Chapter 13. Network Management Tools and Documentation Procedures

Quality computer wiring is essential to a reliable computer network system. If your network wiring is not installed correctly or in a haphazard manner, chances are good that the network is not getting an appropriate level of performance and reliability. Although the physical placement of cabling is important, equally important is documenting that cabling.

Administrators have several daily tasks, and new ones crop up all the time. In this environment, tasks such as documentation sometimes fall to the background. This is when it is important to understand why administrators need to spend their valuable time sitting down writing and reviewing documentation. A number of advantages exist to having a well-documented network, including the following:

Troubleshooting—When something goes wrong on the network, including the wiring, up-to-date documentation serves as an importance reference to guide the troubleshooting effort. The documentation can save time isolating potential locations of an issue and thereby save money.

Training new administrators—In many networks, new administrators are hired and old ones leave. In this scenario, documentation is critical. New administrators do not have the time to try to figure out where cabling is run, what cabling is used, potential trouble spots, and so forth. By having up-to-date information, new administrators can quickly see the layout of the network.

Contractors and consultants—From time to time, consultants and contractors might need to visit the network. This can be done to make future network recommendations for the network or to add wiring or other components. In such cases, up-to-date documentation is required. If it is not there, it is much more difficult for these people to do their jobs and would likely take more time and, therefore, more money.

Recognizing the importance of documentation is one thing, knowing what to document and when to document is another. In this chapter we look at types of management documentation and how network administrators use them.

Foundation Topics: Documentation Management

Good quality network documentation does not happen by accident; rather, it requires some careful planning. When creating network documentation, it is necessary to keep in mind who you are creating the documentation for and that it is a communication tool. It is used to take technical information and present it in a manner that can be understood by someone new to the network. When planning network documentation, it is important to decide on what you need to document.

Note: Write It Down

Imagine you have just taken over a network as administrator. What information would you like to see? This is often a clear gauge of what to include your network documentation.

All networks are different and so, too, will be the documentation required for each network. However, some elements will always be included in quality documentation:

Wiring layout—Network wiring can be confusing. Much of the network wiring is hidden behind walls and ceilings, making it hard to know where wiring is and what wiring is used on the network. This makes it critical to have up-to-date network wiring documentation.

Network topology—Networks can be complicated, and if someone new looks over the network, it is important to document the entire topology. This includes both the wired and wireless topologies. The network topology documentation typically consists of a diagram or diagrams labeling all critical components used to create the network. These diagrams include such components as routers, switches, hubs, gateways, and firewalls.

Server configuration—A single network typically uses multiple servers spread over a large geographical area. Documentation must include schematic drawings of where servers are located on the network and the services each provides. This would also include server function, server FQDN, server IP address, OS and software information, and the like. This is all the information on servers that you need to manage or administer them.

Key applications—Documentation also needs to include all key applications used on the network. This will includes up–to-date information on their updates, vendors, installation dates, and so on.

Network services—Network services are a key ingredient for all networks. A detailed account of services such as such as DNS, DHCP, and RAS is an important part of documentation. Documentation should include a reference of which server maintains which network service. You should describe in detail how each server is configured and structured.

Network procedures—Documentation should include information on network policy and procedures. This includes many elements ranging from who can and cannot access the server room, to network firewalls, protocols, passwords, physical security, and so on.

BaselinesNetwork documentation can also include the results of baseline testing. For example, after a performance baseline is completed, the results can be documented and stored for later comparison.

Wiring Schematics

Network wiring schematics are an important part of network documentation particularly for midsize to large networks where the cabling is complex. For such networks it becomes increasingly difficult to visualize network cabling and even harder to explain it to someone else. A number of software tools can help document network wiring, but they all enable administrators to clearly detail network wiring. Some examples of this software include Microsoft Visio, SmartDraw, and SolarWinds LAN surveyor. Many of these applications have trial versions that you can download.

Several types of wiring schematics exist. They can be general, as shown in Figure 13.1, or they can include a detailed schematic reference, as shown in Figure 13.2 and Table 13.1.

Table 13.1 Wiring Schematic Reference Sample

image

image

Figure 13.1 General wiring schematic.

image

image

image

Figure 13.2 Wiring schematic that corresponds to Table 13.1.

image

Figure 13.1 and Figure 13.2 provide a simplified look at network wiring schematics. Imagine how complicated these diagrams would look on a network with 1, 2, or even 6,000 computers. Quality network documentation software makes this easier, but still the task of network wiring can be a large one for administrators. When documenting wiring, administrators need to ensure that someone could pick up the diagrams and have a good idea of the network wiring.

You might consider documenting network wiring to be a waste of your time. You might, that is, until you need to troubleshoot some random network problems. Without any network wiring schematics, the task will be frustrating and time consuming. Even with simplified information provided in Figure 13.2 and Table 13.1, it is possible to evaluate the network wiring and make recommendations.

In the hypothetical information provided in Figure 13.2 and Table 13.1, several potential problems exist with the network wiring. Any administrator could walk in and review the network documentation and isolate the potential problems. Now it’s your turn.

Note: Time to Update

Network wiring schematics are a work in progress. Although changes to wiring do not happen daily, they do occur when the network expands or old cabling is replaced. It is important to remember that when changes occur to the network, the schematics have to be updated to reflect the changes. Out-of-date schematics can be frustrating to work with.

Physical and Logical Network Diagrams

In addition to the wiring schematics, documentation should also include diagrams of the physical and logical network design. Recall from Chapter 1, “Introduction to Networking,” network topologies can be defined on a physical level or a logical level. The physical topology refers to how a network is physically constructed—that is, how it looks. The logical topology refers to how a network looks to the devices that use it—in other words, how it functions.

Network infrastructure documentation won’t be reviewed daily; however, this documentation is essential for someone unfamiliar with the network to manage or troubleshoot the network. When it comes to documenting the network, you need to document all aspects of the infrastructure. This includes the physical hardware, physical structure, protocols, and software used.

Physical Network Documentation

The physical documentation of the network would include such elements as

Cabling information—A visual description of all the physical communication links, including all cabling, cable grades, cable lengths, WAN cabling, and so on.

Servers—The physical network diagram would include the server names and IP addresses, types of servers, and domain membership.

Network devices—The physical diagram must include the location of the devices on the network. This would include the printers, hubs, switches, routers, gateways, and so on.

Wide area network—The physical network also includes the location and devices of the WAN network and components.

User information—The diagram can include some user information, such as the number of local and remote users.

Figure 13.3 shows a diagram of a physical segment of a network.

image

Figure 13.3 Physical network.

image

Networks are dynamic and changes can happen regularly. The physical network diagrams have to be updated as well. Organizations have different policies and procedures on how often updates should occur. A general rule is that the diagram should be updated whenever significant changes are made to the network, such as the addition of a bridge, change in protocols, or the addition of a new server. These changes impact how the network operates, and the documentation should reflect the changes.

