Google Cloud allows changes to the networking configuration of instances. Possible permitted modifications are as follows: All those actions must be performed when the instance is powered off, and it cannot be a part of a managed instance group (MIG) or network endpoint group (NEG). Console After stopping the VM instance, we need to edit…
Configuring the instance with the static external IP address
External IP address configuration is an essential piece of instance configuration. If you host a website or application or point it to the external domain name, it is desired to have a configured static IP address. Once the instance is created with an external IP address, it is ephemeral. When your instance runs, it might…
The GCE network – Google Cloud Exam Guide
Network-related activities are as important as overall management and storage activities – not only in real life when working with Google Cloud but also for the exam. The following tasks represent Compute Engine networking activities. The upcoming chapter is dedicated to covering VPC, VPN, and Load Balancer networking resources. Configuring an instance with a static…
Creating an instance image
Custom images are the best solution if you want to reuse the fully preconfigured operating system with custom applications and settings. It is possible to create custom instance images from source disks, images, snapshots, or images stored in Cloud Storage and use these images to create VM instances. Console Let’s create a custom instance image…
What Did I Learn in this Module? – 100-150 Guide
• Reliable Networks—As networks evolve, we have learned that there are four basic characteristics that network architects must address to meet user expectations: Fault Tolerance, scalability, QoS, and security. A fault tolerant network limits the number of affected devices during a failure. It allows quick recovery when such a failure occurs. These networks depend on…
Hierarchical Analogy – 100-150 Guide
Imagine how difficult communication would be if the only way to send a message to someone was to use the person’s name. If there were no street addresses, cities, towns, or country boundaries, delivering a message to a specific person across the world would be nearly impossible. On an Ethernet network, the host MAC address…
Network Security – 100-150 Exam Guide
The network infrastructure, services, and the data contained on network-attached devices are crucial personal and business assets. Network administrators must address two types of network security concerns: network infrastructure security and information security. Securing the network infrastructure includes physically securing devices that provide network connectivity and preventing unauthorized access to the management software that resides…
Fault Tolerance – 100-150 Exam Guide
A fault tolerant network is one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages are instantly sent over a different link….
Network Design – 100-150 Exam Guide
Objectives Upon completion of this chapter, you will be able to answer the following questions: Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary.availabilityconfidentialityfault tolerant networkintegrityscalable networkQuality of Service (QoS)Introduction (18.0) Let me introduce you to my friend Bob! Bob works in the IT field in Vancouver,…
Network Testing Utilities Summary
The following is a summary of each topic in the chapter and some questions for your reflection. What Did I Learn in this Module? (17.2.1) A number of software utility programs are available that can help identify network problems. Most of these utilities are provided by the operating system as CLI commands. Some of the…