Router1 to become the primary or designated router (DR) for updates
propagates the default route to all routers in the network
8.

Refer to the exhibit. A technician needs to add a new loopback interface to test routing functionality and network design. The technician enters the following set of commands on the router:
Sanford(config)# interface loopback1
Sanford(config-if)# ip address 192.168.6.62 255.255.255.252 Why does the router respond with an error?
The router does not allow loopback interface configurations.
This mask can not be used with this class of addresses.
Classless routing must be configured before this address can be added.
The network address for Loopback1 overlaps with an already configured interface address.
The router is over the limit for the maximum paths that can be provided in the routing table.
9. What is the maximum network diameter permitted by the default metric of RIPv2?
15 hops
16 hops
100 hops
120 hops
255 hops
10. What are two functions of the network command used when configuring routing protocols? (Choose two.)
identifies which networks will be included in the routing updates
identifies the hosts addresses that can be summarized in the network
used to list all addresses for remote and local networks
determines which subnet mask to apply to routing updates
determines which interfaces can send and receive routing updates
11.

Refer to the exhibit. All routers are running RIPv1. What changes will occur in the routing table of router B if a loopback interface with an address of 10.16.1.129/27 is configured on router B?
Routes to the 10.16.1.0/27, 10.16.1.64/27, and 10.16.1.128/27 networks are added.
A connected route to the 10.16.1.128/27 network is added.
A third route to the 10.0.0.0/8 network with RIPv1 as the source is added.
The 10.0.0.0/8 route is dropped immediately from the routing table after router B is configured.
12.

Refer to the exhibit. If all routers are running RIP version 2, why is there no route for the 192.168.1.32/27 network?
Rip version 2 does not send subnet masks in its updates.
Router A is not setup with RIP as a routing protocol.
Rip version 2 will auto summarize routes by default.
Router B is not setup to advertise the 192.168.1.64/30 network.
13. RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates?
Subnet masks will be added to the routing updates.
Routing updates will be sent out using multicast address 224.0.0.9.
Version 1 and 2 updates will be received and the version 2 updates will not be sent.
The RIP routing process will be removed from the router and routing updates will not be forwarded.
14. How are RIP v1 and RIP v2 similar to one another? (Choose three.)
They both use hop count as a metric.
They both have the same metric value for infinite distance.
They both broadcast their updates to their neighbors.
They both send subnet mask information in their updates.
They both provide for authentication of update sources.
They both use split horizon to prevent routing loops.
15.

Refer to the exhibit. The exhibited network contains a mixture of Cisco and non-Cisco routers. The command debug ip rip was entered on the JAX router. All routers are running the same version of RIP. Router CHI and Router ORL are not able to reach the 192.168.1.16/28 network. What is a possible solution to this problem?
Enable split horizon in the network.
Configure RIPv2 on routers.
Add network 192.168.1.0 to the RIP configuration on the JAX router.
Configure JAX Fa0/0 as a passive interface.
Enable the Serial0/0/0 interface on the JAX router.
Change the IP address on the Fa0/0 interface of the JAX router to 192.168.1.1/24.
16. What field was added to the RIP message header by RFC 1723 to add support for VLSM and CIDR?
subnet mask
destination port number
address family identifier
source and destination IP addresses
17.

Refer to the exhibit. Which command on which router will allow Router1 to learn about the 192.168.0.0/20 network?
Router1(config)# ip classless
Router1(config-router)# no passive-interface serial 0/1/1
Router2(config-router)# version 2
Router2(config-router)# neighbor 10.0.0.2
18.
Refer to the exhibit. Which two statements are true? (Choose two.)
Router1 will install a route to 192.168.0.0/20
Router1 will install a route to 192.168.0.0/24
Router1 will install a route to 192.168.16.0/24
Router2 will install a route to 192.168.16.0/24
Router2 will not install a route to 192.168.16.0/20
19.

Refer to the exhibit. All routers are running RIP version 2. JAX is configured to just advertise the 10.0.0.0/24 network. CHI is configured to advertise the 172.16.0.0/16 network. A network administrator enters the commands shown in the exhibit. What changes will occur in this network?
The JAX router will ignore updates for the 172.16.0.0/16 network due to split horizon issues.
The CHI router will install a route to the 192.168.0.0/16 network in its routing table.
The routing table for CHI will have the 192.168.0.0/16 route but it will have an S next to the route.
The ORL router will apply a 255.255.0.0 subnet mask to all networks in the routing updates it forwards.
20.

Refer to the exhibit. Which command will allow Router2 to learn about the 192.168.16.0/28 network?
Router1(config)# ip classless
Router1(config-router)# network 192.168.16.0
Router1(config-router)# no passive-interface serial 0/1/1
Router2(config-router)# version 2
Router2(config-router)# neighbor 10.0.0.2