Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Distributed firewall wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer network wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
CCNA EXPLORATION ACCESSING THE WAN Study Guide Chapter 8: Network Troubleshooting 8.1.1 8.1.2 8.1.3 8.1.4 8.2.1 8.2.2 8.2.3 8.2.4 Describe network baseline. Network documentation should include what components? Describe the Network Configuration Table. What data set should be included for all components? Describe the End-system Configuration Table. For troubleshooting purposes, what information should be documented? Describe the Network Topology Diagram. At a minimum, the topology diagram should include what? What are some of the commands that are useful to the network documentation process? Why is establishing a network performance baseline important? What are the recommended steps for planning the first baseline? What is some network management software often used to baseline networks? What are the 2 extreme approaches to troubleshooting? Describe using layered models for troubleshooting. Describe using the OSI reference model for troubleshooting. Describe using the TCP/IP reference model for troubleshooting. Describe the stages of the general troubleshooting process. Why is a troubleshooting policy a good idea? What are the three main methods for troubleshooting networks? Describe the bottom up approach. When would the bottom up approach be the approach to use? What would be a disadvantage of the bottom up approach? CCNA EXP 4 CH.8 Network Troubleshooting APRIL 2009 8.2.5 8.2.6 8.3.1 8.3.2 8.3.3 8.3.4 Describe the top down approach. When would the top down approach be the approach to use? What would be a disadvantage of the top down approach? Describe the divide-and-conquer approach. When would the top down approach be the approach to use? What are the steps to determine the scope of the problem gather (document) the symptoms? Why is the use of the debug command not always the best choice when gathering symptoms? What are some effective questioning techniques to use with end users? Describe NMS tools. (Swr) Describe Knowledge bases. (Swr) Describe Baselining Tools. (Swr) Describe Protocol Analyzers. (swr) Describe Network Analysis Module. (Hdw) Describe Digital Multimeters. (Hdw) Describe Cable Testers (Hdw) Describe TDRs. (Hdw) Describe Cable Analyzers. (Hdw) Describe Portable Network Analyzers. (Hdw) Describe WAN communications. What are the steps in WAN design? Why are WAN traffic considerations important? Designing a WAN topology essentially consists of what? CCNA EXP 4 CH.8 Network Troubleshooting APRIL 2009 What are the types of WAN topologies? When is a three-layer hierarchy often used? Describe the connection technologies a typical private WAN uses. Describe the various WAN connection technologies. 8.3.5 8.3.6 Describe the Internet as related WANs. Describe bandwidth considerations as related WANs. Describe some common WAN implement issues 8.3.7 8.4.1 8.4.2 8.4.3 8.4.4 8.4.5 8.4.6 CCNA EXP 4 CH.8 Network Troubleshooting APRIL 2009