Note: Document Change

Documentation should be updated periodically and each time a major change is made to the network. This includes the addition of hardware or setting changes.

Logical Network Documentation

The logical network refers to the direction that data actually flows on the network within the physical topology. The logical diagram is not intended to focus on the hardware of the network but rather how data flows through that hardware. In practice, the physical and logical topologies can be the same. In the case of the bus physical topology, data travels along the length of the cable from one computer to the next. So, the diagram for the physical and logical bus would be the same. Figure 13.4 shows the physical and logical bus.

image

Figure 13.4 Physical and logical bus topology.

image

This is not always the case. For example, a topology can be in the physical shape of a star, but data is passed in a logical ring. The function of data travel is performed inside a switch in a ring formation. So the physical diagram would appear to be a star, but the logical diagram shows data flowing in a ring formation from one computer to the next. Simply put, looking at a physical diagram it is difficult to tell the way in which data is flowing on the network.

In today’s network environments, the star topology is a common network implementation. Ethernet uses a physical star topology but a logical bus topology. In the center of the physical Ethernet star topology is a hub or switch. What happens inside this switch defines the logical bus topology. The switch passes data between ports as if they were on an Ethernet bus segment.

In addition to data flow, logical diagrams can include additional elements, such as the network domain architecture, server roles, protocols used, and so on. Figure 13.5 shows how a logical topology can look in the network documentation.

image

Figure 13.5 Logical topology diagram.

image

Tip: Logical Topology

The logical topology of a network identifies the logical paths that data signals travel over the network. Remember this for the Network+ exam.

Baselines

Baselines play an integral part in network documentation because they provide the capability to monitor the overall performance of the entire network. In simple terms, a baseline is a measure of performance that indicates how hard the network is working and where network resources are spent. The purpose of a baseline is to provide a basis for comparison. For example, you can compare the performance results of the network taken in March to one taken in June, or from one year to the next. More commonly, you would compare the baseline information at a time when the network is having a problem to information recorded when the network was operating with greater efficiency. Such comparisons help you determine if there has been a problem with the system, such as degrading performance, and how significant that problem is and how it impacts users.

To be of any use, baselining is not a one-time task; rather, baselines should be taken periodically to provide an accurate comparison. You should take an initial baseline after the network is set up and operational and then again when major changes are made to the network. Even if no changes are made to the network, periodic baselining can prove useful as a means to determine whether the network is still operating correctly.

All network operating systems (NOS), including Windows, MAC OS, UNIX, and Linux have built-in support for network monitoring. In addition many third-party software packages are available for detailed network monitoring. The system-monitoring tools provided in a NOS give you the means to take performance baselines for either the entire network or an individual segment within the network. Because of the different functions of these two baselines, they are referred to as a system baseline and a component baseline.

To create a network baseline, network monitors provide a graphical display of network statistics. Network administrators can choose a variety of network measurements to track and use these statistics to perform routine troubleshooting tasks, such as locating a malfunctioning network card, a downed server, or a denial of service (DoS) attack.

Collecting network statistic information is a process referred to as capturing. Administrators can capture statistics on all elements of the network. For baseline purposes, one of the most common statistics to monitor is bandwidth usage. By reviewing bandwidth statistics, administrators can see where the bulk of network bandwidth is used. Then administrators can adapt the network for bandwidth use. If too much bandwidth is used by a particular application, administrators can actively control its bandwidth usage. Without comparing baselines, however, it is difficult to see what is normal network bandwidth usage and unusual network bandwidth use.

Tip: Baselines

Remember for the Network+ exam that to provide an effective comparison, baselines need to be performed under the same conditions. If not, the results are not trustworthy.

Policies, Procedures, Configurations, and Regulations

Well-functioning networks are characterized by policies, procedures, and documented configurations. Policies, procedures, and configurations are unique to every network, so every organization should have clear documentation for their network.

Policy Documentation

By definition, policies refer to an organization’s documented rules regarding what is to be done, or not done, and why. Policies dictate who can and cannot access particular network resources, server rooms, backup tapes, and so on.

Although networks might have different policies, depending on their needs, some common policies include the following:

Network Usage Policy—Specifies who can use network resources such as PCs, printers, scanners, and remote connections. In addition to stating who can use these resources, the usage policy dictates what can be done with these resources after they are accessed. For example, the policy might state that no outside systems will be networked without permission from the network administrator.

Internet Usage Policy—Specifies the rules for Internet use on the job. Typically, usage should be primarily focused on business-related tasks. The policy might state that incidental personal use is allowed during specified times.

Email Usage Policy—Emphasizes that email must follow the same code of conduct as expected in any other form of written or face-to-face communication. All emails are property of the company and can be accessed by the company. Personal emails should be erased right away.

Personal Software Policy—Outlines what software, if any, users can load onto the network or personal computer. These policies typically dictate that no outside software should be installed on network computer systems. All software installations must be approved by the network administrator.

User Account Policy—Typically states that users are responsible for keeping their password and account information secret. All staff are required to log off their systems when they finish using them. Attempting to log on to the network with another user account is considered a serious violation.

Ownership Policy—Typically states that the company owns all data, including email, voicemail, and Internet usage logs, of users and reserves the right to inspect these at any time.

This list is just a snapshot of the policies that guide the behavior for administrators and network users. Network policies should be clearly documented and available to network users. Often, these policies are reviewed with new staff members or new administrators. Policies are reviewed and updated regularly. As they are updated, they are rereleased to network users.

Tip: Policy Making

For the Network+ exam, remember that network policies dictate network rules and provide the guidelines for network conduct.

Network Procedure Documentation

Network procedures differ from policies in that they identify the way in which tasks are to be performed. For example, each network administrator has backup procedures identifying the time of day backups are done, how often they are done, and where they are stored. A number of procedures apply to networks for practical reasons but perhaps more important for security reasons.

Administrators have to be aware of several procedures when on the job. The number and exact type of procedure depends on the network, the organization, or even the network administrator. The overall goal of the network is to ensure uniformity and ensure that network tasks follow a framework. Without this procedural framework, different administrators might approach tasks differently and cause confusion on the network.

Network procedures can include the following:

Backup procedures—These procedures identify how all backups are to be performed, who can perform them, and who can use them for recovery purposes. They might also include the types of backup such as full, incremental, or differential, and at what frequency these backup types are done. So the backup policy can dictate that a full backup is to be done Monday evenings with incremental backups done Wednesdays, Thursdays, and Fridays.

Procedures for adding new users—When new users are added to a network, administrators typically have to follow certain guidelines to ensure that users have access to what they need but no more. One such procedure might include the principle of lease privilege. This states that users are assigned the minimum privileges to do their jobs—nothing more, nothing less.

Security procedures—Some of the more critical procedures involve security. These procedures identify security monitoring, security researching, and applying security updates, and what the administrator must do if security breaches occur.

Network monitoring procedures—The network needs to be constantly monitored. This includes reviewing such things as bandwidth, application errors, network operating system updates, and the like.

Software procedures—All software needs to be monitored and updated periodically. Documented procedures dictate when, how often, by whom, and why these updates are done.

Procedures for reporting violations—From time to time, users do not follow outlined network policies. This is why documented procedures should exist to handle the violations properly. These policies can include a first verbal warning followed by written reports and account lockouts.

Remote access procedures—Many workers access the network remotely. This remote access is granted and maintained using a series of defined procedures. These can dictate the time remote users can access the network, how long they can access, and what they can access.

These represent just a few of the policies administrators must follow on the job. It is important that all these procedures are documented well and are accessible. To be effective, all network procedures must be reviewed and updated as needed.

Configuration Documentation

Another critical form of documentation is configuration documentation. Many administrators think they could never forget the configuration of a router, server, or switch, but it happens more often than not. Although it’s often a thankless, time-consuming task, documenting the network hardware and software configurations is critical for continued network functionality.

Two primary types of network configuration documentation are required: software documentation and hardware documentation. Both types of documentation include all configuration information so that should a computer or other hardware fail, both the hardware and software can be replaced and reconfigured. The documentation is important because often the administrator who configured the software or hardware is not available, and someone else has to re-create the configuration using nothing but the documentation. To be effective in this case, the documentation must be as current as possible. Older configuration information might not help.

Regulations

The terms regulation and policy are often used interchangeably; however, there is a difference. As previously mentioned, policies are written by an organization for its employees. Regulations are actual legal restrictions with legal consequences. These regulations are not set by the organizations but by applicable laws in the area. The following is an example of network regulations:

Transmission, distribution, uploading, posting, or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret, or other intellectual property right used without proper authorization; material kept in violation of state laws or industry regulations such as Social Security numbers or credit card numbers, and material that is obscene, defamatory, libelous, unlawful, harassing, abusive, threatening, harmful, vulgar constitutes an illegal threat, violates export control laws, hate propaganda, fraudulent material or fraudulent activity, invasive of privacy or publicity rights, profane, indecent or otherwise objectionable material of any kind or nature. You may not transmit, distribute, or store material that contains a virus, “Trojan Horse,” adware or spyware, corrupted data, or any software or information to promote or utilize software or any of Network Solutions services to deliver unsolicited email. You further agree not to transmit any material that encourages conduct that could constitute a criminal offense, gives rise to civil liability or otherwise violates any applicable local, state, national, or international law or regulation.

Tip: Regulations Are the Law

For this exam and in real-life networking, remember that regulations are often enforceable by law.

Monitoring the Network to Identify Performance

When networks were smaller, and few stretched beyond the confines of a single location, network management was a simple task. In today’s complex, multisite, hybrid networks, however, the task of maintaining and monitoring network devices and servers has become a complicated but essential part of the network administrator’s role. Nowadays, the role of network administrator often stretches beyond the physical boundary of the server room and reaches every node and component on the network. Whether an organization has 10 computers on a single segment or a multisite network with several thousand devices attached, the server administrator must monitor all network devices, protocols, and usage—preferably from a central location.

Given the sheer number and diversity of devices, software, and systems on any network, it is clear why network management is such an important consideration. Even though a robust network management strategy can improve administrator productivity and reduce downtime, many companies choose to neglect network management because of the time involved in setting up the system or because of the associated costs. If these companies understood the potential savings, they would realize that neglecting network management could lead to a huge monetary loss.

Network management and network monitoring are essentially methods to control, configure, and monitor devices on a network. Imagine a scenario in which you are a network administrator working out of your main office in Spokane, WA, and you have satellite offices in New York, Dallas, Vancouver, and London. Network management enables you to access systems in the remote locations or have the systems notify you when something goes awry. In essence, network management is about seeing beyond your current boundary and acting on what you see.

Network management is not one thing. Rather, it’s a collection of tools, systems, and protocols that, when used together, provide the ability to perform tasks such as reconfiguring a network card in the next room or installing an application in the next state.

Note: IDS and IPS

The objectives included in this chapter identified IPS and IDS. However, these topics are included in Chapter 14, “Network Access Security,” with a discussion of firewalls.

The capabilities demanded from network management vary somewhat among organizations, but essentially, several key types of information and functionality are required, such as fault detection and performance monitoring. Here are some of the types of information and functions that network management tools can provide:

Fault detection—One of the most important aspects of network management is knowing if anything is not working or is not working correctly. Network management tools can detect and report on a variety of faults on the network. Given the number of devices that constitute a typical network, determining faults without these tools could be an impossible task. Additionally, network management tools can have the capability to not only detect the faulty device but also shut it down. This means that if a network card is malfunctioning, you can disable it remotely. When a network spans a large area, fault detection becomes even more invaluable because it enables you to be alerted to network faults and to manage them, thereby reducing downtime.

Performance monitoring—Another feature of network management is the ability to monitor the performance of the network. Performance monitoring is an essential consideration that provides you with some crucial information. Specifically, performance monitoring can provide network usage statistics and user usage trends. This type of information is essential when you plan network capacity and growth. Monitoring performance also helps you to determine if any performance-related concerns exist, such as whether the network can adequately support the current user base.

Note: Performance Monitoring

Performance monitoring can be included with baselines. For more information on this, see the preceding baseline section.

Security monitoring—Any good server administrator has a touch of paranoia built into his or her personality. A network management system provides the capability to monitor who is on the network, what they are doing on the network, and how long they have been doing it. More important, in an environment in which corporate networks are increasingly exposed to outside sources, the ability to identify and react to potential security threats is a priority. Reading log files to learn of an attack is a poor second to knowing that an attack is currently in progress and reacting accordingly.

Remote management and configuration—Want to reconfigure or shut down the server located in Australia? Remote management and configuration are key parts of the network management strategy, enabling you to manage huge multisite locations centrally.

Many tools are available to help monitor the network and ensure that the entire network is functioning properly. Some tools, like the packet sniffer, can monitor traffic for administrators and those wanting to obtain data that doesn’t belong to them. In this section we look at several monitoring tools.

Throughput Testing

In the networking world, throughput refers to the rate of data delivery over a communication channel. In this case, throughput testers test the rate of data delivery over a network. Throughput is measured in bits per second (bps), for example, 100Mbps. Administrators need to be aware of exactly what the network is doing, so testing throughput is important. It might be that a high-speed network is not functioning with the expected level of throughput, and bottlenecks occur. Testing throughput is done periodically or after any large changes to the network, such as the installation of a new networkwide application or new server.

Any throughput tester is designed to quickly gather information about the network’s functionality, and specifically, the average overall network throughput. Many software-based throughput testers are available online, both for free and for a fee. Figure 13.6 shows a software-based throughput tester.

image

Figure 13.6 Software throughput tester.

image

As shown in Figure 13.6, throughput testers do not have to be complicated to be effective. To use it, enter the beginning point and then the destination point. The tester sends a predetermined number of data packets to the destination and reports on the throughput level. A throughput tester identifies how long it takes to send the data to the destination point and receive acknowledgment that the data was received. The results display in Kbps or Mbps. Table 13.2 shows the various data rate units.

image

Table 13.2 Data Rate Units

image

Administrators can periodically conduct throughput tests and keep them on file to create a picture of network performance. If it is suspected that a problem exists with the network functionality, the administrator can compare a test with past performance to see exactly what is happening.

The terms throughput and bandwidth are often used interchangeably, but there is a difference. When we talk about measuring throughput, we measure the amount of data flow under real-world conditions. That is, measuring with possible EMI influences, heavy traffic loads, improper wiring, and even network collisions. Take all this into account, take a measurement, and you have the network throughput. Maximum bandwidth, on the other hand, refers to the amount of information that can be sent through a particular media under ideal conditions.

Tip: Know the Difference

For the Network+ exam, be sure you know the difference between throughput and bandwidth.

Port Scanners

A port scanner is a software-based security tool designed to search a network host for open ports on a TCP/IP based network. As a refresher, in a TCP/IP based network, a system can be accessed through one of 65536 available port numbers. Each network service is associated with a particular port. Table 13.3 shows some common protocols and associated ports.

image

Table 13.3 Some of the Most Common TCP/IP Suite Protocols and Their Port Assignments

image

Note: Ports

For the Network+ exam, be sure you can identify the ports used by the more common TCP/IP protocols.

These are just a few of the available ports, and the ports we would expect to be open and available. Many of the thousands of other ports are closed by default; however, many others, depending on the OS, are open by default. These are the ports that can cause us trouble. Like packet sniffers, port scanners can be used both by administrators and by hackers. Hackers use port scanners to try to find an open port that they can use to access a system. Port scanners are easily obtained on the Internet either for free or for a modest cost. After they are installed, the scanner probes a computer system running TCP/IP looking for a UDP or TCP that is open and listening.

When a port scanner is used, several port states might be reported:

Open/Listening—The host sent a reply indicating that a service is listening on the port. There was a response from the port.

Closed or Denied or Not Listening—No process is listening on that port. Access to this port will likely be denied.

Filtered or Blocked—There was no reply from the host, meaning that the port is not listening or the port is secured and filtered.

Stealth—In stealth mode ports are effectively invisible to port scanners.

Note: For Your Protection

Sometimes an ISP takes the initiative, often blocking specific traffic entering its network before it reaches its customers, or after leaving its customers before it exits its network. This is done to protect customers from well-known attacks.

Because hackers can potentially review the status of our ports, it is important that administrators are aware which ports are open and potentially vulnerable. As previously mentioned, many tools and utilities are available for this. The quickest way to get an overview of the ports used by the system and their status is to use the issue the netstat –a command from the command line. A sample of the printout from the netstat –a command and active connections for a computer system is shown in Listing 13.1. The output from a Windows XP system might look a little different, but the information would be the same.

Listing 13.1 Output from a netstat –a Command from a Windows Vista System

image

As you can see from Listing 13.1, the system has many listening ports. Not all these suggest that a risk exists, but it does let us know that they might be vulnerable. To test for actual vulnerability, we use a port scanner. As an example, we can use a free online scanner to probe the system. Many free online scanning services are available. Although a network administrator might use these free online tools for curiosity, for real security testing, a quality scanner should be used.

Note: Scan Your System

To find out more about pot scanners and to conduct an online scan of your computer system, go to grc.com and use their ShieldsUP! utility.

Tip: Port Scanning

For the Network+ exam, remember that port scans identify closed, open, and listening ports and can be used by those intending on compromising security by finding open and unguarded ports.

Network Testing

When testing the network, administrators often perform three distinct types of tests: performance, load, and stress. These test names are sometimes used interchangeably, but although some overlap exists, they are different types of network tests, each with different outcome goals in mind.

Performance Testing

A performance test is, as the name suggests, all about measuring the current performance level of the network. The goal is to take ongoing performance tests and evaluate and compare them, looking for potential bottlenecks. For performance tests to be effective, they need to be taken under the same type of network load each time, or the comparison is not valid. That is, a performance test taken at 3:00 a.m. is going to be different from one taken at 3:00 p.m.

Tip: Performance Testing

On the Network+ exam, be prepared to identify the goal of performance testing, which is to establish baselines for the comparison of network functioning.

Load Testing

Load testing has some overlap with performance testing. Sometimes called volume or endurance testing, load tests involve artificially placing the network under a larger workload. For example, the network traffic can be increased throughout the entire network. After this is done, performance tests can be done on the network with the increased load. Load testing is sometimes done to see if there are bugs in the network that are not currently visible but that could become a problem as the network grows. For example, a company’s mail server might work fine with the current network load, but if the network grew by 10%, the increased load could overwhelm the server. Load tests are all about finding a potential problem before it happens.

Performance tests and load tests are quite similar; however, the information outcomes are different. Performance tests identify the current level of network functioning for measurement and benchmarking purposes. Load tests are designed to give administrators a look into the future to determine if the current network infrastructure can handle the load.

Tip: Load or Performance

For the Network+ exam, be prepared to identify the difference between performance and load tests. Specifically, performance tests are about the network functioning today, whereas load tests look forward to see if performance might be hindered in the future by growth or other changes to the network.

Stress Testing

Finally, we have stress testing. Whereas load tests do not try to break the system under intense pressure, stress tests sometimes do. They are used to push resources to the limit. Although these tests are not done often, they are necessary and, for administrators at least, entertaining. There are two clear goals of stress testing: the first is to see exactly what the network can handle. That is, where is its breaking point, which is useful to know in terms of network expansion. Second, stress testing enables administrators to test their backup and recovery procedures. If a test knocks network resources out, administrators can verify that their recovery procedures work, and the test enables them to observe network hardware failure. Stress tests assume that someday something will go wrong, and administrators will know exactly what to do when it happens.

Logging

In a network environment, all NOSs and most firewalls, proxy servers, and other network components have logging features. These logging features are essential for network administrators to review and monitor. Many types of logs can be used. In this section we review four of the most common: system, security, history, and events.

On a Windows server system, as with the other operating systems, events and occurrences are logged to files for later review. Windows server and desktop systems such as Vista/XP and 2000 use the Event Viewer to view many of the key log files. The logs in Event Viewer can find information on, for example, an error on the system or a security incident. Information is recorded into key log files, although you also see additional log files under certain conditions, such as if the system is a domain controller or is running a DHCP server application.

