Welcome to CAVI, the Cisco Academy for the Vision Impaired. Course Fees Linux Wiki HTML Wiki Documentation Index PmWiki FAQ |
Main /
Chapter 6 - Networks6.0 Networks6.0.1 introduction >6.0.1.1 IntroductionThe image on this page shows a data centre with banks of computer servers, routers, and switches on the left and right with a passageway running between them in the centre of the image. There are two people standing behind the nearest banks of servers, one on the left and one on the right. The person on the right is handing the end of an Ethernet cable, across the passageway, to the person on the left. 6.1 Principles of Networking6.1.1 Computer Networks >6.1.1.1 Define Computer networksThe image on this page shows a desktop computer connected to a wireless router. There is also a laptop, and a wireless printer. The desktop computer and laptop are sharing data. The printer is able to receive the data sent from the desktop computer and laptop for printing. 6.1.1 Computer Networks >6.1.1.2 Features and BenefitsThe image on this page shows 3 workstations connected to a server. The server is connected to printers, scanners, modems, applications and files. Network computers share resources. 6.1.1 Computer Networks >6.1.1.3: Activity - Advantages and Disadvantages of NetworkingThe figure on this page is an interactive activity that allows the learner to classify characteristics of networks as either a PRO or a CON of networking. CON has two characteristics and PRO has three characteristics. The available characteristics are:
The figure also has the following 2 buttons:
6.2 Identifying Networks6.2.1 Types of Networks >6.2.1.1 LANsThe figure on this page shows a local area network (LAN) consisting of three workstations, a server, and an IP phone, all connected to a central switch. 6.2.1 Types of Networks >6.2.1.2 WLANsThe figure on this page shows a wireless local area network (WLAN) that has three desktop computers connected to a central wireless router. 6.2.1 Types of Networks >6.2.1.3 PANsThe image on this page shows a person with a personal area network (PAN) that uses Bluetooth technology and consists of a smart phone, wireless laptop, a wireless printer and a wireless speaker. 6.2.1 Types of Networks >6.2.1.4 MANsThe figure on this page shows a group of buildings that are all interconnected to form a metropolitan area network (MAN). The image also shows that there are LANS in three of the buildings and that one of the buildings in the MAN is connected to another building that is not part of the MAN forming a WAN. 6.2.1 Types of Networks >6.2.1.5 WANsThe figure on this page shows two LANs connected over a serial connection forming a Wide Area Network (WAN) 6.2.1 Types of Networks >6.2.1.6 Peer-to-Peer NetworksThe figure on this page shows three computers connected to a switch creating a peer to peer network. 6.2.1 Types of Networks >6.2.1.7 Client/Server NetworksThe figure on this page shows a server that is an Email server, Web server and File Server connected to the following four client computers:
6.2.1 Types of Networks >6.2.1.8: Activity - Matching Network TypesThe figure on hsi page is an interactive activity that allows the learner to match network descriptions to the correct network type. The network types are:
The network descriptions are:
The figure also has the following 2 buttons:
6.3 Basic Networking Concepts and Technologies6.3.1 Data Flow >6.3.1.1 BandwidthThe image on this page shows the following three statements about networks and related images:
6.3.1 Data Flow >6.3.1.2 Data TransmissionThe 2 figures on this page show the difference between Half Duplex and Full Duplex. Both the figures show two computers connected over a network. Half-Duplex:
Full-Duplex:
6.3.2 Networked Equipment Addressing >6.3.2.1 IP AddressingThe figure on this page shows a computer user sitting at a computer which is connected to a wireless router. The router is connected three servers on the internet. The following IP addresses for the computer and the servers are displayed:
6.3.2 Networked Equipment Addressing >6.3.2.2 IPv4The figure on this page shows the following tables listing the IPv4 address classes:
Class D addresses are used for multicast groups, such as webcasts or streaming videos to a select group. Class E addresses are used for research use only. 6.3.2 Networked Equipment Addressing >6.3.2.3 IPv6Figure 1 on this page shows the following three-part hierarchy of IPv6 addreses.
Addresses are expressed as 8 hexadecimal values, separated by colons.
The figure also shows the IPv6 address with the Subnet ID, '08d3' highlighted. Figure 2 on this page shows the following table with an example of how the IPv6 rules for abbreviating addresses are applied:
6.3.2 Networked Equipment Addressing >6.3.2.4 Static AddressingImage 1 on this page shows the General control tab in the Windows XP Internet Protocol version 4 (TCP/IPv4) Properties dialog box where the user is able to configure the IP address, Subnet Mask, Default gateway as well as Preferred DNS server and Alternative DNS Server. Image 2 on this page shows the Windows XP Network Connection Details window. This displays information such as: The name and model of the hardware that is being used to make the link happen between the computer and the network, MAC address (Physical address), IPv4 address, Subnet Mask, Default Gateway, DNS server, DHCP server, Lease obtained and lease expires, DHCP enabled and other information. 6.3.2 Networked Equipment Addressing >6.3.2.5 DHCP AddressingImage 1 on this page shows 2 versions of the General tab in the Windows XP Internet Protocol version 4 (TCP/IPv4) Properties dialog box. The first version has the Obtain an IP address automatically option selected. It also has the Use the following DNS server addresses option selected. The second version has the Obtain an IP address automatically option selected. It also has the Obtain DNS server address automatically option selected. See page notes for full description. Image 2 on this page shows the General tab in the Windows XP Internet Protocol version 4 (TCP/IPv4) Properties dialog box highlighting the Obtain DNS server address automatically option. Image 3 on this page shows the Alternative Configuration tab in the Windows XP Internet Protocol version 4 (TCP/IPv4) Properties dialog box highlighting the User Configure option. See page notes for full description. 6.3.2 Networked Equipment Addressing >6.3.2.6 ICMPThe image on this page shows the Windows XP Command Prompt executing the following ping command:
END OF COMMAND PROMPT OUTPUT 6.3.2 Networked Equipment Addressing >6.3.2.7: Lab - Configure a NIC to Use DHCP in Windows 7See IT Essentials 5.0 Labs and Worksheets Accessible Files 6.3.2 Networked Equipment Addressing >6.3.2.8: Lab - Configure a NIC to Use DHCP in Windows VistaSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.3.2 Networked Equipment Addressing >6.3.2.9: Lab - Configure a NIC to Use DHCP in Windows XPSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.3.2 Networked Equipment Addressing >6.3.2.10: Packet Tracer - Adding Computers to an Existing NetworkThis task cannot be completed as it requires Packet Tracer, which is inaccessible. Common Ports and Protocols >6.3.3.1 TCP and UDPThe figure on this page shows the following table listing the advantages and applications for TCP and UDP:
Common Ports and Protocols >6.3.3.2 Activity - TCP vs. UDPThe figure on this page is an interactive activity that allows the learner to match the protocol with a list of advantages. Each protocol can have six advantages. The protocols are:
The advantages are:
The figure also has a Reset button. Common Ports and Protocols >6.3.3.3 TCP and UDP Protocols and PortsThe figure on this page shows the following table listing the common network protocols and ports:
Common Ports and Protocols >6.3.3.4: Worksheet - Protocol Definitions and Default PortsIn this worksheet, the learner will write the name of the protocol and the default port(s) for each protocol definition in the table. See IT Essentials 5.0 Labs and Worksheets Accessible Files 6.4 Physical Components of a Network6.4.1 Network Devices >6.4.1.1 ModemsThe image on this page shows the following three different types of modems.:
6.4.1 Network Devices >6.4.1.2 Hubs, Bridges, and SwitchesFigure 1 on this page shows an image of the front and back of a hub. The figure also shows a diagram of four computers, a server, and a printer connected to a central hub. Figure 2 on this page shows an image of the top and back of a switch. The figure also shows a diagram of a computer, a server, and an IP phone connected to a central switch. 6.4.1 Network Devices >6.4.1.3 Routers and Wireless Access PointsFigure 1 on this page shows an image of the top and back of a DSL modem. The figure also shows a diagram of a DSL modem connecting a home to a telephone line and a cable modem connecting a home to a coaxial cable. Figure 2 on this page shows an image of a wireless access point. The figure also shows a diagram of a wired local area network consisting of three computers, a server, and a printer connected to a wireless access point. The wireless access point is broadcasting Internet signal to three laptops. Figure 3 on this page shows an image of a Cisco multipurpose device that is a home gateway, a wireless access point and a switch. 6.4.1 Network Devices >6.4.1.4 NASThe image on this page shows a Network-attached storage (NAS) device which allows a user to store videos, music, pictures and files and to be able to access the files anywhere in the world with an internet connection. 6.4.1 Network Devices >6.4.1.5 VoIP PhonesThe image on this page shows arious IP phones from Cisco and Linksys which look like standard ordinary telephones. 6.4.1 Network Devices >6.4.1.6 Hardware FirewallsFigure shows the internal firewall feature of an integrated router protecting two hosts on an internal network. The figure on this page shows how a hardware firewall works. An internal network consisting of hosts H1 and H2and a web server are connected to an integrated router. The integrated router consists of an internal router, an internal firewall, and an ethernet switch. An external network, H3 wants to log in to the internal network. the H3 network traffic is directed by the internal router which then sends the H3 network traffic to the internal firewall. If the network traffic is allowed to go through the internal firewall the H3 network traffic is then sent to the Ethernet switch which is connected to all of the wired computers in the internal network giving the H3 access to the internal network. If the H3 network traffic was not allowed to go through the network then the traffic would be blocked and prevented from entering the internal network. 6.4.1 Network Devices >6.4.1.7 Internet AppliancesThe image on this page shows the Cisco web TV appliance running. 6.4.1 Network Devices >6.4.1.8 Purchasing Authentic Networking DevicesThe image on this page shows two Cisco network devices side by side that look identical. One is authentic and the other is a counterfeit product. The description given for this figure is, "The cosmetic differences between an authentic product and a counterfeit can be extremely subtle or non existent.". 6.4.2 Cables and Connectors >6.4.2.1 Considerations for Cabling a NetworkThe images on this page show the following three different types of network cables:
6.4.2 Cables and Connectors >6.4.2.2 Coaxial CablesImage 1 on this page shows a coaxial cable with the different layers exposed. Image 2 on this page shows the following different layers of a coaxial cable:
Image 3 on this page shows the following two types of coaxial connectors. See page notes for full description:
6.4.2 Cables and Connectors >6.4.2.3 Twisted-Pair CablesFigure 1 on this page is an image showing the different pairs of copper wires in a twisted-pair cable encased in colour-coded insulation and twisted together. (Figure 2 on this page shows the following table of Twisted-Pair Cable Features.:
Figure 3 on this page shows an image of a Cat 3 cable with a 6 pin RJ11 connector and a Cat 3 cable with 8 pin RJ 45 connector. 6.4.2 Cables and Connectors >6.4.2.4: Lab - Building Straight-Through and Crossover UTP CablesSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.4.2 Cables and Connectors >6.4.2.5: Packet tracer - Cabling a Simple NetworkThis task cannot be completed as it requires Packet Tracer, which is inaccessible. 6.4.2 Cables and Connectors >6.4.2.6 Fibre-Optic CablesThe figure on this page shows a perspective view and a front view of a fibre-optic cable with the following different layers exposed:
The figure also shows an image of three different fibre-optic cables with different connectors and four different sockets. See page notes for full description. 6.5 Network Topologies6.5.1 Topologies >6.5.1.1 Logical and Physical TopologiesThe figure on this page is an interactive activity that allows the learner to view a number of different physical topologies. The figure consists of six buttons with the names of different topologies. As each button is selected the corresponding topology is displayed. See page notes for full description. The topologies are:
6.5.1 Topologies >6.5.1.2: Packet Tracer - Physical TopologiesThis task cannot be completed as it requires Packet Tracer, which is inaccessible. 6.5.1 Topologies >6.5.1.3 Determining the Network TopologyThe figure on this page shows the network topology of a school. The network consists of the five following separate buildings:
6.6 Ethernet Standards6.6.1 Cabled and Wireless >6.6.1.1 Standards OrganisationsThe figure on this page shows the following table listing the various standards organisations for setting networking standards:
6.6.1 Cabled and Wireless >6.6.1.2 IEEE 802.3The figure on this page is an interactive activity that illustrates to the learner collisions in a hub based network. The network consists of hosts H1 to H8 connected to a central hub. When data is sent by two random hosts each will send a data packet to the hub at the same time. When these two packets reach the hub at the same time they collide, therefore causing data transmission errors. See page notes for full description. 6.6.1 Cabled and Wireless >6.6.1.3 Ethernet TechnologiesThe figure on this page shows the following table listing the following different IEEE 802.3 ethernet standards:
6.6.1 Cabled and Wireless >6.6.1.4 IEEE802.11The figure on this page shows the following table listing the following different IEEE 802.11 wireless ethernet standards:
6.7 OSI and TCP/IP Data Models6.7.1 Reference Models >6.7.1.1 TCP/IPThe figure on this page shows the following table listing the TCP/IP layers:
6.7.1 Reference Models >6.7.1.2 OSIThe figure on this page shows the following table listing the OSI layers:
6.7.1 Reference Models >6.7.1.3 Comparing the OSI and TCP/IP ModelsThe figure on this page compares the TCP/IP and OSI models.
6.7.1 Reference Models >6.7.1.4 Activity - Match the OSI Model to the TCP/IP ModelThe figure on this page is an interactive activity that allows the learner to match the OSI Model layers to the TCP/IP Model layers. The TCP/IP Model layers are:
The OSI Model layers are:
The figure also has the following 2 buttons:
6.8 Computer to Network Connection6.8.1 Network Installation Steps >6.8.1.1 Network Installation Completion ListThe figure on this page shows a floor plan diagram of an office space with 3 new desktop computers as well as the new equipment rack and patch panel. The diagram also shows the basic wiring layout. 6.8.2 Network Cards >6.8.2.1 Selecting a NICThe figure on this page shows three images of the following different network interface cards:
6.8.2 Network Cards >6.8.2.2: Worksheet - Internet Search for NIC DevicesSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.2 Network Cards >6.8.2.3 Installing and Updating a NICThe image on this page shows Driver tab of the Broadcom NetXtreme Gigabit Ethernet Properties window with the Roll Back Driver button highlighted. 6.8.2 Network Cards >6.8.2.4: Lab - Install a Wireless NIC in Windows 7See IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.2 Network Cards >6.8.2.6: Lab - Install a Wireless NIC in Windows VistaSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.2 Network Cards >6.8.2.6: Lab - Install a Wireless NIC in Windows XPSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.2 Network Cards >6.8.2.7 Configuring a NICImage 1 on this page shows the Local Area Connection Properties window listing the following available protocols that the device uses:
Image 2 on this page shows the Alternate Configuration tab of the Internet Protocol Version 4 (TCP/IPv4) Properties window. If the computer is used on more than one network the user can enter the following alternate IP settings:
6.8.2 Network Cards >6.8.2.8 Advanced NIC SettingsImage 1 on this page shows the Advanced tab of the Broadcom Gigabit Ethernet Properties window. Two text list boxes are displayed, Property and Value. The Speed and Duplex property is selected as well as the value of Auto. Image 2 on this page shows the Advanced tab of the Atheros Fast Ethernet Controller Properties window. Two text list boxes are displayed, Property and Value. The Wake Up Capabilities property is selected as well as the value of Magic Packet. Image 3 on this page shows the Select Network Service window with QoS packet Scheduler installed. 6.8.2 Network Cards >6.8.2.9: Packet Tracer - Install a Wireless NICThis task cannot be completed as it requires Packet Tracer, which is inaccessible. 6.8.3 Wireless and Wired Router Configurations >6.8.3.1 Connecting to the RouterThe image on this page shows an ethernet cable about to be plugged into a router. The three LEDs next to the ethernet port are circled. See page notes for full description. 6.8.3 Wireless and Wired Router Configurations >6.8.3.2 Setting the Network LocationImage 1 on this page shows the Set Network Location window. See page notes for full description. Image 2 on this page shows the Advanced sharing settings window of the Network and Sharing Center utility. The available settings are as follows:
6.8.3 Wireless and Wired Router Configurations >6.8.3.3 Logging in to the RouterThe image on this page shows the Windows Security window where the user can enter the username and password. There is also a checkbox box to allow Windows to Remember my credentials. 6.8.3 Wireless and Wired Router Configurations >6.8.3.4 Basic Network SetupThe image on this page shows the Cisco E2500 Router Setup Page open in Internet Explorer. Here the user can set options including the following:
6.8.3 Wireless and Wired Router Configurations >6.8.3.5: Lab - Connect to a Router for the First TimeSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.3 Wireless and Wired Router Configurations >6.8.3.6: Packet Tracer - Connect to Wireless Router and Configure Basic SettingsThis task cannot be completed as it requires Packet Tracer, which is inaccessible. 6.8.3 Wireless and Wired Router Configurations >6.8.3.7 Basic Wireless SettingsThe image on this page shows the E2500 Wireless Setup Screen open in Internet Explorer. Here the user can set the following options for both 5 GHZ and 2.4 GHz:
