Wear long pants, long- sleeved shirts, sturdy shoes that cover your feet, and gloves.

toycutnshootNetworking and Communications

Oct 27, 2013 (3 years and 9 months ago)

93 views

__
miguel coronel
_________________________

Name

______
whenever
_____________________

Date

IT ESSENTIALS MOD 1
5

ADVANCED
NETWORKS


15.1 Identify potential safety hazards and implement proper safety procedures related to
networks

1.

What type of clothing
should be work to protect you
form unexpected or toxic materials?

Wear long pants, long
-
sleeved shirts, sturdy
shoes that cover your
feet, and gloves.

2.

What are the safety issues to consider when using a
ladder?



Read the labels
on the ladder and
follow
any safety
instructions
written on it.



Never stand on
the top rung of
the ladder.



Make sure that
people in the area
know you will be
working there.



C
over

off the area
with caution tape
or safety cones.



When you are
using a ladder
that leans up
against a wa
ll,
have someone
hold the ladder to
keep it steady.

3.

What rules should be followed when working with
cables?



Make sure that
the tools you are
using are in good
working order.



Pay attention to
what yo
u are
doing and take
your time.



Always wear
safety gla
sses
when cutting,
stripping, or
splicing cables of
any kind. Tiny
fragments can
injure your eyes.



Wear gloves
whenever possible

and make sure to
dispose of any
waste.

15.1.1 Explain fiber
-
optic safety

4.

What kind of hazards are

associated with fiber optics?

Chemicals and Glass
Splinters

5.

How should you pick up fiber
-
optic fragments?

Use tape to pick up small
fragments and dispose of
them properly

15.1.2 Explain cable, cable cutters, and cable cutting safety hazards

6.

Why
should you always wear safety goggles when
working with cable?

Because small glass
fragment can be shoot
up into the air

15.2

Design a network based on a customer’s needs

7.

What kind of network works best?

Topology

15.2.1 Determine a topology

8.

What

issues should be discussed with the customer?



Cable and
wireless types



Expandability



Number and
location of users

9.

What is a site survey?

A physical and logical
topology of the network

10.

What is a logical topology?

Actual method by which
different
computers and
other equipment in a
network communicate
with one another

11.

What determines the initial physical and logical topology
of the network?

Numbers of users and
the estimated amount of
future growth

12.

What factors should

be considered when planning the
layout of the network?

A floor pan or blueprint

13.

Identify the following network topologies:



Bus Topology Ring Topology Star
Topology


Extended Star Topology Hierarchical

Topology Mesh
Topology

15.2.2 Determine protocols and network applications

14.

Which suite of protocols is the dominate standard of
internetworking?

TCP/IP

15.

Which protocol suite was originally employed by
Novell?

IPX/SPX


16.

Which
protocol cannot be routed or used by routers to
talk to each other?

NetBEUI


17.

Which protocol governs how files such as text, graphics,
sound and video are exchanged on the world wide web?

HTTP

18.

Which protocol is used to securely connect to a remote

computer?

SSH

19.

Which protocol is used to send e
-
mail to a remote e
-
email server?

SMTP

20.

What protocol is associated with each of the following
ports?

80

443

25

23/22

20/21

53

67



-

HTTP

-
HTTPS

-
SMTP

-
Telnet/SSH

-
FTP

-
DNS

-
DHCP

21.

Which protocol
automates assignment of IP addresses on
a network?

DHCP

22.

Which protocol translates URLs to IP addresses?

DNS

Protocol Worksheet

15.3 Determine the components for your customer’s network

23.

What determines the type of device, cables, and network
The choice of network
interfaces that will be required to construct the network?

topology



15.3.1 Select cable types

24.

What cable type should be selected?


The cable type that is the
most beneficial and cost
effective for users and
services that will
connect
to the network

25.

What determines the type of network cable that will be
used?

The size of the network

26.

What is the most common type of cable used in a
network?

