Network Management system

Resumes and Networking
August 10, 2017
Evaluating Online Database Storage Services
August 10, 2017
Show all

Network Management system

Topic: Network Management system  Description: [?]  Preferred language style: English (U.S.)  Answer the questions succinctly and clearly, explain your answer, and show your work.  The explanations need to be brief, but complete, logical, and to the point.     1. When considering securing your network, in which sequence you would follow the steps? Explain your answer.  Install a firewall. Install an intrusion prevention system. Update servers and user PCs with the latest patches. Develop a security policy. 2.   Explain:  Do you think network management can be completely automated? Why/why not? How should such a system interact with managers to allow the specification of goals and constraints? Explain the top-down and bottom-up approaches to network design, showing their advantages and disadvantages. Comment some possible solutions to wireless network management. Traffic analysis Packet analysis How a packet analysis is performed About flow analysis: Explain the information that can be obtained from flow analysis. How they can be used to network management. How can data flow be captured? Explain. Netflow technology. Briefly discuss TWO alternatives to using SNMP for network management, comparing them with SNMP.    8.   A technician says to you: “Troubleshooting TCP/IP is easy. Always do it like this: check the configuration of the firewall, then check the settings on the local router, then check the configuration of the local switch, check the DNS server, check the web browser proxy settings on the client, ping the remote server name, then ping the remote server IP address, then ping the local router, then ping another workstation on the same network as the client, then ping the client computer’s IP address on its Ethernet card, then ping the client computer’s loopback IP address. Finally, check that the activity lights next to the network cable are blinking.”  Suggest a better troubleshooting strategy, giving reasons for your answer. There is no need to discus documentation in your answer. The technician did not mention documentation. Briefly explain TWO roles of documentation in troubleshooting.    9.   Three methods are suggested for measuring network throughput between a local client and a remote server: • measure the time it takes to download a file from the server by http using the web browser.  • measure the time it takes to download a file from the server by ftp using the simple ftp.exe program that comes on Windows XP.  • Ping the server from the client using large packets and small packets, measure the average round-trip time of each, and calculate the throughput with a provided formula.     Discuss ONE advantage, and ONE disadvantage of each method.  Which would be the most accurate? Which is the least accurate? Explain your answer.     Part II – Choose ONE of the following questions      All machines in a company office are connected to a network switch. All machines are on the same VLAN. A network administrator needs to monitor a unicast network protocol that is used between all machines in the office, but is not used with machines outside this office. Briefly explain how you would perform this network monitoring operation, including: the tools (any software or hardware) you would use the connections you would make how you would use the tools the settings on the switch a brief explanation of your method.    11. You are responsible for a network in a large college. Management has asked you to create an automatic computer registration system to help network managers trace machines causing trouble on the network to their owners, or their location. The requirements follow:  all college computers should be registered in an inventory the inventory record should map each machine from mac or ip address to the location of the computer and also to the person responsible for it, so that problems on the network can be more easily traced to their source. computers owned by students or staff should also have a record in the inventory containing the name of the owner, created automatically when the computer is plugged into the campus network. All laboratory machines are to have a name server entry unregistered computers (those without an inventory record) should be denied Internet access    The following existing infrastructure is well established:  A directory service implemented on two ldap servers, one replicating to the other All user accounts are already maintained in the directory One dhcp server and two dns servers (holding names for servers only) all running software from the Internet Software Consortium (isc). Address allocation by dhcp is entirely dynamic (except for servers), with a lease of two hours.  There are about 2000 multi-boot laboratory computers.    State ONE Advantage and ONE disadvantage of implementing the inventory system on the ldap directory, dynamically updating the entry for the computer when the dhcp server allocates an address to it. Explain your disadvantage. Suggest an inventory design which is an alternative to the suggested one. Give supporting reason(s) for your design. Write a brief description of how you would design the application that would allow students and staff to register their own computers in the system.

Leave a Reply

Your email address will not be published. Required fields are marked *