6.8.3 Wireless and Wired Router Configurations >6.8.3.8: Lab - Configure Wireless Router in Windows 7See IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.3 Wireless and Wired Router Configurations >6.8.3.9: Lab - Configure Wireless Router in Windows VistaSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.3 Wireless and Wired Router Configurations >6.8.3.10: Lab - Configure Wireless Router in Windows XPSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.3 Wireless and Wired Router Configurations >6.8.3.11: Packet Tracer - Connecting Wireless PCs to a Linksys WRT300NThis task cannot be completed as it requires Packet Tracer, which is inaccessible. 6.8.3 Wireless and Wired Router Configurations >6.8.3.12 Testing Connectivity with the Windows GUIThe image on this page shows the Wireless Network Connection Status window displaying the following information:
6.8.3 Wireless and Wired Router Configurations >6.8.3.13 Testing Connectivity with the Windows CLIFigure 1 on this page shows the following table listing the different Ipconfig Command Options:
Figure 2 on this page shows the following table listing the different Ping Command Options:
Figure 3 on this page shows the following table listing the Net Commands:
6.8.3 Wireless and Wired Router Configurations >6.8.3.14: Lab - Test the Wireless NIC in Windows 7See IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.3 Wireless and Wired Router Configurations >6.8.3.15: Lab - Test the Wireless NIC in Windows VistaSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.3 Wireless and Wired Router Configurations >6.8.3.16: Lab - Test the Wireless NIC in Windows XPSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.3 Wireless and Wired Router Configurations >6.8.3.17: Packet Tracer - Test a Wireless ConnectionThis task cannot be completed as it requires Packet Tracer, which is inaccessible. 6.8.4 OS Configurations >6.8.4.1 Domain and WorkgroupThe image on this page shows the windows 7 System information window with the following information displayed:
6.8.4 OS Configurations >6.8.4.2 Connecting to a Workgroup or a DomainImage 1 on this page shows the Windows 7 Computer Name /Domain Changes window where the user can enter the Computer name and the Domain or Workgroup name. Image 2 on this page shows the Join a Domain or Workgroup window with the following options:
6.8.4 OS Configurations >6.8.4.3 Windows 7 HomegroupImage 1 on this page shows the Network and Sharing Center window which has three sections. The first section is a network map showing the computer connected to the network which is connected to the Internet. The second section, View your Active Networks displays your network name, access type and connection strength represented by bars. The third section, Change your Network Settings has the following options:
Image 2 on this page shows the HomeGroup window which displays the following three links when a homegroup can be created:
The window also displays a Create a Homegroup button Image 3 on this page shows the HomeGroup window which is displayed when the user can join a homegroup. The wondow lists the same three links as when a homegroup can be created but the Create a homegroup button is replaced with a Join now button. 6.8.4 OS Configurations >6.8.4.4 Sharing Resources in Windows VistaThe image on this page shows the Windows Vista Network and Sharing Centre utility listing the following settings:
6.8.4 OS Configurations >6.8.4.5 Sharing Resources in Windows XPThe image ion this page shows the Windows XP Network Setup Wizard where the user can:
6.8.4 OS Configurations >6.8.4.6 Network Shares and Mapping DrivesImage 1 on this page shows the Permissions window of a shared folder.. The window has two sections. The first section is Group or usernames which lists all of the current groups and users that have access to the folder. Below this section are the following two buttons:
The second section lists Permissions for groups and users. Each type of permission can be either allowed or denied. The types of permissions are:
Image 2 on this page shows the Map Network Drive utility where the user can specify the drive letter for the connection and the folder that the user wants to connect to. The following two checkboxes are also displayed:
6.8.4 OS Configurations >6.8.4.7: Lab - Share a Folder create a Homegroup and Map a Network Drive in Windows 7See IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.4 OS Configurations >6.8.4.8: Lab - Share a Folder create a Homegroup and Map a Network Drive in Windows VistaSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.4 OS Configurations >6.8.4.9: Lab - Share a Folder create a Homegroup and Map a Network Drive in Windows XPSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.8.4 OS Configurations >6.8.4.10 VPNThe image on this page shows the Connect VPN Connection Utility. The user can join a Virtual Private Network by entering the user name, password, and domain. 6.9 Select an ISP Connection Type6.9.1 Connection Technologies >6.9.1.1 Brief History of Connection TechnologiesThe image on this page shows a satellite dish, a broadband modem and a broadband splitter device. 6.9.1 Connection Technologies >6.9.1.2 DSL and ADSLThe figure on this page shows a home computer connected to a DSL modem which is connected to the ISP using a twisted pair Ethernet cable. 6.9.1 Connection Technologies >6.9.1.3 Line of Sight Wireless Internet ServiceThe figure on this page shows a wireless transmission tower which has a direct line of sight through satellite dishes to a hone's receiver. This allows a wireless network to be created inside the home that connects all of the devices in the home to each other and to the Internet. 6.9.1 Connection Technologies >6.9.1.4 WiMAXThe figure on this page shows an ISP network sending the signal through a cable to a WiMax transmitter which then sends the signal to another WiMax transmitter which broadcasts the signal to a home which is in line of sight, therefore providing Internet access. 6.9.1 Connection Technologies >6.9.1.5 Other Broadband technologiesThe figure on this page shows an ISP satellite service provider sending a signal to a satellite which relays the signal to a satellite modem connected to a laptop. 6.9.1 Connection Technologies >6.9.1.6: Worksheet - Answer Broadband QuestionsSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.9.1 Connection Technologies >6.9.1.7 Selecting an ISP for the CustomerThe figure on this page shows the following table listing the various types of Internet connections offerred by ISPs:
6.9.1 Connection Technologies >6.9.1.8: Worksheet - ISP Connection TypesSee IT Essentials 5.0 Labs and Worksheets Accessible Files 6.10 Common Preventative Maintenance Techniques Used for Networks6.10.1 Network Maintenance >6.10.1.1The image on this page shows two IT technicians trying to identify issues within the server rack with one of the technicians holding a laptop computer. 6.11 Basic Troubleshooting Process for Networks6.11.1 Applying the Troubleshooting Process to Networks >6.11.1.1 Identify the ProblemThe figure on this page shows the following table listing the first step in troubleshooting network problems:
6.11.1 Applying the Troubleshooting Process to Networks >6.11.1.2 Establish a Theory of Probable CauseThe figure on this page shows the following table listing the second step in troubleshooting network problems:
6.11.1 Applying the Troubleshooting Process to Networks >6.11.1.3 Test the Theory to Determine CauseThe figure on this page shows the following table listing the third step in troubleshooting network problems:
6.11.1 Applying the Troubleshooting Process to Networks >6.11.1.4 Establish a Plan of Action to Resolve the Problem and Implement the SolutionThe figure on this page shows the following table listing the fourth step in troubleshooting network problems:
6.11.1 Applying the Troubleshooting Process to Networks >6.11.1.5 Verify Full System Functionality and Implement Preventative MeasuresThe figure on this page shows the following table listing the fifth step in troubleshooting network problems:
6.11.1 Applying the Troubleshooting Process to Networks >6.11.1.6 Document Findings, Actions, and OutcomesThe figure on this page shows the following table listing the sixth step in troubleshooting network problems:
6.11.2 Common Problems and Solutions for Networks >6.11.2.1 Identify Common Problems and SolutionsThe figure on this page shows the following table listing common network problems and solutions:
6.12 Networks6.12.1 Summary >6.12.1.1 SummaryThe image on this page shows a data centre with banks of computer servers, routers, and switches on the left and right with a passageway running between them in the centre of the image. There are two people standing behind the nearest banks of servers, one on the left and one on the right. The person on the right is handing the end of an Ethernet cable, across the passageway, to the person on the left. End of Chapter 6: Networks. Next - Chapter 7: Laptops. |