Exam 5 July 2018, questions and answers PDF

Title Exam 5 July 2018, questions and answers
Course Network administration and management
Institution University of Nairobi
Pages 7
File Size 37.9 KB
File Type PDF
Total Downloads 12
Total Views 161

Summary

Question and answers on networks...


Description

NETWORK ADMINISTRATION AN MANAGEMENT

QUESTION ONE DISCUSS THE DIFFERENT: i.

NETWORK MANAGEMENT MODELS

Network management models are guidelines that help to define how a network works, how it should be designed, so as to achieve the required level of process. Such tools include; Cisco Lifestyle Services, Information Technology infrastructure Library, Telecommunications Management network and FCAPS. CISCO LIFESTYLE SERVICES It includes the stages of prepare, plan, design, implement, operate and optimize. The prepare phase deals with network discovery and challenges that are likely to face the network. After, this a conceptualized design is created. The plan phase compares the existing network infrastructure with the proposed infrastructure. The design phase incorporates the design requirements, which are soon to be used to manage the network. The implement phase incorporates the existing network with the new network. In the operate phase, new devices are incorporated into the existing network. The last phase, optimize generally seeks to gather feedback so that adjustments can be made to the network if need be. INFORMATION TECHNOLOGY INFRASTRUCTUR INFRASTRUCTURE E LIBRARY It consists of a framework that consists of practices that can be used to achieve quality of service for the network as well as tackle difficulties associated with the growth or scalability of networks. It has five sets of processes; Service strategy, service design, service transition, service operation and continual service improvement. Service strategy seeks to transform the network management into a strategy, by

thinking in all perspectives about what services the network will offer, to who, etc. Service design is concerned with the change or introduction of new services to the network. Service transition takes care of the transformation of design into relatable services. Service operation refers to the existing support network infrastructure. CSI. Lastly, refers to the day to day activities of analyzing the network, reviewing and improving it. FCAPS FCAPS in full stands for Fault Management, Configuration Management, Accounting Management, Performance Management and Security Management. Fault management deals with fault tolerance and response, configuration management deals with the actual configuration of devices in a network, Accounting management deals with methods used to track usage statistics, Performance deals with how the network is performing using, error messages, statistics, etc. Security management refers to how well a network is secure. ii.

NETWORK ADMINISTRATION MOD MODELS ELS These include the Open Systems Interconnection model and the Transfer Control Protocol model. The OSI model has protocols that can be used to identify and implement the network stack. It has seven layers namely; Application, Presentation, session, transport, network, data link and physical layer. TCP/IP on the other hand only has four layers namely; hardware, network, internet and transport layers.

2.. DESCRIBE THE DIFFERENT PROTOCOLS USED IN TROUBLESHHOTING;

i.

NETWORK ACCESS Here, there is the ping command. This command lets a user test network connectivity from one network to another. If after pinging, there is any loss of packets, then there is no network access. If all packets are received, then there is network access.

ii.

CHECKING ROUTING Here, there is the route command. It is used in checking and manipulating the routing table.

iii.

ANALYZING PROTOCOL PROBLEMS Here, we also have the ping and traceroute command. Traceroute traces the path between sender and receiver to know if a protocol is working or not.

3. a) EXPALIN THE PROCEDU PROCEDURE RE THAT GUIDES MANAGING OF A WEB SER SERVER. VER. i.

Planning and managing web server

ii.

Securing the web OS.

iii.

Securing the web server

iv.

Securing the web content

v.

Using authentication and encryption technologies

vi.

Implementing secure network infrastructure

vii.

Administering the web server. b) EXAMINE THE GENERAL SECURITY MEASURES UNDERT UNDERTAKEN AKEN BY A NETWORK ADMIN TO SECURE A NETWORK. i.

Using encryption for all access points

ii.

Hide the SSID

iii.

Disable access from outside the network.

iv.

Installing antivirus and antispyware protection

v.

Scan devices regularly for potential threats.

4. i.

COMMAND USED TO CHECK BASIC NETWORK CONNECTIVITY

It is the ping command. It traces packets, and if not all packets sent are received, then there is a problem with the connectivity. ii.

HOW SNMP CA CAN N BE USED TO WATCH OVER AND CONFIGURE NETWORK DEVICES. SNMP- Simple Network Management Protocol. It operates on the application layer. It defines communication between devices in a network. It has three components, SNMP manger, SNMP agent and Management Information Base. The SNMP manger monitors traffic seen by the agents and provides a mechanism for the control of the agents. The SNMP agent is a software that

exists within a network component. It contains real time information about a network element, and it sends this information to an SNMP manager. MIB is a virtual information storage location where network management information is held. This information can be altered by SNMP manger or agent. iii.

STEPS FOLLOWED IN TR TROUBLESHHOTING OUBLESHHOTING NETWORK ACCESS IN TCP/IP

a) Identify problem source b) Look for a window troubleshooting tool c) Troubleshoot IPv4 d) Verify connectivity in IPv4 e) Repair the connection f) Verify configuration g) Manage configuration h) Verify reachability...


Similar Free PDFs