Data Center Architecture A cisco network model where employees, partners, and customers rely on resources in the data center to effectively create, collaborate, and interact. Comments An ASN.1 lexical connection that begin with two hypens ("--") and terminated either by another set ("--") or the end of line character. Logical Network Design The object on needs analysis, which describes what network elements will be needed to meet the organization's needs. Request for Proposal Which of the following is not part of the group? Identifier An ASN.1 lexical connection that may begin with a letter, and may contain letters, digits, and hyphens, but may not end with a hyphen or contain two consecutive hyphens. Request for Proposal It creates a competitive environment for providing network equipment and services. Encoding The sequence of octets used to represent a data value. Object Identifier ASN.1 simple types which define as set of values associated with information objects allocated by the standard. Branch Architecture A cisco network model module that allows businesses to extend the applications and services found at the campus to thousands of remote locations and users or to a small group of branches. Entrance Entity Wiring Standards that where this facility may also contain campus-wide backbone connections. Set of Network Maps The key deliverable for the needs assessment stage is ________. Service Requirements An RFP considerations which includes implementation time plan; training courses and materials; support services; reliability and performance guarantees. Data Types A named set of values -- may be simple or structured Network Requirements An RFP checklist that includes > Choice sets of possible network designs; Mandatory, desirable, and wish list items, Security and control requirements; response time requirements; Guidelines for proposing new network designs. ASN.1 It is defined as a machine independent data description language. Request for Proposal It creates a competitive environment for providing network equipment and services. Module The basic building block of an ASN.1 specification. Upgrade Costs Costs to consider in Network Design includes the following except Teleworker Architecture A cisco network design that recommends that connections from home using broadband services such as cable modem or DSL connect to the Internet and from there to the corporate network Set ASN.1 Data Type that has a collection of one or more types Macro Notation It can be used to extend the syntax of ASN.1 to define new types and values Capacity Planning It means estimating the size and type of the "standard" and "advanced" network circuits for each type of network. Type Identifier An ASN.1 lexical connection that must start with an uppercase letter. Tagged ASN.1 data types derived form other types Transfer Syntax It describes how data are actually represented in terms of bit patterns while in transit Backbone Cabling Wiring standards that runs up through the floors of the building (risers) or across a campus and provides the interconnection for equipment rooms and telecommunication closets Network Design Tools Which of the following is not part of the Needs Analysis? Risk Assessment Which of the following is not part of the Cost Assessment deliverables? Choice ASN.1 structured types lists of alternatives Encoding Rules It specifies the mappping from one syntax to another Equipment Room Wiring standards that provides a termination point for backbone cabling that is connected to one or more telecommunication closets. Equipment Room Wiring Standards that is also known as the Main Distribution Facility Equipment Room Contains the main distribution frame (the main location for backbone cabling), phone systems, power protection, uninterruptable power supplies (UPS), LAN equipment (such as bridges, routers, core switches, and hubs), and any file servers and data processing equipment, including the mechanical terminations. Telecommunication Closet Wiring standards that is also known as the Intermediate Distribution Facility (IDF) Cisco Enterprise Architecture It is designed to provide network planners with a roadmap for network growth as the buiness moves through different stages Sequence of ASN.1 structured data types which is collection of a large number of variables of the same type and whose order is significant Reserved Words A lexical convention where letters shuld be typed-in in uppercase Network Users A network design parameter where the number and type of users that will generate network traffic may need to be reassessed. Simple ASN.1 data type that is atomic types and with no components Traditional Network Design A network design including only network analysis phase and implementation phase. BER / Basic Encoding Rules It is widely used in defining transfer syntaxes. Baselining A network design technique where the designers must review the applications currently used on the network and identify their location so they can be connected to the planned network. Needs Categorizing Network design parameter where › network requirements should be organized into mandatory requirements, desirable requirements, and wish list requirements. Edge Architecture A cisco model that pertains to module that offers connectivity to voice, video, and data services outside the enterprise. Abstract Syntax It describes the generic structure of data BER Widely used in defining transfer syntaxes Value Identifier A ASN.1 lexical convention that must start with a lowercase letter Sequence of ASN.1 structured types where there is an ordered collection of zero or more occurrences of a given type Security Which of the following is not part of the Building Block Approach to network design? Application Layer The following are being considered in Geographic scope of the network design except Macro Instance Generated from a macro definition of substituting values for variables Domain Partition Information Generated from a macro definition by substituting values for variables. Transitive Trust Forest-to-forest ____ can be created between Windows Server 2003 forests only (ie not between Windows 2000 forests). Local The Directory Services____ Administrator password/account is different from the domain Administrator account. This password is used when the administrator intentionally want to uninstall the AD DS Server role on the Windows Server. System Properties To change the computer name of the workstations or Clients running Windows 7, you need to access the _________ where Computer Name tab is available. Domains Collections of users, computers, groups, and so on Domains It is a logical partition in Active Directory database, a collections of users, computers, groups, and units of replication. 802 REFERENCE MODEL ISO : OSI Reference Model - IEEE : _________ Model Work Area is the space inside a building where employees, building occupants, or system users work and use their communication equipment. This is also the area where the horizontal communication cables are terminated. Main Cross-Connect is the connecting point between entrance cables, equipment cables, and inter-building backbone cables TIA/EIA-568 was developed through the efforts of more than 60 contributing organizations including manufacturers, end-users, and consultants. TIA/EIA-568 This Standard provides minimum cabling component performance criteria as well as procedures for component and cabling performance validation. TIA/EIA-568 This Standard specifies cabling components, transmission performance, system models, and the measurement procedures needed for verification of balanced twisted pair cabling. Entrance Facility contains the telecommunication service entrance to the building. May also contain campuswide backbone connections. Entrance Facility An entrance to a building for both public and private network service cables (including wireless) including the entrance point of the building and continuing to the entrance room or space Network Demarcation Point is the interconnection to the local exchange carrier's telecommunication facilities. Network Demarcation Point is typically 12 inches from where the carrier's facilities enter the building, but the carrier may designate otherwise. Vertical Wiring Runs up through the floors of a building (risers) or across a campus, and is the cable used between telecommunications closets, entrance facilities, equipment rooms and buildings, including all cables, cable terminations, and intermediate and main cross connects Vertical Wiring These are the wires that extend from floor to floor, across a campus, or from telecommunications closets to an equipment room. This is contrasted with horizontal cabling, which connects individual workstations to the network. Horizontal Wiring runs from each workstation outlet to the telecommunication closet. Horizontal Wiring Any cabling that is used to connect a floor's wiring closet to wall plates in the work areas to provide local area network (LAN) drops for connecting users' computers to the network. Telecommunications Closet contains the connection equipment for workstations in the immediate area and a crossconnection to an equipment room. Telecommunications Closet is a general facility that can provide horizontal wiring connections, as well as entrance facility connections. Telecommunications Closet A room or closet that houses all the telecommunication equipment. Serves as a termination point for the horizontal cabling system of a network. Contains the network's distribution panels, cross connects and backbone. Work Area Wiring Subsystem consists of the communication outlets (wallboxes and faceplates), wiring, and connectors needed to connect the work area equipment (computers, printers, and so on) via the horizontal wiring subsystem to the telecommunication closet Fault Management Major goal is to ensure that the network is always available and when a fault occurs, it can be fixed as rapidly as possible Involves detection, isolation, and correction of abnormal operations that may cause the failure of the OSI network This is the process by which the detection, logging and ticketing, isolation, tracking and eventual restoration of abnormal conditions is accomplished Configuration Management Concerned with initializing a network, provisioning the network resources and services, and monitoring and controlling the network This is the process of keeping track of the various parameters of devices and facilities that make up a network. The process of finding and setting up network devices includes Address and name assignment to network devices (bridges, switches, routers, etc.) Hardware / Software updates to network devices Setting parameters of network devices e.g., Accounting Management Enables charge for the use of managed objects to be measured and the cost for such use to be determined. Mainly focuses on charging and billing users for services, and regulating service use. Tracking each individual and group user's utilization of network resources to better ensure users have sufficient resources Enable charges to be established for the use of network resources, and the costs to be identified for those network resources. Performance Management Concerned with evaluating and reporting the behavior and the effectiveness of the managed network objects Involves analyzing your network and