ITN Module 17: Build a Small Network

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Describe the 3 most common Cisco IOS ping indicators.

- "!" + indicates successful receipt of an echo reply message + validates a Layer 3 connection between source and destination. - "." + indicates that time expired waiting for an echo reply message + a connectivity problem occurred somewhere along the path - "U" + indicates that a router along the path responded with an ICMP Type 3 "destination unreachable" error message + possibly that the router does not know the direction to the destination network + possibly that the router could not find the host on the destination network

Which two considerations are important when determining traffic flow patterns?

- Capture traffic during peak utilization times to get a good representation of the different traffic types - Perform the capture on different network segments and devices as some traffic will be local to a particular segment

What Windows 10 tool is useful to determine which applications are using network services on a host?

- Data Usage

What are the 2 forms of software programs or processes that provide access to the the network? In which MS Windows program can they be monitored? Describe how they differ.

- Network applications vs. Application Layer Services - Task Manager - network applications (email clients, web browsers) + software programs used to communicate over the network + network aware mean that implement application layer protocols and are able to communicate directly with the lower layers of the protocol stack - Application Layer Services + used by programs to use network resources (file transfer, print spooling, etc.) + unseen, but interface with the network and prepare the data for transfer

Describe the elements necessary to scale a network well.

- Network documentation + physical and logical topology - Device inventory + list of devices that use or comprise the network - Budget + itemized IT budget, including fiscal year equipment purchasing budget - Traffic analysis + documentation regarding protocols, applications, and services and their respective traffic requirements

What does an extended ping do to the addresses involved?

- changes the source address

Describe the factors that must be considered when selecting network devices.

- costs + capacity and features (ports available, backplane speed, security tech, cabling, redundancy needs) - speed/ types of ports and interfaces + choosing Layer 2 devices that can accommodate increased speeds allows the network to evolve without replacing central devices - expandability + fixed configurations: cannot be expanded due to having a specific number and type of ports or interfaces + modular configurations: expansion slots to add new modules for evolving requirements - OS features and services for: + Layer 3 switching + NAT + DHCP + Security + QoS + VoIP

What factors impact the IP addressing scheme when implementing a network?

- end user devices + number and connection type (wired, wireless, remote access) - servers/peripheral devices (ex. printers/security cameras) - intermediary devices (switches, access points, etc.)

What does adding a "-d" to "tracert" do for results of the Windows traceroute?

- ensures tracert won't attempt to reverse resolve hop IP addresses, which would add a delay and yield inaccurate results

Describe the factors that a small network administrator must consider when supporting real-time applications?

- infrastructure + tested/validated devices and cabling + possibly newer networking tech - VoIP + small network voice and video over IP can be solved using Skype and non-enterprise versions of Cisco WebEx - IP telephony + IP phone converts voice-to-IP using a dedicated server for call control and signaling + many vendors for small business IP telephony solutions, (ex. Cisco Business Edition 4000 Series products) - real-time applications + Quality of Service (QoS) mechanisms + supported by RTP (Real-Time Transport Protocol) and RTCP (Real-Time Transport Control Protocol)

What is the goal of redundancy? What are the 2 most common ways to create redundancy in a network?

- installing duplicate equipment - supplying duplicate network links for critical areas

How does the Cisco IOS ping differ from the that of a Windows host?

- the Cisco IOS sends 5 pings compared to the Windows 4 pings

How does the Cisco traceroute differ from that of the Cisco IOS and Linux?

- the Windows command is "tracert" while the Cisco IOS and Linux command is "traceroute" - the Windows traceroute sends ICMP Echo Request BUT the Cisco IOS and Linux traceroute uses UDP with an invalid port number

What are three common built-in tools used on MS Windows to display traffic trends in a network? What sort of information can they show?

- tools: + Task Manager + Event Viewer + Data Usage tools - displays: + OS and OS Version +CPU utilization + RAM utilization + Drive utilization + Non-Network applications + Network applications


Set pelajaran terkait

4.04 Properties of Ionic Compounds

View Set

Chapter 12 (Factorial Experimental Designs)

View Set

Week 3 Quiz: Introduction to the Study of Jesus

View Set

Psych 5a. Basic Concepts of Sensation and Perception; Vision

View Set