ITEC-4010 Network Administration
CIDR Alternative, Move to IPv6 | |
File Size: | 42 kb |
File Type: | docx |
Excerpt: Efficient IP address conservation is a must when considering IPv4 address space. This is apparent in the fact that sometime in the next three years available IP addresses will be exhausted (Huston, 2011). What this means is that there will be no more IPv4 Addresses left to allocate out, not that we will suddenly be unable to access the Internet.
Setting up RIP Routing Tables | |
File Size: | 50 kb |
File Type: | docx |
Excerpt: The complexity of setting up a router is unbelievable. Granted, after setting up a few routers the complexity goes away through rote, but for a beginner, or for someone who has no idea about the network layout, it is too much. In fact, the easiest recommendation for setting up large scale networks would be to implement a subjective question menu which then propagates out to any routers which have appropriate rights to the currently connected router.
Storage Area Networks: Transmission Requiremens and Usage | |
File Size: | 21 kb |
File Type: | docx |
Excerpt: “A storage area network (SAN) is a high-speed special-purpose network (or Subnetwork) that interconnects different kinds of data storage devices with associated data servers on behalf of a larger network of users” (Brennan & Olanie, 2008). Also, “A SAN consists of a communication infrastructure, which provides physical connections; and a management layer, which organizes the connections, storage elements, and computer systems so that data transfer is secure and robust” (Tate, Lucchese, & Moore, 2006, p. 24). Essentially, a SAN is a network of storage mediums, whereby the interconnections of those mediums determine the overall speed and capacity of the SAN.
SSH and Port Security | |
File Size: | 135 kb |
File Type: | docx |
Excerpt: Telnet should not be an option nor required for any circumstance. It is an insecure method of data transport that can be easily subject to man in the middle sniffing. In the event of a router failure of such magnitude that a technician needed to remote into the machine remotely, SSH is always an option. To say that they would not have access to a SSH terminal is the equivalent of saying they do not have access to a telnet terminal. Both require the internet, and therefore, a SSH is only a download away.
Sharepoint via LAN and WAN | |
File Size: | 25 kb |
File Type: | docx |
Excerpt: Microsoft SharePoint 2010 is an Enterprise collaboration platform which allows users to access and share documents, lists, forums, calendars, and much more through an internet browser (Microsoft Corporation, 2011). Its primary function is to increase productivity through the sharing of knowledge in a collaborative space. It is used by organizations around the world, including a large percentage of fortune 500 companies (Top SharePoint Sites, 2012).
VPN Implementation | |
File Size: | 21 kb |
File Type: | docx |
Excerpt: While email is a valid form of communication, it has its flaw in the fact that files being sent or received must be stored in triplicate through the email system. For instance, if I were to send a 10MB file to my buddy Will, that file would first be stored in a local directory. The file would then be stored on the exchange server, and finally the file would get stored on Will’s machine. In instances where the file is sent to multiple recipients, say an entire department of 100 people, that file would go from being a 10MB file to being a 1000MB file. A single user could, in essence, flood a network with traffic inadvertently doing nothing more than sending a single file.
Multilayer Switches: A Quick Overview | |
File Size: | 21 kb |
File Type: | docx |
Excerpt: In my opinion, the most important feature of a multilayer switch (MLS) is the ability to route and manage VLAN traffic. When dealing with large networks, where numerous users across several security zones all interact with one another, differentiating security rights and privileges would be a nightmare to manage. However, using the functionality of a MLS, a network admin can create VLANs to virtually split traffic so that security is inherent in the system. Automatic redundant security is never a bad thing.
NAT and PAT Configuration | |
File Size: | 361 kb |
File Type: | docx |
Excerpt: While the most important reason to have NAT/PAT around is the preservation of IPv4 addresses, there will always be a need for NAT/PAT even when IPv4 is discontinued. NAT/PAT offers a way to easily separate local network traffic and foreign network traffic, without having to filter each individual node. If all traffic must go through a specific IP address, then all traffic through that IP address can be checked for threats, rather than having to check all traffic across a network at all times. Also, with the network separated, private internal data is secured from trespass.
Network Reconfiguration | |
File Size: | 433 kb |
File Type: | docx |
Excerpt: Overall, my settings were spot on. However, there were a few discrepancies in terms of additional user accounts being accidentally created. On SW1, I had somehow managed to create an additional user called \, yep, just a backslash. This probably occurred when I typed “username \?” but forgot to enter the question mark. In addition, the banner MOTD was not entered correctly on either machine. Seems I did not put “#” at the end of the message telling the system it had ended (Simulation Exams, NA).
Communication: Solving an Internet Connection Issue | |
File Size: | 20 kb |
File Type: | docx |
Excerpt: The first thing to realize, about any problem received from a customer (user), is the technical issue is not the problem. The problem is the fact something cannot be accomplished which the technical issue is blocking. Whether this is the creation of a document, the sending of a picture, or the connecting of a webcam, the problem is that something is being blocked. In this instance the customer is calling because they cannot use their internet.
Comment Box is loading comments...