You are on page 1of 24

1. What is the key difference between a local area network and a wide area network?

2. What is the main reason for networking computers?


3. What is a “sneaker net”?
4. Name some advantages of having centralized documents.
5. What does MAN stand for and why is it no longer in use?
6. Name some advantages of a Peer-to-Peer network.
7. Name some disadvantages of a Peer-to-Peer network.
8. Name some advantages of a Server-based network.
9. Name some disadvantages of a Server-based network.
10. Name the three basic topologies.
11. What is the difference between a physical and logical topology?
12. Name two media access methods
1. A LAN is the basic building block (and smallest) of a network. It is confined to a limited area. A WAN is
not geographically limited. A WAN is created by connecting LANs together.
2. To share resources, such as data, applications, and peripheral devices.
3. The “old fashioned” way computer users shared resources by taking a file on a floppy disk to the
computer that had the services they needed to use. Dragging a printer from computer to computer for users to
utilize is another form of a sneaker net.
4. Files are easily accessed by all users. Access can be denied to unauthorized users

5. (security), data backups can be more easily and routinely performed.


6. Metropolitan Area Networks have been replaced by the Internet.
7. Simple to install, configure, and manage (each user manages their own computer) for a small number
of workstations (10 or less), inexpensive to install (no need to buy expensive server).
8. No security, loss of performance occurs if expanded over 10 workstations. Workstations need to be
close together (in a relatively small area, like one office). Centralized location of resources (server). File
and resource security available to limit unauthorized access. Ease of data backups. Can be expanded as
network grows. Centralized administration. Increased performance on large networks.

9. Expensive to install (will need to purchase expensive server). More difficult to install and configure,
more difficult to manage (needs an administrator).
10. The three basic topologies are: Bus, Star, and Ring.
11. Physical topologies are the actual wires and hardware that we can see. They represent what the
topology looks like. Logical topologies represent the way that a networks functions.
12. The access methods are CSMA/CD CSMA/CA, Token Passing, and Demand Priority.
1. What is the difference between an operating system and a network operating system?
2. What is the difference between preemptive and non-preemptive multitasking?
3. What is the purpose of the redirector?
4. NetWareis designed as an operating system that will overlay _____________ environments.
5. Purchasing NetWare requires a type of licensing. What happens when the number of users exceeds the
number of licenses?
6. What is NDS?
7. What are the minimum hardware requirements for installing Novell NetWareversion 5?
8. Define interoperability.
9. Unlike NetWare, Windows NT combines the _____________ and the
___________________ into one.
10. What is NTFS?
11. What is a domain?
12. What are the minimum hardware requirements for a Windows NT Workstation?
13. What are the minimum hardware requirements for Windows NT Server?
14. Name some of the services and protocols that Microsoft included with Windows NT to ensure
interoperability with NetWare.
15. Describe a UNIX system.
16. What OS is similar to UNIX and is a publicly open system?

17. What type of computer was developed by Apple computer in 1984?

18.What type of network would utilize Windows for Workgroups as an operating system?
1. Network operating systems are specialized operating systems designed to function in a network environment.
Some NOS function as the operating system that runs a computer’s stand-alone functions as well as its network
interfaces.
2. Multitasking means that a computer has the ability to perform more than one task at a time. Preemptive
multitasking means that the operating system can take control of the processor without a task’s permission. Non-
preemptive multitasking is when the task decides when it is done with the CPU. In non-preemptive multitasking the CPU is
never taken from a task.

