Essay Help Services

ICTNW529 | Install and Manage Complex ICT Networks | Networking

Home Recent Questions ICTNW529 | Install and Manage Complex ICT Networks | Networking

Assessment Tasks

Activity 1

1. In today’s Internet-based economy, customer service and business networks should be available

what percentage of the time?

A. Nearly 100%

B. Nearly 75%

C. Nearly 50%

D. Nearly 25%

 What are the fundamental design goals for building a successful network? (Choose all that apply.) A. Scalability




 All of the above

With a hierarchal network design, which layer is used to connect distribution layer devices?

A. Access layer

B. Core layer

C. Distribution layer

D. Network layer

 When designing a network, what is a common strategy to take?

 Bottom-up approach

 Divide-and-conquer approach

 Top-down approach

 Technical-requirements approach

When designing a network, the core layer includes one or more links to the devices at the enterprise edge to support what? (Choose all that apply.)

A. Internet connectivity


C. Extranet

D. WAN access

E. All of the above

What topology is used when wiring the distribution layer?



 Partial mesh

 Full mesh

When filtering traffic using extended ACLs at the distribution layer, what filtering criteria can be used?

A. Source address

B. Destination address 

C. Protocols

D. Port numbers or applications E. All of the above

What is a benefit to route summarization?

A. Higher router overhead

B. Lower router overhead

C. More routing updates

D. Larger routing tables

Which layer of the network represents the edge of the network where end devices are connected?

A. Access layer

B. Distribution layer 

C. Core layer

D. None of the above

Activity 2

Company XYZ has a four-floor building in which their administrative, human relations, management, and distribution centre employees work. Each section has several servers located in its offices.

Production has exceeded their expectations, and the amount of traffic sent to and from the servers has increased 200 percent. This increase has resulted in increased maintenance for the IT technician.

The technician spends several hours per day moving from one location to another. As a result, the technician’s productivity has decreased.

What suggestion would you make to reduce downtime, provide redundant high-capacity links, and lower the cost of providing services to each department?

Activity 3

A small drafting company is trying to decide whether they should expand their network infrastructure. Their current network technician has determined that too much traffic from all locations is congesting the network. She believes that if the network were expanded the increase in traffic could potentially create more problems. She contacts you and asks what could be done to filter traffic and control the broadcasts that are currently on the network. What suggestion would you make and why?

Activity 4

Describe and present an example of the vulnerability ratings that could be applied to a network.

Activity 5

Does every network require a firewall? Why/Why not?

Activity 6

Define the differences between internal and external threats and suggest strategies to mitigate both.

Activity 7

What is the difference between a security plan and a security policy? How do these two relate to each other?

Activity 8

People who are new to security often assume that security simply means encryption. Why is this a naive assumption? What are some other aspects of security that are just as important as encryption?

Activity 9

Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network but then penetrated farther into the network, resulting in severe economic or political damage to the victim organization. Write two or three paragraphs about what you found.

Activity 10

When would penetration testing be used? Why?

Activity 11

What information does Wireshark provide? How does this information help you in conducting a security audit?

Activity 12

What security issues could arise with staff who may temporarily act in a management position?

Check and install cabling and associated components according to industry standards

Communications media

The terms, communications or networking media refer to the physical media used to transmit data through your network. As you may recall, the physical media of a network resides at the lowest level of the Open Systems Interconnection (OSI) networking model.

What are the most common types?

The most common type of communication medium in networks today is cabling (bound transmission media). As advances are made, the types of cables used have changed and wireless technologies are removing the need for cables altogether.

Common media used in networks include:

UTP (Unshielded Twisted Pair)

category 5, 5e, and 6

RJ45 and RJ11 connectors

Category 5 UTP cable

STP (Shielded Twisted Pair)

 category 7 cable

 GG-45, TERA connectors coaxial cable commonly used in satellite connections

Coaxial cable and connector

fibre optic cable

multimode and single mode

8/125µm, 50/125 µm, 65/125 µm sizes

SC, ST, MTRJ, LT, FC, FDDI connectors

Fibre optic cable


Wi-Fi (802.11a/b/g//n, see Reading 1: Network communication devices)





UWB (Ultra Wide Band)


Activity 13

What type of organisations may benefit from a wireless LAN?

