Midterm Flashcards
Name two popular implementation schemes of IP protocol and give examples
IPV4,IPV6
Describe the three tier network architecture and give examples
The Access Layer is the one closer to the users. In fact, at this layer we find the users
themselves and the access-layer switches. The main purpose of this layer is to
physically connect users to the network. In other words, there is just a cable between
end-user PCs and access-layer switches.
The Distribution layer bridges users to the core layer. It serves as major spine for all
users in an area, so it connects several access switches. In most deployment, Default
Gateways for all the VLANs reside at the Distribution layer.
In the Three Tier Architecture, the Core Layer is the one coordinating everything. It has
only one, simple purpose: connecting all the distribution layers together. In large
enterprises, where you have several distribution switches, the core layer is also known
as Backbone.
•Access layer switches physically connects the users and enforce network-access policies
• Distribution switches connects multiple access switches to the core and enforce policies
such as firewalling or policy routing
• The Core layer switches just route traffic between distribution switches, the fastest possible.
You shouldn’t apply any policy there
List two (2) File permissions that Full Control provides and Read/Write permission does not provide.
Change Permissions / Take Ownership
Explain the difference between Explicit permissions and inherited permissions and give examples.
Explicit permissions are those that are set by default on non-child objects when the object is created, or by user action on non-child, parent, or child objects.
Inherited permissions are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container.
The Five main process groups accomplished through Project management are:
Project management is accomplished through the appropriate application and integration of the 47 logically grouped project management processes
comprising the 5 Process Groups. These 5 Process Groups are:
- Initiating
- Planning
- Executing
- Monitoring and Controlling
- Closing
Define three responsibilities of a project manager during the initiation phase.
Assigning Roles and Responsibilities.
Determining the Scope of impact.
Determining appropriate Stakeholders.
Define Domain and Forest Structures in Windows
environment and how are they related
Domain and Forest Structure
A forest consists of a hierarchical structure of domain containers that are used to categorically store information about objects on the network. Domain
containers are considered the core functional units in the forest structure. This is because each domain container in a forest is used primarily to store and manage Active Directory objects, most of which have a physical representation (such as people, printers, or computers). Forests also provide the structure by which domain containers can be segregated into one or more unique Domain Name System (DNS) namespace hierarchies known as domain trees.
Define Trust relationship and give an example of Transitive Trust.
Two-way Trust:
When you create a new child domain, the child domain automatically trusts the parent domain, and vice versa. At the practical level, this means that authentication requests can be passed between the two domains in both directions.
Transitive Trust:
A transitive trust reaches beyond the two domains in the initial trust relationship. For example, if Domain A and Domain B (parent and child) trust each other, and if Domain B and Domain C (also parent and child) trust each other, Domain A and Domain C also trust each other (implicitly), even though no direct trust relationship between them exists.
List two major File systems used by Windows OS. Compare the features.
FAT (File Allocation Table) is one of the simplest types of file systems. It consists of a file system descriptor sector (boot sector or superblock), a file system block allocation table (referred as File Allocation Table) and plain storage space to store files and folders. Files on FAT are stored in directories. Each directory is an array of 32-byte records, each defining file or file extended attributes (e.g. a long file name). File record attributes the first block of a file. Any next block can be found through a block allocation table by using it as a linked list.
NTFS (New Technology File System) was introduced in Windows NT and currently it is a major file system for Windows. This is the default file system for disk partitions and the only file system that supports disk partitions over 32GB. The file system is quite extensible and supports many file properties, including
access control, encryption etc. Each file on NTFS is stored as a file descriptor in a Master File Table and file content. A Master file table contains all information
about the file: size, allocation, name etc. The first and the last sectors of the file system contain file system settings (boot record or superblock). This file system
uses 48 and 64 bit values to reference files, thus, supporting disk storages with high capacity.
ReFS:
ReFS (Resilient File System) is the latest development of Microsoft currently available for Windows 8 Servers. The file system architecture absolutely differs
from other Windows file systems and is mainly organized in a form of a B+-tree. ReFS has high tolerance to failures due to new features included into the system. And, namely, Copy-on-Write (CoW): no metadata is modified without being copied; data is not written over the existing data, but into new disk space. With any file modifications, a new copy of metadata is stored into free storage space, and then the system creates a link from older metadata to the newer one. Thus, the system stores significant quantity of older backups in different places providing easy file recovery unless this storage space is overwritten.
What is Network RMA ? Explain the concept and give
examples
Reliability • Probability that an engineering system will perform its intended function satisfactorily (from the viewpoint of the customer) for its intended life under specified environmental and operating conditions
Maintainability
• Probability that maintenance of the system will retain the system in, or
restore it to, a specified condition within a given time period
• A measure of the ease and rapidity with which a system or equipment
can be restored to operational status following a failure
Availability
• Availability is the probability that the system is operating satisfactorily
at any time, and it depends on the reliability and the maintainability
• Availability of end to end functionality for customers.
• Ability to experience failures or systematic attacks, without impacting customers or
operations
Define the purpose and importance of network analysis and give examples
Network analysis defines, determines, and
describes relationships between network
components for many conditions.
• The purpose of network analysis
• first, to listen to users and understand
their needs;
• second, to understand the system.
Entails learning what users, their applications,
and devices need from the network
• Also about understanding network behavior
under various situations
• Also defines, determines, and describes
relationships among users, applications, devices,
and networks. In the process,
• Network analysis provides the foundation for all
the architecture and design decisions to follow.
• Network requirements are requests for
capabilities in the network,
• performance and function, which are
necessary for the success of that network.
Describe the meaning and use of Service-level agreements and give examples.
Informal or formal contract between a provider and user that defines the terms of the provider’s responsibility to the user and the type and extent of accountability if those responsibilities are not met
Describe any two types of Network Topologies and
compare them
Network Topology is the schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology. (Think of a christmas tree and how lights used to be, all in a row, one goes out, there goes your network)
Features of Bus Topology
- It transmits data only in one direction.
- Every device is connected to a single cable
Advantages of Bus Topology
- It is cost effective.
- Cable required is least compared to other network topology.
- Used in small networks.
- It is easy to understand.
- Easy to expand joining two cables together.
Disadvantages of Bus Topology
- Cables fails then whole network fails.
- If network traffic is heavy or nodes are more the performance of the network decreases.
- Cable has a limited length.
- It is slower than the ring topology.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another computer, with the
last one connected to the first. Exactly two neighbors for each device.
Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of nodes, because if someone wants
to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass
through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections between
each Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in them. Also,
if one ring fails, the second ring can act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through each
node of the network, till the destination node.
Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having
tokens can transmit data.
2. Cheap to install and expand
Disadvantages of Ring Topology
- Troubleshooting is difficult in ring topology.
- Adding or deleting the computers disturbs the network activity.
- Failure of one computer disturbs the whole network