Remote accessing and related issues

Assignment Help Computer Networking
Reference no: EM13806918

Remote Accessing and Related Issues

An organization's head office is connected to its branch office over the Internet. The network connection works fine without errors. The users at the branch office connect to the head office by using telnet to access UNIX-based servers and a virtual network console (VNC) to access Windows-based servers. They transfer data across the network by using FTP. However, the users complain of a mismatch in the content sent from the head office and that received by them at the branch office.

Based on your understanding of the above scenario create a Microsoft Word document, answering the following:

  • What can be the cause of the problem? Suggest some ways to resolve the problem.
  • Which is the best way to resolve the problem and why?

Users from the finance department access an Oracle server for their operations. The computers on the finance department network are assigned public IP addresses. The Oracle server is on a different network than the finance department network. The users complain of slow response from the Oracle server. A detailed observation of the traffic flow in and out of the server shows a large number of ICMP echo and echo-reply packets. Consider that you are part of the network administration team of the organization. Imagine yourself as a network administrator.

Based on your understanding of the above scenario, create a Microsoft word document answering the following:

  • How will you resolve the problem?
  • Which would be the first place that you would look at for excessive echo and echo-reply packets?
  • Explain in detail of the various commands and in what order you would diagnose to efficiently pinpoint the issue in quickest possible time.

Many users on the local LAN are facing a slow response from the Oracle server. The management has asked you to produce the response time and throughput statistics between a user's computer and the server.

Based on your understanding of the above scenario, create a Microsoft Word document answering the following:

  • Simulate the scenario in Etherpeek and generate the required report.
  • As part of the technical proposal, document the troubleshooting tools to be used and list the steps to be taken in case of a problem.
  • Discuss the different problem scenarios that the client may face.

Reference no: EM13806918

Questions Cloud

Discuss the types of monitoring and alarms : Discuss the types of monitoring and alarms necessary in your configuration. Describe where each one is housed and how it is implemented
What is reaction to james eastons opening statement : What is your 1st reaction to James Eastons' Opening Statement re: Who is responsible for the 9/11 attacks?What is the premise of the video? Lastly, Do you feel Easton provided enough evidence to prove his theory
Write an essay about your possible selection of a spouse : Write an essay about your possible selection of a spouse. the question is would consider marrying someone of whom your parents did not approve.
The equilibrium price and quantity of generic soft drinks : How will these events impact the equilibrium price and quantity of generic soft drinks?
Remote accessing and related issues : Remote Accessing and Related Issues- An organization's head office is connected to its branch office over the Internet. The network connection works fine without errors. The users at the branch office connect to the head office by using telnet to ..
Write an essay that defines and describes friendship : Write an essay that defines and describes friendship.
Explain what the concept of limiting reactant means : The concept of limiting reactant is a very important one in Chemistry. Explain what the concept of limiting reactant means and give an example of a limiting reactant everyday-life situation.
Can the orange corporation have the case removed to federal : Situation 1: Mike, a Utah resident, sues Jim, a Nevada resident for $60,000 in Nevada's Federal District court for negligence (a state law civil suit). Jim argues that the case should be dismissed for a lack of subject matter jurisdiction. Is he righ..
Analyze the main pros and cons in debates about the policy : Analyze the main pros and cons in debates about the policy. Evaluate the pros and cons from two perspectives

Reviews

Write a Review

Computer Networking Questions & Answers

  Develop a plan for the installation of the new nics

Develop a plan for the installation of the new NICs within the company network and Collate these results to create an outline of the requirements that the new NIC would need to meet (for Windows XP, Office 2007 and network requirements obtained fro..

  Configure the steps to ensure intra-vlan routing

Ensure the following configurations are completed on all devices: Configure the steps to ensure Intra-vlan routing

  Write down steps to browse site ausing same url

Employees will open their Web browser and enter personnel.mycompany.com in URL address box to browse this Web site. Write down steps which you take so that each computer in company can browse site using this URL?

  How ip addresses are assigned

Identify how IP addresses are assigned in the local area network at your scool or workplace. Were any other methods used to assign IP adreess prior to the current configuration? Why was the current configuration chosen?

  Use the internet to choose four usb drives which support

use the internet to select four usb drives that support hardware encryption. create a table that compares all four and

  This results in the build-or-buy debate take the stance on

when a company has a need for software one option is to buy it from a software vendor or build it internally if the it

  Suggest a method for consolidating core network services

Explain the key considerations behind establishing trust relationships between the two domains. Suggest a method for consolidating Core Network services.

  Describe the two parts of an ip address

Describe the two parts of an IP address. Provide a step-by-step description of how a packet is routed, assuming that it must traverse at least one router.

  Describing the bigtable and dynamo network storage

You have been asked by your CIO to prepare a white paper of 3-4 pages APA formatted describing the BigTable and Dynamo network storage architectures

  Derive the state equations

Derive the state equations A(t+1) and B(t+1) by substituting the input equations for the J and K variables, and draw the state diagram of the circuit.

  Implementing sliding window protocols using cnet

Implementing Sliding Window Protocols using CNET - It is assumed that the nodes will communicate directly with each other if they are directly connected, otherwise the intermediate nodes will be used to relay the communications. No dynamic routing ..

  Find the largest number of nodes

Find the largest number of nodes that can be activated in the end by selecting only one node into the seed set

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd