100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Unit 5 Managing Networks (P5, P6, M3 and D2) £7.11
Add to cart

Essay

Unit 5 Managing Networks (P5, P6, M3 and D2)

 647 views  3 purchases
  • Module
  • Institution

All my work received distinctions overall in this unit. Please feel free to email me for documentation. Feel free to use my work as guide to complete your own P1,P2,P3,M1,M2,D1 and D2. Listed at the lowest possible price to give you a grade that you need. Included 3,293 words course work assignmen...

[Show more]

Preview 3 out of 21  pages

  • December 6, 2019
  • 21
  • 2019/2020
  • Essay
  • Unknown
  • Unknown
avatar-seller
INTERROGATE A NETWORK TO IDENTIFY THE
NETWORK ASSETS AND THEIR CONFIGURATION (P5).
In this task, I’m going to describe how to interrogate network to identify network
assets and their configuration.
Network assets are assets that are considered to be part of network. These assets
interconnected and rely on each other to provide a service. I’m going to use
command prompt to identify network assets and their configuration.
Command prompt is the command line interpreter application software which is
available in most windows operating system. This software is used to execute
entered commands. The following are the network assets and their configurations
in command prompt:

 Active directory.
This is the product from Microsoft which include several services that runs
on windows server to manage permission and access to network resources.
Active directory stores data as object such as user, application or device
such as printer which are normally defined as either resources or security
principal such as user. Active directory classify object into name and
attributes, such as name of the user include name string along with
information related to the user such as passwords. The main service of
active directory is domain service which stores directory information and
hold interaction between user and domain. Active directory domain
services verify when user signs in to the device and control access to each
resource.
 Dynamic host configuration protocols (DHCP).
This is the network management protocol which is used to assign IP
addresses to each device on a network in order to connect devices to the
network so that they can be able to communicate to each other. In
network, computer and any other devices needed to connect to each other;
therefore DHCP allows that configuration to happen automatically. DHCP is
used in almost in every device that connects to the network, such as
smartphones, computers, printers and others.
 Domain controller.
This is a computer server which is responsible for allowing host access to
the resources with in window domain. Domain controller responds to
security authentication request and verifies user on computer networks.
Domain controller is a centrepiece of active directory services which stores
users account information, authenticates users and force security policy
for window domain.
 Domain name system (DNS).
This is the naming system for computers, services or other resources
connected to the internet or private network. DNS provide access to
information through domain names like webopedia.com or espn.com. Instead
of using IP addresses to load resources on internet, DNS can be used to

, translate domain name to IP address. Each devices connected to internet
has unique IP address which can be used to communicate with other
devices. So instead of human to memorize IP address such as
192.168.1.1(IPV4) or complex IP addresses 2400:cb00:2048:1: c629:d7a2
(IPV6) which are difficult to memorize, with DNS human can use Domain
name to get access to the resources on internet.

 Server.
This is the computer or device or program which is used to manage
network resources. Server provides various services such sharing data to
multiple clients or computation roles, a single server can serve multiple
clients and one client can use more than one server. There are different
servers like database server, mail server, application server and others.


There are different network interrogation tools used to check network
assets. I’m going to use command prompts tools to check network assets.
These are as follows:

IP config.
This is the command line tool which is used to manage the IP address
assigned to the machine that is running in. Also can be used when it comes
to view current TCP/IP in window system, also it displays subnet mask and
default getaway addresses. The following is how to use IP config in
command prompt; you can type the following command to use it:
ipconfig – this command show the configured network adapter information
s such as IP addresses, subnet and others.

ipconfig / release - This is used to release the IP address of network
adapter.

Ipconfig / renew – This command is used to renew the Ip address of
network adapter. This command is mainly used if network adapter relies on
DHCP server to obtain IP address.

, Ping.

This is the command line tool which is used to test reachability of host on Internet
protocol network. Ping check the connectivity between two nodes or devices. To
ping destination node or device, an internet control message protocol echo request
packet is forwarded to that node, if connection is available between nodes, the
destination node respond with an etho reply. Then ping determine the round trip
time for data packets route from its source to its destination and determine
whetehr packets are lossing during the trip.

You can ping a network by typing ping a space then IP adress of that network on
command prompt.




Tracert.

This is another
command line
tool which is
used to show
details about
path that the packet takes from the computer you are on to whatever destination
you specify. Tracert command is also referred as a tracer route command. Trace
route command will list all the routes it passes until to destination or fails to. The
following is how to run tracert on windows operating system.

 Open command prompt.
 Type tracert then you can specify the destination.
For example, >tracert www.google.com.
 Then press enter.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Badaralsalmy. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £7.11. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50990 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£7.11  3x  sold
  • (0)
Add to cart
Added