Network troubleshooting tools

Assignment Help Basic Computer Science
Reference no: EM132600268

Part 1

You are fast asleep and you have received a call at home from the IT Guru network operations center regarding a significant slowdown of the corporate network. You turn on your laptop and try to connect to establish a connection to your corporate network, but are unable to establish a stable connection.

After you apply network troubleshooting tools and the Cisco troubleshooting methodology to your home network (Ping, Tracert, NSLookup, or other tools), you are tasked with writing up a report. In your report, you are to answer the following:

Describe the types of issues these troubleshooting tools will help you address.

Provide your opinion on your favorite tool to use and the Cisco troubleshooting methodology

Would you follow this same method for a corporate network as you would for your home network? Explain why or why not.

Part 2

The manager of the IT Guru network operations center has recently hired 5 new employees to provide 24x7 coverage of the NOC and has asked you to provide an overview on the use of Wireshark as a network troubleshooting tool. Your presentation will be used as a training aid for the new employees.

For this assignment you will need to provide a presentation that will train a new hire on the use of Wireshark as a network troubleshooting tool.

Explanation of what Wireshark is.

How Wireshark can be used for traffic capture and analysis.

Deep packet analysis of common protocols.

Examples of normal and abnormal behavior on the network.

Examples of common attack signatures.

Conclusion slide with a review of how to understand passive and active attacks.

Extra details to support your narration in the slide notes section so that the slides can be used as a reference source for the employees after your presentation.

Reference no: EM132600268

Questions Cloud

Explain the possible ethical threats in the events : BBQ & Co is also engaged to represent Renfrew in a dispute with IRD, Explain the possible ethical threats in the above events and discuss the proper safeguards
Prepare the stockholders equity section of the balance sheet : Paid in Capital in Excess of Stated Value - Common Stock 900,000. Prepare the stockholders' equity section of the balance sheet at Dec 31 2017
Digital forensic methods : How digital forensic methods are useful for Law enforcement professionals and investigators to solve crimes
Compare and contrast the views of management and accountants : Compare and contrast the views of management and accountants regarding the changes required by the Sarbanes-Oxley Act
Network troubleshooting tools : After you apply network troubleshooting tools and the Cisco troubleshooting methodology to your home network (Ping, Tracert, NSLookup, or other tools)
What is Claire Employment Insurance premium : Claire is a British Columbia employee. She worked 80 hours this bi-weekly pay period and is paid $20.00 per hour. What is Claire Employment Insurance premium
Do know who are tesla and edison : Do you know who are Tesla and Edison? Can you imagine your life without electricity or radio? Please watch the video and imagine life without their contribution
Calculate Lois net pay and following the steps in payroll : Lois works for Marian Transport in Québec and is paid $2,632.33 semi-monthly. Calculate Lois net pay and following the steps in payroll
What is T Adams taxable benefit on the loan : T. Adams commenced employment at Moana Sales Ltd. on February 1, 2019. What is T. Adams' taxable benefit on the above loan for 2019

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Benefit from hiring someone to hack into their systems

Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

  How the balance between these two sets of data varies

Report on the statistical information that is being gathered by taxis and the passenger source; also on taxi idle time and missed pickups. Experiment with different numbers of taxis to see how the balance between these two sets of data varies.

  How can we explain the lorenz curve

How can we explain the Lorenz Curve, how it is used to calculate the Gini Coefficient? And what does the Gini Coefficient tell us?

  National incident management system

The ISEE was designed to reinforce the roles of the National Incident Management System (NIMS)/Incident Command System (ICS),

  What is the speedup for this mimd machine

For a 4 CPU MIMD machine, show the sequence of MIPS instructions that you would execute on each CPU. What is the speedup for this MIMD machine?

  Why omitting an input actually describes sequential circuit

explain why omitting an input actually describes a sequential circuit

  Worst case asymptotic time complexity

What is the worst case asymptotic time complexity of the following algorithms/operations?

  Determine the limiting velocity of molecules closer wall

Suppose for a particular liquid and a particular pipe that k = 0.65 and R = 0.5.

  Draw the phase diagram of the system for µ > 0 and µ

Draw the phase diagram of the system for μ > 0 and μ

  Critical element to the security systems engineering

Discuss how Risk Management is a critical element to the Security Systems engineering.

  Project control panel and earned value

Describe how you may use the project control panel to communicate with different project stakeholders.

  Types of file systems that windows

Of the types of file systems that Windows 7 offers (NTFS, FAT, exFAT, UDF, CDFS, Live File System), which do you think is best and why? Give one example where each of the file systems is commonly used.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd