What could be causing the network slowdowns at Personal Trainer? If a problem does exist, which performance and workload measures would you monitor to pinpoint the problem?
What will be an ideal response?
The slow response time probably relates to server performance, network capacity, or a combination of the two. In addition to checking system performance with a benchmarking program, check and defragment the hard disk, using various diagnostic utilities that are available for this purpose. In a file-based system, a highly active file that is not regularly compacted could be causing a slowdown. Data files also might need to be restructured to improve performance. In some situations, it might be better to combine two or more files into a single file; in other cases, separating one file into two or more files might improve performance. During your investigation, you should review all system configuration settings.
You also should observe the staff as they perform their normal activities to learn if the slowdown does occur as reported. See how many workstations were logged on and what tasks were being performed when the response time slowed down. Based on your observations, you might be able to determine that one particular procedure or program triggers the problem. You also can obtain a network monitor program to analyze network performance.
You might also like to view...
Match each item with a statement below.
A. an IPv4/IPv6-capable computer in which each version of IP accesses a separate Transport layer stack B. a virtual network infrastructure model describing IPv6-capable networks embedded within a larger core IPv4 LAN and communicating with other IPv6 networks using a tunneling technology C. a technology that translates an IP address used in one network, such as a private LAN, to a different IP address used in a different network, such as the public Internet D. a virtual network infrastructure model describing IPv6 nodes existing in a IPv4 core backbone and communicating with each other using a tunneling technology E. a method of verifying that a string is an IP address and, if so, determining if the address is IPv4 or IPv6 F. a route used by a network node to communicate with another network node on the same physical or virtual subnet G. the receiving node at the other end of the tunnel, which is responsible for reassembling any fragmented packets, removing the IPv4 header encapsulation, and processing the IPv6 packet H. the route used by a network device to communicate to other devices on a different physical or virtual subnet, leading to the next-hop device, which is typically a router I. a method used by ISATAP nodes to maintain a current list of routes and routers
A clipping mask must be a(n) ____ object
A. grouped B. single C. ungrouped D. complex
Four switches are connected together on a shared LAN. SW1 has a VTP configuration revision of 1, SW2 has a VTP configuration revision of 2, SW3 has a VTP configuration revision of 3, and SW4 has a VTP configuration revision of 4. Which switch's configuration will be preferred and sent updated on each of the other switches?
A) SW2 B) SW4 C) SW3 D) SW1
Which type of transmission synchronization technique uses start and stop bits at the beginning and end of a data frame?
A) Synchronous B) Isochronous C) Asynchronous D) Biochronous