Discussion-routing protocols

Assignment Help Basic Computer Science
Reference no: EM131781292

Discussion: Routing Protocols (Written Transcript)

Because it happened at 4 am, no one noticed or checked.

Gemma was manning the tier 2 helpdesk when the first call came in. The system logged the call at 8:13 am from John Hopkins, a branch manager at a restaurant franchise location in Wyoming, 6:13 am Mountain Standard Time.

Gemma: "IT services, how can I assist this morning?"

John: "Got a problem. I can't access the food ordering system for my next day's delivery."

Gemma: "When did you first notice the problem?"

John: "About 10 minutes ago, a few minutes after I arrived."

Gemma: "Have you noticed any other problems, like can you access the company website or print a document?"

John: "I can print, but now that you mention it...I can't access the website."

Gemma: "Can you access any websites?"

John: "Hang on...no, not even Google."

Just then Gemma noticed an uptick in the phone line activity of her colleagues. Everyone was suddenly very busy, chatter everywhere....unusual for this time of the morning.

Gemma: "John, let me get back to you. I need to check something out."

Knowing he could print basically meant that the local connection was good and the branch office LAN was functioning. It had to be something on the WAN link.  Gemma, suspicious, trained her ears on the conversation of her nearest colleague, Mara. She heard the words, "maybe the WAN link is down." 

"Hmm," she thought to herself, "sounds like more than one branch is having issues." She looked at the incoming phone number on Mara's IP phone. The area code was in Montana. Gemma got up and wandered around looking at the phone numbers on the desktops of other colleagues. They were all from Wyoming, Montana, and Idaho. She went back to her desk and looked up the phone number of her WAN provider. 

The provider's engineer answered cheerily, "Grayson here, what can I do for Shake and Wake Breakfast Foods today?"

Gemma: "I think our WAN link to the northwest is down. We are deluged with calls from Wyoming and border states."

Grayson: "Hmm, I don't see any linkage issues. We would have called you if we had seen them. Let me test something; hold on...yep, they are up and carrying data for other customers just fine. But the bandwidth usage is down, suggesting that your folks aren't using their bandwidth slots. Have you checked your routers?"

Gemma thought for a second. "No, but I am going to VPN into one from this side." Gemma went for the main WAN connection router first. It was up and running. She then went to the second one. It was up and running. She tried to ping to the remote branch...nothing. She tried to ping the other side of the WAN router, the provider's IP. It worked. 

Gemma scratched her head and thinking out loud said, "Grayson, I can ping internally, but I can't ping externally, are you sure that link is up?"

"Data link is up, and I pinged your WAN router's outside address from here," said Grayson.

Gemma was perplexed. She VPN-ed back into the WAN router. Not only could she ping the external address, but she could also reach the branch address in Wyoming. That was went something hit her. She issued the 'show ip route' command. Seeing the result, she then issued the 'show ip ospf neighbor' command and observed nothing. Show IP Protocols told the rest of the story. 

After you view the scenario above, respond to the questions below. One important detail to know is that the WAN link is the local branch's Internet link, as opposed to a separate local Internet Service Provider.

  • Using "problem isolation" troubleshooting, where do you think the "root cause" is physically located?
  • What ideas do you have for how Gemma should proceed at this point to fix this?
  • What do you think could have happened before everyone arrived at work that might have caused this? Was it avoidable? Explain in detail.

Reference no: EM131781292

Questions Cloud

What is end point security and host hardening : What is end point security and host hardening? Provide examples of each concept. What do you think are the advantages to them? Why?
What would be the increase or decrease in profit : Should HJM modify the existing assembly? What would be the increase/decrease in profit if HJM modifies the assembly
Advantages and disadvantages of the wan technology : What WAN technology would you recommend for this ski resort to connect their two locations to exchange data? Be sure to defend your recommendation.
What are the limitations of the cash flow yield : Suppose you are told that the cash flow yield of a pass-through security is 9% and that you are seeking to invest in a security with a yield greater than 8.8%.
Discussion-routing protocols : Gemma was manning the tier 2 helpdesk when the first call came in. The system logged the call at 8:13 am from John Hopkins, a branch manager
What would be the overall margin on the order : Assuming that the company charges $658.45 for the Strobl wedding cake, what would be the overall margin on the order
Discuss about the contemporary american literature : You probably know John Grisham better from his novels than from his journalistic essays. In what ways does his magazine essay, included in our text.
Customer ticket task screen comes into view : Kerry finishes his morning pre-work logins, and at 7:59 am the Customer Ticket task screen comes into view.
What is stephanie recognized gain or loss : Stephanie has an outside basis in the partnership of $339,000. What is Stephanie' recognized gain or loss on the distribution

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd