PopQuiz
Novell CNE Exam #50-665: Networking Technologies
10 questions. Answers can be found at the end of the pop quiz.
courtesy of Measure Up
Questions
1. It is important for your LAN to continue working, even if there is a break in the cabling. Which topology should you use?
a. Bus
b. Bell
c. Ring
d. Star
2. In the network world, each data frame needs three addresses: Physical address, Logical address and __________ address. (fill in the blank)
3. What protocol provides dial-up telephone connections using the Network Layer IP protocol?
a. SLIP
b. FDDI
c. SONET
d. Frame Relay
4. Common ____________ Network Layer protocols include Novell's NetWare Link Services Protocol and OSI's Intermediate Systems-to-Intermediate Systems (IS-IS).
a. Static
b. Dynamic
c. Link-state
d. Distance-vector
5. Which statements define source-routing bridges? (Choose two.)
a. They are typically used in IBM Token Ring networks.
b. They are based on the IEEE 802.1d Spanning Tree Protocol.
c. They are typically used in Ethernet networks.
d. They are used to forward frames from one cable segment to another.
6. Where is the HOSTS file stored on a NetWare server?
a. SYS:ETC
b. SYS:PUBLIC
c. SYS:SYSTEM
d. SYS:DOMAIN
7. How many subnets are possible when 8 bits are used for subnets?
a. 62
b. 64
c. 254
d. 256
e. 1022
f. 1024
8. Which services does TFTP provide?
a. File services
b. Non-transparent file transfer services
c. World Wide Web services
d. Remote terminal emulation services
9. What statements define SAP? (Choose two.)
a. Uses a hop count to determine costs
b. A distance-vector route-discovery protocol
c. Used by NetWare servers to advertise their services at the upper layers
d. Each server running SAP must identify itself and its services each minute
10. What are features of X.500? (Choose two.)
a. File transfer
b. Archive management
c. Synchronization
d. Replication
Answers
1) Answer: d. Physical Star Topology
Physical topology describes the geographic orientation and arrangement of networking nodes. Media access protocol is the set of rules and procedures these nodes use for communicating over transmission media. Finally, topology and protocol combine to create a specific networking standard.
Star Topology: The physical star topology uses a central controlling hub with dedicated legs pointing in all directions — like points of a star. Each network device has a dedicated point-to-point link to the central hub. This strategy prevents troublesome collisions and keeps the lines of communications open and free of traffic. Star topologies are somewhat difficult to install because each device gets its own dedicated segment. Obviously, they require a great deal of cabling. The good news is that this design provides an excellent platform for reconfiguration and troubleshooting. Changes to the network are as simple as plugging another segment into the hub. In addition, a break in the LAN is easy to isolate and doesn’t affect the rest of the network.
2) Answer: Service or service address. In general, addressing distinguishes one location from another. That location can be a home, network device, or Santa's workshop at the North Pole. Data frames need addresses so that they know where to go and what to do. Addressing works on a hierarchy structure. In the network world, each data frame needs three addresses:
- Physical address
- Logical address
- Service address
It's time to send my annual letter to Santa. Believe me, it's never too early. To make sure that it gets there, I need to put three pieces of information on the envelope: his street address (physical), his city (logical), and a topic for internal routing (service). Network data frames work in much the same way. For your data to reach the correct device, it must include three pieces of information. First, your data frame must include a physical address. This is the 12-digit hexadecimal ID programmed onto the workstation's NIC at the factory. If your network is very large, you'll also need a logical address to narrow down the search. This address is programmed by you at the Network Layer. Finally, each data frame needs a service address so that it can find the appropriate destination application. This address operates at the Transport Layer of the OSI Reference Model. 3) Answer: a. SLIP. The Serial Line Internet Protocol (SLIP) provides dial-up telephone connections using the Network Layer IP protocol. SLIP is a WAN implementation at the Physical Layer that connects LANs into WANs or modems to modems. SLIP was the first of two protocols that was developed to provide dial-up IP connectivity (the other is PPP, which we'll get to soon). SLIP is extremely simple and severely limited. It uses a peer-to-peer relationship between a remote IP node and the Internet host. The dial-in host is located on a network and must have access to the Internet. Remote nodes then attach directly to the host through a point-to-point modem connection. The host is often dedicated to the task of managing dial-in access.
SLIP is a de facto standard and has no official backing from any organization. For this reason, SLIP implementations vary a bit and may not always get along with each other. SLIP differs from its newer cousin (PPP) by offering only Physical Layer services.
4) Answer: c. Link-State Route Discovery. Link-state route discovery relies on global broadcasts. Each router identifies its own segment by broadcasting a Link-State Packet (LSP) to all routers on the internetwork. This initial message contains information about the networks that the router is directly attached to and is commonly known as flooding. This way, each router can initially build a complete RIT based primarily on first-hand information, which is updated only when changes occur. Each router broadcasts changes to the global RIT, and other routers modify their own tables. This strategy ensures accurate RITs, but broadcasts changes only. In addition, change information is not broadcast back onto the network where the information was obtained.
Link-state routing protocols, like their distance-vector cousins, determine route reachability information based on the lowest hop count. However, most link-state protocols are much more flexible in terms of the metrics used to determine the best path to a destination network and make take into consideration parameters such as line speed, line quality, and so on. Common link-state Network Layer protocols include Open Shortest Path First (OSPF), Novell's NetWare Link Services Protocol (NLSP), and OSI's Intermediate Systems-to-Intermediate Systems (IS-IS).
5) Answer: a, d. When a frame that is intended for a device on another segment is transmitted, a bridge can forward the frame to the correct cable. Once the frame makes it to the right segment, it will be received by the device whose physical address is specified in the MAC header's destination address field.
Two most popular bridge flavors:
- Transparent Bridges (also known as Learning) - Transparent bridges are widely deployed and easy to implement - they have minimal installation and setup requirements. These bridges learn the location of network devices by examining the source MAC address field and provide transparent forwarding services. Transparent bridges are based on the IEEE 802.1d Spanning Tree Protocol, which allows network administrators to configure redundant paths between network segments.
- Source-Routing Bridges - Source routing bridges are typically used in IBM Token Ring networks. Like transparent bridges, a source-routing bridge is used to forward frames from one cable segment to another. However, the manner in which they perform this task is significantly different.
6) Answer: a. Although DNS provides an automated host name-to-IP address resolution mechanism, the manual maintenance of a hosts database may also be used in place of, or in conjunction with, DNS. In TCP/IP networking, the term "database" is commonly used to describe an ASCII text file containing some form of system-related information.
Prior to DNS, all hosts connected to the Internet had to periodically download host name and address information to keep their databases current. This was a problem for two reasons. First, the information was only as current as the last time it was updated. Second, as the Internet grew, the amount of information needing to be regularly downloaded by each host was eating up valuable network bandwidth.
On UNIX systems, the HOSTS file is stored in the "/etc" directory. On NetWare servers, you will find the HOSTS file in the SYS:ETC directory. These files share the same formatting rules. Each line in a hosts file may contain the following fields:
IP-Address Official-Host-Name Aliases
Each field is separated by at least one ASCII space or tab character. A pound symbol (#) anywhere on a line indicates that any remaining text on the line is a comment.
7) Answer: c. The number of subnets available can be calculated according to the following formula:
Available Subnets = 2n - 2 where n is the number of bits used for subnets. In the previous example, we borrowed 8 Host bits and reassigned them for use by subnets. The resulting number of possible subnets is calculated as:
28 - 2 = 256 - 2 = 254
We must subtract 2 from the possible number of subnets because subnet addresses consisting of all ones or all zeros are not allowed.
When you implement subnetting, you are changing the meaning of IP addresses from two components (Network/Host) to three components (Network/Subnet/Host).
8) Answer: b. FTP and TFTP. File Transfer Protocol (FTP) enables a user to transfer files between two networked computers. It also provides a variety of login, directory inspection, file manipulation, command execution, and other upper-layer services. In addition, FTP can be used to move files between dissimilar operating systems using TCP. This is because it provides a generic file request structure. Cool. Trivial File Transfer Protocol (TFTP) is similar to FTP, but does not require that users specify a login name or password before beginning a file transfer.
9) Answer: c, d. Routing Information Protocol (RIP) and Service Advertising Protocol (SAP) work in conjunction with IPX to perform route selection, route discovery, and service availability functions. Let's see exactly what they do:
- RIP (Router Information Protocol) - A distance-vector route-discovery protocol that uses a hop count to determine costs. Although RIP is implemented as a service, it is based directly on IPX and supports it at the Network Layer.
- SAP (Service Advertising Protocol) - Used by NetWare servers to advertise their services at the upper layers. Each server running SAP must identify itself and its services each minute by broadcasting a SAP packet. This service advertisement functionality coordinates with NCP's translation and service use.
10) Answer: c, d. Like NDS, X.500 organizations network resources (such as users and servers) into a globally-accessible Directory. The X.500 specification establishes guidelines for representing, accessing, and using information stored in a Directory database. X.500 defines Application Layer process functionality. X.500 is described in RFC numbers 1292, 1308, and 1309.
X.500 Directory features closely resemble NDS:
- Scalability - Large databases can be subdivided into smaller Directory System Agents (DSAs). A DSA can represent a single or multiple organizations and its contents may be distributed across multiple Directory servers. NDS calls them "Partitions".
- Replication - This feature allows the Directory database or portions thereof, to be replicated on backup Directory servers located throughout the network.
- Synchronization - Because X.500 must manage a loosely-coupled, distributed database, each server must be able to synchronize its database contents with other servers. Directory database updates may be made at the original master database (master/shadow arrangement) or at any writable replica (peer-to-peer mechanism). In either case, X.500 propagates Directory database change information to all servers holding replicas of the database or a DSA.
These questions and answers are provided by MeasureUp, Inc. An EarthWeb Company. Order the full version of this exam, plus other Cisco, CompTIA, Microsoft, Novell, Oracle and Prosoft simulations online at www.measureup.com, phone 678-356-5000, fax 770-777-0732, or mail to MeasureUp, Inc. An EarthWeb Company, 2325 Lakeview Parkway, Suite 175, Alpharetta, Georgia 30004.
More Pop Quiz:
|