Name Donovan Harris Date 11/14/19 Chapter 1 Student Version Chapter 1 Objectives: Describe the use of a hierarchical network for a small business. Describe recommendations for designing a network that is scalable. Describe the type of switches available for small-to-medium-sized business networks. Describe the type of routers available for small-to-medium-sized business networks. Configure and verify basic settings on a Cisco IOS device. Required Materials: Reading Organizer Packet Tracer Activities: Labs: 1.2.1.7 - Comparing 2960 and 3560 Switches 1.3.1.3 - Skills Integration Challenge 1.0.1.2 Network by Design 1.2.1.8 Lab - Selecting Switching Hardware 1.3.1.1 Layered Network Design Simulation Chapter Test Cisco Semester 3 – Scaling Networks 5.0 Chapter 1 1 Robb Jones Frederick County Career & Tech Center, MD Page intentionally left blank. Cisco Semester 3 – Scaling Networks 5.0 Chapter 1 2 Robb Jones Frederick County Career & Tech Center, MD Name Donovan Harris Date 11/14/19 Points__________ / ___129___ Chapter 1 Reading Organizer Student Version Note: the Reading Organizer has weighted scoring. Any question with the word explain or define in it is expected to have a longer answer and is worth two points each. After completion of this chapter, you should be able to: Describe the use of a hierarchical network for a small business. Describe recommendations for designing a network that is scalable. Describe the type of switches available for small-to-medium-sized business networks. Describe the type of routers available for small-to-medium-sized business networks. Configure and verify basic settings on a Cisco IOS device. 1.1 Implementing a Network Design 1. What do all enterprise networks have to support? Support critical applications Support converged network traffic Support diverse business needs Provide centralized administrative control 2. What is the expected up time for enterprise networks? 99.999% 3. List and explain the three layers of the hierarchical design model. a. Access layer– provides connectivity for the users b. Distribution layer – forwards traffic from one local network to another c. Core layer – high speed backbone layer between dispersed networks Cisco Semester 3 – Scaling Networks 5.0 Chapter 1 3 Robb Jones Frederick County Career & Tech Center, MD 4. Explain how a two-tier hierarchical design differs from the three tier hierarchical model. The core and distribution layers are collapsed into one layer reducing complexity and cost 5. The Cisco Enterprise Architecture divides the network into functional components while still maintaining the core, distribution, and access layers. What are the primary Cisco Enterprise Architecture modules? Enterprise campus Enterprise edge Service provider edge Remote 6. What is the purpose of the Enterprise Edge? Consists of internet, vpn, and wan modules connecting the enterprise with the service providers network 7. What is the function of the Service Provider Edge? Provides internet and PTSN and WAN services 8. Explain what a failure domain is. A failure domain is the area of a network that is impacted when a critical device or network service experiences problems. 9. Explain the advantage of using a building, or departmental, switch block. Each switch block acts independently of the others. As a result, the failure of a single device does not cause the network to go down. Even the failure of an entire switch block does not affect a significant number of end users 10. Explain what a network designer must develop to enable a network to be available and to scale effectively and easily. a. Use expandable, modular equipment or clustered devices that can be easily upgraded to increase capabilities. Device modules can be added to the existing equipment to support new features and devices without requiring major equipment upgrades. Some devices can be integrated in a cluster to act as one device to simplify management and configuration. Cisco Semester 3 – Scaling Networks 5.0 Chapter 1 4 Robb Jones Frederick County Career & Tech Center, MD b. Design a hierarchical network to include modules that can be added, upgraded, and modified, as necessary, without affecting the design of the other functional areas of the network. c. Create an IPv4 or IPv6 address strategy that is hierarchical. Careful IPv4 address planning eliminates the need to re-address the network to support additional users and services. d. Choose routers or multilayer switches to limit broadcasts and filter other undesirable traffic from the network. Use Layer 3 devices to filter and reduce traffic to the network core. 11. Explain what more advanced network design requirements might include? a. Implementing redundant links in the network between critical devices and between access layer and core layer devices. b. Implementing multiple links between equipment, with either link aggregation (EtherChannel) or equal cost load balancing, to increase bandwidth. Combining multiple Ethernet links into a single, load-balanced EtherChannel configuration increases available bandwidth. EtherChannel implementations can be used when budget restrictions prohibit purchasing high-speed interfaces and fiber runs c. Implementing wireless connectivity to allow for mobility and expansion. d. Using a scalable routing protocol and implementing features within that routing protocol to isolate routing updates and minimize the size of the routing table 12. Why is Spanning Tree Protocol (STP) required in a switched Ethernet network? Redundant paths in a switched Ethernet network may cause logical Layer 2 loops 13. Explain how does STP work? By providing a mechanism for disabling redundant paths in a switched network until the path is necessary, such as when failures occur. 14. Explain what EtherChannel is and how it works. Link aggregation allows an administrator to increase the amount of bandwidth between devices by creating one logical link made up of several physical links. Cisco Semester 3 – Scaling Networks 5.0 Chapter 1 5 Robb Jones Frederick County Career & Tech Center, MD 15. What considerations need to be taken into account when implementing a wireless network? a. the types of wireless devices to use b. wireless coverage requirements c. interference considerations d. security considerations 16. What is a popular link-state protocol that works well with Enterprise networks using a hierarchical design? OSPF 17. Which distance vector protocol works well with larger networks? EIGRP 18. Draw a line connecting the correct term to its correct description. Link Aggregation Protocol with distance-vector behaviors. OSPF Alternate data pathway. EIGRP Protocol which uses a backbone area. Redundancy Multiple Ethernet interface links combined into a single bandwidth channel. 