Cat5e

27.

What is the most recent type of twisted
-
pair cable?

Cat6A

28.

What is

the distance limitation of UTP cabling?

330 feet (100m)

29.

Which type of network is more secure?

A wire network

15.3.2 Select ISP Connection Type

30.

What are the three main considerations for an Internet
connection?



Speed



Reliability



Availability

31

What service offers faster connection time and faster
speed than dial
-
up and allows multiple devices to share a
single telephone line?

ISDN

32.

What are the limitations of DSL?



Service is not
available
everywhere



Works better
and faster the
closer the
in
stallation is
to the
telephone
provider’s
Central
Office(CO).Fa
ster when
receiving data
over the
internet than
sending it



The lines that
are in place to
carry
telephone
signals do not
technically
qualify to
carry DSL
signals


33.

What is considered an “al
ways on” technology?

Satellite

Worksheet


ISP Connections

15.3.3 Select Network Cards

34.

Are Ethernet NICs backward
compatible
?



If you have a
10/100 Mbps NIC
and a hub that is
only 10 Mbps, the
NIC will operate
at 10 Mbps



If you have a
10/100/1000
Mbps NIC and a
switch that is only
operating at 100
Mbps, the NIC
will operate at
100 Mbp
s

35.

How do you select wireless NICs?

You should select
wireless NIC’s based on
the type of wireless
network that is installed.

15.3.4 Select the Network Device

36.

Why do you use a hub?

To share data between
multiple devices on a
section of the network

37.

What is one advantage of a hub?

It regenerates the data
that passes through it

38.

What determines the maximum speed of the network?

Switches

39.

Doe
s

a switch segment network traffic?

Yes, it switches filter and
segment network traffic
by sending data only to
the device to which it is
sent

40.

What is contained in a switching table?

Switches

41.

What do routers do?

Connect networks
together

Network
Devices Activity


Figure 2

15.4 Implement the customer’s network

42.

What is on the installation checklist?



All the parts are
available at the
site



The installation is
scheduled



The customer’s
data backups are
current and
available



You have access
to
needed
passwords



You have extra
supplies



Install the
components



Test the
components

15.4.1 Install and test the customer’s network

43.

What is the process for physically creating a network?



To install the
cable in ceilings
and behind walls,
you perform a

cable pull. One
person pulls the
cable, and
another feeds the
cable through the
walls. Make sure
to label the ends
of every cable.
Follow a labeling
scheme that is
already in place,
or follow the
guidelines
outlined in
TIA/EIA 606
-
A



After the cables
have
been
terminated at
both ends, use a
cable tester to
make sure that
there are no
shorts or
interference.



Make sure that
the network
interfaces are
properly installed
in the desktops,
laptops, and
network printers.
After the network
interfaces have
been ins
talled,
configure the
client software
and the IP
address
information on all
of the devices.



Install switches
and routers in a
secured,
centralized
location. All of
the LAN
connections
terminate in this
area. In a home
network, you may
need to install
these devices in
separate
locations, or you
may have only
one device.



Install an
Ethernet patch
cable from the
wall connection to
each network
device. Check to
see if you have a
link light on all
network
interfaces and on
each network
device port that
connects to a
device.



When all devices
are connected
and all link lights
are functioning,
test the
network
for connectivity.
Use the
ipconfig
/all

command to
view the IP
configuration on
each workstation.
Use the
ping

command to test
basic
connectivity. You
should be able to
ping other
computers on the
network,
including the
default gateway
and remote
c
omputers. After
you have
confirmed basic
connectivity, you
must configure
and test network
applications, such
as e
-
mail and an
Internet browser.


44.

What command will allow you to view the IP
configuration on each workstation?

ipconfig /all

45.

What
command do you use to test basic connectivity?

ping

15.4.2 Configure the customer’s Internet and network resources

46.

Why are temporary Internet files stored on your
computer?

