CET 751

Computer Hardware and Network Fundamentals

Summer 2002              Final Exam I-B

 

Name _____Stacy Phelps__________                                               Score ____________

 

There are three required questions.  You are required to also answer three of the optional questions. 

 

Required Questions

 

  1. Complete the following table describing a Summary of Network Technologies.  (10 points)

 

 

Item

 

 

Token Ring

 

 

Ethernet

 

 

FDDI

 

 

 

 

Logical Topology or Shape

Ring

Bus

Double ring

 

 

 

 

Physical Topology or Shape

Ring or star

Star or bus

Ring

 

 

 

Media

UTP, STP, FL, FX

UTP, STP, FL, FX, coaxial

FL, FX

 

 

 

Advantages

 

 

 

Very solid network

Little expense in establishing, simple for maintenance point of view

Speed. Very very fast.

 

 

 

Disadvantages

 

 

Can be difficulty to troubleshoot

The nature of the network can lead to network problems.

The price for speed can be high.

 


 

  1. List and explain, in the proper order, the steps for creating a Windows 9X peer to peer network using three computers that have a NIC installed.  (10 points)

First I would install a hub for the network. 

Next I would make up Ethernet cables or them available and tested for use.

Connect all of the computers to the hub.

And install the proper protocol in the network icon area.

While in the network properties area, we will need to give the computers an individual name and make them function in the same work group.

Provide access what resources are needed to be shared under the network.

Along the way we will need to reboot each time we make changes in the network properties area and attempt and click ok.

 

 

 

  1. There are two network configurations that were discussed in class.  List three advantage and three disadvantages of each. 

 

Peer to Peer

Server Based

Advantages

Advantages

1.

peer to peer networks are simple and can be easy to trouble shoot of fix.

 

 

 

1. Can have high level or lower levels of security based on the needs of the users or administrators.

2. the computers in the network can be wide open to each other and provide more access to files and printers, etc.

 

 

 

 

2. The server based network can have many resources available.

3. the costs is very minimul for the network and does not need a full blown administrator to administer.

3. The server based network can off set costs of the network for per client software versus server based software.

 

Disadvantages

Disadvantages

1. The peer to peer network can be slowed if people are accessing the network at the same time.

 

 

 

1. there can be costs of large servers and other equipment to purchase to administer.

2. The security is based on the individual users settings.

 

 

2. There is a possibility for breeches of security if not tight controls.

3. one of the users must have knowledge to install and minimally maintain network

3.the server based network will need a full time network administrator to maintain the network for the users. Which can mean a lot of money.

 

 


 

The Remaining Questions are Optional (You must select three of them each are worth 10 points each)

 

1.     List the layers of the OSI network model and provide a description of what each layer does.

 

Layer

Description

1.      

 

 

 

 

 

2.      

 

 

 

 

 

3.      

 

 

 

 

 

4.      

 

 

 

 

 

5.      

 

 

 

 

 

6.      

 

 

 

 

 

7.      

 

 

 

 

 

 


 

 

2.     List and explain in the proper order the steps for creating a patch cable.  (Assume the wire is cut from the spool)

 

      Cut the insulation about 1.5 inches back from both ends.

      Take the wire and separate them into their individual color pattern and un-strand them.

      Place the wires into their following pattern . OW/O, GW/B, BW, G, BRNW/BRN.

      Flatten the wires so that they lined up straight and in a flat pattern.

      Cut the wires evenly with about 1 inch of wires left leaving as much twist as possible in the insulation.

      Keep the orange pattern on your left as you look at it, and and slide the RJ45 connector with the clip down, onto the wires and push them as far forward as possible.

      Slide some of the insulation into the RJ45 so that when it is clamped the insulation will be held in place.

      Use your wire crimpers and crimp the RJ45 connector and squeeze very tight..

      Test the cable with a cable tester to ensure that it will work.

 

 

 

 

 

 

3.     List and explain the steps for the configuration of a Domain Controller.  Also explain how to add a User, how to add a Group and how to Share a Folder in a Windows 2000 server environment.  .

 

 

 

 

4.     List and explain the in the proper order the steps for the creation of a rescue disk under Windows 95 that supports reinstallation on Pentium 120 in the lab.  Be certain to include the necessary filed and configuration to enable CDROM support under DOS.  Your starting point is with the computer running.

 

 

 

 

5.     List and explain the in the proper order the steps for the installation of a Network Interface Card in Windows 95 on computers in the lab.  (Starting point is plugged in and off with no NIC installed.

 

      Make sure that we have the windows 95 cd and NIC drivers diskette with us to start with and a tested network cable. Note the model of the NIC that you are installing.

      Unplug the power cord from the wall or else from the power supply.

      Put on static discharge band or ground yourself on a piece of metal in the computer.

      Remove cover of computer.

      Find the proper slot in which to install NIC into computer.

      Remove dust cover from the chasis with our screwdriver.

      Line up the NIC with proper slot and push the NIC firmly into place. Install the screw to the hold NIC into place.

      Put the cover back on.

      Plug in the network cable into card and plug the power back into the power supply or the wall.

      Turn on the power and get driver cd ready.

      Allow the computer to find the new device and enter the new hardware installation mode.

      Place the CD rom into the cdrom driver.

      Click to install drivers from diskette option.

      And select proper location of driver cd.

      Select proper model of NIC from list available if it is not found automatically.

      Click to install driver.

      And proceed with installation

      Reboot computer when driver has been installed and asks for a reboot.

      When computer restarts check to see if a network link light comes on and then proceed to control panel and system device manager to see if there is any problems as indicated by a question mark on installed device.

 

 

6.     Explain what hubs, routers, gateways, and bridges do within a network

 

 

 

1.     Hub

 

Basic networking device that connects multiple computers together.

 

 

 

2.     Router

 

a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to

 

 

 

 

3.     Gateway

When referring to a network a gateway is an address used as entry point into another network

 

 

 

 

4.     Bridge

 

A computer bridge is a device that connects two local area networks (LAN) or two segments of the same LAN

 

 


 

7.     What are the three classes of IP addresses?  Specifically discuss the number of addresses per class.  List the three reserved addresses and explain static and dynamic addressing.

 

 

 

 

8.     Explain what is meant by segmenting of a network and use as an example how segmenting has been implemented on the Dakota State University campus.  Be certain to give an overview of the hardware that would be required to implement segmentation

 

 

 

 

9.     In class we discussed two benefits of a preventative maintenance plan.  Describe those two benefits.  In addition list and explain 5 of 10 guidelines for developing a preventive maintenance plan. 

 

 

 

 

10.  There are 3 categories of computer infestations that we discussed in class.  Define each of the them and then compare and contrast their behaviors.