1.2 Selecting Network Devices 19. There are five categories of switches for enterprise networks, these are: a. Campus LAN Switches b. Cloud-Managed Switches c. Data Center Switches d. Service Provider Switches e. Virtual Networking 20. Explain the following terms: a. Cost–The cost of a switch will depend on the number and speed of the interfaces, supported features, and expansion capability. b. Port Density–Network switches must support the appropriate number of devices on the network. c. Power – It is now common to power access points, IP phones, and even compact switches using Power over Ethernet (PoE). In addition to PoE considerations, some chassis-based switches support redundant power supplies. Cisco Semester 3 – Scaling Networks 5.0 Chapter 1 6 Robb Jones Frederick County Career & Tech Center, MD d. Reliability–The switch should provide continuous access to the network. E. Port Speed–The speed of the network connection is of primary concern to end users. f. Frame Buffers–The ability of the switch tostore frames is important in a network where there may be congested ports to servers or other areas of the network. g. Scalability–The number of users on a network typically grows over time; therefore, the switch should provide the opportunity for growth. 21. Define forwarding rates. Define the processing capabilities of a switch by rating how much data the switch can process per second. 22. What is wire speed? It is the data rate that each Ethernet port on the switch is capable of attaining 23. What does PoE allow? PoE allows the switch to deliver power to a device over the existing Ethernet cabling. 24. Explain how PoE pass-through works. It allows a network administrator to power PoE devices connected to the switch, as well as the switch itself, by drawing power from certain upstream switches. 25. Where are multilayer switches typically deployed in an organization's switched network? The core and distribution layers 26. What are multilayer switches typically characterized by? a. Their ability to build a routing table b. Their support a few routing protocols c. Their ability to forward IP packets at a rate close to that of Layer 2 forwarding 26. Label each switch criteria. Cisco Semester 3 – Scaling Networks 5.0 Chapter 1 7 Robb Jones Frederick County Career & Tech Center, MD 27. In the distribution layer of an enterprise network, routing is required. Without the routing process, packets cannot leave the local network. 28. What beneficial functions do Routers serve? a. Provide broadcast containment b. Connect remote locations c. Group users logically by application or department d. Provide enhanced security 29. List and explain the three categories of routers. a. Branch Routers–Branch routers optimize branch services on a single platform while delivering an optimal application experience across branch and WAN infrastructures. Highly available branch 7networks must ensure fast recovery from typical faults, while minimizing or eliminating the impact on service, and provide simple network configuration and management. b. Network Edge Routers–Network edge routers enable the network edge to deliver high-performance, highly secure, and reliable services that unite campus, data center, and branch networks. Network edge routers must deliver enhance quality of service and nonstop video and mobile capabilities. c. Service Provider Routers–Service provider routers differentiate the service portfolio and increase revenues by deliveringend-to-end scalable solutions and subscriber-aware services. These systems are designed to simplify and enhance the operation and deployment of service-delivery networks. 30. What does an IOS refer to? IOS refers to the package of routing, switching, security, and other internetworking technologies integrated into a single multitasking operating system 31. Explain the following terms in detail. a. Out-of-band management–Is used for initial configuration or when a network connection is unavailable. Configuration using out-of-band management requires:Direct connection to console or AUX portTerminal emulation client b. In-band management–Is used to monitor and make configuration changes to a network device over a network connection. Configuration using in-band management requires:At least one network interface on the device to be connected and operational Telnet, SSH, or HTTP to access a Cisco device 32. Which command can be used to verify and save the routing configuration? Copy run start 33. Explain the following list of commonly used IOC commands. a. show ip protocols–Displays information about the routing protocols configured. If OSPF is configured, this includes the OSPF process ID, the router ID, networks the router is advertising, the neighbors the router is receiving updates from, and the default administrative distance, which is 110 for OSPF. b. show ip route-Displays routing table information, including: routing codes, known networks, administrative distance and metrics, how routes were learned, next hop, static routes, and default routes. Cisco Semester 3 – Scaling Networks 5.0 Chapter 1 8 Robb Jones Frederick County Career & Tech Center, MD c. show ip ospf neighbor–Displays information about OSPF neighbors that have been learned, including the Router ID of the neighbor, priority, the state (Full = adjacency has been formed), the IP address, and the local interface that learned of the neighbor. d. show interfaces–Displays interfaces with line (protocol) status, bandwidth, delay, reliability, encapsulation, duplex, and I/O statistics. If specified without a specific interface designation, all interfaces will be displayed. If a specific interface is specified after the command, information about that interface only will be displayed. e. show ip interfaces–Displays interface information, including: protocol status, the IP address, if a helper address is configured, and whether an ACL is enabled on the interface. If specified without a specific interface designation, all interfaces will be displayed. If a specific interface is specified after the command, information about that interface only will be displayed. f. show ip interface brief–Displays all interfaces with IP addressing information and interface and line protocols status. g. show protocols-Displays information about the routed protocol that is enabled, and the protocol status of interfaces. 34. What is the purpose of the delete flash:vlan.dat command on a switch? To erase vlan info 35. Explain the following list of switch IOS commands. a. show port-security–Displays any ports with security activated. To examine a specific interface, include the interface ID. Information included in the output: the maximum addresses allowed, current count, security violation count, and action to be taken. b. show port-security address–Displays all secure MAC addresses configured on all switch interfaces. c. show interfaces–Displays one or all interfaces with line (protocol) status, bandwidth, delay, reliability, encapsulation, duplex, and I/O statistics. d. show mac-address-table–Displays all MAC addresses that the switch has learned, how those addresses were learned (dynamic/static), the port number, and the VLAN assigned to the port. Cisco Semester 3 – Scaling Networks 5.0 Chapter 1 9 Robb Jones Frederick County Career & Tech Center, MD