1 / 9

Chabot College

Chabot College. Chapter 8 Review Semester III ELEC 99.09. Documentation. Documentation is the most critical component of good network administration. Documentation is the least implemented component of network administration. A maintenance record is used to keep a list of equipment repairs.

yosefu
Télécharger la présentation

Chabot College

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chabot College Chapter 8 Review Semester IIIELEC 99.09

  2. Documentation • Documentation is the most critical component of good network administration. • Documentation is the least implemented component of network administration. • A maintenance record is used to keep a list of equipment repairs. • Rack mount location is included in MDF and IDF documentation. • Software listings would NOT be found on security documentation.

  3. Documentation • A software report would be used to determine what programs are installed on a particular computer. • Network policy should be used to select network passwords. • User policies refer to documentation that outlines what is and what is not permissible on the network. • Configuration error is NOT used as a baseline measure.

  4. Network Operating Systems • Network operating system (NOS) controls the resources and management of a client-server network. • The Unix network operating system supports multi-user, multitasking, primarily uses NFS security, and is kernel based.

  5. Peer-to-Peer Networks • The recommended maximum number of users in a peer-to-peer network is 10. • A dedicated server is NOT associated with a peer-to-peer network. • A peer-to-peer network is also known as a workgroup network.

  6. Troubleshooting • Network troubleshooting is defined as a systematic process. • Your first step in the troubleshooting process is to gather data. • A possible solution to the problem of EMI/RFI effecting performance on your network is using STP cable.

  7. Troubleshooting • The ping 127.0.0.1 command will test the loopback function on the NIC. • An isolating transformer controls voltage spikes and HF noise. • A grounding strap reduces the static discharge risks associated with working on the inside of a computer.

  8. Infections • A worm is a program that spreads across computers and usually reproduces copies of itself in a computer's memory. • A virus is a program that usually has a negative effect on executable programs.

  9. Backup and Storage • Incremental backup stores all files that have been created and modified since the last full backup. • Magnetic tape is used to backup data because the tape is inexpensive. • RAID 5 is a redundancy technique that uses disk striping with parity and requires a minimum of three disks.

More Related