ITN Module 17: Build a Small Network
Describe the 3 most common Cisco IOS ping indicators.
- "!" + indicates successful receipt of an echo reply message + validates a Layer 3 connection between source and destination. - "." + indicates that time expired waiting for an echo reply message + a connectivity problem occurred somewhere along the path - "U" + indicates that a router along the path responded with an ICMP Type 3 "destination unreachable" error message + possibly that the router does not know the direction to the destination network + possibly that the router could not find the host on the destination network
Which two considerations are important when determining traffic flow patterns?
- Capture traffic during peak utilization times to get a good representation of the different traffic types - Perform the capture on different network segments and devices as some traffic will be local to a particular segment
What Windows 10 tool is useful to determine which applications are using network services on a host?
- Data Usage
What are the 2 forms of software programs or processes that provide access to the the network? In which MS Windows program can they be monitored? Describe how they differ.
- Network applications vs. Application Layer Services - Task Manager - network applications (email clients, web browsers) + software programs used to communicate over the network + network aware mean that implement application layer protocols and are able to communicate directly with the lower layers of the protocol stack - Application Layer Services + used by programs to use network resources (file transfer, print spooling, etc.) + unseen, but interface with the network and prepare the data for transfer
Describe the elements necessary to scale a network well.
- Network documentation + physical and logical topology - Device inventory + list of devices that use or comprise the network - Budget + itemized IT budget, including fiscal year equipment purchasing budget - Traffic analysis + documentation regarding protocols, applications, and services and their respective traffic requirements
What does an extended ping do to the addresses involved?
- changes the source address
Describe the factors that must be considered when selecting network devices.
- costs + capacity and features (ports available, backplane speed, security tech, cabling, redundancy needs) - speed/ types of ports and interfaces + choosing Layer 2 devices that can accommodate increased speeds allows the network to evolve without replacing central devices - expandability + fixed configurations: cannot be expanded due to having a specific number and type of ports or interfaces + modular configurations: expansion slots to add new modules for evolving requirements - OS features and services for: + Layer 3 switching + NAT + DHCP + Security + QoS + VoIP
What factors impact the IP addressing scheme when implementing a network?
- end user devices + number and connection type (wired, wireless, remote access) - servers/peripheral devices (ex. printers/security cameras) - intermediary devices (switches, access points, etc.)
What does adding a "-d" to "tracert" do for results of the Windows traceroute?
- ensures tracert won't attempt to reverse resolve hop IP addresses, which would add a delay and yield inaccurate results
Describe the factors that a small network administrator must consider when supporting real-time applications?
- infrastructure + tested/validated devices and cabling + possibly newer networking tech - VoIP + small network voice and video over IP can be solved using Skype and non-enterprise versions of Cisco WebEx - IP telephony + IP phone converts voice-to-IP using a dedicated server for call control and signaling + many vendors for small business IP telephony solutions, (ex. Cisco Business Edition 4000 Series products) - real-time applications + Quality of Service (QoS) mechanisms + supported by RTP (Real-Time Transport Protocol) and RTCP (Real-Time Transport Control Protocol)
What is the goal of redundancy? What are the 2 most common ways to create redundancy in a network?
- installing duplicate equipment - supplying duplicate network links for critical areas
How does the Cisco IOS ping differ from the that of a Windows host?
- the Cisco IOS sends 5 pings compared to the Windows 4 pings
How does the Cisco traceroute differ from that of the Cisco IOS and Linux?
- the Windows command is "tracert" while the Cisco IOS and Linux command is "traceroute" - the Windows traceroute sends ICMP Echo Request BUT the Cisco IOS and Linux traceroute uses UDP with an invalid port number
What are three common built-in tools used on MS Windows to display traffic trends in a network? What sort of information can they show?
- tools: + Task Manager + Event Viewer + Data Usage tools - displays: + OS and OS Version +CPU utilization + RAM utilization + Drive utilization + Non-Network applications + Network applications