Computer Science 604 Study Guide (Print...

Post on 11-Aug-2020

2 views 0 download

transcript

Computer Science 604 Study Guide

Enterprise Wide Computer Networks

Credits and Copyright• -Introduction• - Introduction to the Study GuideUnit 1 - Introduction and Review: Network Concepts and Standards•

Section 2 - Introduction to Computer Networking♦ Section 1 - Introduction to the Course♦ Section 3 - Networking Standards and Reference Models♦

Unit 2 - Networking Fundamentals: Transmission Basics, Media, and Hardware• Section 1 - Transmission Basics and Networking Media♦ Section 2 - Networking Hardware♦

Unit 3 - Networking Protocols, Topologies, and Access Methods• Section 1 - Computer Network Protocols♦ Section 2 - Physical and Logical Topologies, and Access Methods♦

Unit 4 - WANs, Internet Access and Remote Connectivities• Section 1 - WAN Topologies♦

Unit 5 - Enterprise Networking with Windows 2003• Section 1 - Network Operating Systems♦ Section 2 - Networking with Windows Server 2003♦

Unit 6 - Enterprise Networking with Unix-Type of Operating Systems• Section 1 - Networking with Unix-type of Operating Systems♦

Unit 7 - NetWare-based Enterprise Computer Networking• Section 1 - NetWare Based Enterprise Networking♦

Unit 8 - Internetworking with TCP/IP for Enterprise Applications• Section 1 - Networking with TCP/IP: Internet, Intranet and Extranet♦

Unit 9 - Enterprise Network implementation and Management• Section 1 - Troubleshooting Network Problems♦ Section 2 - Maintaining and Upgrading Computer Networks♦

Unit 10 - Enterprise Network Security: Issues, Concepts, and Techniques• Section 1 - Introduction to Network Security♦ Section 2 - Ensuring Network Integrity and Availability♦

Computer Science 604 Study Guide (Print Version)

Computer Science 604 Study Guide 1

Credits and Copyright:

Back to topCommentary

CopyrightCorrespondence can be directed to:

Copyright OfficeAthabasca University1 University DriveAthabasca AB T9S 3A3website: http://emd.athabascau.ca/service_copyright.htmemail: mailto:copyright@athabascau.ca

When linking to a specific page on this site (deep-linking), please also link to the main site athttp://www.athabascau.ca.

The course materials posted to this site are the exclusive property of Athabasca University. Users may loadthis content into their client browser programs for temporary individual viewing in the normal process of webuse. Otherwise, no material contained in these files may be downloaded, copied, adapted, printed, transferred,reproduced, or distributed by any means without the written consent of the copyright holder.

In providing hypertext links to students, Athabasca University has not authorized any use of these materialsthat, if undertaken without permission of the copyright owners or their assignees, may constitute infringementof copyright. Permission for use of materials can only be granted by copyright owners or their assignees.

Students registered in Athabasca University courses are expected to use sound judgment and discretion invisiting websites for research purposes associated with their coursework. Athabasca University will not beheld responsible for the continuing availability of recommended sites, the content of sites found, or theconsequences of visiting those sites.

Every effort has been taken to ensure that these materials comply with the requirements of copyrightclearances and appropriate credits. Athabasca University will attempt to incorporate in future reproductionsany corrections that are communicated to it.

The inclusion of any material in this publication is strictly in accord with the consents obtained andAthabasca University does not authorize or license any further reproduction or use without the consent of thecopyright holder.

Course development assistance provided by the Centre for Learning Design and Development department ofAthabasca University.

© Athabasca University 2011. All rights reserved.

Computer Science 604 Study Guide (Print Version)

Copyright 2

Introduction: Introduction to the Study Guide

Back to topCommentary

COMP 604 will cover essential telecommunication and networking technologies, with a focus on practicalnetwork design, implementation and management in the real enterprise world. Students will be exposed tonetwork media, network architectures, network protocols, network standards, as well as network componentsincluding hubs, switches, routers, NICs and cables available in the present market. Students will learntechniques to design and implement enterprise wide computer networks with Windows 2003, Unix-typeoperating systems and NetWare. Students will also learn about network management and networkapplications for enterprise. After completing this course, a student should be able to explain importantterminologies and concepts of telecommunication and computer networks, design computer networks to meetthe specific needs of given enterprise, support network applications, implement enterprise wide computernetworks with appropriate hardware and software components, and manage enterprise wide computernetworks for good performance and security.

To be a successful in taking the course, you must expect to invest considerable time in performing therequired tasks. Relying too much on help and advice from others with the assignments and the projects mayleave you inadequately prepared for the final exam.br />The Study Guide

The Study Guide is an important part of the course. It is designed to guide you through the learning process,though you may choose to adapt the approach presented according to your own learning style.

The Study Guide consists of a contents page containing links to the ten units which comprise the course. Foreach unit, there are statements of purpose, plus varying numbers of sections, unit summaries and terminologylists. For each section within a given unit there are learning objectives, descriptions of tasks to complete instudying that section, and questions designed to lead you through the process of reading the designatedcourse materials. These leading questions set the goals for your reading, and should therefor be reviewedbefore doing the readings. You may wish to collect these into a unit notes document for later review andreference.

There are also hands-on projects and case projects for each section. If you have, or are willing to purchaseadditional networking devices and tools, you are encouraged to apply some of the practical exercises withthose resources as well. It is recommended that as many as possible of the case studies be done, either asexercises, in your assignments, or in the final exam.

Review questions, when provided, are required exercises.

Equipment and Tools Needed for this Course

To perform the learning activities in the course, you need a PC compatible computer with a Pentium 3 CPUor above, at least 256MB RAM, at least 8GB HD with Windows XP or 2000 installed. Your must also havean appropriate Internet connection. Cable or ADSL is recommended.br />Teaching and learning practical computer networking is better done with appropriate experiments in labs.Because you may not have access to suitable facilities for this, it is recommended that you purchase orborrow the following equipment to set up a basic lab for yourself.

Computer Science 604 Study Guide (Print Version)

Introduction: Introduction to the Study Guide 3

A second computer, which can an older Pentium, to network to your main computer. If you haveWindows installed on the additional unit, you can use it as a client, or you can make it a server byinstalling Linux.

A simple hub.• If you already have a router, it will be useful, but is not necessary.• Several feet of CAT5 UTP cable.• Wiring tools, especially a crimper, which is essential for making your own network cables. Wirecutters and strippers are optional, as you can also cut and strip wire with household tools such asscissors and box knives.

Proceed to the studyguide.

Computer Science 604 Study Guide (Print Version)

Commentary 4

Unit 1: Introduction and Review: Network Concepts and Standards

Back to topCommentary

Unit Purpose and Notes: The purpose of this unit is to introduce you to the fundamentals of computernetworking. In this unit you will become familiarized with the structure of the course. You will learn how thecourse study guide is organised and how to set up your computer(s) for the course. This unit is based onChapters 1 and 2 of Network + Guide to Networks, fourth edition, by Tamara Dean (thereafter referred to as'TD textbook').

Section 1

Section 2

Section 3

Summary

Unit Summary

Read the chapter summary on pages 21-23, and 60-62 of the TD textbook.

Review Questions

Review the questions on pages 27-30, and 67-70 of the TD textbook. Check the course conference for sampleanswers posted by other students, and for tutor commentary on those answers.

Terminology

Review the key terms on pages 23-27, and 62-66 of the TD textook.

Computer Science 604 Study Guide (Print Version)

Unit 1: Introduction and Review: Network Concepts and Standards 5

Unit 1 - Section 2 : Introduction to Computer Networking

Back to Unit 1Commentary

Section Goal: Provide an overview of computer networking basics.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to describe the fundamental concepts of computernetworks, the advantages and uses of computer networks, and identify the basic elements of computernetworks.

Objective Tasks

Read Chapter 1 of TD textbook.• Go over the review questions.• Complete the case project 1-1.•

Objective Leading Questions

What is a computer network?• What are network resources?• What is sneakernet?• What are local computers and remote computers?• What is a peer-to-peer network?• What are the advantages and disadvantages of peer-to-peer network?• What is a local area network (LAN)?• What are server-based networks?• What are servers in a server-based computer network?• What are clients in a server-based computer network?• What are workstations in a server-based computer network?• What is a network operating system (NOS)?• What is the client-server architecture?• What is a metropolitan area network (MAN)?• What is a wide area network (WAN)?• What is the Internet?• Is the Internet a WAN?• What elements are common to all server-based computer networks?• What is network interface card (NIC)?• What are hosts?• What is a node in computer networks?• What is a network topology?• What are network protocols?•

Computer Science 604 Study Guide (Print Version)

Summary 6

What are data packets?• What is addressing in computer networks?• What is transmission media?• What services do computer networks commonly provide?• What is a gateway in computer networks?•

Objective Activities

Activity

Make a plan for your first assignment.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 7

Unit 1 - Section 1 : Introduction to the Course

Back to Unit 1Commentary

Section Goal: In this section you will receive an introduction to the course, its structure, and requirements.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to discuss the scope of the course, explain how thestudy guide is organized, and describe the computer system required to perform the learning tasks set out inthe course.

Objective Tasks

If you do not already have one, establish an Internet connection for your computer. Make a note ofthe particulars of your connection, including any information available regarding the type, speed orother details pertaining to your connection.

if applicable, include in your notes whatever details you may have available regarding the currentconfiguration of your computer and network.

As a computing professional, you may, from time to time, be seeking a position or recruiting otherprofessionals for your organization. In this activity, check at least ten different sources of IT jobadvertisements, including newspapers, online job posting services and homepages of majoremployers. Write a brief report on your findings, listing general job categorizations, qualificationsfor each type of IT position described, salary ranges, and any other statistics available. The purposeof this exercise is to provide an overview of the current employment market and practices in theindustry.

Objective Leading Questions

What are the learning objectives of this course?• How many units does this course have?• How is the study guide organized?• How are the leading questions to be used?• How are the hands-on projects and the case studies used?• When should the review questions be done?• What computer(s), networking devices and tools are required to complete the course?•

Computer Science 604 Study Guide (Print Version)

Activity 8

Unit 1 - Section 3 : Networking Standards and Reference Models

Back to Unit 1Commentary

Section Goal: Recognize standard organization's responsibility for what network-related standards as well aswhat standards are for what, and understand some important networking reference models?

Learning Objectives

Learning Objective 1

After completing this section, students should be able to recognize standard organizations responsibility forwhat network-related standards are and what standards are for, and to understand important networkingreference models?

Objective Tasks

Read Chapter 2 of the TD textbook to find answers to the leading questions.• Go over the review questions.• Complete hands-on project 2-1 and 2-3.•

Objective Leading Questions

What are network standards?1. What organizations are responsible for setting standards for computer networks?2. What are ANSI, EIA, IEEE, ISO and ITU?3. Why do the computer network industry need computer networking standards?4. What is the OSI reference model for computer networks?5. ow many layers does the OSI reference model have?6. Who can be called a network architect?7. v What is the physical layer of the OSI reference model? What are inside the physical layer? Whatdoes it do?

8.

v What is a frame?9. What is the network layer of the OSI reference model? What are inside the network layer? Whatdoes it do?

10.

What do routers do?11. What is segmentation?12. What is reassembly in network layer?13. What is the transport layer of the OSI reference model? What are inside the transport layer? Whatdoes it do?

14.

What is flow-control handled by protocols at transport layer?15. What is sequencing in transport layer?16. What is an acknowledgement sent by transport layer?17. What is the session layer of the OSI reference model? What are inside the session layer? What doesit do?

18.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 9

What is a session in session layer?19. What is a terminal?20. hat is the presentation layer of the OSI reference model? What are inside the presentation layer?What does it do?

21.

What is the application layer of the OSI reference model? What are inside the application layer?What does it do?

22.

What does an application program interface do?23. What is the frame check sequence (FCS), and what does it do?24. How does a piece of information from one computer to another in a network according to the OSIreference model?

25.

What components does a typical Ethernet frame include, and how are they organized?26. What components does a typical token ring frame include, and how are they organized?27. How are network nodes addressed at data link layer?28. How are network nodes addressed at network layer?29. What is MAC address?30. What is block ID in a MAC address?31. What is device ID in a MAC address?32. What IEEE 802 standards are for computer networking?33. According to IEEE standards, what sublayers does the data link layer include?34.

Objective Activities

Activity

Think about part 1 of your first assignment. Do you know how to write web pages in HTML? If not, youmay want to spend some extra time on HTML and other Web technologies.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 10

Unit 2: Networking Fundamentals: Transmission Basics, Media, and Hardware

Back to topCommentary

Unit Purpose and Notes: This unit examines the fundamentals of data communication, including the basicsof data transmission,networking media, and networking hardware. This unit is based on Chapters 3 and 5 ofthe TD textbook.

Section 1

Section 2

Tasks

Study the unit according to the guide given in each section listed above.1. Complete and submit your first assignment by following the instructions given in the assignmentmanual.

2.

Activities

Assignment

Complete and Submit TME 1.

Summary

Unit Summary

Read the chapter summaries for Chapters 3 and 5 of the TD textbook.

Review Questions

Review questions in Chpaters 3 and 5 of the TD textbook. Check the course conference for sample answersposted by other students, and for tutor commentary on those answers.

Terminology

Review key terms in Chapters 3 and 5 of the TD textbook.

Computer Science 604 Study Guide (Print Version)

Activity 11

Unit 2 - Section 1 : Transmission Basics and Networking Media

Back to Unit 2Commentary

Section Goal: To provide an overview of networking media, data transmition, networking media, dataencoding and modes of data transmission.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to describe the various classes of networking media,and how data is transmitted in each; understand how data are encoded for transmission; be able to list anddescribe the features of networking media and modes of data transmission.

Objective Tasks

Study Chapter 3 of the TD textbook.1. Complete Case projects 3-1, 3-2 and 3-3.2. Complete hands-on project 3-1.3. Complete the review questions and check your answers with your peers.4.

Objective Leading Questions

At which layer of the OSI reference model does networking media reside?1. What does the term transmission mean in data networking?2. What are analog signals?3. What are digital signals?4. What is overhead in computer networking?5. What is modulation?6. What is frequency modulation (FM)?7. What is amplitude modulation (AM)?8. What are simplex, duplex and half-duplex transmission?9. What is a communication channel?10. What is multiplexing?11. What does a multiplexer (MUX) do?12. What does a demultiplexer do?13. How does time division multiplexing (TDM) work?14. How does statistical multiplexing work?15. How does wavelength division multiplexing (WDM) work?16. What does a fiber-optic modem do?17. What is a point-to-point transmission?18.