gather information so that you can prepare it for the future Create solution scalability objectives in order to help network engineers design networks that meet future growth requirements and ensure that proposed designs do not experience resource constraints due to growth or extension of the network. Involves tasks required to evaluate network resources utilization and adjust them as required. Security Management Protects the networks and systems from unauthorized access and security attacks Without it, your network will be exposed, as well as all the information and document it contains It is that set of tasks that ensure that only authorized personnel can use the network. includes: Confidentiality Integrity Authentication Access control Nonrepudiation OSI Management Network is an ISO standard document [Draft International Standard (DIS) 7498-4] that guidelines indicating for coordinating the development of existing OSI management standards. defines the terminology of the OSI management and describes its basic concepts. defines the five functional areas, the concept of Layer Management as well as for Managed Objects (MO). Managed Objects are defined by their properties, the operations that can be performed on them, and the relationships to other managed objects and are in a MIB stored. System Management Model is standardized under the International Standard (IS) 10040; provides an overview of the OSI management. System Management Standard provides a model to follow when setting up and operating a management system. CMIS defines the service primitive and the information structure as a basis of the OSI management. CMIP is the OSI protocol for exchanging messages between management facilities in OSI Management . Total Response Time the amount of time it takes a datum to enter the network and be processed and for a response to leave the network. Rejection Rate the percentage of time the network cannot transfer information because of the lack of resources and performance Availability the percentage of time the network is accessible for use and operational. Auto-Discovery A method used by a network management system to dynamically find the devices attached to a data network. Ping (1). Send out a query, such as ICMP Echo to every possible address on the network. (2). When a device answers the query, ask for detailed information using network management protocol (e.g. SNMP). Access Point A piece of network hardware or software that allows access to the data network. Software services Hardware components Network media Packet Filtering usually can be performed in bridges, switches, and routers. stops packets to or from unsecured hosts before they reach an access point. Host Authentication Allow access to a service based on a source host identifier, e.g. network address. User Authentication Enable service to identify each user before allowing that user access. Key A unique piece of information that authenticates the data in a transaction. Key Authentication The destination host requires the source host of a transaction to present a key for the transaction. Key Server A server that validates requests for transactions between hosts by giving out keys. Encryption Encode, Scramble, or Encipher the plaintext information to be sent. Encryption Algorithm The method performed in encryption. Encryption Key A stream of bits that control the encryption algorithm Plaintext The text which is to be encrypted. Ciphertext the text after encryption is performed. DES (Data Encryption Standard) Adopted by U.S. Federal Government. Both the sender and receiver must know the same secret key code to encrypt and decrypt messages with DES Operates on 64-bit blocks with a 56-bit key is a fast encryption scheme and works well for bulk encryption. RSA The public key is disseminated as widely as possible. The secret key is only known by the receiver. Named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman is well established as a de facto standard is fine for encrypting small messages Digital Signatures enable the recipient of information to verify the authenticity of the information's origin, and also verify that the information is intact Centralized configuration Management is centralized to the network management station on the backbone network Distributed configuration The LANs are managed by a local NMS while an NMS host connects to the backbone network Work Area is the space inside a building where employees, building occupants, or system users work and use their communication equipment. This is also the area where the horizontal communication cables are terminated. Main Cross-Connect is the connecting point between entrance cables, equipment cables, and inter-building backbone cables ----------------------------------------------------------------------------------------------------------------------A Protocol that is directly connected to the internetwork in the SNMP Protocol Architecture Network Dependent Protocols It uniquely identifies an MO in the MIB OID An SNMP community where an agent can provide different categories of MIB access using the following concepts: MIB MIB view and Access Mode SNMP Access Policy It refers to the actual values of management information in a system MIB A SNMP NM architecture component that resides int the managed network node agent An SNMP NM architecture component that resides on the network management station manager In the transmission of SNMP message, the PDU is constructed using ASN.1 True Access is provided only to the leaf objects in the MIB tree during SNMP operations True SNMP actions are represented in terms of implicit actions which do their work trhough side effects. True