Sunteți pe pagina 1din 12

RTO No: 20829

CRICOS Provider No: 02044E


ABN: 41 085 128 525
STUDENT COPY- CR

Assessment Resource Summary


ICTTEN6206A - Produce an ICT network architecture
Unit Details

Assessment
Requirements

Assessment
Methods

design

This is a supplementary assessment task for those students who


were deemed not yet competent (NYC) in the performance of their
previous written assessment task and/or lab assessment task for the
unit.
If students were marked unsatisfactory for the lab task, they must
complete the lab task below. If they were marked unsatisfactory for
the written task, they must complete the written task below

1. Written Test / Oral Questioning

(Three
Assessments for
this unit)
3 Practical task

Issue Date

Assessment type:
Short answer
Assessment type:
Lab exercise

March 2016

Unit Summary
The unit objectives, prerequisites, corequisites and other pertinent information about this unit is
described at https://training.gov.au/Training/Details/ICTTEN6206A

Assessment Resource
ICTTEN6206A
a

Page 2 of 12

Assessment Resource
ICTTEN6206A
a

General Instructions for Students


As these are considered practical units to be conducted in a simulated environment, this may
include a closed meeting room, office, or even the classroom (if it represents a working office
environment). You trainer will act as an office supervisor and will provide all relevant information
for an assessment.
Answer all parts of the assessment
Provide typed answers. Handwritten answers are not accepted .
Do not cheat. Anyone caught cheating will automatically be marked Not Yet Satisfactory for
this unit. There are NO EXCEPTIONS to this rule.
In order to achieve competency, all assessment tasks MUST be answered correctly
Note:
All references made to workplace and or employer, are directly related to the trainers and
facilities at VIT.

Page 3 of 12

Assessment Resource
ICTTEN6206A
a

WRITTEN TEST INFORMATION FOR STUDENTS


Short Answer Questions
This information is to be handed to each student to outline the assessment requirements
This is an open book written assessment. This assessment is to be undertaken in an actual job
workplace or a classroom/simulated environment. Students are required to complete the written
test consisting of 20 short answer questions.
Reference Textbooks:
1. Priscilla Oppenheimer Top Down Network Design 3rd Edition. Cisco Press
2. TCP/IP Tutorial and Technical Overview IBM Redbook

Page 4 of 12

Assessment Resource
ICTTEN6206A
a

WRITTEN TEST
Student Name:

______________________________________________________________

Student ID No:

______________________________________________________________

Date:

______________________________________________________________

Student Instructions:
This is an open book written assessment. You are to answer all of the following questions.
Make sure you:

Type all answers inline and submit a printed document. Handwritten assignments will not be
accepted
Answer all questions
Do not cheat. Anyone caught cheating will automatically be marked Not Yet Satisfactory for
this unit. There are NO EXCEPTIONS to this rule.

Page 5 of 12

Assessment Resource
ICTTEN6206A
a

Short Answer

1 What is the purpose of RARP protocol ?


Ans .

The purpose of RARP protocol are as :-

Reverse Address Resolution Protocol (RARP) is a network layerprotocol used


to resolve an IP address from a given hardware address (such as an Ethernet
address). It has been rendered obsolete by BOOTP and the more modern DHCP,
which both support a much greater feature set than RARP.

2 What is the purpose of BOOTP protocol ?


Ans. The purpose of BOOTP protocol are as :BOOTP (Bootstrap Protocol) is a protocol that lets a network user be
automatically configured (receive an IP address) and have an operating
system booted (initiated) without user involvement. The BOOTP server,
managed by a network administrator, automatically assigns the IP address
from a pool of addresses for a certain duration of time.
3 List three parameters that can be used to describe the quality of
service of a particular stream of data?
Ans . The three parameters that can be used to describe the quality
of service of a
particular stream of data as follow : Low throughput.
Dropped packets.
Out-of-order delivery.
Best-effort service.
Differentiated service (also called soft QoS).
Guaranteed service (also called hard QoS).
4 How many bits long is an (i) IPv6 address? (ii) an IPv4 address ?
Ans .
IPv4, which uses 32-bit addresses.

IPv6, addresses are 128-bit hexadecimal numbers.

Page 6 of 12

Assessment Resource
ICTTEN6206A
a

5 What are two advantages of wireless transmission when compared


with bounded media?
Ans.
The two advantages of wireless transmission when compared
with bounded media are as follows
Unbound transmission media are the ways of transmitting data without
using any cables. Where as Bound transmission media are the cables that are
tangible or have physical existence and are limited by the physical geography.

Wireless LANs are being installed in office and college campuses. This
transmission uses Microwave, Radio wave, Infra red are some of popular unbound
transmission media. Whereas popular bound transmission media in use are
twisted pair cable, co-axial cable and fiber optical cable. Each of them has its own
characteristics like transmission speed, effect of noise, physical appearance, cost etc.

6 What is the role of the MIB in the SNMP protocol?


Ans. The role of the

MIB in the SNMP Protocol are as follows :-

SNMP stands for Simple Network Management Protocol and


consists of three key components: managed devices, agents, and
network-management systems (NMSs). A managed device is a node
that has an SNMP agent and resides on a managed network. These
devices can be routers and access servers, switches and bridges,
hubs, computer hosts, or printers. An agent is a software module
residing within a device. This agent translates information into a
compatible format with SNMP. An NMS runs monitoring applications.
They provide the bulk of processing and memory resources required
for network management.
A management information base (MIB) is a formal description of a set
of network objects that can be managed using the Simple Network
Management Protocol (SNMP). The format of the MIB is defined as part
of the SNMP. (All other MIBs are extensions of this basic management
information base.) MIB-I refers to the initial MIB definition; MIB-II refers
to the current definition. SNMPv2 includes MIB-II and adds some new
objects.
7 List three different security options I can use when I negotiate between an
LDAP client and LDAP server ?
Page 7 of 12

Assessment Resource
ICTTEN6206A
a

Ans .
The three different security options I can use when I
negotiate between an LDAP client and LDAP server are as follows : Selective Listening

IP Firewall
TCP Wrappers.
8 What is the purpose of the mount command in NFS?
Ans.

The purpose of the mount command in NFS are as follows :The mount command instructs the operating system that a file system is ready to use, and
associates it with a particular point in the overall file system hierarchy (its mount point) and sets
options relating to its access. Mounting makes file systems, files, directories, devices and special
files available for use and available to the user. Its counterpart umount instructs the operating
system that the file system should be disassociated from its mount point, making it no longer
accessible and may be removed from the computer. It is important to umount a device before
removing it since changes to files may have only partially been written and are completed as part
of the umount.

9 What is the main file sharing protocol used in Microsoft networks?


Ans . The main file sharing protocol used in Microsoft networks are as
follows :

Common Internet File System (CIFS),


Server Message Block (SMB).
NetBEUI.
NetBIOS.
NetBT.
TCP/IP.

10 What is meant by the statement HTTP is a stateless protocol ?


Ans. HTTP is a stateless protocol. A stateless protocol does not require the server to retain
information or status about each user for the duration of multiple requests.
But some web applications may have to track the user's progress from page to page, for example
when a web server is required to customize the content of a web page for a user. Solutions for these
cases include:

the use of HTTP cookies.

server side sessions,

hidden variables (when the current page contains a form), and

URL-rewriting using URI-encoded parameters, e.g., /index.php?


session_id=some_unique_session_code.
Page 8 of 12

Assessment Resource
ICTTEN6206A
a

END OF WRITTEN ASSESSMENT


Before you hand in your written assessment, make sure that you:
1. Re-check your answers and make sure you are happy with your responses
2. Have written your Name, Student ID Number, and Date on the first page

Student Declaration:

I declare that the work


submitted is my own, and has not been copied or
plagiarised from any person or source.

Name:

________________________

Signature:

________________________

Date:

____/_____/_____

Assessor Use Only


Assessor Comments

Satisfactory (S)

Not Yet Satisfactory (NYS)

Assessor Signature: _______________________________

Date: _____________

Page 9 of 12

Assessment Resource
ICTTEN6206A
a

PRACTICAL OBSERVATION INFORMATION FOR STUDENTS


Laboratory Exercises
This information is to be handed to each student to outline the assessment requirements
This assessment is to be undertaken in an actual job workplace or a classroom/simulated
environment. Students are to arrange an appointment with a business client (role-played by the
assessor) to install and configure Windows 2012 Server. The student is to complete the
laboratory tasks
Install the operating system
Install and configure DNS
Change the IP address of the server to assign two static IP addresses 192.168.1.100
and 182.168.1.101 to the adapter on the server.
Assign the DNS address property to be 192.168.1.100
Create a zone myzone.com
Create two host records for the www host, one mapped to 192.168.1.100 and the second
mapped to 192.168.1.101
Test the DNS load balancing by pinging www.myzone.com

Once the laboratory tasks are completed, the student is to show the answers to the Lab to the
trainer to obtain signoff. Modifications may be required, so the student is to ensure the tasks
performed meet the requirements.
This assessment is done during the allocated laboratory/tutorial sessions or can be completed
offsite and brought to the lab for inspection.
Note that the install files for Windows 2012 Server are present in the c:\lab-files folder. You
will also need to enter a 25 digit product key during the install process. The product key
you need is: D2N9P-3P6X9-2R39C-7RTCD-MDVJX.

Resources
How to assign multiple IP addresses to a NIC https://www.youtube.com/watch?
v=ehX6uOGQy90
How to configure round robin DNS
http://www.plaintutorials.com/load-balancing-with-dns-round-robin/

Page 10 of 12

Assessment Resource
ICTTEN6206A
a

PRACTICAL OBSERVATION ASSESSOR CHECKLIST


This checklist is to be used when assessing the students in the associated task. This
checklist is to be completed for each student. Please refer to separate mapping document
for specific details relating to alignment of this task to the unit requirements.
Please complete below
Student Name:
Student ID No:

Assessor Instructions:
Please refer to the detailed instructions outlined on the Instructions for Assessors that
provides more detail as to products and processes:
Student checklist Laboratory Exercises

Satisfactory

Comments

Date Observed:

Student has undertaken this assessment in an actual


job workplace or a classroom/simulated environment

Yes No

Student has completed each of the following tasks (as a minimum):

Install Windows 2

Yes No

Multiple IPS assigned

Yes No

Configure DNS

Yes No

Ping works correctly

Yes No

Page 11 of 12

Assessment Resource
ICTTEN6206A
a

Assessor Use Only


Assessor Comments

Satisfactory (S)

Not Yet Satisfactory (NYS)

Assessor Signature: _______________________________

Date: _____________

Page 12 of 12

S-ar putea să vă placă și