Computer Science 604 Study Guide (Print Version)

Summary 12

What is broadcasting transmission?19. What is Webcasting?20. What is throughput?21. What is bandwidth?22. What is baseband? How is data represented in a baseband communication channel?23. What is broadband? How is data represented in a broadband communication channel?24. What is electromagnetic interference (EMI)?25. What is radio frequency interference (RFI)?26. What is attenuation?27. What does a repeater do in data communication?28. What is the most significant factor you have to consider when choosing a transmission media?29. What cost factors do you need to consider when choosing a transmission media?30. What is latency?31. What are some general means to protect transmission media from noises?32. What is the structure of coaxial cables?33. What are some common types of coaxial cables?34. What are the main properties of thickwire Ethernet?35. What are transceivers, MAU, drop cable and AUI in thicknet?36. What are the main properties of thinnet, or thin Ethernet?37. What kinds of connectors are used in thinnet?38. What is a twisted-pair cable? Why are the wires twisted?39. What is crosstalk?40. What are the differences between UTP and STU?41. How are UTP cables categorized?42. How are wires in a UTP cable colored?43. How are computer networks specified in the 10BaseT Ethernet networking standard?44. What is an enterprise-wide network?45. How are computer networks specified in the 100BaseT Ethernet networking standard?46. How are computer networks specified in the 100BaseTX Ethernet networking standard?47. How are computer networks specified in the 100BaseT4 Ethernet networking standard?48. How are computer networks specified in the 100BaseVG Ethernet networking standard? What doesthe VG stand for?

49.

What is the general structure of a fiber-optic cable?50. What is a single-mode fiber?51. What is a multimode fiber?52. What are the main features of fiber-optic cable?53. How are computer networks specified in the 10BaseF Ethernet networking standard?54. How are computer networks specified in the 10BaseFX Ethernet networking standard?55. How should network cables be installed in a commercial building according to TIA/EIA structuredcabling standard?

56.

What are punch-down blocks, patch panels and patch cables in network cabling?57. What wires of UTP are used for transmitting data in thinknet, and what wires are used to receivedata?

58.

What is a straight-through cable according to TIA/EIA?59. What is a crossover cable?60. What are atmospheric transmission media?61. What is infrared transmission?62. What is the throughput of infrared transmission, and what is the maximum distance?63. What is RF transmission?64. What is narrowband RF transmission?65.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 13

What is spread spectrum RF transmission?66. How do you choose the right transmission media for your network?67.

Activities

Hands-On Projects

Do Project 4-1. Do other projects if you have the required hardware.

Computer Science 604 Study Guide (Print Version)

Activities 14

Unit 2 - Section 2 : Networking Hardware

Back to Unit 2Commentary

Section Goal: Provide an overview of networking hardware and its various roles in the implementation ofenterprise wide computer networks.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to describe a variety of networking hardwarecomponents their uses in implementing enterprise wide computer networks.

Objective Tasks

Read Chapter 5 of the the TD textbook.• Complete case project 5-1.• Complete hands-on project 5-4.• Complete the review questions and check your answers with your peers.•

Objective Leading Questions

What network devices are commonly used on computer networks?1. What are network adapters? Which layers of OSI reference model do NICs belong to?2. What may a new network adapter be able to do?3. What are some main features of network interface cards that can be used to differentiate one fromanother?

4.

What are some main types of NICs?5. What is an expansion board?6. Where do you connect a NIC on a computer?7. What are some common bus architectures you may deal with when installing and configuringcomputer networks?

8.

What are the differences between ISA, EISA and PCI architectures?9. In addition to PC buses, what other interfaces may network adapters be connected to, such as on alaptop computer?

10.

What computer devices can a PCMCIA slot accommodate?11. What are the advantages and disadvantages of using a USB network adapter?12. What are the advantages and disadvantages of using wireless network adapter?13. Which manufactures make network interface cards?14. What are the general procedures/steps to install a modern network adapter?15. What is firmware?16. Why is it important to use a Phillips-head screwdriver when installing an expansion card networkadapter on a computer?

17.

Computer Science 604 Study Guide (Print Version)

Hands-On Projects 15

What is a device driver?18. How do you install and configure NIC software on your computer?19. How are IRQ numbers assigned to different devices on PC computers by default? What IRQnumbers may not be used by a NIC?

20.

What system resources you may need to set or adjust for a NIC?21. How do you view IRQ settings on your computer?22. How do set or change IRQ number and memory range for a NIC?23. What does the base I/O port setting specify?24. What are some popular memory addresses for network adapters' base I/O ports?25. How do you change firmware setting on a NIC?26. What is a loopback plug? When is it needed?27. What are the main characteristics of network adapters?28. What are the main features of repeaters? What are the limitations of repeaters?29. In what layer of the OSI model do repeaters operate?30. If you need to connect a computer to jack 550 metres away, how many repeaters do you need?31. What are the differences between repeater and hub?32. How do you use the uplink port on a hub?33. Compared to passive hubs, what function(s) can an intelligent hub perform?34. What are standalone hubs?35. What are stackable hubs, modular hubs and managed hubs?36. How do you connect a hub to a existing network or another hub?37. How do you connect a computer to a hub?38. How do you choose the right hub for your needs?39. What are bridges?40. What are the differences between bridges and repeaters?41. At what layer of the OSI reference model do bridges operate?42. What functions does a bridge usually perform?43. What functions does a bridge not perform?44. What advantages do bridges have by being protocol-ignorant?45. What methods may a bridge use to filter or forward packets?46. What is transparent bridging?47. What are the details of the spanning tree algorithm used in network bridges and routers?48. What is source-route bridging?49. What is translational bridging?50. What are network switches?51. What are the differences between switches and bridges?52. Compared to hubs, what advantages do switches have?53. What disadvantages do switches have?54. What are the differences between cut-through mode and store-and-forward mode of switches?55. What are VLANS? How do you use switches to create a virtual LAN?56. What are higher layer switches?57. What is a router?58. At what layer of the OSI model do routers operate?59. What are the main features and functions of routers?60. What protocols are not routable? What does the term routable mean in the context of protocols?61. What is a modular router?62. What are the differences between static routing and dynamic routing?63. What routing protocols may a router use?64. What are the details of the RIP, OSPF, EIGRP, and BGP protocols?65. What are the differences between brouters and routing switches?66.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 16

What are gateways?67. Where may a gateway reside?68. What are some popular types of gateways?69.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 17

Unit 3: Networking Protocols, Topologies, and Access Methods

Back to topCommentary

Unit Purpose and Notes: This unit examines the network protocols and popular topologies you need toknow and use in implementing enterprise networks. This unit is based on Chapters 4 and 6 of the TDtextbook.

Section 1

Section 2

Summary

Unit Summary

Read the chapter summaries on pages 200-202, and 321-323 of the TD textbook.

Review Questions

Review questions on pages 209-213, and 328-333 of the TD textbook.

Terminology

Review the key terms on pages 203-209, and 323-328 of the TD textbook.

Computer Science 604 Study Guide (Print Version)

Unit 3: Networking Protocols, Topologies, and Access Methods 18

Unit 3 - Section 1 : Computer Network Protocols

Back to Unit 3Commentary

Section Goal: Provide an overview of network protocols and their various roles.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to describe some widely-used network protocols andhow they work, and identify the network layer used in each.

Objective Tasks

Read Chapter 4 of the TD textbook.• Complete case project 4-1.• Complete hands-on projects 4-1 and 4-3.• Complete the review questions and check your answers with your peers.•

Objective Leading Questions

What is a protocol?1. What are some commonly used protocols?2. What are routable protocols?3. What is a multiprotocol network?4. What is TCP/IP? Is it a single protocol?5. What are subprotocols?6. What layers are in the TCP/IP reference model? What does each layer do?7. What subprotocols of the TCP/IP suites are TCP/IP core protocols?8. What is the Internet Protocol (IP)? What layer does it belong to?9. What is a data frame? What is an IP datagram? What is a TCP segment? What are the relationshipsbetween them?

10.

What is the structure of an IP datagram? What is each of the components used for?11. Why is IP an unreliable, connectionless protocol?12. What layer does the Transmission Control Protocol (TCP) belong to? What is TCP responsible for?13. What is the structure of a TCP segment? What is each of the components for?14. Why is TCP called a connection-oriented protocol?15. What are the differences between the OSI reference model and the TCP/IP network referencemodel?

16.

What protocols are in the core of the TCP/IP protocol suite?17. What does the Transmission Control Protocol (TCP) do at transport layer?18. What is a port?19.

Computer Science 604 Study Guide (Print Version)

Summary 19

What are the differences between TCP and UDP protocols? Why is TCP said to be aconnection-oriented protocol, whereas UDP is described as a connectionless protocol?

20.

What does the Internet Control Message Protocol (ICMP) do?21. What does the Address Resolution Protocol do?22. What are some commonly used application protocols in the TCP/IP protocol suite?23. How are network nodes addressed in TCP/IP?24. What is TCP/IP class A address? How many network nodes can be addressed in TCP class A?25. What are TCP/IP class B addresses? How many network nodes can be addressed in TCP class B?26. What are TCP/IP class C addresses? How many network nodes can be addressed in TCP class C?27. What is a loopback address?28. If one needs a class of IP addresses, where should the request be sent?29. What is a firewall? How can it be used allow computers within a private computer network to accessthe Internet?

30.

What is a static/dynamic IP address?31. What is DHCP?32. What is the IPX/SPX protocol?33. What are the relationships between the OSI reference model and IPX/SPX?34. What does the IPX protocol do, and at which layer?35. What does SPX protocol do, and at which layer?36. What is the structure of an IPX datagram?37. What is the structure an SPX packet?38. What is the SAP protocol? What does it do?39. What is the NCP protocol? What does it do?40. How are network nodes addressed in IPX/SPX?41. What is NetBIOS? What does it do and at which layer?42. What is NetBEUI? What does it do and at which layer?43. Why is NetBIOS non-routable?44. How are network nodes addressed in NetBIOS?45. What is the AppleTalk protocol suite?46. What protocols are in the AppleTalk protocol suite?47. What are the relationships between AppleTalk and the OSI reference model?48. What are AppleTalk zones?49. How are network nodes addressed in the AppleTalk?50. What is binding in computer networks?51. How do you install network protocols on a Windows machine?52. What protocols do you need to install in order to access to the Internet?53.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 20

Unit 3 - Section 2 : Physical and Logical Topologies, and Access Methods

Back to Unit 3Commentary

Section Goal: Provide an overview of LAN topologies and the methods used to access a computer network.

Learning Objectives

Learning Objective 1

After completing this section, students should be able:

to describe various LAN topologies and their uses, and the advantages and disadvantages of each;• to define switching, describe circuit switching, message switching and packet switching work, andexamine their differences;

and to understand how various access methods work.•

Objective Tasks

Read Chapter 6 of the TD textbook.• Complete case projects 6-1 and 6-2.• Complete hands-on project 6-2.• Complete the review questions and check your answers with your peers.•

Objective Leading Questions

What is the physical topology of a computer network?1. What physical topologies are commonly used?2. What are the main features of a bus topology?3. What are the main components of a bus topology?4. What are the main features of a ring topology?5. What are the main components of a ring topology?6. What are the main features of a star topology?7. What are the main components of a star topology?8. What is a hybrid physical topology?9. What is a star-wired ring topology? What main features does it have?10. What is a star-wired bus topology? What main features does it have?11. What are daisy chain and daisy chained topology? Why is a daisy chain needed?12. What are the main features of a daisy-chained topology?13. What is a hierarchical topology? What are its' main features?14. What does an enterprise-wide computer network topology require?15. What are backbone networks?16. What is a serial backbone? What are its main features?17.

Computer Science 604 Study Guide (Print Version)

Unit 3 - Section 2 : Physical and Logical Topologies, and Access Methods 21

What is a distributed backbone? What are its main features?18. What is a collapsed backbone? What are its main features?19. What are the differences between a distributed backbone and a collapsed backbone?20. What is a parallel backbone? What are its main features?21. What is a mesh network? What are the main features of a mesh network?22. What is a logical topology?23. On what layers of OSI network reference model would the logical topology's elements be found?24. What are the most popular traditional network transport systems?25. What is switching in the context of computer networking?26. What is circuit switching?27. # How does circuit switching work?28. What are the advantages and disadvantages of circuit switching?29. What is message switching?30. How does message switching work?31. What are the advantages and disadvantages of message switching?32. What is packet switching?33. How does packet switching work?34. What are the advantages and disadvantages of packet switching?35. What are packets?36. What is Ethernet's access method?37. How does CSMA/CD work?38. What does CSMA/CD stand for?39. What is a collision in data transmission on Ethernet? How does it happen? How is it resolved?40. What is a jamming in data transmission on Ethernet? How does it happen? How is it resolved?41. What is a collision domain on an Ethernet network?42. What is data propagation delay? How long does it take for data travel across a 900M cable at1.8*10^8 M per second?

43.

Why is an appropriate propagation delay important for Ethernet?44. Why do different Ethernet network standards support different lengths of network segments?45. What is the demand priority access method used by 100BaseVG?46. What network topology does a demand priority network run on?47. Why do data collisions not happen on demand priority network?48. What is an intelligent hub? Where is it needed?49. What is a shared Ethernet?50. What are the differences between shared and switched Ethernet networks in terms of bothadvantages and disadvantages?

51.

How does switched Ethernet increase the effective bandwidth of a network segment?52. What are the main features of 1 Gigabit and 10 Gigabit Ethernet?53. What are some commonly used Ethernet data frames?54. What are the differences between different Ethernet data frames?55. How can you specify the type of frame used on a given Ethernet network?56. On which layer of OSI reference model does data framing occur?57. Why may a single data frame carry any one of many higher-layer protocols?58. What data are common among all types of Ethernet frames?59. What is padding in data framing? What is padding necessary?60. What are minimum and maximum Ethernet frame size respectively?61. Why does each Ethernet frame contain a 7-byte preamble?62. What data is behind a 7-byte preamble in an Ethernet frame?63. Which IEEE committee is in charge of all Ethernet network standards?64.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 22

What is the default frame type for version 4.x or higher of the Novell NetWare network operatingsystems?

65.

Why is IEEE 802.3 frame also called LLC frame? How is it called in the Novell lexicon?66. What is the structure of an IEEE 802.3 frame?67. What information is contained in the LLC field of an IEEE 802.3 frame?68. What is a service access point?69. What does the frame check sequence (FCS) do?70. What mathematical algorithm is used to generate an FCS?71. What is the difference between IEEE 802.3 frame and the Novell proprietary 802.3 fame?72. What are the differences between Ethernet II frame and IEEE 802.3 frame?73. How does an Ethernet II frame identify the upper layer protocol contained in the frame?74. Where did IEEE 802.3 SNAP frame come from?75. Why is a good knowledge of frame types important in learning about computer networking?76. How can multiple frame types be used on a network?77. What are the main design considerations for Ethernet networks?78. Which company designed LocalTalk?79. What are the main features of LocalTalk?80. What transmission method does LocalTalk use?81. How do you connect a Macintosh device to a LocalTalk network?82. What higher-level protocols does LocalTalk support?83. How does LocalTalk support TCP/IP?84. Which company developed Token Ring technology?85. What are the main features of Token Ring networks?86. What are the main features of High Speed Token Ring?87. How do Token Ring networks work?88. What does the active monitor in a Token Ring network do?89. What is a token? How is a token passed around a Token Ring network?90. Which IEEE standard describes the specification of Token Ring?91. How many addressable stations can be connected to a Token Ring network?92. How is an addressable station connected to a Token Ring network?93. What is a MAU? What does it do?94. What is a CAU? What does it do?95. What is a LAM? What does it do?96. What cables and connectors are used for Token Ring networks?97. What is a media filter? What is its job?98. How can a Token Ring network benefit from network switching?99. What is the format of an IBM Token Ring frame?100. What are the main considerations for Token Ring networks?101. What is FDDI? What are the advantages and disadvantages of FDDI technology?102. What are the main features of FDDI?103. What is ATM (Asynchronous Transfer Mode)?104. What does ATM specify? What makes ATM different from Ethernet and Token Ring?105. How does ATM benefit from its fixed packet size?106. How does a small packet size in ATM affect the potential throughput of ATM?107. What are virtual circuits?108. How does ATM benefit from using virtual circuits?109. How can ATM logical topology be integrated with Ethernet or Token Ring networks?110.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 23

Unit 4: WANs, Internet Access and Remote Connectivities

Back to topCommentary

Unit Purpose and Notes: This unit discusses networking technologies used in the implementation of widearea networks for enterprise applications, and technologies for establishing Internet access and remoteconnectivity. This unit is based on Chapter 7 of the TD textbook.

Section 1

Activities

Assignment

Complete and Sumbit TME 2.

Summary

Unit Summary

Read the chapter summary on pages 390-394of the TD textbook.

Review Questions

Review the questions on pages 402-407 of the TD textbook.

Terminology

Review the key terms on pages 394-402 of the TD textbook.

Computer Science 604 Study Guide (Print Version)

Unit 4: WANs, Internet Access and Remote Connectivities 24

Unit 4 - Section 1 : WAN Topologies

Back to Unit 4Commentary

Section Goal: Provide an overview of WAN topologies.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to describe a variety of enterprise-wide and WANphysical topologies, their uses, advantages, and disadvantages.

Objective Tasks

Read the WAN Topologies section in Chapter 7 of the TD textbook to find answers to the leadingquestions.

Complete hands-on project 7-3.• Complete case project 7-1.•

Objective Leading Questions

What is a wide area network?1. How do WAN topologies differ from LAN topologies?2. What network devices are critical in building WANs?3. What kind of network traffic cannot be carried by a WAN link?4. What is a peer-to-peer WAN topology?5. Where is the peer-to-peer WAN topology often used?6. What are the advantages and disadvantages of dedicated circuits for WANs?7. What is a ring WAN topology?8. What are the advantages and disadvantages of a ring WAN compared with a peer-to-peer WAN?9. What is a star WAN topology?10. What are the advantages and disadvantages of a star WAN compared to other WAN topologies?11. What is a mesh WAN topology?12. What are the advantages and disadvantages of a mesh WAN compared to other WAN topologies?13. What is a tiered WAN topology?14. What are the advantages and disadvantages of a tiered WAN compared to other WAN topologies?15. What is a WAN link?16. What are the differences and similarities between WANs and LANs?17. When might an organization need a WAN?18. What is PSTN?19. How do you access a remote server via PSTN network?20. What are the advantages and disadvantages of PSTN?21. Why is the throughput of a PSTN connection limited?22. What was the X.25 technology originally designed for?23.

Computer Science 604 Study Guide (Print Version)

Summary 25

What is the maximum throughput of X.25?24. How does an X.25 connection work?25. What is the relationship between X.25 and Frame Relay technology?26. What is maximum throughput of frame relay technology?27. How does a frame relay connection work?28. What are switched virtual circuits and permanent switched circuits?29. What is the committed information rate (CIR)?30. What are the advantages and disadvantages of using frame relay?31. What services was integrated service digital network (ISDN) designed to provide?32. What are the differences between ISDN and PSTN?33. What channels are all ISDN connections based on?34. What are the bandwidth of B-channels and D-channels?35. What kinds of ISDN connections are commonly found in North America?36. What channels does the BRI ISDN connection have?37. What channels does a PRI ISDN connection have?38. What are the main features of B-ISDN?39. How does an ISDN line connect to an analogue device?40. How do ISDN lines usually terminate at customers' sites?41. What are the advantages and disadvantages of using ISDN connections?42. What are T-carriers?43. What multiplexing technology does T-carrier transmission use?44. What are the main features of a T1 circuit?45. What networking devices are needed to set up a T1 WAN connection? How?46. What is DSL? What are the main features of ADSL, HDSL and VDSL?47. What network devices are needed for setting up an ADSL connection?48. What does a DSLAM do?49. How are coaxial cables used for data network? What devices are needed? How does it work?50. Why do traditional cable TV companies have to upgrade their cables in order to provide Internetservices through their cable?

51.

What is HFC?52. What are cable-drop and head-end?53. What disadvantages may a cable-based Internet connection have compared to ADSL?54. What was SONET technology originally developed for?55. What makes SONET different from T-carriers?56. How does SONET work?57. What major factors do you need to consider when choosing a WAN?58. What WAN technologies are available?59. What are the major features of each WAN technology?60. Which WAN technology offers the highest transmission speed?61. Which is the least expensive WAN technology?62. Which is the most reliable WAN technology?63. What WAN technology is most popular in the market?64. Which WAN technology would you choose for individual or unimportant transmissions?65. Which WAN technology would you choose for mission-critical applications?66. How do you secure your WAN?67. What are the major security threats to WANs? How do you deal with these threats?68. What are VPNs?69. What are the advantages of using VPN to implement a WAN?70. How security and privacy issues are addressed in VPN?71. What does remote connectivity mean? How is it different from WAN?72.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 26

In what situation is remote access to a LAN needed?73. What methods can use to implement remote access?74. How can you access a LAN through the Internet by using a Web browser?75. What is dial-up networking?76. How do you create a new dial-up connection in Windows 2000/XP?77. What does Windows 2003 Server offer for remote access?78. What other companies offer similar remote access technologies?79. What are the SLIP and PPP protocol?80. What are the differences between the two?81. Why is PPP much more popular than SLIP?82.

Objective Activities

Other Activity

Read the course conference for relevant postings.

Computer Science 604 Study Guide (Print Version)

Objective Activities 27

Unit 5: Enterprise Networking with Windows 2003

Back to topCommentary

Unit Purpose and Notes: This unit introduces network operating systems, with a focus on buildingenterprise networks with Windows operating systems, Windows 2003 in particular. This unit is based onChapter 8 of the TD textbook.

Section 1

Section 2

Summary

Unit Summary

Read the chapter summary on pages 417-419 of the TD textbook.

Review Questions

Review questions on pages 472-477 of the TD textbook.

Terminology

Review the key terms on pages 466-472 of the TD textbook.

Computer Science 604 Study Guide (Print Version)

Other Activity 28

Unit 5 - Section 1 : Network Operating Systems

Back to Unit 5Commentary

Section Goal: Provide an overview of the role and components of network operating systems.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to discuss the functions and features of a networkoperating system.

Objective Tasks

Study Network Operating Systems, and Network Operating System Services and Features on pages 415-435of the TD textbook.

Objective Leading Questions

What are the major functions of network operating systems?1. What layer of the OSI model do those functions belong to?2. What are some commonly used network operating systems?3. How do you choose a network operating system to meet specific needs? What major factors shouldbe considered?

4.

How do you choose hardware for servers on which network operating systems will be running?5. What services are commonly provided by network operating systems?6. What does client support include?7. What communication may be involved between a client and a server?8. How does a client log onto a server?9. What is a 3-tier architecture?10. What is a thin client?11. How are users and their rights managed by network operating systems?12. What are users and user groups?13. What are directories?14. What file systems are used by some common network operating systems?15. What are the main features of the FAT, FAT16, FAT32 and HPFS file systems?16. What are the significant advantages of the client/server architecture?17. Where are shared applications commonly installed?18. How do network operating systems support printer sharing?19. What are network system resources? How do network operating systems manage system resources?20.

Computer Science 604 Study Guide (Print Version)

Summary 29

Objective Activities

Other Activity

Check Microsoft Website about their newest NOS, and compare with Server 2003.

