Identify methods to optimize network performance

Assignment Help Computer Networking
Reference no: EM133505563

Network Fundamentals

Exercise 1 - Performance & Disaster Recovery

Learning Objective 1: Use appropriate tools to collect data about the network.
Learning Objective 2: Identify methods to optimize network performance.
Learning Objective 3: Identify best practices for incident response and disaster recovery.

Description:
This exercise will explore the concepts of network performance & monitoring as well as the fundamentals of disaster recovery and business continuity planning.
Required Resources:
• Text: West, J. (2021). CompTIA Network+ Guide to Networks. (9th Edition.) Boston, MA: Cengage Learning.
• Paper & Pen/Pencil
• Internet-enabled Windows PC computer system
• Cisco Packet Tracer
• Microsoft Office

Lab Steps:
Part I: Network Monitoring

In this exercise, you will practice filtering the information contained in the log. You need a computer running Windows 10. Ideally, it should be a computer that has been used for a while, so that the event log contains several entries. It need not be connected to a network. However, you must be logged on to the computer as a user with administrator privileges.

1. Open Event Viewer. In the left pane, click the custom views arrow and then click Administrative events. A list of Administrative Events appears in the center pane of the Event Viewer window. This log lists Critical, Error, and Warning events.
2. Suppose you want to find out whether your workstation has ever experienced trouble obtaining a DHCP-assigned IP address. In the Actions pane (the pane on the right), in the Administrative Events section, click Find. The Find dialog box opens.
3. Type dhcp and then click Find Next.
4. What is the first DHCP-related event you find? When did it occur? What was the source of this event? Read the description of the event in the General tab to learn more about it. Note: If the computer did not find a DHCP event, first make sure the topmost record is selected before beginning your search to ensure that all the records are searched. If a DHCP event is still not found, search for a different kind of event such as DNS or Service Control Manager. Otherwise, choose another event at random.
5. Click Cancel to close the Find dialog box. Keep the event listing that you found highlighted.
6. Now suppose you want to be notified each time your workstation experiences this error. In the Actions pane, click Attach Task To This event. The Create Basic Task Wizard dialog box opens.
7. In the Name text box, replace the default text with DHCP_my_computer. Click Next to continue.
8. You're prompted to confirm the Log, Source, and Event ID for this error. Click Next to continue.
9. You're prompted to indicate the type of action the operating system should take when this error occurs. start a program is the only option not deprecated and should be selected by default. Click Next to continue.
10. Now you are asked to provide information about the program you want the system to open. Click the Browse button and find the cmd.exe file. The default location for cmd.exe is C:\windows\system32\cmd.exe, although your location path might be different. Select the file and click open. Click Next to continue.
11. A summary of your notification selections appears. Take a screensnip of your task configuration; save it as filename dhcp-notify-task.png.
12. Click Finish to create the task and add it to the actions your operating system will perform.
13. An Event Viewer dialog box opens, alerting you that the task has been created. Click ok
to confirm.
14. You can see the task you just created by opening Task Scheduler. Press WIN+R and enter taskschd.msc. (or click Start and type task scheduler and press enter.
15. In the Task Scheduler window, click the down arrow next to Task scheduler Library and then click event viewer Tasks. Select the task you just created and answer the following questions:
a. In the lower pane, check the Security options section. Which user account will be used when the task runs?
b. Click run in the Actions pane. What happens?
c. What command would keep this task from running without removing it from Task Scheduler?
16. Capture a screen snip of your scheduled task as shown in the task scheduler and save it as scheduled-task.png.
17. You can now delete this task if you want. Close all open windows.

Part II: Disaster Recovery and Business Continuity

No organization can ever prepare "too much" to avoid the devastating results of a poorly planned backup and recovery strategy. In this lab exercise, you will develop a disaster recovery plan.

Using your reading from the textbook, answer the following items for the planning of a disaster recovery and business continuity plan. (***Note: The correct answers are in your book***)

Step 1: Form a disaster recovery response team. Name and describe the important roles of a disaster recovery team.

Step 2: Research an online vendor that will provide a compliant data backup solution for a medical billing organization that handles patient medical records. Your response must address the following questions. What are the compliance regulations related to the handling of said medical records that must be observed? What are the features of the vendor's offering with regards to the strict compliance requirements? What is the Vendor name and the URL from which you obtained your facts? Your response should be at least 150 words.

