Download presentation
Presentation is loading. Please wait.
2
POP QUIZ 2 !!!
3
Multiple Choice Questions
4
The organization whose website you visited in your homework, that registers ip addresses in North and South America is called: A. IETF B. Erin C. Internic D. IEEE E. ARIN
5
What’s the Speed of Fast Ethernet? A. 10 Mbps B. 4/16 Mbps C. 100 Mbps D. 1000 Mbps E. None of the Above
6
Type of Cable most often used within Ethernet lans using star topologies? A. fiber B. UTP C. BNC D. thin coax E. Thick coax
7
Which of the following is NOT a network architecture? A. Ethernet B. FDDI C. Token Ring D. Token Passing E. ATM
8
The file on a Unix system that gives you info on port numbers, is called: A. /etc/services B. /etc/ports C. /etc/ethers D. /etc/hosts E. /etc/vfstab
9
Which is a common standard for wireless networks? A. 802.3 B. 802.5 C. 802.11b D. 802.11z E. 805.3
10
What Network Protocol is usually used with Novell Netware? A. Netbeui B. IPX/SPX C. Appletalk D. RARP/ARP E. None of the above
11
A Network Architecture based on token passing around a dual fiber ring is? A. ATM B. CDDI C. Token Ring D. FDDI E. Fast Ethernet
12
Which protocol in the TCP/IP suite can act as a replacement for TCP? a. IP b. SPX c. ARP d. UDP e. All of the above
13
What class of an IP address is normally given to large corporations or a large university (like Rutgers)? A. Class A B. Class B C. Class C D. Class D E. Class E
14
Todays network printing solutions usually work by using: A. a server with a printer directly attached B. a printer with its own NIC installed and connected directly to a switch C. print spooling on a print server D. B and C above E. None of the above
15
Fill in the Blanks
16
IPV4 uses _________ bits for the tcp/ip address. IPV6 improves this by using ____________ bits. 32, 128
17
A typical ethernet address is made up of ________ hex digits. An example would look like ______________. A typical ip address is written down with ________ distinct parts (sections), where each part ranges from _____ to _______. An example would look like _________. 12, 1A:BC:F4:44:6C:A1, 4, 0, 255, 165.230.99.70
18
Some of the Rules for Ethernet: 10Base5: _______ maximum segment length _______ maximum number of segments 10BaseT: _______ maximum distance from hub to a given system 500m, 5, 100m
19
Name the following Channel Access Methods Talk whenever you want _________ Listen before talking, talk and keep listening ______________ Listen before talking, ask permission to talk, and then talk ______________ 2 non contention methods are _______ and _________ Aloha, CSMA/CD, CSMA/CA, Token Passing, Polling
20
Assume you have a server named “santa” and a client named “elf”. The server shares a directory/folder called “\toys”. Give the windows command given on the client, to map the above directory. net use k: \\santa\toys
21
Assume you have a unix server named “santa” and a unix client named “elf”. The server shares a directory/folder called “/toys”. Give the Unix command given on the client, to map the above directory to an empty directory (/turkey) on the client. mount santa:/toys /turkey
22
The dos/windows command to view your networking info is called ______ The unix command to view your networking info is called __________ The control panel icon useful in widows to view and change your tcp/ip information is called: ________ ipconfig, ifconfig, network
23
Acronym Expansions
24
TCP/IP Transmission Control Protocol/Internet Protocol POTS Plain Old Telephone Service DSL Digital Subscriber Line
25
CSMA/CD Carrier Sense Multiple Access with Collision Detection ATM Asynchronous Transfer Mode OSPF Open Shortest Path First RARP Reverse Address Resolution Protocol
26
Simple Definitions
27
Virtual drive a logical drive letter that is not physically located on the system. Used to do drive mappings between client and server. Like the K: drive in the class lab. Points to a folder on the server. DNS Domain Name Service. A dns server translates names into ip number and visa versa. This is useful because most humans who use internet applications specify systems by using names, but the tcp/ip packets need to use ip numbers instead. Thus DNS servers are used to translate.
28
Questions and Answers
29
Explain the 4 layers of the TCP/IP protocol. What does each layer do? Explain important fields in each protocol layer. Explain fully. What is meant by encapsulation/de- encapsulation?
30
Explain the different ways a machine can find its ip address when booting up? How does it find its Mac Address?
31
Clearly Explain how CSMA/CD works.
32
Draw a ethernet packet and show all fields and their sizes.
33
Explain what a bridge is and how does it work? Draw a diagram.
34
Explain what a router is and how it works?
35
Explain how a packet is passed from Point A to Point B if both A and B are on the same subnet. Explain what the 4 addressing fields are in each packet and how they get filled in.
36
Explain how a packet is passed from Point A to Point B if both A and B are on different networks (one or more router/hops apart). Explain what the 4 addressing fields are in each packet and how they get filled in.
37
If a site has a Class B tcp/ip address and it uses the subnet mask 255.255.254.0, then What is the number of hosts they can have at their site per lan/subnet? What is the number of lans/subnets do they have? Show all work (show how you got these answers)
38
What is a VLAN? Explain fully. What is a firewall? Explain fully.
39
What are some of the security problems related to networks? What can one do to help prevent these types of security issues?
40
Explain the different stages of the Lifecycle of a Network. (state what the stages are in the correct order, explain them fully).
41
The End!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.