Semester 3 - Review
|
|
Network Documentation
Cut Sheets and diagrams
MDF and IDF layouts
Server and workstation configurations
Software listings
Maintenance records
Serurity measures
User Policies
|
Network Security
Network access
Password - length, expire, re-use
Restricted/Timed access to network
Password protected screen savers, log off at end of day
Data Recovery
UPS, Backups and Disk Array
Tape Backup
Full - all data backed up. Archive bits set back to 0
Incremental - all files created or modified since last full. Archive bit set back to 0 after incremental
Differential - all files created or modified since last full. Archive bit is left a 1 after differential
RAID - Redundant Array of Inexpensive Disks
RAID 0 - Stripes data across mulitple disks, no parity, no redundancy
RAID 1 - 2 types
- Disk mirroring - 2 disk same controller, duplicate information
- Disk duplexing - 2 disks 2 controllers, duplicate information
RAID 5 - minimum 3 disks, stripes info across disks, parity, redundancy
Environmental Factors
Static, dust, dirt and heat
Power conditioning
Isolating transformers - voltage spikes and HF noise
Regulators - maintain constant voltage output
Line conditioners - regulator with isolating transformer built-in
EMI and RFI interference
Viruses
|
Server Administration
Peer-to-Peer
Recommended 10 workstation maximum
All workstations have all software installed on them. Individual user accounts are setup on each machine
Client-Server
Server is center of network. One password, one user account. All programs are on server.
Network Troubleshooting
Scientific method
Gather data, analyze data and come up with possible solution, implement solution, problem fixed?, if not undo solution and re-analyze
Analyze Network Troubleshooting
Use the ping command to test local NIC card
127.0.0.1 is local loopback test address to test NIC card
|
Goto page 1
|
© Copyright 2000
|