Step 3: Describe the differences between hot, warm, and cold backup sites. Detail what is included in each AND detail what it would take to resume business operations when using each of them as part of your disaster recovery and BCP (business continuity plan). Your response should be at least 150 words.

Step 4: Please list 4 concepts that you found interesting and informative about this week's topics. Explain how these concepts can be applied in your personal and/or professional life.

QUESTIONS
Transfer the answers for the questions answered in the exercise to the Week 5.1: Hands-On Grade Sheet assignment in Canvas.

1. Part I, Step 15
a. In the lower pane, check the Security options section. Which user account will be used when the task runs?
b. Click run in the Actions pane. What happens?
c. What command would keep this task from running without removing it from Task Scheduler?
2. Part II, Step 1
3. Part II, Step 3
4. Part II, Step 4

Create a WordPad (or Word) file and embed the saved snips
a) dhcp-notify-task.png
b) scheduled-task.png

Exercise 5.2 - Hands-On Project

Description:
In this lab, you will develop your knowledge related to mobile networking technologies.

Required Resources:
• Text: West, J. (2021). CompTIA Network+ Guide to Networks. (9th Edition.) Boston, MA: Cengage Learning.
• Paper & Pen/Pencil
• Internet-enabled Windows PC computer system
• Cisco Packet Tracer
• Microsoft Office
• Wireless Network Device provided by CIAT.

Setup:
• Log into an Internet-enabled computer system
• Open Cisco Packet Tracer
Lab Steps:

Part I: Network Design
Design a Class-C network that will contain 5 wired workstations, 5 wireless laptops, a router, a wireless router, a switch, three networked printers, a print server, and a file server. Your network will appear similar to the one shown below. The sample only uses 3 PCs and Laptops in the interest of space and fostering originality. Your network will contain all 5 PCs and laptops.

You will use your own separate network IP address scheme, different from the one shown in the example. You may use the same 12.12.12.x scheme for the remote server connection.

There should be separate blocks of IP addresses for the following categories to allow for future expansion:
• Wired workstations (i.e. 192.168.39.100-119)
• Wireless devices (i.e. 192.168.39.200-219)
• Printers (i.e. 192.168.39.50-59)
• Network hardware such as servers, switches, routers, printers, etc. (i.e. 192.168.39.1-19 and 192.168.39.250-254)

For the wireless component:
• Remember to add the wireless NIC to the laptops as you did in a previous lab exercise.
• Connect the wireless router to the switch using an Ethernet LAN port. (E0/1)
• Ensure you use an IP addressing scheme that is in the same subnet as your wired network.
• Issue an IP address to the wireless router's LAN that is consistent with the overall Network IP address.
• Limit the wireless DHCP to 20 IP addresses in the scope.
• Issue a wireless security passphrase using WPA2-Personal AES Encryption
• Connect the laptops to the wireless network using the PC Wireless option in the Desktop tab of the laptops.
• Open the properties box for the wireless router and from the GUI tab, save screen snips of the following pages.
• Setup Tab: Basic Setup (Save as filename WiFi-BasicSetup.png)
• Wireless Tab: Basic Wireless Settings (Save as filename WiFi-WirelessSetup.png)
• Wireless Tab: Wireless Security (Save as filename WiFi-Security.png)

Part II: Network Documentation

Apply a Class-C IP Scheme to the network that is DIFFERENT from the one shown here.
• Select a network IP
• Select a subnet mask

Apply a DNS naming scheme to the network that is DIFFERENT from the one shown.
• Select a TLD (other than .edu)
• Select a domain name to go with your TLD (other than ciat.edu)

Fill in the IP addresses and the FQDNs in the table that follows. This table can be found in a document that you can download and fill out. It is in the Student Files section of Canvas. (Files
> Student Files > Lab Support Files) from the links on the left side of your Canvas CIS102B Home Page.

The file you will download is named Lab52.rtf. Please download it and fill out the table so you can upload it later. To download the file, click the file name to view it in Canvas, then click Download at the top of the page.

Label the IP addresses with CIDR notations and the FQDNs on your network diagram in Packet Tracer. Capture a screen snip of your entire, fully documented and labeled, network and save it with a filename of Network.png

Part III: Network Connectivity
Confirm network connectivity. Perform the following ping tests and save each as a screen snip using the filename in the parenthesis ( ). Remember initial connectivity may time out for the first or second packets as the routing tables are built.
• Ping from PC0 to File Server (PingPC0-FS.png)
• Ping from PC0 to Printer 2 (PingPC0-Prt2.png)
• Ping from PC1 to Laptop 1 (PingPC1-Lap1.png)
• Ping from Laptop 1 to Laptop 2 (PingLap1-Lap2.png)
• Ping from Laptop 0 to Print Server (PingLap0-PrtSvr.png)
• Ping from Laptop 1 to Printer 1 (PingLap1-Prt1.png)
• Ping from PC2 to the Default Gateway (PingPC2-DG.png)
• Ping from Laptop2 to the Edge Router (PingLap2-DG.png)
• Ping from PC2 to Remote Server (PingPC2-RSRV.png)

From Part 2:
• Select a network IP
• Select a subnet mask
• Select a TLD
• Select a sub-domain name

Fill out the table that you download from Canvas Files and save the file as filename
LastName_Table52.rtf. Upload it to Canvas.

Create a WordPad (or Word) document and embed the following saved snip files in the exact order shown.
1. Network.png
2. WiFi-BasicSetup.png
3. WiFi-WirelessSetup.png
4. WiFi-Security.png
5. PingPC0-FS.png
6. PingPC0-Prt2.png
7. PingPC1-Lap1.png
8. PingLap1-Lap2.png
9. PingLap0-PrtSvr.png
10. PingLap1-Prt1.png
11. PingPC2-DG.png
12. PingLap2-DG.png
13. PingPC2-RSRV.png

Reference no: EM133505563

Questions Cloud

How different generations naturally communicate help : How can considering how different generations naturally communicate help you better communicate with members of your team?
How do your smm goals support your overall business goals : What are your SMART goals for your venture in the context of social media? How do your SMM goals support your overall business goal(s)?
Clinical presentation of person with abnormal pathology : Describe the clinical presentation of a person with an abnormal pathology related to Serotonin.
Discuss process of literature evaluation and role of teacher : Discuss the process of literature evaluation and the role of the teacher in selection of literature at district, school, team, and individual classroom levels.
Identify methods to optimize network performance : CIS102B Network Fundamentals, California Institute of Arts & Technology - Identify methods to optimize network performance
Discuss censorship and inform family that literature present : Discuss censorship and inform families that some literature may present content that could create questions or be concerning to them.
Millennial may face to address privacy and confidentiality : What are the strengths and challenges that a millennial may face to address privacy and confidentiality?
Defines the qualifications needed for position : A list containing the knowledge, skills, abilities, work experience, education, and training that defines the qualifications needed for a position is called
Good rx and rx saver are flooding market : Newer discount cards like Good Rx and Rx Saver are flooding the market. There are also manufacturer discount cards that patients can use as well.

Reviews

Write a Review

Computer Networking Questions & Answers

  Describing a network management system

Write a two-and-a-half-page paper describing a network management system identified on a currently dated vendor website on HP

  Personal privacy posed by the networking technologies

MN501 - Network Management in Organisations - Essay and Power Point on Legal, Social, Cultural Issues and Life-Long Learning

  Identify three benefit of implementing server virtualization

Identify three benefits of implementing server virtualization at the city of Seacliff Heights. Elaborate on how specifically the city will benefit?

  What are advantages of a layer three multi-layer switch

Consider this assignment and post your opinion on the following question.In your opinion, what are the advantages of a layer 3 multi-layer switch over a traditional router?

  Evaluate the whole organizations anticipated growth

Evaluate the whole organization's anticipated growth. Compare the growth to the daily job activities of employees in different IT positions within organization

  What is the big concern with a linear network topology

List four improvements made in Ethernet that have helped provide determinism.

  Discuss about the network architecture

Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents the communication flow between organizational levels and across departments/division of an actual hierarchical business. Be s..

  Contrast available it security solutions to address

Analyze the security challenges arising from adding e-commerce to the website

  Find the purpose and format of each packet

CBT uses nine types of packets. Use the Internet to find the purpose and format of each packet. Use the Internet to find how CBT messages are encapsulated.

  Cacophony of the network devices

Even with the 30 decibel cacophony of the network devices humming in the background, it seems deathly silent. Thelma and Louise are pondering their next move.

  Identify problems with maintaining legacy systems

COIT20246 - ICT Services Management - cq university - Find and summarise ONE resource that describes ONEother commercial IaaS provider that is NOT Google

  Describe the osi and tcp/ip reference models.

Discuss how the layered stack approach assists in our understanding of these reference models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd