You are on page 1of 3

CHAPTER2(

REVI
EW QUESTI
ONS)

Q1. Discusst
heter
m“scal
abil
i
ty.
”Whatdoesitmean?Whyisi
tani
mport
antnet
work
designgoal
?Whataresomec hal
l
engesdesi
gner
sfac
ewhendesi
gni
ngforscal
abi
l
it
y?

Abi
l
it
yofasy
stem,net
wor
korpr
ocesst
obechangedi
nsi
zeort
oaccommodat
egr
owt
handexpand
busi
nesss
ervi
cet
omeetor
gani
zat
i
onobj
ect
i
ves.
1. managementi
sabl
etos
eet
hev
alueofmaki
ngl
argeamountofdat
aav
ail
abl
eforc
ust
omer
s,
pr
ospect
i
vec
ust
omer
s,empl
oyees,v
endor
sandsuppl
i
ers

2. Asc
alabl
ebusi
nessmodel
wil
lst
andamuchl
argerc
hanc
eofbei
ngpr
ofi
tabl
eint
hel
ongr
un.
Busi
nessneedst
ogr
owi
nor
dert
obesucc
essf
ul,andi
fyourbusi
nessi
sn’
tpr
epar
edf
ort
hat
gr
owt
hfr
om anI
Tper
spec
ti
ve,i
tcancr
ashandbur
n.EXAMPLE:Sayy
ouspendmoneyona
mar
ket
i
ngc
ampai
gn,dr
ivi
ngpot
ent
i
alnewc
ust
omer
stoy
ourwebsi
t
e.Tr
affici
ncr
easesf
rom 1000
hi
t
sadayt
o10000hi
t
saday
.Ify
ouar
en’
treadyf
ort
hemassi
vei
ncr
eas
einhi
t
s,y
ourwebsi
t
e
maygodown.Thosepot
ent
i
alcus
tomer
swi
l
lremembert
haty
ourbusi
nesshasabr
okenwebsi
t
e
andwi
l
llookt
oyourcompet
i
tor
s.

3. Scal
abi
l
it
ydi
rect
l
yaffec
tst
hemaj
ordr
iver
sorc
omponent
sofanor
gani
zat
i
onsuc
hasPr
oduct
i
on,
Di
st
ri
but
i
on,Net
wor
ksandI
nfr
ast
ruct
ure.

4. Scal
abi
l
it
yisani
mpor
tantnet
wor
kdesi
gngoal
bec
ausei
ti
sani
nfor
mat
i
ont
echnol
ogys
ervi
ce
management(
ITSM)pr
inci
pl
eofdesi
gn,cr
eat
e,del
i
ver
y,s
uppor
tandmanagementt
hatmeet
s
t
heI
nfor
mat
i
onTec
hnol
ogyI
nfor
mat
i
onLi
brar
yfr
amewor
k(I
TIL)

CHALLENGES:

1. Sec
urit
y
2. Del
ayandDel
ayVari
ati
ons
3. Devel
oper
smayunder
esti
mat
ethegr
owt
hrat
eofanor
gani
zat
i
onandmaypr
ovi
deabudgett
hat
i
sunder
est
i
mat
edt
odev
elopascal
abl
esy
stem.
4. Mos
tlar
gesof
twar
esy
stems(
dat
acent
ers/
cl
ouds)ar
edi
st
ri
but
edacr
ossmanycomput
erss
othe
net
workcanl i
mithowscal
abl
ethesoftwarei
sifnotdesi
gnedproper
ly
.
5. Ser
veraffini
t
y–s erv
erandcl
i
entrecognizepr
evioussessi
onsaremarkedassec
urec
hannel
.
Thi
scoul
dposeasecuri
t
ythreatwi thanewdeviceorpr
ocessi
ntr
oducedtothewebf ar
m.
6. Scal
abi
l
it
ycoul
dbeav er
ydifficul
tfeat
uret
oint
egrat
eint
oadevelopmentphase,becausei
tcoul
d
r
equi
reat
otal
sof
twar
echangei
ntheov
eral
lsy
stem ar
chi
t
ect
urees
peci
al
lyi
fthemet
hodol
ogy
us
eddoesnotsuppor
tint
egr
ati
on.

Q2. Anetworkdesi
gncust
omerhasagoalof99.
80percentupt
ime.How muchdown-
t
imewillbeper
mit
tedi
nhoursperweek?How muchdownt i
mewi l
lbeper
mitt
edi
n
minut
esperdayandsecondsperhour
?Whichval
uesar eaccept
ablei
nwhich
ci
rcumst
ances?

SLAl
evel
of99.
8% upt
i
me/
avai
l
abi
l
it
ygi
vesf
oll
owi
ngper
iodsofpot
ent
i
aldownt
i
me/
unav
ail
abi
l
it
y:

 Dai
l
y:2m 52.
8s

 Weekl
y:20m 9.
6s

 Mont
hly
:1h27m 39.
5s

 Year
ly:17h31m 53.
9s

Q3. Assumeyouar einNew YorkCit


yintheUnitedSt
atesandyouaredownl oadinga
100-KBwebpagef r
om aserverinCapeTown,SouthAfri
ca.Assumethatt hebandwidth
Betweenthetwocit
iesi
s1Gbps.Whi chtypeofdelaywil
lbemor esi
gnificant
,propagat
ion
delayort
ransmissi
ondelay?Defendyouranswer
.

PROPAGATI
ONDELAY:

Propagat i
ondelayresul
tfrom fini
t
es peedoflightwhichisthetimeittakesabi ttopropagatefr
om
onerout ertot
henext ;i
tisafunctionofthedistancebetweent hetwor outer
st aki
ngal ongti
met o
convergeaf t
eral i
nkoutageduet or out
ingprotocol
s.Therefor
et r
ansmi ssi
ondel aywil
l bemore
si
gnific
ant;whichisthetimeittakest oputdi
gitaldat
aintoat r
ansmissionl i
ne.(E.g.–1024bytes
packetona1. 5444MbpsT1Li ne=5s econds)asc omparedt opropagat i
ngsignalthr
oughafiber
opti
csc abletr
av el
l
ingapproxi
mat ely2/3thespeedofl i
ghtinav acuum.

Q4. Thechaptermenti
onedreconnai
ssanceattacks.Dosomer esear
chtolear
nmoreaboutthe
tool
sthatatt
acker
susewhenonar econnaissancemissi
on.Inyourownwords,descr
ibe
twotool
sthatyouresear
ched.
Reconnaissanceat
tacki
sanatt
emptt ogaininf
ormati
onaboutatar
get
edcomptersornet
wor
kds
thatcanbeusedasapr el
imi
narysteptowardafurt
herat
tackseeki
ngt
oexpl
oitthetar
get
system.I
tcouldbepassi
veoracti
ve.

1. Nmap:Thi st ooliscapabl
eofdetecti
ngt ypesofvictim’
soperat
i
ngsy st
emsj us
tusi
ngTCP
finger
pri
nti
ng.TCPfinger pri
nti
ngusesadv ancedfinger
pri
nti
nganaly
sisoft heTCPs t
ack
i
mpl ementation.ATCPpack eti
scraft
edbyswi t
chingonoroffcert
ainflagsandsenttot
he
remotemac hine,whichal
lowstheatt
ack ermak eani nt
ell
i
gentguessoft heoperat
i
ngsystem
from i
tsdatabaseofTCPs tacksi
gnatures.

2. Traceroute:Thi
stooli
susedtofindoutI
Paddressesofrouter
sandfir
ewall
sthatpr
otectvi
cti
m
hosts.Inc aseafir
ewal
lbl
ick
sUDPpack etsal
ongt hepath.Othert
ool
sthatcanbeus ed f
or
acti
ver econnai
ssanceare

• Scanr
and–Fas
tnet
wor
ksc
anner

• AMAP–Appl
i
cat
i
onMapper

• Nessus–Vul
ner
abi
l
it
yScanner

You might also like