Security Logs

A system security log contains events related to security incidents, such as successful and unsuccessful logon attempts and failed resource access. Security logs are customizable, meaning that administrators can fine-tune exactly what they want to monitor. Some administrators choose to track nearly every security event on the system. Although this might be prudent, it often can cause huge log files that are too large and take up too much space. Figure 13.7 shows a Security log from a Windows system.

image

Figure 13.7 Windows Security log.

image

Notice in Figure 13.7 that there were some successful logons and logoffs. In a potential security breach, there would be some audit failures for logon or logoff attempts. To save space and prevent the log files from growing too big, administrators may choose to audit failed logon attempts, not successful ones.

Each event in a security log contains additional information to make it easy to get the details on the event. To do this, double-click any events listed in the security log. Additional information includes the following:

Date—The exact date the security event occurred.

Time—The time the event occurred.

User—The name of the user account that was tracked during the event.

Computer—The name of the computer used when the event occurred.

Event ID—The type of event that has occurred. This ID can get additional information about the particular event. Events can be anything from a logon on to logoff to a tracked OS crash.

To be effective, security logs should be reviewed regularly.

Application Logs

Application logs contain information logged by applications that run on a particular system and not just the operating system itself. Vendors of third-party applications can use the application log as a destination for error messages generated by their applications.

The application log works in much the same way as the security log. It tracks events within applications—both successful events and failed events. Figure 13.8 shows the details provided from an applications log in a Windows system.

image

Figure 13.8 Application log.

image

Notice in Figure 13.8 that three types of events occurred: general application information events, a warning event, and an error event. Vigilant administrators would likely want to check the event ID of both the event and warning failures to isolate the cause.

System Logs

System logs record information about components or drivers in the system. This is the place to look when you troubleshoot a problem with a hardware device on your system or a problem with network connectivity. For example, messages related to the client element of DHCP appear in this log. The System log is also the place to look for hardware device errors, time synchronization issues, or service startup problems. Figure 13.9 shows an example of a System log.

image

Figure 13.9 System log.

image

History Logs

History logs are most often associated with the tracking of Internet surfing habits—that is, log files that maintain a record of all sites that a user visits. Network administrators can review these for potential security or policy breaches, but generally these are not commonly reviewed.

Another form of history logs are a compilation of events from other log files. For instance, one history log might contain all significant events over the past year from the security log on a server. History logs are critical because they provide a detailed account of alarm events that can track trends and locate problem areas in the network. This information can help you revise maintenance schedules, determine equipment replacement plans, and anticipate and prevent future problems.

Note: Log Files

Application logs, history logs, and system logs can often be viewed by any user. Security logs can be viewed only by users who are use accounts with administrative privileges.

Log Management

Monitoring logs can require significant time and effort. That is where Log Management (LM) strategies come into play. LM describes the process of managing large volumes of system-generated computer log files. LM includes the collection, retention, and disposal of all system logs. LM can be completely designed in-house or you can use many third-party LM applications designed to make the whole process easier. Whichever way you go, LM can be a huge task. It is essential to ensure the proper functioning of the network and applications and keep an eye on network and system security.

Configuring our systems to log all sorts of events is the easy part; trying to find the time to review the logs is an entirely different matter. To help with this process, third-party software packages are available to help with the organization and reviewing of log files.

Networking Tools

A large part of network administration involves having the right tools for the job and knowing when and how to use them. Selecting the correct tool for a networking job sounds like an easy task, but network administrators can choose from a mind-boggling number of tools and utilities.

Given the diverse range of tools and utilities available, it is unlikely that you will encounter all the ones available or even all those discussed in this chapter. For the Network+ exam, however, you are required to have a general knowledge of the tools and what they are designed to do.

Until networks become 100% wireless, network administrators can expect to spend some of their time using a variety of media-related troubleshooting and installation tools. Some of these tools, such as the tone generator and locator, can troubleshoot media connections, and others, such as wire crimpers and punchdown tools, can create network cables and connections.

Note: Carry a Screwdriver

Although many costly, specialized networking tools and devices are available to network administrators, the most widely used tool—the standard screwdriver—costs only a few dollars. As a network administrator, you can expect to take the case off a system with amazing regularity—to replace a network interface card (NIC) or perhaps remove the cover from a hub or switch to replace a fan. Advanced cable testers and specialized tools will not help you when you need a screwdriver.

Wire Crimpers

Wire crimpers are tools you might use regularly. Like many things, making your own cables can be fun at first, but the novelty soon wears thin. Basically, a wire crimper is a tool that you use to attach media connectors to the ends of cables. For instance, you use one type of wire crimper to attach RJ-45 connectors on unshielded twisted-pair (UTP) cable, and you use a different type of wire crimper to attach Bayonet Neill Concelman (BNCs) to coaxial cabling. Figure 13.10 shows an example of a wire crimper for crimping both RJ-11 and RJ-45 connectors.

image

Figure 13.10 A wire crimper for RJ-45 and RJ-11 cables. (Photo courtesy of TRENDnet, www.trendnet.com.)

image

Note: Cable Caveat

When making cables, always order more connectors than you need; there will probably be a few mishaps along the way.

In a sense, you can think of a wire crimper as a pair of special pliers. You insert the cable and connector separately into the crimper, making sure that the wires in the cable align with the appropriate connectors. Then, by squeezing the crimper’s handles, you force metal connectors through the wires of the cable, making the connection between the wire and the connector.

When you crimp your own cables, you need to be sure to test them before putting them on the network. It only takes a momentary lapse to make a mistake when creating a cable, and you can waste time later trying to isolate a problem in a faulty cable.

Strippers and Snips

Two other commonly used wiring tools are strippers and snips. Wire strippers come in a variety of shapes and sizes. Some are specifically designed to strip the outer sheathing from coaxial cable, and others are designed to work best with UTP cable. Any type of strippers is designed to cleanly remove the sheathing from wire to make sure a clean contact can be made.

Many administrators will not have specialized wire strippers unless they do a lot of work with copper-based wiring. However, standard wire strippers are good to have on hand.

Wire snips are tools designed to cleanly cut the cable. Sometimes network administrators will buy cable in bulk and use wire snips to cut the cable in desired lengths. The wire strippers then prepare the cable for the attachment of the connectors.

Punchdown Tools

Within network wiring closets are rows of distribution blocks, or patch panels. A patch panel is a freestanding or wall-mounted unit with a number of RJ-45 connections on the front. The patch panel provides a connection point between network equipment such as hubs and switches and the ports to which PCs are connected, which are normally distributed throughout a building.

The individual wires within a twisted pair cable need to be attached to the back of the patch panel for each RJ-45 connector slot. This is where a punchdown tool is used. The punchdown tool presses each of the individual wires within the twisted-pair cable into the connectors at the back of the patch panel. The metal connectors in which the wires are pressed are known as insulation displacement connectors (IDCs). See Figure 13.11.

image

Figure 13.11 A punchdown tool. (Photo courtesy of TRENDnet, www.trendnet.com.)

image

A discussion of punchdown tools and how they are used is provided in Chapter 2, “Media and Connectors.”

Cable Certifiers

Today’s networks are all about speed and for good reason. Whereas the original networks shared simple files and resources such as printers, today’s networks see the convergence of voice, data, and video applications on a single network. To accommodate these applications, higher-performance cabling solutions are required to maintain the high demands placed on them. Many existing networks are retrofitted to meet the demands of high-bandwidth applications.

The question for network administrators is, can the existing wiring infrastructure meet the current and future demands of network users? This is where cable certifiers come into the picture. Cable certifiers can determine cable fault locations, cable length issues, cable noise problems, and qualify cables for applications such as VoIP. These handheld devices create a full summary of the cable test results, enabling administrators to see exactly if the current cabling can meet the demands of network users.

Some of the common features of cable certifiers include the following:

• Test telephone and coax cables for continuity and proper termination.

• Determine cable length and distances.

• Verify twisted-pair integrity including opens, shorts, miswires, split pairs, and so on.

• Identify individual cable runs to locate and identify routes

• Obtain accurate reflection of cables’ ability by measuring NEXT, FEXT, attenuation, and return loss and bit error rates to determine cable carrying capability.

Tip: Certifiers

For the Network+ exam, remember that certifiers test the speed of cables, ensuring they can meet the demands of network applications.

Voltage Event Recorders

Voltage event recorders monitor the quality of power used on the network or by network hardware. Voltage event recorders identify potential power-related concerns such as power sags, spikes, surges, or other power variations. Such power irregularities can cause problems for hardware and, in the case of serious spikes, can destroy hardware. Voltage event recorders are attached directly to a wall socket to monitor power. They record their findings, which are reviewed by the administrator.

Temperature Monitors

When we talk about temperature monitoring, we are often referring to the temperature of our server and network equipment rooms. In general, the heat tolerance range for computer equipment is surprisingly wide. Take, for example, a typical server system, which can happily operate in a range between 50°F and 93°F. That is a spread of 43°, which is plenty of room in a normal heated environment. The problem is that if you maintain a computer room at either the upper or lower end of these levels, the equipment will run, but for how long, no one knows.

Although no specific figures exist relating to the recommended temperature of server rooms, the accepted optimum is around 55 to 65°F. At this temperature, the equipment in the room should operate, and those working in the room should not get too cold. Human beings generally require a higher temperature than computer equipment does, which is why placing servers in an office space with staff is not ideal.

Many people assume that the biggest problem with servers and network equipment is that of overheating. To some extent, this is true; servers in particular do generate a great deal of heat and so can overheat to the point where components fail. But this is only one of the heat-related issues. A more significant, and more gradual, problem is that of temperature consistency.

Heat causes components to expand, and cooling causes them to contract. This is known as thermal expansion and contraction. Even the slightest temperature shifts cause the printed circuit boards and chips to shift around, and if they shift too much or too often, the chance of them becoming separated from their connections is greatly increased. Keeping the heat at a moderate and constant level reduces the expansion and contraction of the boards and increases the reliability of the components.

Note: Close Doors

Never wedge open a door to an environmentally controlled room, no matter how cold you get. Not only does having an open door defeat the purpose of the controlled environment, but it can also damage air conditioning units.

One way administrators keep their equipment rooms at the right temperature is using temperature monitors. In the equipment room, temperature monitors constantly document changes in room temperature. If the monitor detects radical changes in temperature, it sends an alert to the administrator. This can sometimes occur if someone leaves a door open to the server room, if the air conditioning breaks, or if some piece of network hardware produces a lot of heat. Although network temperature monitors might not often be needed, having them installed adds great peace of mind for administrators.

Keeping It Cool

Fortunately, the solution to the heat problem is relatively simple. You use an air conditioning unit. The problem is, you can’t use just any A/C unit. Having a late 1960s window-ledge unit with a pipe hanging out the window might be better than nothing, but we need serious high-quality protection.

High-quality air conditioning systems fall under the domain of industrial heating, ventilation, and air-conditioning (HVAC) equipment. Server-environment-specific air condition units are designed to maintain a constant temperature. High-quality units guarantee an accuracy of plus or minus 1°F. Most units have an audible alarm, but some also have the capability to communicate with management systems so that server-room temperature can be monitored remotely. Although the icy blast of a server-room air conditioning system might not be welcomed by those who have to work in it for an extended period of time, the discomfort is far outweighed by the benefit to server equipment.

Calculating the correct size and type of air conditioning unit can be a tricky proposition. Air conditioning systems are rated on the number of cubic feet that they can safely condition. Using this figure, and estimating the increase in temperature caused by the hardware in the room, gives you the basic information you need to choose an A/C unit. Of course, the calculation should take into account potential future growth. In some cases, a standby A/C unit is also installed. Whether such a system is required depends on how much fault tolerance you need and are willing to pay for.

Toner Probes

A toner probe, also called toner and probe, is two devices that can save a network installer many hours of frustration. There are two components to this tool: the tone generator and the tone locator. In the field, you might hear the tone generator and the tone locator referred to as the fox and hound.

The purpose of the toner and probe is to generate a signal transmitted on the cable you attempt to locate. At one end, you press the tone locator against individual wires; at the other, the tone generator sends a signal down a specific cable. When the tone locator makes contact with the wire that has the tone generators signal on it, the locator emits an audible signal or tone.

The toner and probe is a useful device, but it does have some drawbacks. First, it often takes two people to operate—one at each end of the cable. Of course, one person could just keep running back and forth; but if the cable is run over great distances, this can be a problem. Second, using the tone generator is time consuming because it must be attached to each cable independently.

Note: Labeling Cables

Many problems that can be discovered with a tone generator are easy to prevent by taking the time to properly label cables. If the cables are labeled at both ends, you do not need to use such a tool to locate them.

Tip: Toners

For the Network+ exam, remember that the toner and probe are specifically used for locating the ends of cables hidden in floors, ceilings, or walls, and tracking cables from the patch panel to their destination.

Protocol Analyzer

Protocol analyzers, also known as packet sniffers, can be hardware- or software-based; their primary function is to analyze network protocols such as TCP, UPD, HTTP, FTP, and so on. In use, protocol analyzers help diagnose computer networking problems, alert you of unused protocols, identify unwanted or malicious network traffic, and help isolate network traffic-related problems.

Protocol analyzers capture the communication stream between systems. But unlike the sniffer, the protocol analyzer also reads and decodes the traffic. Decoding enables the administrator to view the network communication in English. From this, administrators can get a better idea of the traffic flowing on the network. When unwanted or damaged traffic is spotted, analyzers make it easy to isolate and repair. For example, if a problem occurs with specific TCP/IP communication, such as a broadcast storm, the analyzer can identify the source of the TCP/IP problem and isolate the system causing the storm. Protocol analyzers also provide many statistical and real-time trend statistics that help for management justification of new hardware.

Protocol analyzers can be used for two key reasons:

Identify protocol patterns—By creating a historical baseline of its analysis, administrators can spot trends for protocol errors. That way, when a protocol error occurs, it can be researched to see if that error has occurred before and what was done to fix it.

Decode information—Capturing and decoding network traffic allows administrators to see what exactly is going on with the network on a protocol level. This helps identify protocol errors and potential intruders.

Tip: Statistics

For the Network+ exam, remember that protocol analyzers enable administrators to examine the bandwidth that a particular protocol is using.

Media/Cable Testers

A media tester, also called a cable tester or continuity tester, defines a range of tools designed to test whether a cable works properly. Any tool that facilitates the testing of a cable can be deemed a cable tester. However, there are specific tools called media testers and continuity testers. These media testers enable administrators to test a segment of cable, looking for shorts, improperly attached connectors, or other cable faults. All media testers inform you whether the cable works correctly and where the problem in the cable might be. Continuity testers are designed to verify that an electrical path exists between two end points. In the network, this means continuity between your cable jack and termination point. Continuity testers can locate shorts or other wiring problems in a section of network cabling. Figure 13.12 shows an example of a media tester. Note that there are two parts to the media tester: one for each end of the cable.

image

Figure 13.12 An example of a media tester. (Photo courtesy of TRENDnet, www.trendnet.com.)

image

Media Testers

Although network administrators do not need to use a cable tester every day, it could significantly help in the troubleshooting process. This section describes time domain reflectometers (TDR), which are used on copper cables, and optical time domain reflectometers (OTDR), which are used on optical cables. You also learn about multimeters.

TDR

A time domain reflectometer (TDR) is a device used to send a signal through a particular media to check the continuity of the cable. Good quality TDRs have the capability to locate many types of cabling faults, such as a severed sheath, damaged conductors, faulty crimps, shorts, loose connectors, and the like. TDRs help ensure that data sent across the network is not interrupted by poor cabling that can cause faults in data delivery.

Tip: TDR

For the Network+ exam, you should know that TDRs work on the physical layer of the OSI model, sending a signal through a length of cable looking for cable faults.

OTDR

Because the majority of network cabling is copper-based, most tools designed to test cabling are designed for copper-based cabling. However, when you test fiber-optic cable, you need an optical tester.

An optical cable tester performs the same basic function as a wire media tester, but on optical media. The most common problem with an optical cable is a break in the cable that prevents the signal from reaching the other end. Because of the extended distances fiber-optic cables can cover, degradation is rarely an issue in a fiber-optic LAN environment.

Ascertaining whether a signal reaches the other end of a fiber-optic cable is relatively easy, but when you determine that a break exists, the problem becomes locating the break. That’s when you need a tool called an optical time-domain reflectometer (OTDR). By using an OTDR, you can locate how far along in the cable the break occurs. The connection on the other end of the cable might be the source of the problem, or perhaps there is a break halfway along the cable. Either way, an OTDR can pinpoint the problem.

Unless you work extensively with fiber-optic cable, you’re unlikely to have an OTDR or even a fiber-optic cable tester in your toolbox. Specialized cabling contractors will have them, though, so knowing they exist is important.

Multimeter

One of the simplest cable-testing devices is a multimeter. By using the continuity setting, you can test for shorts in a length of coaxial cable; or, if you know the correct cable pinouts and have needlepoint probes, you can test twisted-pair cable.

A basic multimeter combines several electrical meters into a single unit offering the capability to measure voltage, current, and resistance. Advanced models can also measure temperature. A multimeter has a display, terminals, probes, and a dial to select various measurement ranges. A digital multimeter has a numeric digital display, whereas an analog one has a dial display. Inside a multimeter, the terminals connect to different resistors depending on the range selected.

Network multimeters can do much more than test electrical current. Look for multimeters to do the following:

Ping specific network devices—A multimeter can ping and test response times of key networking equipment such as routers, DNS servers, DHCP servers, and so on.

Verify network cabling—It is possible to use a network multimeter to isolate cable shorts, split pairs, or other faults.

Locate and ID cable—Quality network multimeters enable administrators to locate cables at patch panels and wall jacks using digital tones.

Document findings—Multimeter results can be downloaded to a PC for inspection. Most network multimeters provide a means to link to a PC, such as USB ports.

Network Qualification Tester

The network qualification tester gives administrators a quick glance at the network’s bandwidth and whether in its current configuration it can grow to support VoIP or Gigabit Ethernet.

If a network is running slow, the network qualification tester can identify why the network is struggling. For example, it can identify cross talk within a cable and how it impacts the network performance. Most quality network qualification testers can test twisted-pair and coaxial cable, and other models test for fiber-optic cable.

Tip: Qualification Testing

Remember for the Network+ exam, network qualification testers enable administrators to identify the current speeds the network cabling can support and isolate cabling from network problems.

Butt Set

A butt set is most often associated with telephony, but it can be used on some data networks as well. A butt set enables the administrator or technician to butt or tap into a communication line and use it. In the case of a phone line, a technician can use the line normally—that is, make a call, answer a call, or listen into a call.

The butt set looks somewhat like a regular phone handset with wires attached. The wires from the handset connect to the phone wire and that’s it. The technician can test and access the phone line. This device can test network telephony but has limited use on network cable. Some network butt sets enable the access of data on the cable, but many other tools can do the same thing with better results.

Wireless Detector

Wireless media requires its own types of tools. One such tool is a Wi-Fi detector. The intent of such a device is to reveal Wi-Fi hot spots and detect wireless network access with LED visual feedback. Such devices can be configured to scan specific frequencies. When working with 802.11b/g/n networks, you will most certainly require scanning for 2.4GHz RF signals.

Such devices can be used in the troubleshooting process to identify where and how powerful RF signals are. Given the increase in wireless technologies, RF detectors are sure to increase in popularity. Figure 13.13 shows a Wi-Fi detector.

image

Figure 13.13 Wireless RF detector.

image

Summary

This chapter focuses on the cable management and documentation. Documentation is an important part of the administrator’s role. It involves having documentation of network layout, both physical and logical, and documented network procedures, policies, configurations, and regulations.

Documentation is not a one-time process; keeping up-to-date documentation is necessary to ensure network functionality. In addition to documenting, administrators must review documentation and log files to ensure that they are aware of any security breaches or other issues on the network.

You can use many software- and hardware-based tools to test the network and help in documentation of the network. These tools include packet sniffers, protocol analyzers, load testers, and throughput testers.

Administrators can use many tools to help maintain and troubleshoot network media. These tools include a TDR, OTDR, wireless detector, cable tester, mulitmeter, toner probe, and butt set. In addition, there are tools you can use to work with media, including snips, strippers, and punchdown tools.

Exam Preparation Tasks: Review All the Key Topics

image

Review the most important topics in the chapter, noted with the Key Topics icon in the outer margin of the page. Table 13.4 lists a reference of these key topics and the page numbers on which each is found.

Table 13.4 Key Topics for Chapter 13

image

Complete the Tables and Lists from Memory

Print a copy of Appendix B, “Memory Tables” (found on the CD), or at least the section for this chapter, and complete the tables and lists from memory. Appendix C, “Memory Tables Answer Key,” also on the CD, includes completed tables and lists to check your work.

Define Key Terms

Define the following key terms from this chapter, and check your answers in the Glossary.

Baselines

Butt set

• Cable stripper

• Event logs

• History logs

• IP address

• Load testing

Media testers

Multimeter

• OTDR

• Packet sniffers

• Physical and logical network diagrams

• Policies and procedures

• Port scanners

• Punchdown tool

• Protocol analyzer

Regulations

• System logs

• TDR

• Temperature monitor

Toner probe

Throughput testers

• Twisted-pair

• Voltage event recorder

• Wire crimpers

• Wiring schematics

• Wireless

Apply Your Knowledge

Exercise 13.1 Testing Network Throughput

In this exercise, you walk through the steps to test the throughput between two points on a network. You download a trial version of a software-based throughput tester and use it to test the connection.

Estimated time: 10 minutes

1. Open your Internet browser and go to the QCheck page on the IxChariot website: www.ixiacom.com/products/display?skey=qcheck.

2. From this screen, click the link that reads Install QCheck.

3. You will be asked to fill out your name and address on a form web page. Then verification will be sent to your email. Click the link in your email to begin the download of the QCheck tester.

4. The installed QCheck throughput tester resembles Figure 13.14.

Figure 13.14 QCheck throughput tester.

image

5. With the throughput tester open, select the protocol you want to test, either UDP or TCP. Select the beginning location and end point IP addresses.

6. Finally, select the brown Throughput button, and click the Run button to test the throughput between the two points you selected.

7. To test the difference in performance, try testing the throughput at different times of day. The throughput readouts should vary according to traffic load.

Exercise 13.2 Diagram Your Network

This exercise assumes you have a home network established or have knowledge of a network design. In this exercise, you document a physical network design.

Estimated time: 10 minutes

1. Open your browser and navigate to the WERESC website at http://www.weresc.com/network.php.

2. Select the Download link. This installs free network diagram software to your computer, as shown in Figure 13.15.

Figure 13.15 Network diagram software.

image

3. Using the predrawn elements on the left side of the screen, draw the physical layout of your network.

Review Questions

You can find answers to the review questions in Appendix A, “Answers to Review Questions.”

1. You have recently installed a new server in a wiring closet. The server shuts down periodically, and you suspect there might be power-related problems. Which of the following tools might you use to isolate a power problem?

a. Voltage multimeter

b. Voltage regulator

c. Voltage monitor

d. Voltage event recorder

2. While you were away, an air conditioning unit malfunctioned in a server room, and the room and some equipment overheated. Which of the following would have alerted you to the problem?

a. Multimeter

b. Temperature monitor

c. TDR

d. OTDR

3. Which of the following involves pushing the network beyond its limits, often downing the network to test network limits and recovery procedures?

a. Crash and burn

b. Stress test

c. Recovery test

d. Load test

4. You have been given a physical wiring schematic. The schematic shows the following:

image

Given this information, what cable recommendation might you make if any?

a. Nonplenum cable should be used between the IDF and MDF.

b. Horizontal cable run should use plenum cable.

c. Patch cable connecting printer should be shorter.

d. Leave network cabling as is.

5. What tool would you use when working with an IDC?

a. Wire crimper

b. Media tester

c. OTDR

d. Punchdown tool

6. As a network administrator, you work in a wiring closet where none of the cables have been labeled. Which of the following tools are you most likely to use to locate the physical ends of the cable?

a. Toner probe

b. Wire crimper

c. Punchdown tool

d. ping

7. Which of the following commands can be issued from the command line to view the status of the systems ports?

a. netstat -p

b. netstat -o

c. netstat –a

d. netstat -y

8. You suspect that an intruder has gained access to your network. You want to see how many failed logon attempts there were in one day to help determine how they got in. Which of the following might you do?

a. Review the history logs.

b. Review the security logs.

c. Review the logon logs.

d. Review the performance logs.

9. You have been called into to inspect a network configuration. All your customer has for reference is a single network diagram. Considering the diagram, which of the following statements are true?

image

a. Cable 1 does not need to be plenum rated.

b. Cable 2 should be STP cable.

c. Cable 3 is incorrect, STP cannot be connected directly to a wall jack.

d. Cable 2 goes beyond recommended length.

e. The network looks good from this diagram.

10. You install a new system into an existing star network and need a cable that is 45 feet long. Your local vendor does not stock cables of this length, so you are forced to make your own. Which of the following tools will you need to complete the task?

a. Optical tester

b. Punchdown tool

c. Crimper

d. UTP splicer

11. Which of the following network utilities are used by both hackers and administrators to eavesdrop on network transmissions?

a. Port filters

b. Packet filters

c. Data watchers

d. Packet sniffers

12. You are troubleshooting a problem with a workstation and have managed to narrow it down to a single patch cable. What tool might you use to troubleshoot the problem further?

a. Tone generator/locator

b. OTDR

c. ping

d. Media tester

13. You have recently been informed that 75 new users will be added to the network over the next 2 months. You are concerned about the impact on overall network functionality. Which of the following could you do to verify that the network can handle the load?

a. Stress test

b. Performance test

c. Load test

d. Traffic test

14. What tool can find a break in a length of fiber-optic cable?

a. Tone generator

b. TDR

c. OTDR

d. Fox and hare

15. You have been called in to troubleshoot a network experiencing intermittent connectivity problems. Which of the following documentation might you request to see first?

a. Security logs

b. History logs

c. Physical network diagram

d. Logical network diagram

16. Which of the following utilities can measure voltage, current, and resistance?

a. Multimeter

b. TDR

c. OTDR

d. Toner probe

17. A toner probe is sometimes referred to as what?

a. Fox and rabbit

b. Fox and hare

c. Fox and hound

d. Fox and dog

18. Which of the following describes network procedures?

a. Legally enforceable rules.

b. Series of rules established by an organization.

c. They identify the way in which network tasks are to be performed.

d. They identify the way in which policies are to be followed.

19. Your network server maintains several key applications shared to all systems on the network. Recently users have been complaining that the application runs slowly and sometimes they can’t access it at all. Which of the following might you do first?

a. Move the server closer to the client stations.

b. Review the physical network diagram.

c. Review the logical logs.

d. Review the application logs.

20. On several occasions, your network server has been compromised and a Trojan horse installed remotely. You suspect someone is gaining access to your system. Which of the following might you do? (Choose two.)

a. Review the history logs.

b. Use a port scanner.

c. Use a packet sniffer.

d. Use the netstat –a command.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset