Take the quiz (either here or use the PTP software) if you want to use the score to help you decide how much time to spend on this chapter. Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes,” found at the end of the book, includes both the answers and explanations. You can…
Category: Ciscco Wired Host Networking
All equipment used in information technology—hosts, routers, switches, and even copper cables—generates heat during operation. However, operating equipment at higher temperatures can reduce its life span or—if the temperature is high enough—cause immediate failures. Heat is managed in information technology operations by • Vendors working to reduce the heat their devices produce. • Vendors designing…
Once network parameters are configured, you must verify the configuration is correct. ping and traceroute are the two most widely used utilities. The network in Figure 4-16 will be used throughout this section to illustrate tools commonly used to verify connectivity and their use. Figure 4-16 Verifying Connectivity Ping The first application to use when…
Ookla’s (and similar) tools test your connection to the Internet, giving you throughput and delay. iPerf tests your network—either locally or to a publicly accessible server—and gives you throughput. Mike’s Traceroute (MTR) shows you the delay and jitter across a network Note MTR runs only on Linux-like systems, so if you want to run it…
A command-line interface ( CLI) is interactive: the user types commands, and the host returns some response, usually text. Network engineers tend to work with CLIs more than GUIs because • CLIs tend to respond more quickly. • CLIs require fewer resources so they can be implemented in a broader range of devices. • Text…