Install and configure servers, routers, switches or other devices to provide internet protocol (IP) addressing and routing

Multiple servers in a complex network

A complex network is one that utilises multiple servers and a variety of different connectivity devices to fulfil user requirements. Complex networks gives administrators the flexibility to deliver the required resources to users in a more efficient way.

A multi-server platform will also provide your network with redundancy and load balancing, which give users a more resilient environment.

User requirements vary greatly, ranging from simple word processing to advanced database searching.

Consequently, it is difficult to satisfy each user's requirements with a single server.

Adding to the complexity of the requirements are users working on workstations with different local operating systems. Different systems may include Microsoft Windows (eg XP, Vista), variants of Linux (eg SUSE or Redhat), Mac OS X and so on.

Types of configuration

Depending on your company’s needs, you can configure your multiple servers to act either:

independently, or individually in concert

The emphasis is on the performance, budget constraints and the amount of work it entails for you, as the network administrator.

Activity 14

If staff members do not adhere to a company’s security policy, what consequences should follow?

Activity 15

How can multiple servers provide fault tolerance and what are the main issues to consider?

Install and configure servers, routers, switches or other devices to provide name resolution

DNS Overview14

If your network devices require connectivity with devices in networks for which you do not control name assignment, you can assign device names that uniquely identify your devices within the entire internetwork. The global naming scheme of the Internet, the DNS, accomplishes this task. This service is enabled by default. The following sections summarize DNS concepts and function.

Hostnames for Network Devices

Each unique IP address can have an associated hostname. DNS uses a hierarchical scheme for establishing hostnames for network nodes. This allows local control of the segments of the network through a client-server scheme. The DNS system can locate a network device by translating the hostname of the device into its associated IP address.

Domains Names for Groups of Networks

IP defines a naming scheme that allows a device to be identified by its location in the IP. This is a hierarchical naming scheme that provides for domains. On the Internet, a domain is a portion of the naming hierarchy tree that refers to general groupings of networks based on organization type or geography. Domain names are pieced together with periods (.) as the delimiting characters.

For example, Cisco is a commercial organization that the IP identifies by a com domain name, so its domain name is A specific device in this domain, the File Transfer Protocol (FTP) system, for example, is identified as

Name Servers

To keep track of domain names, IP has defined the concept of a name server. Name servers are programs that have complete information about their namespace portion of the domain tree and may also contain pointers to other name servers that can be used to lead to information from any other part of the domain tree. Name servers know the parts of the domain tree for which they have complete information. A name server may also store information about other parts of the domain tree. Before domain names can be mapped to IP addresses, you must first identify the hostnames, then specify a name server, and enable the DNS service.


To speed the process of converting names to addresses, the name server maintains a database, called a cache, of hostname-to-address mappings for use by the connect, telnet, and ping EXEC commands, and related Telnet support operations. The cache stores the results from previous responses. Upon receiving a client-issued DNS query, the name server will check this local storage to see if the answer is available locally.

Name Resolvers

Name resolvers are programs that extract information from name servers in response to client requests. Resolvers must be able to access at least one name server. The resolver either uses that name server's information to answer a query directly or pursues the query using referrals to other names servers. A resolver will typically be a system routine that is directly accessible to user programs. Therefore, no protocol is necessary between the resolver and the user program.


The domain namespace is divided into areas called zones that are points of delegation in the DNS tree. A zone contains all domains from a certain point downward, except those for which other zones are authoritative.

Authoritative Name Servers

A name server is said to be an authority for the parts of the domain tree for which it has complete information. A zone usually has an authoritative name server, often more than one. An authoritative name server has been configured with host table information or has acquired host table information though a zone transfer (the action that occurs when a secondary DNS server starts up and updates itself from the primary server).

DNS Operation

An organization can have many name servers, but Internet clients can query only those that the root name servers know. The other name servers answer internal queries only.

A name server handles client-issued queries to the DNS server for locally defined hosts within a particular zone as follows:

An authoritative name server responds to DNS user queries for a domain name that is under its zone of authority by using the permanent and cached entries in its own host table. If the query is for a domain name that is under its zone of authority but for which it does not have any configuration information, the authoritative name server simply replies that no such information exists.

A name server that is not configured as the authoritative name server responds to DNS user queries by using information that it has cached from previously received query responses. If no device is configured as the authoritative name server for a zone, queries to the DNS server for locally defined hosts will receive nonauthoritative responses.

Name servers answer DNS queries (forward incoming DNS queries or resolve internally generated DNS queries) according to the forwarding and lookup parameters configured for the specific domain.

When DNS queries are forwarded to name servers for resolution, some memory space is held for the corresponding DNS query until an appropriate response is received or until there is timeout. To avoid the free I/O memory from getting exhausted when handling queries at high rate, configure the maximum size for the queue.

Technology Overviews15

The following sections provide brief overviews of the required technologies that are deployed to create a core network.

Active Directory Domain Services

A directory is a hierarchical structure that stores information about objects on the network, such as users and computers. A directory service, such as AD DS, provides the methods for storing directory data and making this data available to network users and administrators. For example, AD DS stores information about user accounts, including names, email addresses, passwords, and phone numbers, and enables other authorized users on the same network to access this information.


DNS is a name resolution protocol for TCP/IP networks, such as the Internet or an organization network.

A DNS server hosts the information that enables client computers and services to resolve easily recognized, alphanumeric DNS names to the IP addresses that computers use to communicate with each other.


DHCP is an IP standard for simplifying the management of host IP configuration. The DHCP standard provides for the use of DHCP servers as a way to manage dynamic allocation of IP addresses and other related configuration details for DHCP-enabled clients on your network.

DHCP allows you to use a DHCP server to dynamically assign an IP address to a computer or other device, such as a printer, on your local network. Every computer on a TCP/IP network must have a unique IP address, because the IP address and its related subnet mask identify both the host computer and the subnet to which the computer is attached. By using DHCP, you can ensure that all computers that are configured as DHCP clients receive an IP address that is appropriate for their network location and subnet, and by using DHCP options, such as default gateway and DNS servers, you can automatically provide DHCP clients with the information that they need to function correctly on your network.

For TCP/IP-based networks, DHCP reduces the complexity and amount of administrative work involved in reconfiguring computers.


TCP/IP in Windows Server 2012 is the following:

Networking software based on industry-standard networking protocols.

A routable enterprise networking protocol that supports the connection of your Windows-based computer to both local area network (LAN) and wide area network (WAN) environments.

Core technologies and utilities for connecting your Windows-based computer with dissimilar systems for the purpose of sharing information.

A foundation for gaining access to global Internet services, such as the World Wide Web and File Transfer Protocol (FTP) servers.

A robust, scalable, cross-platform, client/server framework.

TCP/IP provides basic TCP/IP utilities that enable Windows-based computers to connect and share information with other Microsoft and non-Microsoft systems, including:

Windows Server 2012 Windows 8

Windows Server 2008 R2 Windows 7

Windows Server 2008

Windows Vista

Windows Server 2003 operating systems Windows XP

Internet hosts

Apple Macintosh systems IBM mainframes

UNIX systems

Open VMS systems

Network-ready printers, such as HP LaserJet series printers that use HP JetDirect cards

Install and configure servers, routers, switches or other devices to provide network services

Network communication devices

Networks, network segments and network users must be able to communicate and use network resources. To enable this you may need to install and configure communication devices throughout your network. Below is a list of common networking devices.

Network Interface Card (NIC) gateway

router switch hub bridge


media converter

Wireless Access Point (WAP) modem.