3. The redirector (in Novell NetWare it is called the requester) forwards requests away from the local bus,
redirecting them to the server. The purpose of the redirector is to make network resources look like local resources to the
application.
4. NetWare is a reliable operating system that provides excellent performance and security. It is designed as
an operating system that will overlay multi-operating system environments.
5. The number of users on a NetWare network may exceed the number of licenses, but only the licensed number
of users will be allowed to log on at any one time.
6. NDS (NetWare Directory Services) is the core of the NetWare operating system. It is a hierarchically organized
database that provides security, name service, messaging, routing, web-publishing, management, and file and print
services. Organization of network resources such as users, groups, servers, and volumes is also handled with NDS.
7. Pentium Class or Higher CPU, 64 MB RAM, 550 MB of free hard drive space.
8. Interoperability describes the ability of an operating system to interact with other operating systems.
9. Windows NT combines the operating system and the network operating system into one.
10. NTFS is the file system in Windows NT and it must be utilized in order to take full advantage of NT’s security
features.

11. NT uses domains in order to accomplish its security goals. A domain is simply a group of workstations with a
shared security database.

12. 486DX-33 CPU, 12 MB RAM, 110 MB free hard drive space.


13. 476DX-3 CPU, 16 MB RAM, 125 MB free hard drive space.
14. NWLink is a protocol based on Novell’s IPX/SPX and is used for communication between the two systems.
GSNW (Gateway Services for NetWare) provides the gateway between an NT domain and the NetWare server. CSNW
(Client Services for NetWare) allows NT workstations to use file and print services on a NetWare server. FPNW (File and
Print Services for NetWare) allows NetWare clients to access NT file and print services. DSMN (Directory Service
Manager for NetWare) is used to integrate user and group account information between NT and NetWare. Migration Tool
for NetWare is used to convert NetWare accounts to NT.
15. UNIX is a multi-tasking, multi-user, general-purpose operating system. Because all of its functions are file based,
it is a very bulky operating system. A UNIX system consists of a Host (or central computer) with terminals for the users.
These terminals rely solely on the Host for services and are not stand-alone systems. It is possible to convert a UNIX host
into a file server using software. The UNIX host will run this software as just another application.
16. Linux
17. The Macintosh
18. Windows for Workgroups is a version of Windows 3.1 that includes the ability to run a peer-to-peer network.
1. Who developed the OSI model?
2. Name the seven layers of the OSI model.
3. A network adapter card operates at the _______ layer of the OSI model
4. A bridge operates at the ________ layer of the OSI model.
5. A router operates at the _________layer of the OSI model.
6. Data compression takes place at the __________ layer of the OSI.
7. Which OSI layer is responsible for NIC to NIC communication?
8. What is the function of the Application Layer?
9. The ____________ layer is responsible for the mechanical and electrical functions of transmitting data over
a network.
10. What is the function of the Presentation Layer?
11. Which OSI layer is responsible for establishing, managing, and ending connections?
12. What is a MAC address?
13. Which OSI layer makes routing decisions?
14. Which OSI layer is responsible for delivering data in sequence, without duplication and error free?
15. The Data Link layer has been split into two sub-layers. What are they?
16. What is the function of a Gateway?
17. Which IEEE standard defines the Logical Link Control (LLC) sub-layer?
18. What are NDIS and ODI?
19. Describe protocol binding.
20. Which is faster, connection-oriented communication or connectionless communication?
21. Name as many routable protocols as you can remember.
22. You have expanded your NetBEUI network into two segments and are using an intelligent router to
optimize network traffic. Will this work? Why or Why not?
1. The OSI model was developed by ISO (International Organization for
Standardization).
2. Application, Presentation, Session, Transport, Network, Data Link, and Physical
3. Network layer
4. Data Link layer
5. Network Layer
6. Presentation layer
7. The Data Link layer
8. The Application layer is responsible for communication between a user’s application and the network.
This is not the actual application or program, simply a support layer that allows an application to use the
network by acting as a translator.
9. Physical
10. The Presentation layer is the translator for the network. It translates data into a format that is
compatible with the network and back into a format that is compatible with the computer.
11. The Session layer
12. The MAC address is another name for the 12-digit (6-byte) hexadecimal address that is hardwired on
the NIC by the manufacturer. It is a computer’s physical address.
13. The Network layer
14. The Transport layer
15. The Logical Link (LLC) layer and the Media Access Control (MAC) layer
16. A gateway translates between two networks that use different protocols. A computer with special
software serves as a gateway and allows for communication between completely dissimilar networks.

17. 802.2
18. They are Network Adapter Card interface specifications. They are incompatible with each other. NDIS
(Network Driver Interface Specification) was co-developed by Microsoft and 3Com, while ODI (Open Data Link
Interface) was co-developed by Novell and Apple. The purpose of these standards is to allow operating system
vendors to write multiple drivers for the same NIC. This way more than one protocol can be bound to a single
NIC.
19. In order to function, a protocol must be bound to the NIC. This binding process is what links the
protocol stacks to the NIC driver. It is possible to bind two protocols the one NIC (such as TCP/IP and
IPX/IPX) or to have two NICs with one protocol bound to each one. The order in which these protocols are
bound to the NIC determines which one the network operating system will attempt to use first.
20. Connectionless communication is faster, but connection-oriented communication is more reliable.
21. AppleTalk, DECnet, IPX/SPX, PPP, PPTP, SLIP, SMB, SNA, TCP/IP, UDP, X.25, XNS
22. No, NetBEUI is a non-routable protocol.
1. What is the maximum segment length of Thinnet?
2. What is the maximum segment length of Thicknet?
3. What type of connectors are used with Coaxial cable?
4. What is the purpose of a transceiver?
5. How is a vampire tap connected?
6. What is the purpose of plenum cabling?
7. What is the maximum segment length of UTP?
8. What is the transmission speed of category 5 cabling?
9. What is the most popular of the cable types?
10. Which twisted pair cabling is less sensitive to EMI?
11. What type of connector is used with twisted pair cable?
12. What is the most expensive cable type?
13. What is the least expensive of the cable types?
14. List some advantages of fiber-optic cable.
15. What does AWG stand for and what is it?
16. Describe baseband.
17. Describe broadband.
18. What is the difference between simplex, half-duplex, and full-duplex communication?
19. What is the function of a network adapter card?
20. In what type of network would you expect to find boot PROM capabilities?
21. In Token Ring networks, what are the two ring speeds available?
22. Where would you expect to find a PCMCIA card?
23. What are some of the reasons you would need to install a wireless network?
24. What are the four basic wireless transmission types?
25. Which is the most secure type of radio wireless network?
26. Which microwave transmission type is used to transmit globally?
1. 185 meters
2. 500 meters
3. BNC connectors
4. A transceiver is a device that both transmits and receives data on a network.
5. They utilize sharp teeth that puncture the cable to make the connection.
6. Plenum grade cabling is used in the plenum (the space between the ceiling and the floor above, which
is used to circulate air in a building). Fire codes usually call for special cable in this area because PVC cable
gives off poisonous gas and fumes when burned, which would end up being circulated throughout the building.
7. 100 meters
8. Up to 100 Mbps
9. UTP is the less expensive of the twisted pair cable types. It is also flexible and easy to install, making it
the most popular cable type.
10. STP is insulated with a foil mesh between the wire pairs, which results in less
sensitivity to EMI and crosstalk.
11. RJ-45 connectors
12. Fiber-Optic cable is the ideal cable type for networking. However, it is the most expensive and
most difficult to install.
13. UTP is the least expensive of the cable types. It is also flexible and easy to install, making it the
most popular cable type.
14. Fiber-optic supports extremely high bandwidths, segment lengths of up to several miles, and it is
not subject to EMI or eavesdropping.
15. American Wire Gauge (AWG) is the standard that describes wire thickness. The AWG wire
number decreases as the wire thickness increases.
16. Baseband uses the entire capacity of the cable as a single channel.
17. Broadband allows two or more channels to share the bandwidth of the cable, making the signal flow
unidirectional.
18. Simplex communication is one way, can receive but not send. For example, a pager. Half-duplex
communication can send or receive, but not at the same time. For example, a CB radio. Full-duplex can send
and receive signals at the same time. For example, the telephone.
19. Network Adapter Cards or Network Interface Cards (NICs) are used to connect the computer to the
network. (They make the physical connection to the network.) NICs translate the data that computers can
understand into signals that can be transmitted over the network medium and back again.
20. Remote Boot PROM (Programmable Read Only Memory) is used on networks that utilize diskless
workstations. High-security networks sometimes use diskless workstations to make it impossible for data to be
downloaded and stolen. Computers usually use information located on a floppy or hard drive to boot up,
remote boot PROM allows the computer to boot using information located on a remote computer.
21. In a Token Ring network if the correct ring speed is not selected a computer will not be able to connect
to the network. The two choices available are 4 Mbps and 16 Mbps.
22. PCMCIA (Personal Computer Memory Card International Association) cards are credit card sized
expansion buses that are used in portable computers (laptops) to provide the same expandability enjoyed
