Reference no: EM133505563
Network Fundamentals
Exercise 1 - Performance & Disaster Recovery
Learning Objective 1: Use appropriate tools to collect data about the network.
Learning Objective 2: Identify methods to optimize network performance.
Learning Objective 3: Identify best practices for incident response and disaster recovery.
Description:
This exercise will explore the concepts of network performance & monitoring as well as the fundamentals of disaster recovery and business continuity planning.
Required Resources:
• Text: West, J. (2021). CompTIA Network+ Guide to Networks. (9th Edition.) Boston, MA: Cengage Learning.
• Paper & Pen/Pencil
• Internet-enabled Windows PC computer system
• Cisco Packet Tracer
• Microsoft Office
Lab Steps:
Part I: Network Monitoring
In this exercise, you will practice filtering the information contained in the log. You need a computer running Windows 10. Ideally, it should be a computer that has been used for a while, so that the event log contains several entries. It need not be connected to a network. However, you must be logged on to the computer as a user with administrator privileges.
1. Open Event Viewer. In the left pane, click the custom views arrow and then click Administrative events. A list of Administrative Events appears in the center pane of the Event Viewer window. This log lists Critical, Error, and Warning events.
2. Suppose you want to find out whether your workstation has ever experienced trouble obtaining a DHCP-assigned IP address. In the Actions pane (the pane on the right), in the Administrative Events section, click Find. The Find dialog box opens.
3. Type dhcp and then click Find Next.
4. What is the first DHCP-related event you find? When did it occur? What was the source of this event? Read the description of the event in the General tab to learn more about it. Note: If the computer did not find a DHCP event, first make sure the topmost record is selected before beginning your search to ensure that all the records are searched. If a DHCP event is still not found, search for a different kind of event such as DNS or Service Control Manager. Otherwise, choose another event at random.
5. Click Cancel to close the Find dialog box. Keep the event listing that you found highlighted.
6. Now suppose you want to be notified each time your workstation experiences this error. In the Actions pane, click Attach Task To This event. The Create Basic Task Wizard dialog box opens.
7. In the Name text box, replace the default text with DHCP_my_computer. Click Next to continue.
8. You're prompted to confirm the Log, Source, and Event ID for this error. Click Next to continue.
9. You're prompted to indicate the type of action the operating system should take when this error occurs. start a program is the only option not deprecated and should be selected by default. Click Next to continue.
10. Now you are asked to provide information about the program you want the system to open. Click the Browse button and find the cmd.exe file. The default location for cmd.exe is C:\windows\system32\cmd.exe, although your location path might be different. Select the file and click open. Click Next to continue.
11. A summary of your notification selections appears. Take a screensnip of your task configuration; save it as filename dhcp-notify-task.png.
12. Click Finish to create the task and add it to the actions your operating system will perform.
13. An Event Viewer dialog box opens, alerting you that the task has been created. Click ok
to confirm.
14. You can see the task you just created by opening Task Scheduler. Press WIN+R and enter taskschd.msc. (or click Start and type task scheduler and press enter.
15. In the Task Scheduler window, click the down arrow next to Task scheduler Library and then click event viewer Tasks. Select the task you just created and answer the following questions:
a. In the lower pane, check the Security options section. Which user account will be used when the task runs?
b. Click run in the Actions pane. What happens?
c. What command would keep this task from running without removing it from Task Scheduler?
16. Capture a screen snip of your scheduled task as shown in the task scheduler and save it as scheduled-task.png.
17. You can now delete this task if you want. Close all open windows.
Part II: Disaster Recovery and Business Continuity
No organization can ever prepare "too much" to avoid the devastating results of a poorly planned backup and recovery strategy. In this lab exercise, you will develop a disaster recovery plan.
Using your reading from the textbook, answer the following items for the planning of a disaster recovery and business continuity plan. (***Note: The correct answers are in your book***)
Step 1: Form a disaster recovery response team. Name and describe the important roles of a disaster recovery team.
Step 2: Research an online vendor that will provide a compliant data backup solution for a medical billing organization that handles patient medical records. Your response must address the following questions. What are the compliance regulations related to the handling of said medical records that must be observed? What are the features of the vendor's offering with regards to the strict compliance requirements? What is the Vendor name and the URL from which you obtained your facts? Your response should be at least 150 words.
Step 3: Describe the differences between hot, warm, and cold backup sites. Detail what is included in each AND detail what it would take to resume business operations when using each of them as part of your disaster recovery and BCP (business continuity plan). Your response should be at least 150 words.
Step 4: Please list 4 concepts that you found interesting and informative about this week's topics. Explain how these concepts can be applied in your personal and/or professional life.
QUESTIONS
Transfer the answers for the questions answered in the exercise to the Week 5.1: Hands-On Grade Sheet assignment in Canvas.
1. Part I, Step 15
a. In the lower pane, check the Security options section. Which user account will be used when the task runs?
b. Click run in the Actions pane. What happens?
c. What command would keep this task from running without removing it from Task Scheduler?
2. Part II, Step 1
3. Part II, Step 3
4. Part II, Step 4
Create a WordPad (or Word) file and embed the saved snips
a) dhcp-notify-task.png
b) scheduled-task.png
Exercise 5.2 - Hands-On Project
Description:
In this lab, you will develop your knowledge related to mobile networking technologies.
Required Resources:
• Text: West, J. (2021). CompTIA Network+ Guide to Networks. (9th Edition.) Boston, MA: Cengage Learning.
• Paper & Pen/Pencil
• Internet-enabled Windows PC computer system
• Cisco Packet Tracer
• Microsoft Office
• Wireless Network Device provided by CIAT.
Setup:
• Log into an Internet-enabled computer system
• Open Cisco Packet Tracer
Lab Steps:
Part I: Network Design
Design a Class-C network that will contain 5 wired workstations, 5 wireless laptops, a router, a wireless router, a switch, three networked printers, a print server, and a file server. Your network will appear similar to the one shown below. The sample only uses 3 PCs and Laptops in the interest of space and fostering originality. Your network will contain all 5 PCs and laptops.
You will use your own separate network IP address scheme, different from the one shown in the example. You may use the same 12.12.12.x scheme for the remote server connection.
There should be separate blocks of IP addresses for the following categories to allow for future expansion:
• Wired workstations (i.e. 192.168.39.100-119)
• Wireless devices (i.e. 192.168.39.200-219)
• Printers (i.e. 192.168.39.50-59)
• Network hardware such as servers, switches, routers, printers, etc. (i.e. 192.168.39.1-19 and 192.168.39.250-254)
For the wireless component:
• Remember to add the wireless NIC to the laptops as you did in a previous lab exercise.
• Connect the wireless router to the switch using an Ethernet LAN port. (E0/1)
• Ensure you use an IP addressing scheme that is in the same subnet as your wired network.
• Issue an IP address to the wireless router's LAN that is consistent with the overall Network IP address.
• Limit the wireless DHCP to 20 IP addresses in the scope.
• Issue a wireless security passphrase using WPA2-Personal AES Encryption
• Connect the laptops to the wireless network using the PC Wireless option in the Desktop tab of the laptops.
• Open the properties box for the wireless router and from the GUI tab, save screen snips of the following pages.
• Setup Tab: Basic Setup (Save as filename WiFi-BasicSetup.png)
• Wireless Tab: Basic Wireless Settings (Save as filename WiFi-WirelessSetup.png)
• Wireless Tab: Wireless Security (Save as filename WiFi-Security.png)
Part II: Network Documentation
Apply a Class-C IP Scheme to the network that is DIFFERENT from the one shown here.
• Select a network IP
• Select a subnet mask
Apply a DNS naming scheme to the network that is DIFFERENT from the one shown.
• Select a TLD (other than .edu)
• Select a domain name to go with your TLD (other than ciat.edu)
Fill in the IP addresses and the FQDNs in the table that follows. This table can be found in a document that you can download and fill out. It is in the Student Files section of Canvas. (Files
> Student Files > Lab Support Files) from the links on the left side of your Canvas CIS102B Home Page.
The file you will download is named Lab52.rtf. Please download it and fill out the table so you can upload it later. To download the file, click the file name to view it in Canvas, then click Download at the top of the page.
Label the IP addresses with CIDR notations and the FQDNs on your network diagram in Packet Tracer. Capture a screen snip of your entire, fully documented and labeled, network and save it with a filename of Network.png
Part III: Network Connectivity
Confirm network connectivity. Perform the following ping tests and save each as a screen snip using the filename in the parenthesis ( ). Remember initial connectivity may time out for the first or second packets as the routing tables are built.
• Ping from PC0 to File Server (PingPC0-FS.png)
• Ping from PC0 to Printer 2 (PingPC0-Prt2.png)
• Ping from PC1 to Laptop 1 (PingPC1-Lap1.png)
• Ping from Laptop 1 to Laptop 2 (PingLap1-Lap2.png)
• Ping from Laptop 0 to Print Server (PingLap0-PrtSvr.png)
• Ping from Laptop 1 to Printer 1 (PingLap1-Prt1.png)
• Ping from PC2 to the Default Gateway (PingPC2-DG.png)
• Ping from Laptop2 to the Edge Router (PingLap2-DG.png)
• Ping from PC2 to Remote Server (PingPC2-RSRV.png)
From Part 2:
• Select a network IP
• Select a subnet mask
• Select a TLD
• Select a sub-domain name
Fill out the table that you download from Canvas Files and save the file as filename
LastName_Table52.rtf. Upload it to Canvas.
Create a WordPad (or Word) document and embed the following saved snip files in the exact order shown.
1. Network.png
2. WiFi-BasicSetup.png
3. WiFi-WirelessSetup.png
4. WiFi-Security.png
5. PingPC0-FS.png
6. PingPC0-Prt2.png
7. PingPC1-Lap1.png
8. PingLap1-Lap2.png
9. PingLap0-PrtSvr.png
10. PingLap1-Prt1.png
11. PingPC2-DG.png
12. PingLap2-DG.png
13. PingPC2-RSRV.png