These communication devices work at different layers on the OSI model (Open Systems Interconnection Reference Model) and consequently have different capabilities in handling communication needs.

Network Interface Card (NIC)

A Network Interface Card/Controller (NIC), also commonly referred to as a network card or network adapter, is the hardware device that allows a computer to access a network. NICs operate at the Data Link or layer 2 of the OSI model.

Each NIC is uniquely identified on the network via its Media Access Control (MAC) address. The Institute of Electrical and Electronics Engineers (IEEE) oversees the issuing of MAC addresses to NIC manufacturers to ensure no two NICs share the same MAC address.

NICs are available in several forms. They are commonly available as an expansion card that can be inserted into a PCI/PCI-e expansion slot on a computer’s mainboard. Many modern mainboards have network interfaces built onboard as part of the mainboard chipset. NICs may also come as PCMCIA cards for laptops or as a USB dongle.

All NIC’s have some form of media access, most commonly an RJ45 socket for UTP (Unshielded Twisted Pair) cable. Or it may be fibre optic, wireless (802.11a, b, g, n) or BNC (British Naval Connector) on older cards. Wireless NICs are usually referred to as a wireless adapter or WNIC (Wireless NIC). NICs are configured to communicate with Ethernet-based networks and occasionally Token Ring networks.

NICs are also available in several speed and communication configurations. In terms of speed they may be 10Mbps, 100Mbps, 1Gbps or various wireless speeds. Many NICs are also capable of sensing the network speed and adapting to match that speed (eg 10/100 auto-sensing). NICs are also capable of communicating in half-duplex or full-duplex modes. Half-duplex allows the NIC to communicate in both directions but only one direction at a time. Half-duplex can still be found on older NICs. Full-duplex is the preferred mode of operation and allows the NIC to communicate in both directions simultaneously.


A gateway is a node on a network that joins one network to another. Despite differences in network architecture and protocols between the networks, gateways read and repackage data so it can be read by either network. To do this they operate on multiple layers of the OSI model. They must communicate with an application, establish and manage sessions, translate encoded data and interpret logical and physical addresses.

Gateways can be implemented as hardware, software or a combination of hardware and software.

Because gateways are often used to join LANs to external networks such as the Internet, they often lie at the network perimeter. Therefore in many network scenarios a gateway device often performs extra roles such as a firewall, proxy server and anti-virus/spam/malware filtering.

The terms gateway and router have increasingly become synonymous. In many instances a router is acting as a network gateway. The term gateway is becoming obsolete. See routers below.


Routers join dissimilar networks, as do gateways. Through protocol translation, routers allow the forwarding of data packets between the networks.

When a signal is forwarded to a router in preparation for being passed along to another network or subnet, the signal is first stored and then translated so that the protocols are recognisable to the destination. Only then will the packets move to the other side of the router.

Routers go beyond being simple store/translate/forward devices. Most routers seek the optimum path along which to transmit data. Routers use various measures and information gathered from the network layer of the OSI model to determine the optimal path. They keep listening to the network or subnets for bad segments or faulty nodes. They can also hear traffic jams on the networks or subnets.

Through gathering this information, routers build a table of the various paths along which data packets can be sent and constantly update the ‘cost’ of each pathway to make sure the best possible pathway is selected for forwarding packets.


A network switch connects multiple segments of a network together. It is usually a dedicated hardware device with multiple ports.

Although similar in concept to routing, switches operate at the data-link layer of the OSI model. They forward data according to the MAC addresses found in data frames. (Note: at the data-link layer, frames are dealt with rather than packets, which reside at layer 3 or the network layer of the OSI model).

In this way, switches can operate much faster than routers because the MAC address is immediately available at the start of the frame rather than being embedded.

Even when a switch is configured to store-and-forward, which means checking an entire frame for errors before forwarding it on, a switch is much faster than a router. For example, a router would take 1-2 ms to store-and-forward a 1518 byte Ethernet frame compared with 0.02 ms for a switch.