by desktop computers, including network connectivity.
23. To create a temporary network, to backup a cable-based network, to provide a mobile network
environment, for areas where running cable would be impossible or unsightly, outdoor installations and to
connect to remote sites such as a ship or oil platform.
24. Infrared, Laser, Radio, and Microwave
25. Spread-Spectrum Radio is more secure than Single-Frequency Radio (Narrow-Band Radio) because
it broadcasts over a range of frequencies instead of just one.
26. Satellite microwave is used to transmit globally; Terrestrial microwave is used to transmit over
shorter distances.
1. What are the three primary access methods?
2. Describe the difference between the two different contention methods CSMA/CD and CSMA/CA.
3. Why isn’t token passing considered a contention method?
4. Describe how data is transmitted in Token Ring architecture
5. What happens if two computers using the demand priority access method transmit at exactly the same
time?
6. How is data transmitted over the network cable?
7. What is CRC and what part of the packet is it usually located in?
8. What sort of information do packet headers contain?
9. What does the “T” in 10BaseT indicate?
10. What is the maximum segment length in 10Base2?
11. What type of connectors are used in 10Base5?
12. What type of cable is used in 10BaseFL?
13. Name the two main 100 Mbps Ethernet Standards.
14. Which IEEE Specification defines Ethernet?
15. Which IEEE Specification defines Token Ring?
16. What are the two transmission speeds of Token Ring?
17. How are data collisions avoided in the Token Ring architecture?
18. Describe beaconing as it applies to Token Ring architecture.
19. Which way does data travel in a Token Ring network?
20. What is a SMAU?
21. Describe a MIC connector.
22. How does a computer on a LocalTalk network obtain its address?
23. What is the purpose of AppleShare?
24. What type of access method is utilized by an ARCNet network?
25. How does data flow in an ARCNet network?
1. CSMA/CD & CSMA/CA, Token Passing, and Demand Priority
2. CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection and CSMA/CA stands for
Carrier Sense Multiple Access with Collision Avoidance. Both CSMA/CD and CSMA/CA listen to the network
cable to determine if it is free (Carrier Sense), if no data is traveling, a CSMA/CD computer will transmit. If
there is another computer on the network that transmitted at exactly the same time, a data collision will occur,
and both sets of data will be destroyed. CSMA/CD detects that a collision has occurred and waits a specified
amount of time before re-transmitting. With CSMA/CA the process is much the same except that instead of just
transmitting when it senses that the cable is free, it will send a signal that it is about to transmit. This will cause
any other computer that was about to transmit to wait and so data collisions are avoided. This extra step can
slow down network traffic, so CSMA/CA is not the most popular of the two contention methods.
3. A computer on a token passing access method network must possess the token in order to
transmit data. Therefore, only one computer at a time will transmit in this kind of architecture, and so, no
contention.
4. A token, which is a special kind of packet, is circulated around the ring from computer to computer in a
Token Ring network. A computer that wants to send data onto the network waits until the token is passed to it
and takes possession of it. The transmitting computer encodes the token with the data that it wants to transmit,
as well as header and trailer information that contain the destination and source addresses, as well as error
control information. It then passes the token back out onto the ring where it travels on until it reaches the
destination computer. The destination computer copies the data into its buffer and adds some acknowledgment
information (or re-transmittal information if it detected errors) and releases the frame back out onto the network
where it travels back to the source computer. Assuming that the data was transmitted error-free, the source
computer removes the “used” frame from the network and creates a new “free” token to release back out onto
the network.
5. If the hub receives two transmissions at exactly the same time the one with the highest priority is
processed first. If the two transmissions have the same priority level, they are processed at the same time
by alternating between the transmissions.
6. In packets or frames. (Small chunks of data at a time.)
7. CRC (Cyclical Redundancy Check) is a mathematical calculation that is calculated at the source
computer and included in the trailer of the packet. When data arrives at the destination computer, the
calculation is redone and if it calculates as it did at the source computer it is assumed that the data arrived
intact.
8. The header contains information such as an alert signal that announces that data is being transmitted,
the source and destination addresses and clocking information.
9. The first part indicates transmission speed (10 means it transmits at 10 Mbps), the second part “Base”
indicates that it uses baseband (single channel) technology and the last part indicates the cabling type, or
maximum segment length in the case of coaxial cable. (“T” indicates Twisted-pair).
10. 185 Meters. The “2” in this case means 2 times 100 meters, but in the case of Thinnet coaxial cable the
maximum segment length is 185 meters.
11. BNC connectors
12. Fiber-Optic
13. 100VG-AnyLAN, also called 100BaseVG, VG, and AnyLAN. The VG stands for Voice Grade.
100BaseX is sometimes called Fast Ethernet. It has different specifications depending upon the type of cabling
used (hence the “X” in the area that indicates cable type).
14. The IEEE 802.3 standard
15. The IEEE 802.5 standard
16. 4 Mbps and 16 Mbps
17. A computer must posses the token in order to transmit data. Since no other computer can transmit
while one computer has the token, data collisions are avoided.
18. The active monitor (which is the first computer to go online) is responsible for monitoring network
activity to make sure that frames are being sent and received accurately. It also ensures that only one token is
traveling the ring at a time and investigates any frames that have traveled around the ring more than once. It
does this by transmitting a signal every seven seconds. This signal is called beaconing and it travels from
computer to computer. If a computer doesn’t receive an expected signal from its upstream neighbor it will notify
the monitor that a problem may exist.
19. Which way data travels in a Token Ring network is a matter of convention. IEEE 802.5 says it travels
clockwise, while IBM says that it travels counter-clockwise. It can be either depending upon how it is set up.
The main thing is that data only travels in one direction on a Token Ring network. It is more commonly set up
to travel clockwise, however.
20. SMAU stands for Smart Multistation Access Unit. This is a hub that has all of the features of an active
hub (regenerates or amplifies the signal) with additional capabilities such as certain network management
functions. A SMAU may have the capability to shut down a connection that is producing errors thereby allowing
the rest of the network to function.
21. MIC (Media Interface Connectors) are connectors that have neither male nor female ends. Any
connector can be connected to another MIC connector. They are also called hermaphrodite connectors.
22. When a computer first comes online in a LocalTalk network it randomly selects an address from a
range of allowable addresses. It then broadcasts the address to determine if any other computer on the
network is using it. If no other computer is using the address, it stores it to use each time it connects to the
network.
23. AppleShare is the name of the file server on an AppleTalk network. It also provides a print server.
24. Token-passing.
25. The token is passed around the network in numerical order. It first goes to computer #1 and then #2,
etc. It does this even if computer #1 is at the opposite end of the network from computer #2.
1. What are the two tools required to initiate a network design?
2. What are the two areas of concern when starting a network project?
3. What are the two most prominent reasons to choose a peer-to-peer network?
4. What is the number one reason for choosing a client/server network?
5. Is NetBEUI a good protocol to use with a large WAN?
6. Your client is installing a small Ethernet network and trying to save money at the same time. However, he
intends to expand the network in the future. Give one reason why you should recommend that he spend a little
more now and install CAT 5 cabling instead of CAT 3.
7. You are expanding your network and will need to invest in 50 to 100 new network cards. Your accounting
office found a really good deal on network cards, but they are not all the same. Why should you refuse this
offer?
8. Your company just bought ten new computers and all are guaranteed to meet the minimum
requirements of Windows NT. Was this a good purchase?
9. How do you know if a new piece of hardware will work with Windows NT?
1. All you need to start a network project is a pencil and some paper.
2. You will need to consider the customer and the network goals.
3. The best reasons for using peer-to-peer are its simplicity and low cost.
4. The number one reason for using a client/server network is security.
5. No, NetBEUI is a non-routable protocol and will not interface with routers.
6. It will be less costly to install CAT 5 now than to replace the CAT 3 later when the network needs to be
upgraded from 10 MHz to 100 MHz to handle the higher traffic.
7. First, you cannot be sure that they will meet the specifications of your network. Also, having to maintain
a variety of network cards will increase the workload of your IS department – it is better to standardize network
cards in a large network.
8. No – the minimum requirements are just enough to run the NOS, but not enough to run it efficiently.
9. Check the hardware compatibility list (HCL).
1. What is the difference between a hub and a MAU?
2. What is the difference between an active hub and a passive hub?
3. Define a repeater, a bridge, a router, and a gateway.
4. What is analog communication?
5. A form of digital line that is capable of 1.544 Mbps transmissions is called?
6. Name three advanced WAN environments.
7. What are the two components of remote network accessing?
8. Name three RAS protocols.
9. Name four forms of RAS security.
10. Describe the difference between BAUD and bps.
1. Hubs are used with Ethernet networks and MAUs are used with Token Ring
networks.

