POP QUIZ 2 !!! Multiple Choice Questions The organization whose website you visited in your homework, that registers ip addresses in North and South America is called: A. IETF B. Erin C. Internic D. IEEE E. ARIN What’s the Speed of Fast Ethernet? A. 10 Mbps B. 4/16 Mbps C. 100 Mbps D. 1000 Mbps E. None of the Above Type of Cable most often used within Ethernet lans using star topologies? A. fiber B. UTP C. BNC D. thin coax E. Thick coax Which of the following is NOT a network architecture? A. Ethernet B. FDDI C. Token Ring D. Token Passing E. ATM The file on a Unix system that gives you info on port numbers, is called: A. B. C. D. E. /etc/services /etc/ports /etc/ethers /etc/hosts /etc/vfstab Which is a common standard for wireless networks? A. 802.3 B. 802.5 C. 802.11b D. 802.11z E. 805.3 What Network Protocol is usually used with Novell Netware? A. Netbeui B. IPX/SPX C. Appletalk D. RARP/ARP E. None of the above A Network Architecture based on token passing around a dual fiber ring is? A. B. C. D. E. ATM CDDI Token Ring FDDI Fast Ethernet Which protocol in the TCP/IP suite can act as a replacement for TCP? a. IP b. SPX c. ARP d. UDP e. All of the above What class of an IP address is normally given to large corporations or a large university (like Rutgers)? A. Class A B. Class B C. Class C D. Class D E. Class E Todays network printing solutions usually work by using: A. a server with a printer directly attached B. a printer with its own NIC installed and connected directly to a switch C. print spooling on a print server D. B and C above E. None of the above Fill in the Blanks IPV4 uses _________ bits for the tcp/ip address. IPV6 improves this by using ____________ bits. 32, 128 A typical ethernet address is made up of ________ hex digits. An example would look like ______________. A typical ip address is written down with ________ distinct parts (sections), where each part ranges from _____ to _______. An example would look like _________. 12, 1A:BC:F4:44:6C:A1, 4 , 0, 255, 165.230.99.70 Some of the Rules for Ethernet: 10Base5: _______ maximum segment length _______ maximum number of segments 10BaseT: _______ maximum distance from hub to a given system 500m, 5, 100m Name the following Channel Access Methods Talk whenever you want _________ Listen before talking, talk and keep listening ______________ Listen before talking, ask permission to talk, and then talk ______________ 2 non contention methods are _______ and _________ Aloha, CSMA/CD, CSMA/CA, Token Passing, Polling Assume you have a server named “santa” and a client named “elf”. The server shares a directory/folder called “\toys”. Give the windows command given on the client, to map the above directory. net use k: \\santa\toys Assume you have a unix server named “santa” and a unix client named “elf”. The server shares a directory/folder called “/toys”. Give the Unix command given on the client, to map the above directory to an empty directory (/turkey) on the client. mount santa:/toys /turkey The dos/windows command to view your networking info is called ______ The unix command to view your networking info is called __________ The control panel icon useful in widows to view and change your tcp/ip information is called: ________ ipconfig, ifconfig, network Acronym Expansions TCP/IP Transmission Control Protocol/Internet Protocol POTS Plain Old Telephone Service DSL Digital Subscriber Line CSMA/CD Carrier Sense Multiple Access with Collision Detection ATM Asynchronous Transfer Mode OSPF Open Shortest Path First RARP Reverse Address Resolution Protocol Simple Definitions Virtual drive a logical drive letter that is not physically located on the system. Used to do drive mappings between client and server. Like the K: drive in the class lab. Points to a folder on the server. DNS Domain Name Service. A dns server translates names into ip number and visa versa. This is useful because most humans who use internet applications specify systems by using names, but the tcp/ip packets need to use ip numbers instead. Thus DNS servers are used to translate. Questions and Answers Explain the 4 layers of the TCP/IP protocol. What does each layer do? Explain important fields in each protocol layer. Explain fully. What is meant by encapsulation/deencapsulation? Explain the different ways a machine can find its ip address when booting up? How does it find its Mac Address? Clearly Explain how CSMA/CD works. Draw a ethernet packet and show all fields and their sizes. Explain what a bridge is and how does it work? Draw a diagram. Explain what a router is and how it works? Explain how a packet is passed from Point A to Point B if both A and B are on the same subnet. Explain what the 4 addressing fields are in each packet and how they get filled in. Explain how a packet is passed from Point A to Point B if both A and B are on different networks (one or more router/hops apart). Explain what the 4 addressing fields are in each packet and how they get filled in. If a site has a Class B tcp/ip address and it uses the subnet mask 255.255.254.0, then What is the number of hosts they can have at their site per lan/subnet? What is the number of lans/subnets do they have? Show all work (show how you got these answers) What is a VLAN? Explain fully. What is a firewall? Explain fully. What are some of the security problems related to networks? What can one do to help prevent these types of security issues? Explain the different stages of the Lifecycle of a Network. (state what the stages are in the correct order, explain them fully). The End! The End!