Networking Essentials Study Guide

 


Categorize all of the topics listed in the above "What is" questions.

Find similarities and differences.


Categorize all of the topics listed in the above "Describe" questions.

Find similarities and differences.


What are share names, domain names, computer names, and workgroup names?

What is the difference between an application server and a file-and-print server? Give examples of each.

What is the difference between user-level access control and share-level

access control of network resources?

What are the characteristics of Client/Server?

What are the characteristics of connection-oriented and

connectionless-oriented communication?

What is a datalink communications protocol?

Describe the OSI model.

What layers of the OSI model do gateways, bridges, routers, repeaters and brouters act as translators?

Describe the characteristics of the IEEE 802.3 10BaseT, 10Base2, and

10Base5 standards?

What are NDIS and ODI? Explain the purpose.

What are the benefits of ODI and NDIS?

What are the physical requirements to implement a 100-Mbps Ethernet network?

Draw pictures that represent the Mesh, Ring, Bus, and Star networking topologies.

Describe ISDN, X.25, T1, and ATM.

Describe centralized administration.


What IRQs and I/O ports do the following PC hardware components typically use? Video card, SCSI card, LPT1, LPT2, COM1, COM2, COM3,

COM4, PS/2 Mouse.

What is an IRQ and I/O port?

What is a NIC?

What is a transceiver?

What is a NetBIOS name?

What is a protocol analyzer?

What is a time domain reflectometer (TDR)?

What is a cable tracer?

What is a medium attachment unit?

What is an oscilloscope?

What is performance monitor?

What is a volt-ohmmeter?

What is a MAC address?

What is an Ethernet switch?

Troubleshoot the physical network. What component of the network needs to be replaced?

Clients cannot connect to servers. You use a volt-ohmmeter to measure the resistance between the wire and the shield, the terminators, and T-connectors.


Scenario One:

Scenario Two:

Scenario Three:

Troubleshoot the physical network. What component of the network needs to be replaced?


Clients cannot connect to servers. You use a volt-ohmmeter to measure the resistance between the wire and the shield, the terminators, and T-connectors.

Scenario One:

RG-58 A/U coaxial cable - infinity ohms

T-connector #1 - infinity ohms

T-connector #2 - infinity ohms

Terminator #1 - 50 ohms

Terminator #2 - 50 ohms

Describe your implementation of the physical network:

Your client has a WAN consisting of 60 Windows NT servers, 2000 Windows NT workstations, 200 DOS and Windows 3.1 workstations, 20 UNIX workstations and servers, 15 Macintosh workstations, and 3000 Windows 95 workstations. The incredible growth in the network has created unacceptable levels of broadcast storms. Describe the hardware that you would implement to reduce broadcast storms without affecting the functionality and connectivity of the clients and explain how you could minimize costs and allow for continued expansion.

Background:

The client would like help connecting 4 existing LANs in Dallas, Los Angeles, Detroit, and New York.

Required Result:

Optional Result:

Proposal 1:

Proposal 2:

Proposal 3:

Proposal 4: Make your own proposal that meets all required and optional.

Background:

Your client wants a NetBIOS naming convention for her network. The network consists of 2 Windows NT domains each containing 1 PDC and 20 BDCs and 250 Windows NT workstations in each domain. These domains consist of 5 LANs in Detroit, Dallas, New York, Chicago, and Toronto.

Required Result:

  1. The client needs a valid NetBIOS naming schema.
  2. The client needs this schema to function across the WAN.

Optional Result:

  1. The client wants the names to identify the business function of the workstation.
  2. The client wants the names to identify the physical LAN of that the server or workstation.
  3. The client wants the names to identify the business function of the server.

Proposal 1:

Assign each workstation a unique 6 digit alphanumeric name and assign each server a name using the following template example: d1-mktg5 where d1 represents domain 1 and mktg5 represents the 5th server in the marketing department.

Proposal 2:

Assign each workstation a name that matches the employee's first name and assign each server a name using the following template example:
d1-mktg5 where d1 represents domain 1 and mktg5 represents the 5th server in the marketing department.

Proposal 3:

Assign each workstation using the following template example:
wks-mktg-899009 where wks represents workstation, mktg identifies the workstation as a marketing computer, and 899009 is the unique employee number of the primary user. Assign each server a unique 6 digit alphanumeric name.

Proposal 4:

Use three unique six-digit codes to build all NetBIOS names.

Proposal 5:

Make your own proposal that meets all required and optional.

Background:

Your client has an Ethernet network with 1000 computers. Currently the network consists of 100 Novell NetWare servers and 900 DOS and Windows 3.1 workstations. The client wants to migrate to Windows NT Servers which will replace the NetWare servers and Windows 95 which will replace the DOS and Windows 3.1 workstations. Since the client has been using NetWare 4.1 only, they have not had any peer to peer networking functionality.

Required Result:

  1. The client needs to protect all sensitive network data.

Optional Result:

  1. The client would like to minimize administrative overhead.
  2. The client would like to provide secure peer to peer networking resources.
  3. Rate each proposal by determining if it meet the required result and whether it meets any optional results.

Proposal 1:

Implement peer to peer file sharing of all network resources with user-level security on the server based network resources while using resource password security on the workstations.

Proposal 2:

Implement resource password security on all server and workstation shared resources and centralized administration of user accounts.

Proposal 3:

Implement resource password security on all server and workstation shared resources and peer to peer file sharing.

Proposal 4:

Implement centralized administration of user accounts and user level security on all servers and workstation shared resources.

Proposal 5:

Implement user level security on all server-shared resources and centralized administration of user accounts.

Proposal 6:

Make your own proposal that meets all required and optional.

Background:

The client would like for you to help design her network roll out plan. The client has decided on one Windows NT domain consisting of 1 PDC and 5 BDCs, which creates centralized administration of user accounts, but she is not sure whether to implement Windows 95 and Windows NT workstations.

Required Result:

  1. The client needs to protect all sensitive network data.
  2. The client needs centralized control of all network resources.

Optional Result:

  1. The client wants local security of all workstation and server resources.
  2. The client wants to track unauthorized access of workstations and servers.
  3. The client wants to track all access to server based resources.
  4. The client wants to provide tracking of local access to specific files for certain shared workstations. (Workstations that more than one person share)
  5. The client wants all machines to be protected from password-cracking programs.
  6. Rate each proposal by determining if it meet the required result and whether it meets any optional results.

Proposal 1:

Implement Windows 95 workstations. User level security on all server and workstation shared resources.

Proposal 2:

Implement Windows 95 workstations with user level security on all servers and workstation shared resources. Implement disk mirroring on all NT Server based disk resources. Set a user policy to force users to change their passwords every month while forcing 5 unique passwords per cycle.

Proposal 3:

Implement Windows NT workstations in a workgroup with user level security on all server-shared resources. Implement NTFS with user level security on all servers and workstations. Perform weekly backups.

Proposal 4:

Implement a mixture of Windows NT and Windows 95. User level security on all server and workstation shared resources. Implement disk mirroring on all NT Server based disk resources. Set a user policy to force users to change their passwords every month while forcing 5 unique passwords per cycle. Implement NTFS with user level security on all servers and workstations. Perform weekly backups.

Rate each proposal by determining if it meet the required result and whether it meets any optional results. Also, make a proposal of your own meeting all objectives.

Background:

The client needs a well-designed disaster prevention and recovery plan for his network. Currently there is one Windows NT domain consisting of 1 PDC and 25 BDCs, and the network has 100 Windows 95 workstations and 150 Windows NT workstations. 10BaseT Ethernet connects all these PCs.

The client has implemented the NTFS file system on all NT servers to protect sensitive shared network data, and he has also placed all the servers in a physically secure location under lock and key.

Required Result:

  1. The client would like to log all network data access.
  2. The client would like all servers protected from hardware failure.
  3. The client will accept down times of 3 hours or less.

Optional Result:

  1. The client would like automated virus protection.
  2. The client would prefer down times of less than 30 minutes.
  3. Rate each proposal by determining if it meet the required result and
  4. whether it meets any optional results.

Proposal 1:

Implement disk mirroring on all servers. Implement daily backups and store tapes off site. Implement user level security on all network resources.

Proposal 2:

Implement disk mirroring on all servers. Implement weekly backups and store tapes on and off site. Implement user level security on all network resources.

Proposal 3:

Implement daily backups and store tapes off and on site. Implement user level security on all network resources. Attach a UPS to all servers.

Proposal 4:

Attach a UPS to all servers. Implement daily backups and store tapes off and on site. Implement disk striping with parity on all servers.

Implement user level security on all network resources.

Proposal 5:

Implement daily backups and store tapes off and on site. Implement user level security on all network resources. Attach a UPS to all servers.

Enable file and directory auditing on all sensitive data on servers.

Proposal 6:

Implement disk mirroring on all servers. Implement daily backups and store tapes off site. Implement user level security on all network resources. Implement server based anti-virus software scanning services.

Proposal 7:

Implement disk mirroring on all servers. Implement weekly backups and store tapes on and off site. Implement user level security on all network resources. Implement server based anti-virus software scanning services and logon scripts to kick off virus scanning on clients.

Proposal 8:

Make your own proposal that meets all required and optional.