2. Active hubs are used to connect nodes and boost the signal strengths. An active hub requires some
input power. Passive hubs are used only to make connections.
3.
Repeater - A repeater is a device that is used to extend the cable lengths of a network segment. They do not
translate or filter any information. They do however, amplify the signal thereby compensating for signal loss
due to long cables. Repeaters work in the Physical layer of the OSI model.
Bridge - A bridge does the same things as a repeater but has one additional feature. A bridge can be used to
isolate segments on a LAN, thus reducing the traffic for each segment. Bridges work in the Data Link layer of
the OSI model.
Router - A router has all the features of a bridge, but it can switch packets across multiple networks. They can
also determine the best path for “routing” traffic and filter broadcast traffic to the local segment. Not all
network protocols will work with a router. For example, NetBEUI is not routable.
Gateway - Gateways make it possible to connect different network architectures. Think of a gateway as a
computer that acts as a translator between two networks that don’t speak the same language.
4. Analog communication is based on PSTN or public switched telephone network.
5. T1
6. Frame Relay, ISDN, and SONET
7. RAS (remote access server) and DUN (dial up networking).
8. SLIP, PPP, PPTP and L2TP
9. Auditing, Callback Security, Security host, and PPTP filtering.
10. BAUD rate is the number in cycles per second of the carrier signal of a modem. BAUD is limited to
2400 bps. A bps or bit per second is the actual data transmission rate of a modem. In older modems, BAUD
and bps were the same thing.
1. What are the four layers that make up the TCP/IP protocol suite?
2. How many primary protocols are used to make the TCP/IP Suite?
3. Name three of the five other protocols used within TCP/IP
4. What is the purpose of DNS?
5. What is an FQDN and give an example?
6. What is a domain?
7. Who is responsible for maintaining top-level domains?
8. Which of the name resolution services will work only in Windows?
9. IPv4 addresses consist of a ______ bit number.
10. What is the value of the leading bit (one on the far left) for a Class A IP address?
11. Subnetting is the process of breaking an IP address into _________ and ________ groups
12. What are five reasons to use subnetting?
1. The four layers of TCP/IP are: Application, Transport, Internet and Network
Interface.
There are five primary protocols: they are – TCP, UDP, IP, ICMP, and ARP.
2. Additional protocols are: POP3, SMTP, FTP, SNMP, and HTTP.
3. The Domain Name System is used to resolve host names into IP addresses.
4. FQDN is a Fully Qualified Domain Name. An example is http://www.microsoft.com.
5. A domain is a group of computers that share a common general purpose.
6. The InterNIC (Internet Network Information Center) is responsible for top-level domain names.
7. WINS
8. 32