Because when the
browser can load content
faster the next time you
visit the
same website

47.

Which permission allows the user to view the file and
subfolder names, navigate to subfolders, view data in
files and run program files?

Read

48.

What permission allows you to change permission in the
file or folder and take ownership of

the file or folder?

Change


49.

What is the maximum of simultaneous file
-
sharing
connection in Windows XP?

10

Lab


Browser Configuration

Lab


Network Resource Sharing

15.5


Upgrade the customer’s network

15.5.1


Install and Configure Wireless NIC

50.

What must your computer have to connect to a wireless
network?

Wireless adapter

Lab


Wireless NIC Installation

15.5.2 Install and Configure Wireless Router

51.

Where is the best place for a wireless access point?

At the center of the area
you are

covering, with
line of sight between the
wireless devices and the
access point.

52.

What is the default address for router configuration and
management?

19
2.168.1.1

53.

What is the default password for router configuration and
management?

admin

Lab


Wireless Router Installation

15.5.3 Test Connection

54.

What is the easiest way to test for an Internet
connection?

Open a web browser and
see if the Internet is
available.

55.

What are packets?

The communication
between the computer
and the network
device

56.

What is the difference between a static address and a
dynamic address?

Static address assigns
manually and dynamic
address assign
automatically.

57.

What command line tool is used to verify that the
connection has a valid IP address?

ipconfig

58.

What command line tool is used to test connectivity
between devices?

ping

59.

How do you know if your adapter is working properly?

Test network by using
ping

60.

What command line tool traces the route that packets
take from your computer to a desti
nation address?

Tracert

Lab


Wireless NIC connection test

15.6 Describe installation, configuration and management of a simple mail server

61.

What are the two protocols associated with email?

POP(Post Office
Protocol)

IMAP(Internet Message
Access
Protocol)



62.

What is SMTP?

Simple Mail Transfer
Protocol


sends e
-
mail
client to an e
-
mail
server, or from one e
-
mail server to another

63.

What port does SMTP use?

25

64.

What port does POP use?

110

65.

What port does IMAP use?

143

66.

What are
the characteristics of SMTP?



Simple, text
-
based protocol



Sent over TCP
using port 25



Must be
implemented to
send e
-
mail



Message is sent
after recipients
are identified are
verified

67.

What is an e
-
mail server?

A computer that can
send and receive e
-
mail
on behalf of e
-
mail
clients.

68.

What is an active directory server?

A computer that hosts a
database that allows
centralized
administration over an
enterprise network

69.

What is native mode?

Exchange must be
installed on a domain
where every computer
runs at least Windows
2000.

70.

What should you do before installing Exchange?

Test the environment

71.

What is IIS (Internet Information Services)?

A server that has
programs used for
building and
administering website
services

15.7 Describe preventive

maintenance procedures for networks

72.

What type of preventive maintenance should you do?

Develop a plan to
perform scheduled
maintenance and
cleaning at regular
intervals

15.8 Troubleshoot the network

73..

What is the first step to troubleshooting a

network
problem?

Identify the problem

74.

What are the six steps in the troubleshooting process?



Identify the
Problem



Establish a theory
of Probable
Causes



Determine an
Exact Cause



Implement a
Solution



Verify Solution
and Full System
Functionality



Document
findings

15.8.1


Review the Troubleshooting process

75.

What are the obvious issues you should verify?

Solution and full system
functionality.

76.

What steps are required to close with the customer?

Document Findings

15.8.2 Identify common
problems and solutions

77.

If you are experiencing an unreliable network printer,
what is a possible solution?

Check your router,
restart the router and
reconfigure the router.



78.

What is one possible solution if your network has
become slow as more u
sers are added

all users connect
to a 24
-
port hub?

Increase the maximum
number of simultaneous
FTP users on the FTP
server.



15.8.3 Apply troubleshooting skills

Lab


Network Problems

Lab


Remote Technician Network Problems