An organization responsible for SNMP standardization Internet Engineering Task Force SNMP Security concepts where agent can act as intermediary to other proprietary managed devices Proxy Service In categorizing MIB objects, it refers to the current condition of a system State SNMP defines two techniques for identifying a specific object instance such as serial access and random access technique. True It allows NMS to discover the structure of the MIB view dynamically. GetNextRequest PDU In categorizing MIB objects, it means controlling a system. Actions In categorizing MIB objects, it refers to the collections of logical and physical devices or services that are being managed Components It checks whether the MIBs are written in SMIv1 or SMIv2 defined correctly MIB Compiler All managed objects are structured hierarchically True It refers to the union of all MO definitions the MIB An SNMP Security concepts where agent may wish to limit access to the MIB to authorized managers only. Authentication Service SNMP Statistics are considered valid for a specific period of time. True In categoring MIB objects, it refers to a fairly static properties of a modeled object. Attributes It describes how the managed objects (MO) can be defined in the MIB, data types and values MOs can have, and how MOs are named SMI An SNMP Operation that sends unsolicited scalar object values to notify problems. Trap Operation It defines the general framework for defining SNMP MIBs. SMI It provides the first line of security protection in SNMP. Authentication It is issued by an SNMP manager on behalf of the NMS to retrieve information from an agent. GetRequest PDU It provides the second line of security protection in SNMP. Authorization SNMP MIB can store only simple data types. True SNMP Operation that retrieves management information. Get operation BER is used to define MOs and the entire MIB structure False A protocol used by the Ping utility command. Internet Control Message Protocol Which of the following is not part of the Simple Network Mangement Protocol framework? Network Management Tools SNMP SMI does not use a subset of ASN.1 False It allows you to see MIB using the graphical user interface (GUI). MIB Browser SNMP does support explicit action operation False SNMP Security concepts where agent may wish to give different access privileges to different managers Access Policy An SNMP Operation that updates management information. Set Operation In categorizing MIB objects, it refers to the useful information about what a system has been doing. Statistics SNMP Operations support No explicit action True By means of ____________, the agent occasionally notifies the manager about some events related to network operation trap It is used for accessing the MIB objects serially. Lexicographical Ordering It is issued by an SNMP agent to notify the NMS of some significant event. Trap PDU SNMP MIBs are not object-oriented True It refers to a single MO definition a MIB Another term used for Simple Network Management Protocol (SNMP). Internet Network Management Framework It extends the SNMPv1 MIB functions RMON1 It is issued by the SNMP manager on behalf of the NMS to modify information in an agent. SetRequest PDU The relationship between an agent and a set of managers that defines authentication, access control and proxy characteristics. SNMP Community SNMP MIBs support inheritance False A cisco network model where employees, partners, and customers rely on resources in the data center to effectively create, collaborate, and interact. Data center architecture A ASN.1 lexical convention that begin with two hyphens ("--") and terminated either by another set ("-") or the end of line character Comments The object on needs analysis, which describes what network elements will be needed to meet the organization's needs Logical Network Design Which of the following is not part of the group? RFP A ASN.1 lexical convention that may begin with a letter, and may contain letters, digits, and hyphens, but may not end with a hyphen or contain two consecutive hyphens Identifier - It creates a competitive environment for providing network equipment and services. RFP The sequence of octets used to represent a data value ENCODING - ASN.1 simple types which is define as the set of values associated with information objects allocated by the standard Object Identifier - A cisco network model module that allows businesses to extend the applications and services found at the campus to thousands of remote locations and users or to a small group of branches. Branch Architecture Wiring Standards that where this facility may also contain campus-wide backbone connections. Entrance Facility The key deliverable for the needs assessment stage is Set of Network Maps An RFP considerations which includes implementation time plan; training courses and materials; support services; reliability and performance guarantees. Service Requirements A named set of values -- may be simple or structured Data Types - An RFP checklists that includes › Choice sets of possible network designs; Mandatory, desirable, and wish list items, Security and control requirements; Response time requirements; Guidelines for proposing new network designs Network Requirements - It is defined as a machine independent data description language ASN.1 It creates a competitive environment for providing network equipment and services. Request for Proposal - The basic building block of an ASN.1 specification Module Costs to consider in Network design includes the following except Upgrade Costs - A cisco network design module that recommends that connections from home using broadband services such as