Uploaded by 3mdono

Chapter 1 - Reading Organizer - Student Version - 5.0 (35)

advertisement
Name Donovan Harris Date 11/14/19
Chapter 1
Student Version
Chapter 1 Objectives:





Describe the use of a hierarchical network for a small business.
Describe recommendations for designing a network that is scalable.
Describe the type of switches available for small-to-medium-sized business networks.
Describe the type of routers available for small-to-medium-sized business networks.
Configure and verify basic settings on a Cisco IOS device.
Required Materials:
Reading Organizer
Packet Tracer Activities:
Labs:
1.2.1.7 - Comparing 2960 and 3560 Switches
1.3.1.3 - Skills Integration Challenge
1.0.1.2 Network by Design
1.2.1.8 Lab - Selecting Switching Hardware
1.3.1.1 Layered Network Design Simulation
Chapter Test
Cisco Semester 3 – Scaling Networks 5.0
Chapter 1
1
Robb Jones
Frederick County Career & Tech Center, MD
Page intentionally left blank.
Cisco Semester 3 – Scaling Networks 5.0
Chapter 1
2
Robb Jones
Frederick County Career & Tech Center, MD
Name Donovan Harris Date 11/14/19
Points__________ / ___129___
Chapter 1
Reading Organizer
Student Version
Note: the Reading Organizer has weighted scoring. Any question with the word explain or define in it is
expected to have a longer answer and is worth two points each.
After completion of this chapter, you should be able to:





Describe the use of a hierarchical network for a small business.
Describe recommendations for designing a network that is scalable.
Describe the type of switches available for small-to-medium-sized business networks.
Describe the type of routers available for small-to-medium-sized business networks.
Configure and verify basic settings on a Cisco IOS device.
1.1 Implementing a Network Design
1. What do all enterprise networks have to support?
Support critical applications
Support converged network traffic
Support diverse business needs
Provide centralized administrative control
2. What is the expected up time for enterprise networks?
99.999%
3. List and explain the three layers of the hierarchical design model.
a. Access layer– provides connectivity for the users
b. Distribution layer – forwards traffic from one local network to another
c. Core layer – high speed backbone layer between dispersed networks
Cisco Semester 3 – Scaling Networks 5.0
Chapter 1
3
Robb Jones
Frederick County Career & Tech Center, MD
4. Explain how a two-tier hierarchical design differs from the three tier hierarchical model.
The core and distribution layers are collapsed into one layer reducing complexity and cost
5. The Cisco Enterprise Architecture divides the network into functional components while still
maintaining the core, distribution, and access layers. What are the primary Cisco Enterprise
Architecture modules?
Enterprise campus
Enterprise edge
Service provider edge
Remote
6. What is the purpose of the Enterprise Edge?
Consists of internet, vpn, and wan modules connecting the enterprise with the service providers
network
7. What is the function of the Service Provider Edge?
Provides internet and PTSN and WAN services
8. Explain what a failure domain is.
A failure domain is the area of a network that is impacted when a critical device or network service
experiences problems.
9. Explain the advantage of using a building, or departmental, switch block.
Each switch block acts independently of the others. As a result, the failure of a single device does not
cause the network to go down. Even the failure of an entire switch block does not affect a significant
number of end users
10. Explain what a network designer must develop to enable a network to be available and to scale
effectively and easily.
a. Use expandable, modular equipment or clustered devices that can be easily upgraded to
increase capabilities. Device modules can be added to the existing equipment to support new
features and devices without requiring major equipment upgrades. Some devices can be
integrated in a cluster to act as one device to simplify management and configuration.
Cisco Semester 3 – Scaling Networks 5.0
Chapter 1
4
Robb Jones
Frederick County Career & Tech Center, MD
b. Design a hierarchical network to include modules that can be added, upgraded, and
modified, as necessary, without affecting the design of the other functional areas of the
network.
c. Create an IPv4 or IPv6 address strategy that is hierarchical. Careful IPv4 address planning
eliminates the need to re-address the network to support additional users and services.
d. Choose routers or multilayer switches to limit broadcasts and filter other undesirable traffic
from the network. Use Layer 3 devices to filter and reduce traffic to the network core.
11. Explain what more advanced network design requirements might include?
a. Implementing redundant links in the network between critical devices and between access
layer and core layer devices.
b. Implementing multiple links between equipment, with either link aggregation (EtherChannel)
or equal cost load balancing, to increase bandwidth. Combining multiple Ethernet links into a
single, load-balanced EtherChannel configuration increases available bandwidth. EtherChannel
implementations can be used when budget restrictions prohibit purchasing high-speed
interfaces and fiber runs
c. Implementing wireless connectivity to allow for mobility and expansion.
d. Using a scalable routing protocol and implementing features within that routing protocol to isolate
routing updates and minimize the size of the routing table
12. Why is Spanning Tree Protocol (STP) required in a switched Ethernet network?
Redundant paths in a switched Ethernet network may cause logical Layer 2 loops
13. Explain how does STP work?
By providing a mechanism for disabling redundant paths in a switched network until the path is
necessary, such as when failures occur.
14. Explain what EtherChannel is and how it works.
Link aggregation allows an administrator to increase the amount of bandwidth between devices by
creating one logical link made up of several physical links.
Cisco Semester 3 – Scaling Networks 5.0
Chapter 1
5
Robb Jones
Frederick County Career & Tech Center, MD
15. What considerations need to be taken into account when implementing a wireless network?
a. the types of wireless devices to use
b. wireless coverage requirements
c. interference considerations
d. security considerations
16. What is a popular link-state protocol that works well with Enterprise networks using a hierarchical
design?
OSPF
17. Which distance vector protocol works well with larger networks?
EIGRP
18. Draw a line connecting the correct term to its correct description.
Link Aggregation
Protocol with distance-vector behaviors.
OSPF
Alternate data pathway.
EIGRP
Protocol which uses a backbone area.
Redundancy
Multiple Ethernet interface links combined into a single
bandwidth channel.
1.2 Selecting Network Devices
19. There are five categories of switches for enterprise networks, these are:
a. Campus LAN Switches
b. Cloud-Managed Switches
c. Data Center Switches
d. Service Provider Switches
e. Virtual Networking
20. Explain the following terms:
a. Cost–The cost of a switch will depend on the number and speed of the interfaces, supported
features, and expansion capability.
b. Port Density–Network switches must support the appropriate number of devices on the
network.
c. Power – It is now common to power access points, IP phones, and even compact switches
using Power over Ethernet (PoE). In addition to PoE considerations, some chassis-based
switches support redundant power supplies.
Cisco Semester 3 – Scaling Networks 5.0
Chapter 1
6
Robb Jones
Frederick County Career & Tech Center, MD
d. Reliability–The switch should provide continuous access to the network.
E. Port Speed–The speed of the network connection is of primary concern to end users.
f. Frame Buffers–The ability of the switch tostore frames is important in a network where there
may be congested ports to servers or other areas of the network.
g. Scalability–The number of users on a network typically grows over time; therefore, the switch
should provide the opportunity for growth.
21. Define forwarding rates.
Define the processing capabilities of a switch by rating how much data the switch can process per
second.
22. What is wire speed?
It is the data rate that each Ethernet port on the switch is capable of attaining
23. What does PoE allow?
PoE allows the switch to deliver power to a device over the existing Ethernet cabling.
24. Explain how PoE pass-through works.
It allows a network administrator to power PoE devices connected to the switch, as well as the switch
itself, by drawing power from certain upstream switches.
25. Where are multilayer switches typically deployed in an organization's switched network?
The core and distribution layers
26. What are multilayer switches typically characterized by?
a. Their ability to build a routing table
b. Their support a few routing protocols
c. Their ability to forward IP packets at a rate close to that of Layer 2 forwarding
26. Label each switch criteria.
Cisco Semester 3 – Scaling Networks 5.0
Chapter 1
7
Robb Jones
Frederick County Career & Tech Center, MD
27. In the distribution layer of an enterprise network, routing is required. Without the routing process,
packets cannot leave the local network.