Computer Science 604 Study Guide (Print Version)

Objective Activities 30

Unit 5 - Section 2 : Networking with Windows Server 2003

Back to Unit 5Commentary

Section Goal: Illustrate the implementation of a Windows 2003 based network.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to describe the main functions and features ofWindows 2000 server, as well as the use of Windows 2000 to implement enterprise computer networks.

Objective Tasks

<>ul>

Study Windows 2003 Server on pages 435-464 of the TD textbook.• Read articles about 2003 Server and their latest NOS, on Microsoft Website• Do case projects 8-1, 8-2 and 8-3.• If possible, complete hands-on project 8-1, 8-2 and 8-4.• Complete the review questions and check your answers with your peers.•

Objective Leading Questions

What is the relationship between Windows 2003 Server and Windows 200 Server?1. What are the benefits of the Windows 2003 Server network operating system?2. What is clustering?3. Why do people choose Windows 2003 server?4. What hardware does Windows 2003 server require?5. What memory model does Windows 2003 Server use?6. What file system does Windows 2003 Server use?7. What are the main features of the CDFS and NTFS file systems?8. What can be done using Microsoft management console (MMC)?9. How are servers, users, groups, and resources logically and physically related on Windows 2003Server?

10.

What is an active directory?11. What is a schema?12. What are Windows 2003 workgroups?13. What is a domain on a Windows 2003 network?14. How does Windows 2003 server organize domains?15. How does Windows 2003 server manage the relationships between domains?16. What are the naming conventions of Windows 2003 server?17. What different names may each object on a Windows 2003 network have?18. Why is it important to make a good plan before installing a NOS?19.

Computer Science 604 Study Guide (Print Version)

Other Activity 31

What important questions should be answered in preparing for a Windows 2003 server installation?20. What are the differences between per-server and the per seat license modes?21. What is the process of installing a Windows 2003 Server?22. After Windows 2003 Server is installed, what must be done in order to configure the installedserver?

23.

How is a domain user account created on a Windows 2003 Server?24. How is a a group created on a Windows 2003 Server?25. How is the permission for a directory modified?26. For two network operating systems such as Windows 2000 server and NetWare to be fullycompatible, what do they have to do?

27.

What is GSNW?28. What are the advantages of using Microsoft's Gateway Services for NetWare?29. How does Windows 2003 server network operating system deal with interoperability with NetWareand Unix?

30.

What does the directory Services Migration Tool (DSMIGRATE) do?31.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 32

Unit 6: Enterprise Networking with Unix-Type of Operating Systems

Back to topCommentary

Unit Purpose and Notes: This unit covers the main features of Unix operating system relevant tonetworking, and covers how to use Unix-type of operating systems including Linux and Mac OS X Server toimplement computer networks. This unit is based on Chapter 9 of the TD textbook.

Section 1

Summary

Unit Summary

Read the chapter summary on pages 512-515 of the TD textbook.

Review Questions

Review questions on pages 517-522 of the TD textbook.

Terminology

Review the key terms on pages 515-517 of the TD textbook.

Computer Science 604 Study Guide (Print Version)

Unit 6: Enterprise Networking with Unix-Type of Operating Systems 33

Unit 6 - Section 1 : Networking with Unix-type of Operating Systems

Back to Unit 6Commentary

Section Goal: Provide and overview of the networking features and capabilities of the UNIX-type ofoperating system such as Linux.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to discuss the history of the UNIX operating system,list and describe UNIX commands, and describe the installation and configuration of Linux for networking.

Objective Tasks

Read Chapter 9 of the TD textbook.• Complete case projects 9-1, 9-2, 9-3 and 9-4.• Complete the review questions and check your answers with your peers.•

Objective Leading Questions

In what ways does Unix differ from Windows and NetWare network operating systems?1. What is the Unix operating system?2. What are the differences between Unix and Linux operating systems?3. What Unix implementations are currently available commercially or free of charge?4. What are the common features among all versions of the Unix operating system?5. What are proprietary UNIX operating systems?6. What are the advantages of choosing a proprietary UNIX?7. What are Open Source UNIX or UNIX-like operating systems?8. Why do people choose UNIX for enterprise networking?9. What hardware is needed for a UNIX server?10. What are the main features of Linux?11. What is Linux's memory model?12. What file systems does Linux support?13. What is Linux's common file and directory structure?14. How does Linux provide file services?15. How does Linux provide Internet services?16. What questions should be asked in preparing a Linux installation?17. What is the process to install a Linux server?18. How are groups and users added in Linux network system?19. How are file access permissions changed in a Linux system?20. What tools are provided for Linux to internetwork with other network operating systems?21.

Computer Science 604 Study Guide (Print Version)

Summary 34

Unit 7: NetWare-based Enterprise Computer Networking

Back to topCommentary

Unit Purpose and Notes: This unit discusses the main features and functions of Novell's NetWare and itsuse to implement enterprise computer networks. This unit is based on Chapter 10 of the TD textbook.

Section 1

Activities

Assignment

Complete and Submit TME 3.

Summary

Unit Summary

Read the chapter summary on pages 551-553 of the TD textbook.

Review Questions

Review the questions on pages 555-560 of the TD textbook.

Terminology

Review the key terms on pages 553-555 of the TD textbook.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 35

Unit 7 - Section 1 : NetWare Based Enterprise Networking

Back to Unit 7Commentary

Section Goal: Describe the NetWare network operating systemand its implementation.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to list the advantages of NetWare, and illustrate theplanning, design and implementation of Novell networks for enterprise.

Objective Tasks

Read Chapter 10 of the TD textbook.• Complete case project 10-1.• Complete hands-on project 10-1.• Complete the review questions and check your answers with your peers.•

Objective Leading Questions

What are the differences and similarities between Windows 2000 Server and NetWare?1. What is the latest version of NetWare?2. Why do people choose NetWare for their enterprise networking needs?3. How does NetWare support IP?4. What major limitations does the latest NetWare have?5. What hardware is needed to run NetWare?6. What is NetWare's memory model?7. What does NetWare's kernel do? How is the kernel launched from a DOS partition?8. What interface does NetWare provide for network administrators?9. What are the main features of NetWare's file system? How does it support other file systems such asUnix and Macintosh?

10.

How does the NetWare Directory Services system manage multiple servers and their resources?11. What questions should be asked in planning a NetWare installation?12. What is the installation process for NetWare?13. How is NetWare Administrator Utility (NWAdmin) used to create objects in the NDS tree?14. How are the properties of a User object modified through NWAdmin?15. How does NetWare internetwork with other network operating systems such as Windows 2000Server and Unix?

16.

Computer Science 604 Study Guide (Print Version)

Summary 36

Unit 8: Internetworking with TCP/IP for Enterprise Applications

Back to topCommentary

Unit Purpose and Notes: This unit examines TCP/IP addressing and subprotocols, and describes their usesin implementing internet, intranets and extranets for enterprise applications. This unit is based on Chapter 11of the TD textbook.

Section 1

Summary

Unit Summary

Read the chapter summary on pages 559-602 of the TD texbook.

Review Questions

Review the questions on pages 605-610 of the TD textbook.

Terminology

Review the key terms on pages 602-605 of the TD textbook.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 37

Unit 8 - Section 1 : Networking with TCP/IP: Internet, Intranet and Extranet

Back to Unit 8Commentary

Section Goal: Describe and discuss the key aspects of inter-networking computers to meet enterprise needs,including internet, intranet and extranet implementation.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to describe the tools and techniques ofinter-networking.

Objective Tasks

Read Chapter 11 of the TD textbook.• Complete case projects 11-1 and 11-2.• Complete hands-on projects 11-2 and 11-3.• Complete the review questions and check your answers with your peers.•

Objective Leading Questions

How are network devices addressed in a TCP/IP-based computer network?1. What are the main characteristics of the IP addressing scheme?2. How can the class a particular IP address belongs to be identified?3. What is multicasting?4. Where can official IP addresses be obtained for enterprise networking needs?5. What problems does IP Version 6 (IPv6) solve?6. v What is subnetting?7. Why are the advantages of subnetting?8. What are subnet masks? Where may they specified?9. Given an IP address and its subnet mask, how can its network prefix and host information bedetermined?

10.

What role do routers play in subnetting?11. How do subnets and IP addresses work on a network?12. What roles do gateways play in the context of IP addressing and subnets?13. What is network address translation (NAT)?14. For what reasons is NAT used?15. What are sockets?16. What are ports?17. What is the relationship between sockets and ports?18. What are the default port numbers for commonly used TCP/IP services?19. In the world of TCP/IP-based computer networks, what are host names and domain names?20. What roles does a domain name system (DNS) play?21.

Computer Science 604 Study Guide (Print Version)

Summary 38

What are the conventions of domain naming?22. What roles do host files (hosts, hosts.txt or lmhosts) play?23. In a sophisticated DNS server hierarchy, what roles do resolvers, name servers and name space playrespectively?

24.

How is DNS configured on a Windows 2003 workstation and a UNIX workstation respectively?25. What are name spaces, root server, zones, resource record and address resource record respectively?26. For what purpose was the BOOTP protocol developed?27. What are the reasons for implementing DHCP protocol?28. How does a DHCP client lease an IP address from a DHCP server?29. How is a DHCP lease terminated?30. What is Windows Internet Naming Service? What is such service needed for a network?31. What advantages does WINS offer?32. How are network devices addressed in IPv6?33. What TCP/IP subprotocols are commonly used? What does each of the subprotocols do?34. What features does IMAP4 provide?35. When there is a problem with a network, what utility programs can be used to diagnose and/or fixthe problem on a TCP/IP-based network?

36.

How are these diagnostic tools used?37. What is the World Wide Web?38. What is a Web browser?39. What is a Web server?40. What is a URL?41. What is an unqualified host name?42. How is email service set up for an organization?43. How is a computer set up to read and send emails?44. For what purpose would one use FTP?45. What is the relationship between FTP and TFTP?46. When might it be necessary to use Gopher service?47. For what purpose might Newsgroups be used in an enterprise network?48. What is e-commerce?49. In what aspects may e-commerce contribute to an enterprise?50. What Voice over IP technologies is currently available for business needs?51. What are the advantages and disadvantages of each VoIP technology?52.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 39

Unit 9: Enterprise Network implementation and Management

Back to topCommentary

Unit Purpose and Notes: This unit discusses the planning, design, implementation, and management ofenterprise wide computer networks. This unit is based on Chapters 12 and 15 of the TD textbook.

Section 1

Section 2

Summary

Unit Summary

Read the chapter summaries on pages 653-655, and 814-816 of the TD textbook.

Review Questions

Review the questions on pages 657-661, and 818-822 of the TD textbook.

Terminology

Review the key terms on pages 655-657, and 816-818 of the TD textbook.

Computer Science 604 Study Guide (Print Version)

Unit 9: Enterprise Network implementation and Management 40

Unit 9 - Section 1 : Troubleshooting Network Problems

Back to Unit 9Commentary

Section Goal: Provide an overview of the network troubleshooting process and tools.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to describe the elements of an effectivetroubleshooting methodology, follow a systematic troubleshooting process to diagnose networking problems,and use a variety of tools to solve networking problems.

Objective Tasks

Read Chapter 12 of the TD texbbook to find answers to the leading questions.• Complete case projects 12-1, 12-2, 12-3, 12-4 and 12-5.•

Objective Leading Questions

What steps should be followed in troubleshooting network problems?1. How are the symptoms of a network problem identified?2. How is the scope of a network problem identified?3. How can a problem that results from a network change be pinpointed?4. After a network problem is identified, how may the cause be determined?5. How can more be learned about the causes of a network problem?6. How may it be determined whether a network problem's symptoms are truly reproducible?7. Why is it important to verify user competency in troubleshooting apparent network problems?8. How is the physical connectivity of a computer network verified?9. How is the logical connectivity of a computer network verified?10. How can a safe and reliable solution to a network problem be implemented11. How can a solution be tested, once it is implemented?12. What potential effects of a solution should be considered?13. Why should problems and solutions be documented?14. What hardware tools are needed in troubleshooting network problems?15. What software tools are needed in troubleshooting network problems?16. How are the right tools chosen for network troubleshooting?17. What is a network monitor?18. What data errors may occur to a network?19. What capabilities does Microsoft's NetMon offer?20. What capabilities does Novell's LANanalyzer offer?21. What is a network analyzer?22. What physical layer problems and symptoms are commonly seen in real network installations?23. Who would usually be involved in network troubleshooting?24.

Computer Science 604 Study Guide (Print Version)

Summary 41

How may vendor information help in troubleshooting network problems?25. Why do others need to be notified of network changes? Who, and how would they be notified?26. How are future problems prevented?27. What should be recorded in a change management system?28.

Objective Activities

Hands-on Projects

If possible, complete the hands-on projects 12-1 and 12-2.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 42

Unit 9 - Section 2 : Maintaining and Upgrading Computer Networks

Back to Unit 9Commentary

Section Goal: Provide and overview of the need for goals and implementation of a network maintenanceplan.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to:

describe the process for a baseline analysis to determine the state of a network, plan and followregular hardware and software maintenance routines, describe the steps involved in upgradingnetwork operating systems, and in adding network hardware, list and discuss the potential pitfalls ofmaking changes to a network, and research network trends to plan future upgrades; and

be able to describe the elements and benefits of project management, analyze the current state of anetwork, perform a needs assessment and recommend changes based on findings, manage a networkimplementation project, and design and test a pilot network.

Objective Tasks

Read Chapter 15 of the TD textbook.• Complete case projects 15-1, 15-2 and 15-3.•

Objective Leading Questions

Why does a network require maintenance?1. Why might a network require upgrading?2. What is baselining?3. What are asset management and change management?4. What general steps should be followed in making software change to a network?5. What is a patch for a software program?6. What is a software upgrade?7. What are the differences between client upgrade and application upgrade?8. How should a network operating system be upgraded? What should be carefully considered inplanning such an upgrade?

9.

How can a software upgrade be reversed? Why is reversing an upgrade sometimes needed?10. What general steps should be followed when considering a hardware upgrade?11. What hardware on a network may need an upgrade?12. How should the network administrator perform a cabling upgrade? A backbone upgrade?13. Why might it be necessary to reverse hardware changes?14. What are the current trends in networking technology?15.

Computer Science 604 Study Guide (Print Version)

Hands-on Projects 43

How would a networking professional research networking trends?16. What is project management?17. What are the common elements for a project plan?18. What types of resources are needed for a network project?19. Why are communications critical to the success of a network project?20. What is process management?21. How does process management help you?22. What is contingency planning?23. In a networking project, what measures may be taken to prevent problems during the projects'implementation?

24.

How may the implementation of a networking project be tested and evaluated?25. What are the most significant steps in implementing a networking project?26. How is project feasibility determined?27. How are project goals set?28. How is a baseline assessment performed in implementing a network project?29. What questions must be answered when doing needs assessment?30. What questions must be answered when assessing user requirements?31. What questions must be answered when assessing performance requirements?32. What questions must be answered when assessing availability requirements?33. What questions must be answered when assessing integration and scalability requirements?34. What questions must be answered when assessing security requirements?35. What is a pilot network?36. How is a more realistic and useful pilot network created?37. How are network users prepared for changes to the network?38.

Objective Activities

Hands-on Project

If possible, complete hands-on projects 15-1 and 15-2.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 44

Unit 10: Enterprise Network Security: Issues, Concepts, and Techniques

Back to topCommentary

Unit Purpose and Notes: This unit discusses a variety of security issues with computer networks, as well astechniques and measures to secure an enterprise wide computer networks, and discusses the techniques andmeasures used to secure an enterprise wide computer network. This unit is based on Chapters 13 and 14 ofthe TD textbook.

Section 1

Section 2

Activities

Assignment

Complete and Submit TME 4.

Summary

Unit Summary

Read the chapter summaries on pages 705-708, and 761-763 of the TD textbook.

Review Questions

Review the questions on pages 713-718, and 770-775 of the TD textbook.

Terminology

Review teh key terms on pages 708-713, and 763-770 of the TD textbook.

Computer Science 604 Study Guide (Print Version)

Hands-on Project 45

Unit 10 - Section 1 : Introduction to Network Security

Back to Unit 10Commentary

Section Goal: Provide an overview of network security.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to identify security risks in computer networks, andimplement certain techniques to secure a computer network.

Objective Tasks

Read Chapter 13 of the TD textbook.• Complete case projects 13-1, 13-2 and 13-3.•

Objective Leading Questions

What are hackers and crackers? What are the differences between the two?1. What is root?2. What is a firewall?3. What should be done in a security audit?4. What network security risks are associated with people?5. What network security risks are associated with hardware and network design?6. What network security risks are associated with protocols and software?7. What network security risks are associated with Internet access?8. What is IP spoofing attack?9. What is a flashing attack?10. What is a denial-of-service attack?11. How are risks associated with people addressed?12. How is an effective security policy developed?13. What are the typical goals for security policies?14. What should be included in a security policy?15. What policy should be made for response to security breaches?16. How are secure passwords created?17. How are passwords kept secure?18. How should administrators physically secure an enterprise computer network?19. How are risks associated with hardware and network design addressed?20. What does a packet filtering firewall do?21. What does a screening firewall do?22. How are firewalls used to secure an enterprise computer network?23. What roles does a proxy server play?24. What security feature should be sought in a remote control program?25.

Computer Science 604 Study Guide (Print Version)

Summary 46

What security features should be provided by a secure remote access server package for dial-upnetworking?

26.

How are risks associated with protocols and software addressed?27. What restrictions may be imposed on users' access to network resources in order to secure anenterprise network?

28.

What is encryption?29. What roles can encryption play in network security?30. What should be ensured by encryption?31. What is a key in the context of encryption?32. What is cipher text?33. What is private key encryption or symmetric encryption?34. What is public key encryption or asymmetric encryption?35. What is a digital certificate?36. What roles do digital certificates play in network security?37. What is the essence of Kerbros authentication protocol?38. What is the essence of the PGP system? For what purpose may you choose to use PGP?39. What is secure socket layer (SSL)?40. How does SSL work to secure a network?41. What is TLS? How is it used for network security?42. What is the essence of IPSec protocol?43. What is key management and key exchange?44. What are VPNs?45. How methods may be taken to secure VPNs?46. What is the essence of the Point-to-Point Tunneling Protocol (PPTP)?47. What is tunneling?48. What are the essence of Layer 2 forwarding (L2F) and Layer 2 tunneling protocol (L2TP)respectively?

49.

Objective Activities

Hands-on Project

If possible, hands-on projects 13-1, 13-2 and 13-3.

Leading Questions

What are hackers and crackers? What are the differences between the two?• What is root?• What is a firewall?• What should be done in a security audit?• What network security risks are associated with people?• What network security risks are associated with hardware and network design?• What network security risks are associated with protocols and software?• What network security risks are associated with Internet access?• What is IP spoofing attack?•

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 47

What is a flashing attack?• What is a denial-of-service attack?• How are risks associated with people addressed?• How is an effective security policy developed?• What are the typical goals for security policies?• What should be included in a security policy?• What policy should be made for response to security breaches?• How are secure passwords created?• How are passwords kept secure?• How should administrators physically secure an enterprise computer network?• How are risks associated with hardware and network design addressed?• What does a packet filtering firewall do?• What does a screening firewall do?• How are firewalls used to secure an enterprise computer network?• What roles does a proxy server play?• What security feature should be sought in a remote control program?• What security features should be provided by a secure remote access server package for dial-upnetworking?

How are risks associated with protocols and software addressed?• What restrictions may be imposed on users' access to network resources in order to secure anenterprise network?

What is encryption?• What roles can encryption play in network security?• What should be ensured by encryption?• What is a key in the context of encryption?• What is cipher text?• What is private key encryption or symmetric encryption?• What is public key encryption or asymmetric encryption?• What is a digital certificate?• What roles do digital certificates play in network security?• What is the essence of Kerbros authentication protocol?• What is the essence of the PGP system? For what purpose may you choose to use PGP?• What is secure socket layer (SSL)?• How does SSL work to secure a network?• What is TLS? How is it used for network security?• What is the essence of IPSec protocol?• What is key management and key exchange?• What are VPNs?• How methods may be taken to secure VPNs?• What is the essence of the Point-to-Point Tunneling Protocol (PPTP)?• What is tunneling?• What are the essence of Layer 2 forwarding (L2F) and Layer 2 tunneling protocol (L2TP)respectively?

Activities

Computer Science 604 Study Guide (Print Version)

Leading Questions 48

Hands-On Projects

Hands-on project 15-1.Case Studies

Case project 1, 2 and 3 on Page 806 and 807.

Computer Science 604 Study Guide (Print Version)

Hands-On Projects 49

Unit 10 - Section 2 : Ensuring Network Integrity and Availability

Back to Unit 10Commentary

Section Goal: Provide an overview of the techniques and tools to ensure integrity and reliability in networks.

Learning Objectives

Learning Objective 1

After completing this section, students should be able to identify the characteristics of a network that keepsdata safe from loss or damage, protect a network from computer viruses, explain both network-level andsystem-level fault-tolerance techniques, describe the techniques and strategies for data backup, and describethe components of a useful disaster recovery plan.

Objective Tasks

Read Chapter 14 of the TD textbook.• Complete case project 14-1.• Complete the hands-on project 14-1.• Complete the review questions and compare your answers with your peers.•

Objective Leading Questions

What is network integrity?1. What is network availability?2. What general guidelines should be followed to protect an enterprise network?3. What is a computer virus?4. What types of viruses are commonly seen on computer networks?5. What characteristics may computer viruses have?6. What symptoms on the network may indicate an virus infection?7. What important functions should an antivirus program have to protect a network?8. What guidelines should be followed for an antivirus policy?9. What are virus hoaxes?10. How can a network be made fault-tolerance?11. What power flaws may occur in a computer network?12. What are UPS and online-UPS?13. How can it be decided which UPS is right for a given network?14. Why does a fully meshed network offer the best fault-tolerance?15. What is a fully redundant system?16. How can network servers be made fault-tolerant?17. What is server mirroring?18. What is server clustering?19. How can storage be made fault-tolerant?20. How does RAID offer fault-tolerant storage?21.

Computer Science 604 Study Guide (Print Version)

Case Studies 50

What is network-attached storage?22. What are storage area networks?23. What methods can be used to back up data on a network?24. What questions should be addressed by a good data backup strategy?25. What are full backup, incremental backup and differential backup respectively?26. What other schemes may be used to backup network data?27. What is disaster recovery?28. What issues should be addressed by a disaster recovery team?29.

Objective Activities

Hands-on Project

If possible, complete hands-on project 14-2 and 14-3.

Computer Science 604 Study Guide (Print Version)

Objective Leading Questions 51