cable modem or DSL connect to the Internet and from there to the corporate network. Teleworker Architecture ASN.1 Data Type that has a collection of one or more types Set - It can be used to extend the syntax of ASN.1 to define new types and values Macro Notation It means estimating the size and type of the "standard" and "advanced" network circuits for each type of network. Capacity Planning A ASN.1 lexical convention that must start with an uppercase letter Type Identifier ASN.1 data types derived from other types Tagged - It describes how data are actually represented in terms of bit patterns while in transit Transfer syntax Wiring standards that runs up through the floors of the building (risers) or across a campus and provides the interconnection for equipment rooms and telecommunication closets Backbone Cabling Which of the following is not part of the Needs Analysis? Network Design Tools Which of the following is not part of the Cost Assessment deliverables? Risk Assessment ASN.1 structured types lists of alternatives Choice - It specifies the mapping from one syntax to another Encoding Rules Wiring standards that provides a termination point for backbone cabling that is connected to one or more telecommunication closets. Equipment Room Wiring standards that is also known as the Intermediate Distribution Facility (IDF) Telecommunication Closet It is designed to provide network planners with a roadmap for network growth as the business moves through different stages Cisco Enterprise Architecture ASN.1 structured data types which is collection of a large number of variables of the same type and whose order is significant Sequence of A lexical convention where letters should be typed-in in uppercase. Reserved Words A network design parameter where the number and type of users that will generate network traffic may need to be reassessed. Network Users ASN.1 data type that is atomic types and with no components Simple A network design including only network analysis phase and implementation phase. Traditional Network Design - It is widely used in defining transfer syntaxes BER A network design technique where the designers must review the applications currently used on the network and identify their location so they can be connected to the planned network. Baselining Network design parameter where › network requirements should be organized into mandatory requirements, desirable requirements, and wish list requirements. Needs Categorization A cisco model that pertains to module that offers connectivity to voice, video, and data services outside the enterprise. Edge Architecture It describes the generic structure of data Abstract Syntax Widely used in defining transfer syntaxes BER - A ASN.1 lexical convention that must start with a lowercase letter Value Identifier ASN.1 structured types where there is an ordered collection of zero or more occurrences of a given type Sequence of Which of the following is not part of the Building Block Approach to network design? Security - Wiring Standards that is also known as the Main Distribution Facility Equipment Room The following are being considered in Geographic scope of the network design except Application Layer - Generated from a macro definition by substituting values for variables. Macro Instance ASN.1 simple types which is define as the set of values associated with information objects allocated by the standard object identifier An RFP considerations which includes implementation time plan; training courses and materials; support services ;reliability and performance guarantees. service requirements Child domains derive their namespace from parent Trees The following are being considered in Geographic scope of the network design Access, distribution, core The sequence of octets used to represent a data value. Encoding A network design parameter where the number and type of users that will generate network traffic may need to be reassessed. Network users A cisco network design module that recommends that connections from home using broadband services such as cable modem or DSL connect to the Internet and from there to the corporate network. teleworker architecture Collections of users, computers, groups, and so on Domains It is a logical partition in Active Directory database, a collections of users, computers, groups, and units of replication. Domains A network design technique where the designers must review the applications currently used on the network and identify their location so they can be connected to the planned network . ___________ Analogy: Baselining It is used to organize resources to reflect administrative divisions and may not map to organizationalstructure. It is also used to delegate administrative authority. Organizational units It provides an operator interface to allow an authorized user to manage the network. NMA Required length of cable from work station to wall plate 6 meters Required length of cable from switch to panel 4 meters Maximum distance 90 meters service primitive and the information structure as a basis of the OSI management. Common Management Information Protocol provides a model to follow when setting up and operating a management system. System Management Standard The following are being considered in geographic scope of the network design except Application layer -----------------------------------------------------------------------------------------------------------------------BIG PICTURE
0
You can add this document to your study collection(s)
Sign in Available only to authorized usersYou can add this document to your saved list
Sign in Available only to authorized users(For complaints, use another form )