28. What beneficial functions do Routers serve?
a. Provide broadcast containment
b. Connect remote locations
c. Group users logically by application or department
d. Provide enhanced security
29. List and explain the three categories of routers.
a. Branch Routers–Branch routers optimize branch services on a single platform while delivering an
optimal application experience across branch and WAN infrastructures. Highly available branch
7networks must ensure fast recovery from typical faults, while minimizing or eliminating the impact on
service, and provide simple network configuration and management.
b. Network Edge Routers–Network edge routers enable the network edge to deliver high-performance,
highly secure, and reliable services that unite campus, data center, and branch networks. Network
edge routers must deliver enhance quality of service and nonstop video and mobile capabilities.
c. Service Provider Routers–Service provider routers differentiate the service portfolio and increase
revenues by deliveringend-to-end scalable solutions and subscriber-aware services. These systems are
designed to simplify and enhance the operation and deployment of service-delivery networks.
30. What does an IOS refer to?
IOS refers to the package of routing, switching, security, and other internetworking technologies
integrated into a single multitasking operating system
31. Explain the following terms in detail.
a. Out-of-band management–Is used for initial configuration or when a network connection is
unavailable. Configuration using out-of-band management requires:Direct connection to console or
AUX portTerminal emulation client
b. In-band management–Is used to monitor and make configuration changes to a network device over
a network connection. Configuration using in-band management requires:At least one network
interface on the device to be connected and operational Telnet, SSH, or HTTP to access a Cisco device
32. Which command can be used to verify and save the routing configuration?
Copy run start
33. Explain the following list of commonly used IOC commands.
a. show ip protocols–Displays information about the routing protocols configured. If OSPF is
configured, this includes the OSPF process ID, the router ID, networks the router is advertising,
the neighbors the router is receiving updates from, and the default administrative distance,
which is 110 for OSPF.
b. show ip route-Displays routing table information, including: routing codes, known networks,
administrative distance and metrics, how routes were learned, next hop, static routes, and default
routes.
Cisco Semester 3 – Scaling Networks 5.0
Chapter 1
8
Robb Jones
Frederick County Career & Tech Center, MD
c. show ip ospf neighbor–Displays information about OSPF neighbors that have been learned,
including the Router ID of the neighbor, priority, the state (Full = adjacency has been formed),
the IP address, and the local interface that learned of the neighbor.
d. show interfaces–Displays interfaces with line (protocol) status, bandwidth, delay, reliability,
encapsulation, duplex, and I/O statistics. If specified without a specific interface designation, all
interfaces will be displayed. If a specific interface is specified after the command, information
about that interface only will be displayed.
e. show ip interfaces–Displays interface information, including: protocol status, the IP address,
if a helper address is configured, and whether an ACL is enabled on the interface. If specified
without a specific interface designation, all interfaces will be displayed. If a specific interface is
specified after the command, information about that interface only will be displayed.
f. show ip interface brief–Displays all interfaces with IP addressing information and interface
and line protocols status.
g. show protocols-Displays information about the routed protocol that is enabled, and the
protocol status of interfaces.
34. What is the purpose of the delete flash:vlan.dat command on a switch?
To erase vlan info
35. Explain the following list of switch IOS commands.
a. show port-security–Displays any ports with security activated. To examine a specific
interface, include the interface ID. Information included in the output: the maximum addresses
allowed, current count, security violation count, and action to be taken.
b. show port-security address–Displays all secure MAC addresses configured on all switch
interfaces.
c. show interfaces–Displays one or all interfaces with line (protocol) status, bandwidth, delay,
reliability, encapsulation, duplex, and I/O statistics.
d. show mac-address-table–Displays all MAC addresses that the switch has learned, how those
addresses were learned (dynamic/static), the port number, and the VLAN assigned to the port.
Cisco Semester 3 – Scaling Networks 5.0
Chapter 1
9
Robb Jones
Frederick County Career & Tech Center, MD
Download