Você está na página 1de 13

RTO No: 20829

CRICOS Provider No: 02044E


ABN: 41 085 128 525
STUDENT COPY- CR

Assessment Resource Summary


ICTTEN6206A - Produce an ICT network architecture
Unit Details

Assessment
Requirements

Assessment
Methods

design

This is a supplementary assessment task for those students who


were deemed not yet competent (NYC) in the performance of their
previous written assessment task and/or lab assessment task for the
unit.
If students were marked unsatisfactory for the lab task, they must
complete the lab task below. If they were marked unsatisfactory for
the written task, they must complete the written task below

1. Written Test / Oral Questioning

(Three
Assessments for
this unit)
3 Practical task

Issue Date

Assessment type:
Short answer
Assessment type:
Lab exercise

March 2016

Unit Summary
The unit objectives, prerequisites, corequisites and other pertinent information about this unit is
described at https://training.gov.au/Training/Details/ICTTEN6206A

Assessment Resource
ICTTEN6206A
a

Page 2 of 13

Assessment Resource
ICTTEN6206A
a

General Instructions for Students


As these are considered practical units to be conducted in a simulated environment, this may
include a closed meeting room, office, or even the classroom (if it represents a working office
environment). You trainer will act as an office supervisor and will provide all relevant information
for an assessment.
Answer all parts of the assessment
Provide typed answers. Handwritten answers are not accepted .
Do not cheat. Anyone caught cheating will automatically be marked Not Yet Satisfactory for
this unit. There are NO EXCEPTIONS to this rule.
In order to achieve competency, all assessment tasks MUST be answered correctly
Note:
All references made to workplace and or employer, are directly related to the trainers and
facilities at VIT.

Page 3 of 13

Assessment Resource
ICTTEN6206A
a

WRITTEN TEST INFORMATION FOR STUDENTS


Short Answer Questions
This information is to be handed to each student to outline the assessment requirements
This is an open book written assessment. This assessment is to be undertaken in an actual job
workplace or a classroom/simulated environment. Students are required to complete the written
test consisting of 20 short answer questions.
Reference Textbooks:
1. Priscilla Oppenheimer Top Down Network Design 3rd Edition. Cisco Press
2. TCP/IP Tutorial and Technical Overview IBM Redbook

Page 4 of 13

Assessment Resource
ICTTEN6206A
a

WRITTEN TEST
Student Name:

______________________________________________________________

Student ID No:

______________________________________________________________

Date:

______________________________________________________________

Student Instructions:
This is an open book written assessment. You are to answer all of the following questions.
Make sure you:

Type all answers inline and submit a printed document. Handwritten assignments will not be
accepted
Answer all questions
Do not cheat. Anyone caught cheating will automatically be marked Not Yet Satisfactory for
this unit. There are NO EXCEPTIONS to this rule.

Page 5 of 13

Assessment Resource
ICTTEN6206A
a

Short Answer

1 What is the purpose of RARP protocol ?


Ans .

The purpose of RARP protocol are as :-

Reverse Address Resolution Protocol (RARP) is a system layer protocol used


to determine an IP address from a given equipment location, (for example, an
Ethernet address). It has been rendered out of date by BOOTP and the more
present day DHCP, which both backing a much more prominent list of capabilities
than RARP.

2 What is the purpose of BOOTP protocol ?


Ans. The purpose of BOOTP protocol are as :The Bootstrap Protocol (BOOTP) is a computer networking protocol used in
Internet Protocol networks to automatically assign anIP address to network
devices from a configuration server. The BOOTP was originally defined in RFC 951
3. List three parameters that can be used to describe the quality of

service of a particular stream of data?


Ans . The three parameters that can be used to describe the quality
of service of a
particular stream of data as follow : Low throughput.
Dropped packets.
Out-of-order delivery.
Best-effort service.
Differentiated service (also called soft QoS).
Guaranteed service (also called hard QoS).
3 How many bits long is an (i) IPv6 address? (ii) an IPv4 address ?
Ans .
IPv4, which uses 32-bit addresses.

IPv6, addresses are 128-bit hexadecimal numbers.

Page 6 of 13

Assessment Resource
ICTTEN6206A
a

4 What are two advantages of wireless transmission when compared


with bounded media?
Ans.
The two advantages of wireless transmission when compared
with bounded media are as follows
Unbound transmission media are the methods for transmitting
information without utilizing any links. Where as Bound transmission
media are the links that are substantial or have physical presence and
are restricted by the physical geology.
Remote LANs are being introduced in office and school grounds. This
transmission utilizes Microwave, Radio wave, Infra red are some of
prevalent unbound transmission media. While well known bound
transmission media being used are curved pair link, co-pivotal link and
fiber optical link. Each of them has its own particular qualities like
transmission pace, impact of clamor, physical appearance, cost and so
on.
5 What is the role of the MIB in the SNMP protocol?
Ans. The role of the

MIB in the SNMP Protocol are as follows :-

SNMP remains for Simple Network Management Protocol and


comprises of three key segments: oversaw gadgets, specialists,
and system administration frameworks (NMSs). An oversaw
gadget is a hub that has a SNMP operators and dwells on an
oversaw system. These gadgets can be switches and get to
servers, switches and connects, center points, PC hosts, or
printers. An operators is a product module dwelling inside of a
gadget. This specialists makes an interpretation of data into a
perfect organization with SNMP. A NMS runs checking
applications. They give the greater part of handling and
memory assets required for system administration.
An administration data base (MIB) is a formal depiction of an
arrangement of system questions that can be overseen utilizing
the Simple Network Management Protocol (SNMP). The
organization of the MIB is characterized as a major aspect of
the SNMP. (Every single other Mib are augmentations of this
essential administration data base.) MIB-I alludes to the
Page 7 of 13

Assessment Resource
ICTTEN6206A
a

underlying MIB definition; MIB-II alludes to the present


definition. SNMPv2 incorporates MIB-II and includes some new
questions.
6 List three different security options I can use when I negotiate between an
LDAP client and LDAP server ?

Ans .
The three different security options I can use when I
negotiate between an LDAP client and LDAP server are as follows : Selective Listening

IP Firewall
TCP Wrappers.
7 What is the purpose of the mount command in NFS?
Ans.

The purpose of the mount command in NFS are as follows :-

The mount order teaches the working framework that a document framework
is prepared to utilize, and relates it with a specific point in the general record
framework chain of importance (its mount point) and sets alternatives
identifying with its entrance. Mounting makes document frameworks, records,
registries, gadgets and exceptional records accessible for use and accessible
to the client. Its partner umount teaches the working framework that the
record framework ought to be disassociated from its mount point, making it
no more open and might be expelled from the PC. It is critical to umount a
gadget before evacuating it since changes to records may have
8 What is the main file sharing protocol used in Microsoft networks?
Ans . The main file sharing protocol used in Microsoft networks are as
follows :

Common Internet File System (CIFS),


Server Message Block (SMB).
NetBEUI.
NetBIOS.
NetBT.
TCP/IP.

What is meant by the statement HTTP is a stateless protocol ?

Ans. HTTP is a stateless convention. A stateless convention does not require the server to hold
data or status about every client for the span of numerous solicitations.

Page 8 of 13

Assessment Resource
ICTTEN6206A
a

In any case, some web applications may need to track the client's advancement from page to page,
for instance when a web server is required to modify the substance of a website page for a client.
Answers for these cases include:the use of HTTP cookies.

server side sessions,

hidden variables (when the current page contains a form), and

URL-rewriting using URI-encoded parameters, e.g., /index.php?


session_id=some_unique_session_code.

END OF WRITTEN ASSESSMENT


Before you hand in your written assessment, make sure that you:
1. Re-check your answers and make sure you are happy with your responses
2. Have written your Name, Student ID Number, and Date on the first page

Student Declaration:

I declare that the work


submitted is my own, and has not been copied or
plagiarised from any person or source.

Name:

________________________

Signature:

________________________

Date:

____/_____/_____

Assessor Use Only

Page 9 of 13

Assessment Resource
ICTTEN6206A
a

Assessor Comments

Satisfactory (S)

Not Yet Satisfactory (NYS)

Assessor Signature: _______________________________

Date: _____________

Page 10 of 13

Assessment Resource
ICTTEN6206A
a

PRACTICAL OBSERVATION INFORMATION FOR STUDENTS


Laboratory Exercises
This information is to be handed to each student to outline the assessment requirements
This assessment is to be undertaken in an actual job workplace or a classroom/simulated
environment. Students are to arrange an appointment with a business client (role-played by the
assessor) to install and configure Windows 2012 Server. The student is to complete the
laboratory tasks
Install the operating system
Install and configure DNS
Change the IP address of the server to assign two static IP addresses 192.168.1.100
and 182.168.1.101 to the adapter on the server.
Assign the DNS address property to be 192.168.1.100
Create a zone myzone.com
Create two host records for the www host, one mapped to 192.168.1.100 and the second
mapped to 192.168.1.101
Test the DNS load balancing by pinging www.myzone.com

Once the laboratory tasks are completed, the student is to show the answers to the Lab to the
trainer to obtain signoff. Modifications may be required, so the student is to ensure the tasks
performed meet the requirements.
This assessment is done during the allocated laboratory/tutorial sessions or can be completed
offsite and brought to the lab for inspection.
Note that the install files for Windows 2012 Server are present in the c:\lab-files folder. You
will also need to enter a 25 digit product key during the install process. The product key
you need is: D2N9P-3P6X9-2R39C-7RTCD-MDVJX.

Resources
How to assign multiple IP addresses to a NIC https://www.youtube.com/watch?
v=ehX6uOGQy90
How to configure round robin DNS
http://www.plaintutorials.com/load-balancing-with-dns-round-robin/

Page 11 of 13

Assessment Resource
ICTTEN6206A
a

PRACTICAL OBSERVATION ASSESSOR CHECKLIST


This checklist is to be used when assessing the students in the associated task. This
checklist is to be completed for each student. Please refer to separate mapping document
for specific details relating to alignment of this task to the unit requirements.
Please complete below
Student Name:
Student ID No:

Assessor Instructions:
Please refer to the detailed instructions outlined on the Instructions for Assessors that
provides more detail as to products and processes:
Student checklist Laboratory Exercises

Satisfactory

Comments

Date Observed:

Student has undertaken this assessment in an actual


job workplace or a classroom/simulated environment

Yes No

Student has completed each of the following tasks (as a minimum):

Install Windows 2

Yes No

Multiple IPS assigned

Yes No

Configure DNS

Yes No

Ping works correctly

Yes No

Page 12 of 13

Assessment Resource
ICTTEN6206A
a

Assessor Use Only


Assessor Comments

Satisfactory (S)

Not Yet Satisfactory (NYS)

Assessor Signature: _______________________________

Date: _____________

Page 13 of 13