Sie sind auf Seite 1von 3

CHAPTER 2 (REVIEW QUESTIONS)

Q1. Discuss the term scalability. What does it mean? Why is it an important network
design goal? What are some challenges designers face when designing for scalability?

Ability of a system, network or process to be changed in size or to accommodate growth and expand
business service to meet organization objectives.
1. management is able to see the value of making large amount of data available for customers,
prospective customers, employees, vendors and suppliers

2. A scalable business model will stand a much larger chance of being profitable in the long run.
Business needs to grow in order to be successful, and if your business isnt prepared for that
growth from an IT perspective, it can crash and burn. EXAMPLE: Say you spend money on a
marketing campaign, driving potential new customers to your website. Traffic increases from 1000
hits a day to 10000 hits a day. If you arent ready for the massive increase in hits, your website
may go down. Those potential customers will remember that your business has a broken website
and will look to your competitors.

3. Scalability directly affects the major drivers or components of an organization such as Production,
Distribution, Networks and Infrastructure.

4. Scalability is an important network design goal because it is an information technology service


management (ITSM) principle of design, create, delivery, support and management that meets
the Information Technology Information Library framework (ITIL)

CHALLENGES:

1. Security
2. Delay and Delay Variations
3. Developers may underestimate the growth rate of an organization and may provide a budget that
is underestimated to develop a scalable system.
4. Most large software systems (data centers/clouds) are distributed across many computers so the
network can limit how scalable the software is if not designed properly.
5. Server affinity server and client recognize previous sessions are marked as secure channel.
This could pose a security threat with a new device or process introduced to the web farm.
6. Scalability could be a very difficult feature to integrate into a development phase, because it could
require a total software change in the overall system architecture especially if the methodology
used does not support integration.

Q2. A network design customer has a goal of 99.80 percent uptime. How much down-
time will be permitted in hours per week? How much downtime will be permitted in
minutes per day and seconds per hour? Which values are acceptable in which
circumstances?

SLA level of 99.8 % uptime/availability gives following periods of potential downtime/unavailability:

Daily: 2m 52.8s

Weekly: 20m 9.6s

Monthly: 1h 27m 39.5s

Yearly: 17h 31m 53.9s

Q3. Assume you are in New York City in the United States and you are downloading a
100-KB web page from a server in Cape Town, South Africa. Assume that the bandwidth
Between the two cities is 1 Gbps. Which type of delay will be more significant, propagation
delay or transmission delay? Defend your answer.

PROPAGATION DELAY:

Propagation delay result from finite speed of light which is the time it takes a bit to propagate from
one router to the next; it is a function of the distance between the two routers taking a long time to
converge after a link outage due to routing protocols. Therefore transmission delay will be more
significant; which is the time it takes to put digital data into a transmission line. (E.g. 1024bytes
packet on a 1.5444Mbps T1 Line = 5seconds) as compared to propagating signal through a fiber
optics cable travelling approximately 2/3 the speed of light in a vacuum.

Q4. The chapter mentioned reconnaissance attacks. Do some research to learn more about the
tools that attackers use when on a reconnaissance mission. In your own words, describe
two tools that you researched.
Reconnaissance attack is an attempt to gain information about a targeted compters or networkds
that can be used as a preliminary step toward a further attack seeking to exploit the target
system. It could be passive or active.

1. Nmap: This tool is capable of detecting types of victims operating systems just using TCP
fingerprinting. TCP fingerprinting uses advanced fingerprinting analysis of the TCP stack
implementation. A TCP packet is crafted by switching on or off certain flags and sent to the
remote machine, which allows the attacker make an intelligent guess of the operating system
from its database of TCP stack signatures.

2. Traceroute: This tool is used to find out IP addresses of routers and firewalls that protect victim
hosts. In case a firewall blicks UDP packets along the path. Other tools that can be used for
active reconnaissance are

Scanrand Fast network scanner

AMAP Application Mapper

Nessus Vulnerability Scanner

Das könnte Ihnen auch gefallen