70-058 Networking Essentail¸´Ï°¸ÅÒª
Network Topology
Networking Architectures
Physical Mesh Topologies - Mesh topologies are distinguished by having redundant links between devices which enable data to be sent over several different paths. Reconfiguration, like installation, gets progressively more difficult as the number of devices increases. Most mesh topology networks are not true mesh networks. Rather they are hybrid mesh networks which contain some redundant links, but not all.
Networking Protocols
Protocols
are the agreed-upon way in which computer exchange information.
Microsoft-Supplied Network Protocols
The Protocol Suites or Stack
Dialup Communication Protocals
Other protocols you may encounter:
The Theoretical Network
OSI LAYERS | ||
Application Layer | Provides services that directly support user applications. | |
Associated Devices and Services: Gateways | ||
Presentation Layer | Translates the data between the formats the network requires and the formats the computer expects. The presentation layer performs protocol conversion, data translation, compression and encryption. | |
Associated Devices and Services: Gateways | ||
Session Layer | Allow applications on separate computers to share a connection called a session. This layer enables two programs to find each other and establish communication link. This layer places check points in the data stream, so if communications fail, only the data after the most recent checkpoint need be transmitted. | |
Associated Devices and Services: Gateways | ||
Transport Layer | Manages the flow control of data between parties across a network. Ensures that packets are delivered error free, in sequence and with no loses or duplications. | |
Associated Devices and Services: Advanced Cable Testers & Gateways | ||
Network Layer | Address messages for delivery, and translates logical network address and names into there physical equivalents. Makes routing decisions and forwards packets for devices that are farther than a single link away. | |
Associated Devices and Services: Advanced Cable Testers & Routers | ||
Data Link Layer | Handles
special data frames between the Network layer and Physical layers. Provides
for the flow of data over a single link from one device to another.
Associated Devices and Services: Advanced Cable Testers, NIC's & Bridges, Ethernet Switching Hub. |
Logical Link Control (LLC)The LLC control provides (SAP's) that other computers can refer to and use to transfer information from the Logical Link control sub-layer. |
Media Access Control (MAC) Provides for shared access to the network adapter card and communicates directly with the network adapter card. | ||
Physical Layer | Is simply responsible
for sending bits from one computer to another. It
converts the bits into signals for out going massages. |
|
Associated Devices and Services: TDR's, Oscilloscopes, Repeaters & Hubs |
IEEE 802 physical layer Specifications | |
802.1 | Internetworking |
802.2 | Logical Link Control (LLC) |
802.3 | The number of the IEEE standard for Carrier Sense with Multiple Access an Collision Detection (CSMA/CD, or Ethernet). |
802.4 | Token Passing or Bus LAN |
802.5 | Token Ring LAN |
802.6 | Metropolitan Area Network (MAN) |
802.7 | Broadband |
802.8 | Fiber Optic |
802.9 | Integrated Voice and Data Networks. |
802.10 | Network Security |
802.11 | Wireless Networks |
802.12 | Demand Priority Access LAN, 100BaseVG-AnyLAN |
WAN (Wide Area Network)Technologies & Connectivity
ATM stands for Asynchronous Transfer Mode. ATM is an advanced implementation of packet switching that provides high-speed data transmission rates at about 155Mbps, but theoretically 1.2 gigabits per second is possible. ATM also supports simultaneous voice, video and data transmission.
ISDN (Integrated Services Digital Network) Primary goal was to integrate voice and data services by replacing analog telephone lines with digital equivalents. Can support data throughput as high as 115Kbps including compression. ISDN offers normal throughput of 64Kbps per channel, and most ISDN lines offer normal bandwidth of 128K, because channels are often used in pairs.
Frame Relay - Frame Relay is a packet switch network service that doesn't perform error checking. The error checking will be handled at the either end of the connection. It operates at at speeds between 56Kbps and 1.544Mbps. Customers can specify exactly the amount of bandwidth they want to pay for.
T1 and T3 Lines - The most widely used type of all high speed digital lines. T1 is a point-to-point transmission technology that consists of 24 64kbps channels for a total transmission capability of 1.544 Mbps. Each of the channels my be used as a separate voice or data communication channel. T3 is equivalent of 28 T1 lines and handles a data rate of 44.736 Mbps. It is extremely expensive. T3 lines require fiber optic cables or microwave-transmission equipment. You can lease portions of a T-carrier line's bandwidth though services called Fractional T1 (FT1) and Fractional T3 (FT3).
SONET - Sonet is fiber optic WAN technology used to deliver voice data, and video at speeds of up to 622 Mbps and beyond.
Cabling and Interfaces
Coaxial Cable | |
Thinnet | RG-58 A/U 50-ohms, wire-stand center conductor |
RG-58 /U 50-ohms, solid copper center conductor | |
RG-58 C/U military grade | |
Connectors that
are characteristic of Thinnet are: 1) BNC Connector 2) BNC Barrel connectors 3) 50-ohm Terminators 4) T-connectors |
|
Thicknet | RG-8, 50-ohms |
RG-11 50-ohms | |
Connectors that are characteristic of thicknet are: DIX or AUI connectors are used for connection to the network adapter card. | |
Cable TV | RG-59 75-ohms, Broadband/Cable television |
ARCnet | RG-62 93 ohm, |
Transceiver A can connect a thinnet cable to a thicknet cable. A transceiver cable is also called a drop cable. They can also switch the parallel data stream on a computers bus to a serial data stream used in the cables connection the computers.
Twisted Pair Cable - Twisted pair cable comes in two types Shielded (STP) and Unshielded (UTP).
UTP Cable | |
Category 1 | Older telephone networks |
Category 2 | less than 4 Mbps, |
Category 3 | Up to 16Mbps - The minimum UTP cable required for 10baseT |
Category 4 | Up to 20Mbps |
Category 5 | 1 - 155Mbps most common rate is 10Mbps. |
Ethernet Standards | |
10baseT | 10Mbps data rate, baseband signaling over unshielded twisted pair (UTP). 10baseT segments may be up to 100 meters (328 feet) long, and a minimum cable length of 2.5 meters (about 8 feet). 1 node per segment 1,024 nodes per network. |
100baseT | 100baseT is regular Ethernet run at a faster data rate over category 5 UTP cable. 100baseT uses the same CSMA/CD protocol in a star wired bus as 10baseT. Also called fast Ethernet. |
10base2 Thinnet |
10Mbps data rate, baseband signaling, and a maximum segment length of 185 meters (610.5 Feet). Thinnet, which uses thin coaxial cable RG 58. - IEEE standard 802.3 30 Nodes per segment 90 per network. The total length of a thinnet network may not exceed 925 meters. Based on the Bus topology. |
10base5 Thicknet (Also known as standard ethernet) |
Typically 10Mbps data rate, baseband signaling, and a maximum segment length of 500 meters (1650 Feet). Thicknet, uses thick coaxial cable. RG-8 and RG-11. 100 Nodes per segment 300 nodes per network - IEEE standard 802.3. Maximum repeaters 4. Maximum Taps 100 |
10baseFL | 2Gbps (typically 100Mbps)Mbps data rate, and baseband signaling over a fiber-optic cable. A 10baseFL network segment may be up to 2000 meters. |
Ethernet uses a data format called frames. They can be between 64 to 1618 bits long. They contain preambles that mark the start of the frame.
100Mbps Ethernet specifications | |
100baseT4 | 4-pair Category 3, 4 or 5 UTP or STP |
100baseTX | 2-pair Category 5 UTP or STP |
100baseFX | 2-strand fiber-optic cable |
Token Rink specifications | |
Type 1 cable | The maximum number of workstations is 260 on type 1 or fiber optic cable at 16Mbps. The distance between MSAU's is 100 meters |
Type 2 cable | The maximum distance between MSAU's is 45 meters |
Type 3 Cable | The maximum number of workstations is 72 at 4Mbps. |
A token
Ring hub may also be referred to as a MAU MSAU, or SMAU. |
Connecting Networks
Component | Function |
Hub | A hub is a device that
connects multiple nodes to the network. The three main types of hubs are: 1) Passive - Don't require power, act merely as a physical connection. 2) Active - Require power, which they use to regenerate and strengthen signals passing though them. 3) Intelligent - Intelligent hubs can provide services such as packet switching and traffic routing. |
Repeater | Repeaters are used to strengthen the signal over distance. They are also used to counteract signal degradation and clean up the signal. Signal-regenerating repeaters create an exact duplicate of the incoming data, retransmitting only the desired data. Repeaters must use the same media access scheme. Resides on the Physical Layer of the OSI model. |
Bridge | Bridges are used to segment networks. Through address filtering, bridges can divide busy networks into segments and reduce network traffic. A bridge uses the physical address to determine where to pass the signal. Bridges cannot connect LAN's of different types (ex. an Ethernet segment cannot connect to a token Rink segment) They cannot distinguish one protocol from another. Bridges can connect dissimilar media. Resides on the MAC sub-layer of the Data Link Layer of the OSI model. |
Router | An intelligent connectivity
device that routes using logical and physical address to connect two or
more logically separate networks, Segment the network traffic.
Routers can interconnect LAN's of different types (ex. Ethernet to Token
Ring). Shares status and routing information to other routers to provide
better traffic management and bypass slow connections. They also
provide broadcast management. When packets are passed from router
to router the data layer source and
destination addresses are stripped of and then recreated. Resides on the
Network Layer of the OSI model. Routers use two type of addressing: 1) Physical 2) Logical |
There are two types of Routing
devices: 1) Static - You must update the routing tables manually. 2) Dynamic - Dynamic routers build and update there own routing tables. |
|
Brouter | A network connectivity device that can provide both bridge and router services. Operates at the Data Link Layer of the OSI model. |
Gateway | A network connectivity device that translates communication protocols between dissimilar LANs. Primarily operates at the Application Layer although they often fulfill certain functions at the Session layer and occasionally as low at the Network layer. For purposes of the exam consider the Gateway to work at or above the Transport layer .(note, I have read conflicting information regarding which layer a gateway resides on? ) |
Multiplexer | A device that divides signals
for transmission over a segment and reverses this process for multiplexed
signals coming in from the segment. Multiplexers can mix both types of
signal (voice and data) and places them on the same WAN link. Frequently
shortened to MUX. The following are methods of multiplexing.
|
Connection Oriented
Communication - A formal connection between
two computers. Reliable
Connectionless oriented connection - Sending
data across the network without guaranteeing receipt. fast but Unreliable
Crosstalk - Interference when two wires are laid against
each other in parallel.
Attenuation - The degradation or distortion of an electronic
signal as it travels from it's destination.
IRQ | Common Use |
3 | Com 2 and 4 |
4 | Com 1 and 3 |
5 | Usually open, Lpt 2, or MIDI |
7 | Lpt 1 |
Network Adapter Cards (NIC)
Designing the Local Area Network
Type of network to number of users | |
Peer-to-peer | 2 - 10 users |
Single Server | 10 - 50 users |
Multi Server | 50 -200 users |
Multi Server High Speed Backbone network | 200 -1000 users |
Enterprise | 1000 or more users |
Administering A Network
Fault Tolerance Systems | |
RAID | Function |
Level 0 (Striping) | Increase disk performance, but does not make your server more fault tolerant |
Level 1 (Mirroring) | Makes an exact copy of your hard drive partition on a another hard drive partition in your system. Mirrors can contain the system and boot partitions in NT. |
Level 5 (Striping with Parity) | Protects you from failure of any one disk in your computer by spreading the information to be stored on disks and by including some error correction information on the disk. If any one of the striped disks fails, the operating system can recover the information. Requires at least three disks with partition of the same size, and each partition should be on a different drive. The parity is written across all disks. |
Sector Sparing - is a fault tolerance system also called hot fixing. If bad sectors are found during disk input/output operations, the fault tolerance driver will attempt to move the data to a good sector and map out the bad sector. Only SCSI devices can perform sector sparing. (ESDI and IDE) cannot.
Broadband - Analog signals. The signal flow is unidirectional. Multiple communication channels may be used simultaneously.
Baseband - Digital signal sent over a cable without modulation.
Windows NT & Novell
Diagnostic Tools
1.Broadband Transmission uses:
a. Bi-directional Digital signals, a range of
frequencies to transmit data and use amplifiers to regenerate the signal.
b.
Unidirectional analog signals, a range of frequencies to transmit data and use
amplifiers to regenerate the signal.
c. Unidirectional digital signals, a
range of frequencies to transmit data and use amplifiers to regenerate the
signal.
d. Bi-directional Digital signals, a range of frequencies to
transmit data and use repeaters to regenerate the signal.
2. Baseband Transmission uses:
a. Bi-directional Digital signals, a range of
frequencies to transmit data and use amplifiers to regenerate the signal.
b.
Unidirectional analog signals, a range of frequencies to transmit data and use
amplifiers to regenerate the signal.
c. Unidirectional digital signals, a
range of frequencies to transmit data and use amplifiers to regenerate the
signal.
d. Bi-directional Digital signals, a single frequency to transmit
data and use repeaters to regenerate the signal.
3. Project 802 defines standards for which layers of the OSI model?
a. Application and presentation layers.
b.
Physical and Data Link layers
c. Network and Data Link layers
d.
Transport and Network layers
4. Repeaters are used to:
a. Regenerate analog signals.
b. Regenerate
digital signals.
c. Connect UTP to Fiber-Optic cable.
d. Connect ThinNet
to Thicknet
e. Isolate broadcast traffic
5. What is the maximum cable segment length for UTP (10BaseT) Ethernet?
a. 100 meters
b. 185 meters
c. 200 meters
d. 285 meters
e. 355 meters
6. COM1+ 3 uses:
a. IRQ 2
b. IRQ 3
c. IRQ 4
d. IRQ 5
e.
IRQ 6
7. COM2+4 uses:
a. IRQ 2
b. IRQ 3
c. IRQ 4
d. IRQ 6
e. IRQ 7
8. LPT 1 uses:
a. IRQ 2
b. IRQ 3
c. IRQ 4
d. IRQ 6
e. IRQ 7
9. Where do you need to be careful in not providing two equal NETBIOS names?
a. workgroup name
b. computer name
c. domain
name
d. share name
10. With which devices can you measure the bandwidth of a new installation site ?
a. Volt meter
b. Network Monitor
c. TDR
d.
Oscilloscope
11. Which protocols are routable?
a. XNS
b. OSI
c. IP
d. LAT
e.
NetBEUI
f. IPX
g. AppleTalk
h. DECnet.
12. Which of the following examines packets?
a. performance monitor
b. TDR
c. Protocol
Analyzer
D. SMPT
13. Which of the following should be used for at least 100mbps?
a. ATM
b. X25
c. 52kbps Digital line
d
X100
14. Which is a feature of Win NT Workstation?
a. Shared resources with passwords
b. User level
passwords
15. Which is a feature of Win 95?
a. Shared resources with passwords
b. User level
passwords
16. Assume that a user must provide a user name and password to gain access to a network resource. Different levels of access privileges are assigned, depending on the user. Which kind of network security is this an example of?
a. Share-level security
b. Partial-access
security
c. User-level security
d. Password security
17. Why does a high number of broadcast messages adversely affect overall network performance?
a. Each broadcast message requires an acknowledgement
packet from every computer on the network
b. No computer on the network can
transmit data until each broadcast message has been acknowledged by every
computer on the network
c. Broadcast messages are automatically routed to
every segment of a LAN
d. Every computer on the network must process each
broadcast message
18. Which layer of the OSI model are managed by a network protocol such as Microsoft NetBEUI?
a. Network
b. Physical
c. Transport
e.
Media access control
19. Your company uses both Ethernet and token-ring LAN in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enable communications between dissimilar LAN's that use different protocols?
a. Bridge
b. Router
c. Gateway
d. Repeater
20. What device works at the MAC sub-layer of Data Link layer of the OSI Model?
a. Bridge
b. Router
c. Gateway
d. Repeater
21. What is the purpose of the token in a network that employs a media access control method on the IEEE 802.5 specification?
a. Token passing provides higher throughput than
CSMA/CD when using twisted-pair wiring.
b. The station that holds the token
is allowed to transmit a message on the network
c. The station that holds the
token has the highest priority on the network
d. A token contains information
that is used to route messages between rings
22. What does the MAC driver do?
a. It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes data to the application through the session layer interface.
b. It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions.
c. It supports communication between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services.
d. It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session.
23. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and you have limited workspace. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 100 meters in length. Which cable is best suited to this installation?
a. Fiber-optic
b. Category 1 UTP
c. Category 3
UTP
d. Thicknet coaxial
24. What is the minimum category of UTP cable required to meet Ethernet 10BaseT standard?
a. Category 1
b. Category 2
c. Category 3
d.
Category 5
25. Which of the following can not be duplicated when using NetBIOS?
a. Workgroup name
b. Domain name
c. Computer
name
d. Share name
26. What does the transport protocol do?
a. It defines how data should be presented to the next receiving layer, packages the data accordingly, ad then passes data to the application though the session layer interface.
b. It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions
c. It supports communications between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services
d. It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session
27. Which of the following supports compression and error control?
a. PPP
b. SLIP
c. DLC
d.SMPT
28. Your company has decided to implement a WAN in the near future. You are required to design a Net BIOS naming scheme. At the present time your company consist of:
20,000 Computers using TCP/IP
850 Servers using
Windows NT & NetWare
2500 HP LaserJet printers
Each employee has their
own e-mail address
Required result:
The naming scheme should work
after the company implements the WAN.
Optional desired results:
Naming scheme should
show department, location and define the user.
Proposed solution:
Implement a 16 characters
NetBIOS naming scheme. The first 6 characters would show the department, 5
characters would show the location, and the other 5 characters will have part of
the e-mail address for each user.
a. The proposed solution produces the required result
and produces both of the optional desired results.
b. The proposed solution
produces the required result and produces only 1 of the optional desired
results.
c. The proposed solution produces the required result but does not
produce any of the optional desired results.
d. The proposed solution does
not produce the required result.
29. Your company is implementing a WAN. You want to connect three locations in Atlanta, New York and Los Angeles.
Required results:
They need to have communication
of at least 1 Mbps at all times.
Desired optional results:
They need to have
continued communication between all cities at 1 Mbps even if one line
breaks.
Proposed solution:
Connect a T1 line between New
York and Los Angeles and Los Angeles and Atlanta.
a. The proposed solution produces the required result
and produces both of the optional desired results.
b. The proposed solution
produces the required result and produces only 1 of the optional desired
results.
c. The proposed solution produces the required result but does not
produce any of the optional desired results.
d. The proposed solution does
not produce the required result
30. Your company is implementing a WAN. You want to connect three locations in Atlanta, New York and Los Angeles.
Required results:
They need to have communication
of at least 1 Mbps at all times.
Desired optional results:
They need to have
continued communication between all cities at 1 Mbps even if one line
breaks.
Proposed solution:
Connect 3 T1 lines between each
of the three cities.
a. The proposed solution produces the required result
and produces both of the optional desired results.
b. The proposed solution
produces the required result and produces only 1 of the optional desired
results.
c. The proposed solution produces the required result but does not
produce any of the optional desired results.
d. The proposed solution does
not produce the required result.
31. You have a network with MS-DOS clients and Unix clients. Recently, an NT server is added to the network. Now the Unix machines can access all shared resources except those on the NT server. why?
a. protocol mismatch between server and Unix
clients
b. incorrect binding order of protocols on the server
32. You have a network in which network utilization has increased from 30% to 70% in one year. You plan to add another server and 30 clients within 12 months.
Required Result:
Reduce network utilization by
50%
Optional results:
allow for future
expansion
minimize costs
maintain network utilization at its present lower
level
Proposed solution:
Change the packet size from
1514 bytes to 576 bytes and increase the TCP window from 4096 bytes to 16384
bytes
a. The proposed solution produces the required result
and produces both of the optional desired results.
b. The proposed solution
produces the required result and produces only 1 of the optional desired
results.
c. The proposed solution produces the required result but does not
produce any of the optional desired results.
d. The proposed solution does
not produce the required result.
33. You're network has started to slow down. You run performance monitor and it shows the following:
%processor time = 8 (average)
%pagefaults/sec = 2
(average)
%disk_time=25 (average)
Based on this, what should to restore performance.
a. add more ram
b. introduce disk striping with
parity
c. get multiprocessor system
d. segment the network
34. You've got 'x' number of servers and PC's using a mixture of routable and non-routable protocols including TCP/IP, SPX/IPX and NetBEUI. You've got 4 brouters. And the network performance is being seriously compromised by network broadcast traffic.
Required:
Cut broadcast traffic by 50%
Optional Desired Results:
keep costs to a
minimum
allow for further expansion
Proposed Solution:
Convert all the computers to
NWLink and disable the bridging
a. The proposed solution produces the required result
and produces both of the optional desired results.
b. The proposed solution
produces the required result and produces only 1 of the optional desired
results.
c. The proposed solution produces the required result but does not
produce any of the optional desired results.
d. The proposed solution does
not produce the required result.
35. You have 750 computers on an IPX network, one NT server, and all the rest are win95 clients. You want to MINIMIZE the amount of administration, what do you use:
a. Peer-peer
b. User level.
36. Which WAN transmission will support any available transmission speed?
a. Frame relay
b. ATM
37. What WAN link transmits voice, data and video?
a. ATM
b. RAS
c. T1
d. ISDN
38. What is a characteristic of assured delivery?
a. Connection Oriented
b. Connection-less
Oriented
39. You have a 486 computer using COM1, COM2, LPT1, and VGA. NIC is set for IRQ 3, I/O Base 300. Which one is conflicting with the NIC?
a. COM1
b. COM2
c. LPT1
d. VGA
40. Your network is using multiple protocols (AppleTalk, NetBEUI, TCP/IP, NWLink,...) for MACS, NetWare, Unix, PCs. There is excessive network traffic and poor performance. How can you reduce network traffic and improve performance. Choose only one protocol for the network. There should be minimal degradation of machine functionality as a result of the protocol change.
a. AppleTalk
b. NetBEUI
c. TCP/IP
d.
NWLink
41. What resource can you use to check hubs, routers, and bridges on your network?
a. SNMP
b. TDR
c. Network
Monitor
42. Which Operating Systems support share-level access?
a. Windows for Workgroups
b. Windows 95
c. Win
NT Workstation
d. Win NT Server
43. Tom can log on to the network but cannot connect to a server on another segment using that server's NetBIOS name. What is wrong?
a. Tom's computer is not registered in the WINS
server
b. The remote server is not registered in the WINS server.
44. What is the name of the unique identifier encoded in the NIC?
a. MAC address
b. IP address.
45. Your network cannot be down if one hard disk fails. What kind of fault-tolerance can you implement with a limited budget.
a. RAID level 5 (disk striping w/parity)
b. Disk
duplexing
c. Backup server
46. You come in Monday morning and find that all computers on one segment of the network are having problems communicating. You suspect that it is caused by a broadcast storm. You have determined that it is not a hardware problem. What is your first action to resolve the problem? Choices as best as I remember were:
a. disconnect all routers
b. Power down and
restart the server
c. Use a TDR to analyze the problem
d. Use a Network
Analyzer to determine the source of the storm
47. You have offices in Atlanta, New York, and LA You want to connect the 3 offices in a WAN.
Required result: They must have communication of at least 1 Mbps
Optional desired result: They must be able to communicate at 1 Mbps even if one link fails.
Solution: Install 2 T1 links (New York to Atlanta,
Atlanta to LA)
Install dial-up connections of 28.8 Kbps between all 3
sites.
a. The proposed solution produces the required result
and produces the optional desired result.
b. The proposed solution produces
the required result but does not produce optional desired result.
c. The
proposed solution does not produce the required result.
48. You have offices in Atlanta, New York, and LA You want to connect the 3 offices in a WAN.
Required result: They must have communication of at least 1 Mbps
Optional desired result: They must be able to communicate at 1 Mbps even if one link fails.
Solution: put a RAS server at each site and have 6 28.8 Kbps lines going between all 3 sites.
a. The proposed solution produces the required result
and produces the optional desired result.
b. The proposed solution produces
the required result but does not produce optional desired result.
c. The
proposed solution does not produce the required result.
49. You have a number of computers in a 10Base2 network and it has reached 70% of capacity. You will be adding some more computers later.
Required result: Increase speed by 50% and reduce % of capacity to ? (I think 30).
Optional desired results: Maintain the level of operation after adding the additional computers and Minimal change to operation
Solution: Install fiber optic cable and FDDI adapters
a. The proposed solution produces the required result
and produces the optional desired result.
b. The proposed solution produces
the required result but does not produce optional desired result.
c. The
proposed solution does not produce the required result.
50. What do you use for measuring network performance over long period of time?
a. Time domain reflectometer
b. Protocol
Analyzer
c. Logging with Performance Monitor
51. Which of the following would you use if you wanted a safe dialup connection?
a. SLIP
b. PPP
52. Which of the following supports compression and error control?
a. PPP
b. SLIP
53. What OSI level does a router work at?
a. Application Layer
b. Presentation Layer
c.
Session Layer
d. Transport Layer
e. Network Layer
f. Data Link
Layer
g. Physical Layer
54. What OSI level does a gateway work at?
a. Application Layer
b. Presentation Layer
c.
Session Layer
d. Transport Layer
e. Network Layer
f. Data Link
Layer
g. Physical Layer
55. What OSI level does a bridge work at?
a. Application Layer
b. Presentation Layer
c.
Session Layer
d. Transport Layer
e. Network Layer
f. Data Link
Layer
g. Physical Layer
56. One of the workers in the company complained that her computer is slow. What should you do to isolate this problem?
a. Use network monitor to monitor the network
b.
Shut down all routers in that segment
c. Shut down the server in that segment
of the network.
57. Which connectivity device works above the transport layer?
a. repeater
b. bridge
c. router
d.
gateway
e. brouter
58. You need to run Twisted Pair Cat5 180m. What would you need?
a. repeater
b. bridge
c. router
d.
gateway
e. brouter
59. What do you use to create a segmented LAN?
a. repeater
b. bridge
c. router
d.
gateway
e. brouter
60. You have an 200 node LAN using TCP/IP, and you want to segment it into 3 sub-nets. What do you use?
a. repeater
b. bridge
c. router
d.
gateway
e. brouter.
61. What connectivity device works at the physical layer of the OSI model?
a. repeater
b. bridge
c. router
d.
gateway
e. brouter.
62. You have an 200 node LAN using TCP/IP and NetBEUI and after you segment it into 3 subnets it is still able to use both protocols. What do you use?
a. repeater
b. bridge
c. router
d.
gateway
e. brouter.
63. What do you use to connect a Ethernet LAN to IBM mainframe?
a. repeater
b. bridge
c. router
d.
gateway
e. brouter
64. Two of your clients encounter problems accessing the network most of the time. All others have the same problem occasionally. You have 2 networks together using TCP/IP & NetBEUI protocols. The cables you are using are RG-58 A/U and RG 58 U.
After running diagnostics you get the following readings:
CABLE reads INFINITY
BNC T connectors read
INFINITY
What would you do?
a. Replace all BNC T connectors.
b. Replace all 16
bit network cards with 32 bit.
c. Replace all RG-58 A/U cable with RG-58
U.
d. Set the transceiver settings to the manufacturer defaults.
65. A company has 120 computers, with Windows 95 and Windows for Workgroups and has a problem with employee turnover. You implement:
a. User-level security
b. share-level with
passwords for resources.
66. Configurations for 2 NICs on your network are identical, why can't they participate in the network?
a. Base I/O conflict
b. IRQ conflict
c.
Incorrect frame type
d. MAC address conflict.
67. You want to implement a WAN and you want to use the fastest transfer speed, What do you use?
a. T1
b. ATM
c. Switched 56k
d.
ISDN
68. You test your RG-58 cable and get the following readings:
end 0 to infinity
t-connector
infinity
terminator 50
a. replace terminator with a 75 ohm terminator
b.
replace the cable
c. replace the t-connector
69. Which WAN link will provide increased bandwidth as needed?
a. X.25
b. Frame Relay
c. DLC
d.
ATM
70. What would be used to connect two twisted pair category 5 wiring cable lengths into a 180 meter run?
a. repeater
b. bridge
c. router
d.
gateway
e. brouter
71. What device is used to segment a LAN to isolate network traffic?
a. repeater
b. bridge
c. router
d.
gateway
e. brouter
72. Which of the following should be used for at least 100mbps?
a. X25
b. 52kbps
c. Digital line [ATM]
73. Assume that a user must provide a user name and password to gain access to a network resource. Different levels of access privileges are assigned, depending on the user. Which kind of network security is this an example of?
a. Share-level security
b. Partial-access
security
c. User-level security
d. Password security
74. Which layers of the OSI model are managed by a network protocol such as Microsoft NetBEUI?
a. Network and transport
b. Physical and data
link
c. Transport and session
d. Media access control and logical link
control
75. Your company uses both Ethernet and token-ring LAN in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enable communications between dissimilar LANs that use different protocols?
a. Bridge
b. Router
c. Gateway
d.
Repeater
76. What is the purpose of the token in a network that employs a media access control method on the IEEE 802.5 specification?
a. Token passing provides higher throughput than
CSMA/CD when using twisted-pair wiring.
b. The station that holds the token
is allowed to transmit a message on the network
c. The station that holds the
token has the highest priority on the network
d. A token contains information
that is used to route messages between rings
77. Which of the following will support a WAN link of 100Mbps?
a. Frame Relay
b. T1
c. -X.25
d. Frame
Relay
e. ATM
78. Which limitation are NDIS and Novell ODI designed to overcome?
a. The need to dynamically bind a single protocol to multiple MAC drivers in order to support more than one network operating system.
b. The need for proprietary network interface drivers for each network operating system and protocol.
c. Monolithic protocols do not conform to the OSI model
d. Monolithic protocols cannot be loaded into the upper memory area
79. What does the MAC driver do?
a. It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes data to the application through the session layer interface.
b. It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions.
c. It supports communication between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services
d. It is responsible for establishing logical names on the network, establishing connectionsbetween two logical names on the network, and supporting reliable data transfer between computers that have established a session
80. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and you have limited workspace. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation?
a. Fiber-optic
b. Category 1 UTP
c. Category 3
UTP
e. Thicknet coaxial
81. What is the minimum category of UTP cable required to meet Ethernet 10BaseT standard?
a. Category 1
b. Category 2
c. Category 3
e.
Category 5
82. You have two networks, one uses NetBEUI and ones uses NWLink. Which device is required so that these networks can communicate?
a. Router
b. Brouter
c. Bridge
d.
Repeater
83. What does the transport protocol do?
a. It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes data to the application though the session layer interface.
b. It provides low-level access to network adapters by providing data transmission support and some basic adapter management functions.
c. It supports communications between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services.
d. It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session.
84. What protocol counts hops from router to router to find the shortest path?
a. DHCP
b. RIP
c. SNMP
d. IP
e.
DLC
85. Which WAN link will provide increased bandwidth as needed?
a. X.25
b. Frame Relay
c. DLC
d.
ATM
86. Which connectivity device works at the network layer and is capable of selecting multiple data paths?
a. Bridge
b. Repeater
c. Router
d.
Hub
87. What do you need to know to copy a shared file from one computer to another?
a. Workgroup name
b. Share name
c. Domain
name
d. Computer name
88. What is a characteristics of IEEE 802.3 10Base2 specification?
a. UTP
b. RG-62
c. BNC T Connector
d. RJ
45
89. Tom attempts to log onto the system and he is unsuccessful because he cannot get an IP address. Which dial-up protocol is Tom using?
a. PPP
b. SLIP
90. From the following, choose a WAN link of 100Mbps.
a. T1
b. ATM
c. X.25
d. Frame
Relay
91. What is a characteristic of IEEE 802.3 10BaseT specification?
a. RJ-11
b. BNC T connector
c. UTP
d.
Coaxial cable
92. EXHIBIT
O
X-|
|
O-X--------------------|-----------------------X-O (Grounded)
RG-58 A/U Cable
O=50 ohm Terminator
X=Computer
The company is having problems with their network. They have problems with attenuation. What would you do to solve the problem?
a. Change the 50 ohm terminators to 25 ohm
b.
Ground one of the other terminators
c. Rearrange the cables so there are only
two terminators
d. Add a repeater
93. EXHIBIT
O-X---------------X-----------------X---------------X-O
+
+
O=50 ohm
Terminator
+=Ground
X=Computer
The company is using 10Base2, RG-58 A/U cabling for a bus topology in one of their classrooms. The computers are receiving garbage information. They have hired you to fix the problem. What would you do?
a. Replace all the cable with RG-58 /U
b. Ground
the terminators properly
c. Change terminators to 25 ohms
d. Add a
repeater to boost the signal
94. You have set up two computers to connect into the network. All components IRQ's are set to default value. You have set up both network cards with the following:
MAC address = 0114AS558957
IRQ = 5
I/O Base
Address = 300
The computers are not able to communicate on the network. What should you do?
a. Change IRQ5 to IRQ3
b. Change MAC address to
manufacturers default
c. Change I/O Base address to 320
d. Check for loose
connections
95. You have an Ethernet network and a Token Ring network connected by a bridge. When you send a file from the Token Ring network to the Ethernet network, it takes 2 minutes. When you send the same file from the Ethernet network to the Token Ring network it takes 30 seconds. What could be the cause of the problem?
a. The Ethernet packet size is larger than the Token
Ring packet size.
b. The Token Ring packet size is larger than the Ethernet
packet size.
96. You can successfully ping a server using it's IP address, but you cannot send it a message using it's NetBIOS name. What is the possible problem?
a. The server's name is not registered in the WINS
server.
b. Your station's name is not registered in the WINS
server.
97. You are installing a new network. You want an inexpensive way to provide 100Mbps. What should you use?
a. Category 5 UTP cable
b. Category 4 UTP
cable
c. Category 3 UTP cable
98. Your company has decided to implement a WAN in the near future. You are required to design a Net BIOS naming scheme. At the present time your company consist of:
20,000 Computers using TCP/IP
850 Servers using
Windows NT & NetWare
2500 HP LaserJet printers
Each employee has their
own e-mail address
Required result:
The naming scheme should work
after the company implements the WAN.
Optional desired results:
Naming scheme should
show department, location and define the user.
Proposed solution:
Implement a 15 characters
NetBIOS naming scheme. The first 5 characters would show the department, 5
characters would show the location, and the other 5 characters will have part of
the e-mail address for each user.
a. The proposed solution produces the required result
and produces both of the optional desired results.
b. The proposed solution
produces the required result and produces only 1 of the optional desired
results.
c. The proposed solution produces the required result but does not
produce any of the optional desired results.
d. The proposed solution does
not produce the required result.
99. In a system that uses a client-server
application, what does the server do ?
a. The server fills requests from
the client computer for data and processing resources.
b. The server stores
data for the client, but all data processing occurs on the client
computer.
c. The client stores data for the server, but all data processing
occurs on the server computer.
c. The server stores data and performs all of
the data processing, the client performs as a display device.
100. What is the maximum cable segment length for
thinnet Ethernet?
a. 100 meters
b. 185 meters
c. 200 meters
d.
285 meters
e. 355 meters
101. What device translates protocols above the data link layer?
a. Bridge
b.
Repeater
c. Router
d. Hub
e. Gateway
102. You have a large office with a single floor, the lease does not allow installation of cable in walls. You need to setup 7 computers in a network and keep cost to a minimum. What type of topology would you use?
a. Star
b. Bus
c. Mesh
d.
Fiber-optic
103. What wide area network service can provide reliable connection over unreliable switched circuits?
a. ISDN
b. X.25
c. Frame Relay
d.
ISDN
104. You just installed a network adapter card in a PC on IPX network. The network drivers load ok but the PC can't talk to server. All the other PC's can talk to the server without problems.
a. Incorrect transceiver setting
b. Memory address
conflict
c. Segment improperly terminated
d. Frame type setting
incorrect
d