Similarly to routers, switches build tables of destination MAC addresses attached to ports. Through constructing these tables, switches can send the frame only to the port that the destination MAC address resides on, rather than flooding the frame through every port. If the destination MAC address is unknown (not yet in the table), the frame is transmitted out of all of the connected ports, except the incoming port, to discover which port connects to the desired MAC address.

Some advanced switches operate at layer 3 and above of the OSI model. These switches can perform complex networking tasks through the addition of specialised hardware and software.

Switches are essentially high speed multi-port bridges. See the paragraph on bridges below.

Advantages of using switches

Ethernet switching is the most common device used for networking a site. It offers many advantages, including:

no maximum distance span

no limit to the number of switches between nodes allows mixing switches of different speeds.

When hub-based architecture is used, for example under an ethernet environment, it imposes certain restrictions in terms of maximum distance span of the network. Switches, however, create a segment per port. This micro-segmentation dramatically reduces, if not eliminates, data collisions. Consequently there is no limitation on the span of the network.

There are limitations, however, in terms of distances between pairs of switches. Depending on which communication media you are using. For UTP, the limit is 100m. Fibre optic cable allows longer distances between switches (up to2km).

While ethernet restricts the number of repeaters between nodes to four, ethernet switching has no such limit. Depending on your network infrastructure, you may have hundreds of switches between nodes.

When you design your network, you will have the option of using switches with different speeds. Switches commonly come in 10Mbps (legacy systems), 100Mbps and 1Gbps. Many switches also offer the ability to connect different speed nodes and the switch will automatically detect and function at the required speed on that port.

The number of ports also varies. Common numbers include: 4, 8, 16, 24 and 48 and may come in various combinations, for example, twenty four 100Mbps UTP ports, one 1Gbps UTP port and one 1Gbps fibre port. Through linking or stacking switches together, the total number of available ports can be increased to match the number of nodes that need to be connected.


Hubs are generic connection devices used to link different nodes on a network to form a single segment. They function at the physical layer (layer 1) of the OSI model. A binary signal received at one port is repeated on all other ports. Essentially hubs act as multi-port repeaters (See Repeaters below). Because all connected nodes must communicate on the same network segment, hubs are prone to causing collisions where two or more nodes attempt to transmit data at the same time. This can impact on the overall performance of the network.

There are two types of hubs.

Passive Active

Passive hubs merely connect cables on the network.

Active hubs are electrically powered and usually amplify or repeat the signals that pass through them.


Bridges connect and pass frames between network segments that share the same network protocols. Bridges operate at the data link layer (layer 2) of the OSI model. As with switches, bridges forward frames based on reading the MAC address of the intended destination. If a bridge does not have the correct MAC address, it will forward the packet to all other segments.

Bridges are outdated communication devices that have predominantly been replaced by switches and routers.


Many networks use category 5 (Cat5) UTP cabling which has a maximum usable length of 100 metres.

This is due to attenuation (signal strength reduces in proportion to the length of the medium).

Repeaters are devices that refresh the signals they receive and overcome the problems of attenuation.


boost the signal to its original strength and condition

repair any corruption that may have occurred along the way.

Repeaters only strengthen the signal they do not provide any filtering or routing services.

Repeaters have predominantly been replaced by the use of switches.

Media converters

Sometimes referred to as transceivers, media converters allow network traffic to be sent across different physical media. They are most commonly used to convert from fibre to UTP, or vice-versa where a networking device (eg switch) does not have the necessary media port.

Activity 16

Why would a company continue to use mainframe technology rather than replace it with modern servers?

Install and configure remote access services

Install and Enable the Routing and Remote Access Service18

Applies To: Windows Server 2008

The Routing and Remote Access service in the Windows Server® 2008 family provides:

Virtual private network (VPN) remote access and dial-up services.

Multiprotocol LAN-to-LAN, LAN-to-WAN, VPN, and network address translation (NAT) routing services.

You install the Routing and Remote Access service by using the Add Roles Wizard.

Membership in the local Administrators group, or equivalent, is the minimum required to complete this procedure. Review details about using the appropriate accounts and group memberships at Local and Domain Default Groups (

To install the Routing and Remote Access service

In the Server Manager main window, under Roles Summary, click Add roles. -- OR --

In the Initial Configuration Tasks window, under Customize This Server, click Add roles.

In the Add Roles Wizard, click Next.

In the list of server roles, select Network Policy and Access Services. Click Next twice.

In the list of role services, select Routing and Remote Access Services to select all of the role services. You can also select individual server roles.

Proceed through the steps in the Add Roles Wizard to complete the installation.

Activity 17

Under what circumstances would you recommend remote access services (such as VPN) to a client.

Install and configure devices to provide data management services

Connecting to a host computer

How to connect to a mainframe host

Here is an overview of the techniques used to connect to mainframes:

In the early days of mainframe computing, ‘dumb terminals’ directly connected to the mainframe computer via RS-232 serial cabling or coaxial cabling. Users interacted with data via a keyboard (and punch cards before this) and a text only interface.

RS-232 serial cable

As the number of terminals requiring access to the mainframe grew, it became impractical to individually cable each terminal. To solve this problem, groups of dumb terminals were connected to a mainframe via a terminal controller, also called a cluster controller. These devices are similar in concept to a hub or switch used in modern networks.

In the mid to late 1980s dumb terminals were increasingly replaced with ‘smart terminals’.

Smart terminals were incapable of natively communicating with a mainframe. For this reason

‘terminal emulation’ software was used to emulate the existence of a dumb terminal and allow communication with the mainframe.

Physical access between smart terminals and mainframes was initially achieved in the same way as dumb terminals, via direct cabling and an RS-232 serial expansion card within the computer.

As networks grew and common standards evolved (TCP/IP, Ethernet, Cat5 cabling, RJ45 connectors), so too did the incompatibility of these networks and the standards used by mainframe systems. To allow communication between multiple computers on the network and a mainframe, terminal emulation software is required and a gateway device or computer is also used.

The gateway performs a similar function as a terminal or cluster controller, allowing multiple computers to access the mainframe. In addition, the gateway provides protocol and media translation. These systems still relied on text-based interfaces.

Operating systems used on client computers moved away from text based user interfaces to Graphical User Interfaces (GUIs), such as Microsoft Windows. In conjunction with the mouse input device, GUI’s revolutionised the ease and simplicity of user interaction with computers.

Interfaces used to interact with mainframe hosts followed this trend with the introduction of GUI-based interfaces. X Windows System is a common GUI interface for UNIX/Linux based servers and mainframes (X Windows System-

In a modern network environment, users access data and resources on a mainframe via a web-based interface on their client computer. No locally stored terminal emulation software is required, only a compatible web browser. This allows for a more seamless integration of mainframe resources within current network infrastructure. Exposing the business functions of mainframe resources, yet hiding the complexity of the connection, forms part of a Service oriented Architecture (SOA) (Service-Oriented Architecture -

Activity 18

Provide examples of when peer-to-peer architecture is appropriate. Also, list examples where client-server architecture would be a more appropriate option.

Activity 19

What is network interoperability and why is it important?

Activity 20

Research and describe one method of network performance optimisation.

Install software and configure and test voice over internet protocol (VoIP) and videoconferencing services

IP Telephony Voice over IP (VoIP)

Voice over IP (VoIP) defines a way to carry voice calls over an IP network including the digitization and packetization of the voice streams. IP Telephony utilizes the VoIP standards to create a telephony system where higher level features such as advanced call routing, voice mail, contact centers, etc., can be utilized.

Session Initiation Protocol (SIP) is a peer-to-peer, multimedia signaling protocol developed in the IETF. SIP is ASCII-based, resembling HTTP, and reuses existing IP protocols (DNS, SDP, etc.) to provide media setup and teardown. Since its first publication in 1999, SIP has generated a high level of interest in the VoIP industry, and many people believe that SIP will become the de facto standard protocol for future voice networks.

Activity 21

Select one VoIP system currently available on the market. Outline the minimum system requirements and installation procedure for the product.

Activity 22

Describe the requirements and applications for H.323 based Video Conferencing systems.

Activity 23

Select one network management toll other than those listed above. What is the purpose of the tool? Where can it be obtained from? What are its applicable platforms? Who should use the tool?

Select and install network management tools according to industry and organisational standards

An important part of any network administrator's job is to monitor the network for performance, traffic usage, faults and availability, and to respond quickly to issues. A network-monitoring tool is a software-based or a software-hardware combination that watches the network from end to end, collecting data on hundreds of performance metrics, among them bandwidth, latency, responsiveness and CPU use of hosts. A comprehensive network monitoring foundation tracks the network's behavior and issues alerts when it exceeds a performance threshold -- whether that means dipping below an acceptable level or when network traffic spikes

Most network-monitoring products work well for typical small to midsize networks, whether wired or wireless. But more complex networks -- enterprise networks and distributed environments -- need a comprehensive platform that offers visibility into physical and virtual servers, wide area network (WAN) links, a software-defined network (SDN) architecture, cloud-based services, network-based applications and the increasing number of mobile devices that connect to the network.

Activity 24

Exercise 1: Configure data collector sets

In this exercise, you configure data collector sets. To complete this exercise, perform the following steps:

Start SYD-DC, and sign on as CONTOSODon_Funk.

On SYD-DC, click Performance Monitor in the Tools menu of Server Manager.

In the Performance Monitor console, expand the PerformanceData Collector SetsUser Defined

On the Action menu, click New, and click Data Collector Set.

In the Create New Data Collector Set dialog box, type the name SYD-DC-Performance-Measurement and click Create Manually (Advanced), 

On the What Type Of Date Do You Want To Include? page, click Performance Counter, as shown in Figure 10-28, and click Finish.

In the Performance Monitor console, click SYD-DC-Performance-Measurement.

In the details pane, click DataCollector01.

On the Action menu, click Properties.

In the DataCollector01 Properties dialog box, 

In the Available Counters dialog box, click Logical Disk, and click Add.

Click Memory, click the arrow, click Available Mbytes, and click Add.

Click Network Interface, and click Add.

Click Processor, and click Add.

Verify that the list of added counters matches Figure 10-30, and click OK.

In the DataCollector01 Properties dialog box, set the Sample Interval to 15 seconds (see Figure 10-31), and click OK.

In Performance Monitor, click Data Collector SetsUser DefinedSYD-DC-Performance-Measurement.

On the Action menu, click Properties.

On the Schedule tab of the SYD-DC-Performance-Measurement Properties dialog box, click Add.

On the Folder Action dialog box, set a time of 3:00:00 AM, and click OK.

schedule Exercise 2: Collect data

In this exercise, you collect data from the data collector set. To complete this exercise, perform the following steps:

 In Performance Monitor, click Data Collector SetsUser DefinedSYD-DC-Performance-Measurement.

 On the Action menu, click Start.

 After 2 minutes, on the Action menu, click Stop.

 Expand Reports, expand User Defined, and click SYD-DC-Performance-Measurement.

Exercise 3: Configure alerts

In this exercise, you configure a free disk space alert. To complete this exercise, perform the following steps:

 In Performance Monitor, click User Defined under Data Collector Sets.

 On the Action menu, click New, and click Data Collector Set.

 On the Create New Data Collector Set page, type Disk Space Alert, click Create Manually (Advanced), and click Next.

 On the Create New Data Collector Set page, click Performance Counter Alert, as shown in Figure 10-35, and click Next.

 On the Which Performance Counters Would You Like To Monitor? page, click Add.

 In the Available Counters dialog box, click LogicalDisk, click %Free Space, click C:, and click Add, 

Activity 25

Outline 3 items that you would include in a desktop management policy.

Search Here

Latest Reviews


Payments And Security