10.

Class B? Class C?

Class A 01-126 (leading bit is 0)

Class B 128-191 (leading bit is 1)

Class C 192-223 (leading bits 11)

11. Subnetting is the process of breaking an IP address into meaningful and manageable groups.

12. Connect physically remote local networks Connect a mix of network technologies (Ethernet and Token

Ring) Allow an unlimited number of hosts to communicate Reduce network traffic by limiting broadcast and

local traffic to a single segment


1. You are the manager of a large network and have been getting complaints about the system being slow.
What kind of software package can you purchase to help analyze your network?
2. In order for your new network management software to monitor the activities of the entire network, each
device will need to be _________ compliant.
3. TCP/IP provides several tools that you can use to validate the statistics of your network. List as
many as you can.
1. Network Management Software is used to analyze network traffic and network status.
2. SNMP (Simple Network Management Protocol)
3. Event Viewer, ROUTE, NBTSTAT, NETSTAT and TRACERT.
1. What are the two requirements of user level logon?
2. In a share level model, passwords are assigned to __________.
3. What is the function of a firewall?
4. What does the acronym RAID stand for?
5. What are the six levels of RAID?
6. What purpose does encryption play in your security model?
1. The user must type in a Username and a Password.
2. Resources
3. A firewall is used to prevent unauthorized access to your network from outside via the Internet. It can
also be configured to prevent unauthorized transmissions from leaving your network.
4. Redundant Array of Independent Disks or Redundant Array of Inexpensive Disks.

5.

RAID 0 Non-redundant striped array

RAID 1 Mirrored arrays

RAID 2 Parallel array with ECC

RAID 3 Parallel array with parity

RAID 4 Striped array with parity

RAID 5 Striped array with rotating parity

6. Encryption encodes a message so that it cannot be read if it is intercepted during transmission.


1. What are the three primary steps to take when troubleshooting?
2. After repairing a problem, are you finished with the troubleshooting process?
3. You are troubleshooting a cable problem. You have found the cabinet with the patch panel and hub, but
need to know which of the 50 cables goes to the accounting office. What would be the best tool to help you
locate the cable in question?
4. You have located the cable in question #3, and think it might be shorted. What tool would you need to
find the short?
5. You are working with a TCP/IP network and want to confirm the protocol stack in a specific workstation.
What utility can you use to confirm the protocol stack is good?
6. What is the loopback IP address?
7. You need to know the IP address of a workstation. What TCP/IP utility can you use to find the IP address of
the workstation?
8. You have just connected a workstation to the network. What is the easiest way to tell if the network card can
“see” the network?
9. What is the difference between bandwidth and throughput?
10. You have a Windows NT network and received complaints that the server is running slow. What utility can
you use to determine the performance of the server?
1. The three steps to troubleshooting are: Define the Problem, Isolate the Problem, and Repair the
Problem.
2. NO – You still need to confirm the repair and document the problem and solution.
3. The best tool for isolating a single cable from many is the tone generator or tone locator. The fox
and hound.
4. TDRs (Time-Domain Reflectometers) are used to locate shorts in cables.
5. PING the loopback IP.
6. 127.0.0.1
7. You can use IPCONFIG from a DOS prompt or if using Windows, WINIPCFG from the RUN command.
8. If the network card has indicator lights, you should see the green light that indicates that the network
card has detected the presence of a network.
9. Bandwidth is the amount of traffic that a network can handle at a given time. Throughput is the
maximum speed that a message can be transmitted.
10. Performance Monitor

You might also like