Remote accessing and related issues

Assignment Help Computer Networking
Reference no: EM13806918

Remote Accessing and Related Issues

An organization's head office is connected to its branch office over the Internet. The network connection works fine without errors. The users at the branch office connect to the head office by using telnet to access UNIX-based servers and a virtual network console (VNC) to access Windows-based servers. They transfer data across the network by using FTP. However, the users complain of a mismatch in the content sent from the head office and that received by them at the branch office.

Based on your understanding of the above scenario create a Microsoft Word document, answering the following:

  • What can be the cause of the problem? Suggest some ways to resolve the problem.
  • Which is the best way to resolve the problem and why?

Users from the finance department access an Oracle server for their operations. The computers on the finance department network are assigned public IP addresses. The Oracle server is on a different network than the finance department network. The users complain of slow response from the Oracle server. A detailed observation of the traffic flow in and out of the server shows a large number of ICMP echo and echo-reply packets. Consider that you are part of the network administration team of the organization. Imagine yourself as a network administrator.

Based on your understanding of the above scenario, create a Microsoft word document answering the following:

  • How will you resolve the problem?
  • Which would be the first place that you would look at for excessive echo and echo-reply packets?
  • Explain in detail of the various commands and in what order you would diagnose to efficiently pinpoint the issue in quickest possible time.

Many users on the local LAN are facing a slow response from the Oracle server. The management has asked you to produce the response time and throughput statistics between a user's computer and the server.

Based on your understanding of the above scenario, create a Microsoft Word document answering the following:

  • Simulate the scenario in Etherpeek and generate the required report.
  • As part of the technical proposal, document the troubleshooting tools to be used and list the steps to be taken in case of a problem.
  • Discuss the different problem scenarios that the client may face.

Reference no: EM13806918

Questions Cloud

Discuss the types of monitoring and alarms : Discuss the types of monitoring and alarms necessary in your configuration. Describe where each one is housed and how it is implemented
What is reaction to james eastons opening statement : What is your 1st reaction to James Eastons' Opening Statement re: Who is responsible for the 9/11 attacks?What is the premise of the video? Lastly, Do you feel Easton provided enough evidence to prove his theory
Write an essay about your possible selection of a spouse : Write an essay about your possible selection of a spouse. the question is would consider marrying someone of whom your parents did not approve.
The equilibrium price and quantity of generic soft drinks : How will these events impact the equilibrium price and quantity of generic soft drinks?
Remote accessing and related issues : Remote Accessing and Related Issues- An organization's head office is connected to its branch office over the Internet. The network connection works fine without errors. The users at the branch office connect to the head office by using telnet to ..
Write an essay that defines and describes friendship : Write an essay that defines and describes friendship.
Explain what the concept of limiting reactant means : The concept of limiting reactant is a very important one in Chemistry. Explain what the concept of limiting reactant means and give an example of a limiting reactant everyday-life situation.
Can the orange corporation have the case removed to federal : Situation 1: Mike, a Utah resident, sues Jim, a Nevada resident for $60,000 in Nevada's Federal District court for negligence (a state law civil suit). Jim argues that the case should be dismissed for a lack of subject matter jurisdiction. Is he righ..
Analyze the main pros and cons in debates about the policy : Analyze the main pros and cons in debates about the policy. Evaluate the pros and cons from two perspectives

Reviews

Write a Review

Computer Networking Questions & Answers

  The cto informed you that the board of executives showed

the cto informed you that the board of executives showed great interest in building a new network based on the work you

  Describe the principles and misconceptions in effective

choose at least five 5 of the twelve 12 course learning outcomes below to help guide your letter for each of the five

  Intercepting the message in conversation

Provided that Alice and Bob both suppose that they have the correct public keys for the other party, and supposing that Eve may intercept any messages passed between Alice and Bob, Describe the steps Alice could take in order to ensure that the pub..

  Explain the key concepts of circuit switching and packet

write a 4- to 6-page paper use tables whenever possible toquestion 1 describe open systems interconnection osi protocol

  What are the five areas of network management

Generalize the basic approaches we used for making the best out of best effort service for real-time interactive multimedia applications and why RTSP is called an out of band control protocol? Find out another protocol that also uses out of band c..

  The wireless lan technology had a profound impact

The wireless LAN technology (IEEE802.11x standards) has had a profound impact in short-range communications. Other wireless technologies, particularly Bluetooth, Zigbee, IrDA, RFID and NFC offer shorter-range communication services for various typ..

  Explain authentication and authorization

Explain authentication and authorization. Which depends on the other? How and why are these processes more complex in a modern networked organization.

  The framing methods in slides

The sender program accepts two user inputs: the first input represents the selection of which framing method and the second one is the original data to transmit.

  Describe the company network and interconnection

Describe the company network, interconnection, and communication environment. Assess risk based on the GFI, Inc. network diagram scenario

  What are the advantages of dhcp

Compare and contrast DCHP and the ICMP messages that were previously used for start up configuration. What are the advantages of DHCP that caused it to be the popular solution

  Define the networking principles

The selected organization should be large enough to allow reasonable exercise of the networking principles in the course assignments.

  Individual website design and development

Complete the website design document in Microsoft Word. Cover all the elements for your site design (see 'Overview: Individual WebsiteDesign Document and Development Effort Instructions' link).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd