Designing and Supporting Computer Networks – Introducing Network Design Concepts
Chp1 Online Study Guide
CURR / Question / Answer1.1 /
Discovering Network Design Basics
1.1.1 / Network Design Overview1.1.1.1 /
- What are the five steps in designing a good network?
1.1.1.2 /
- What are the four fundamental design goals?
- Which fundamental design goal accounts for network growth?
1.1.2 /
The Benefits of a Hierarchal Network Design
1.1.2.1 /- List the three basic layers of a hierarchal network design.
- What are the major benefits to a hierarchal network that a flat network does not provide?
1.1.2.2 /
- What is the Cisco Enterprise Architecture?
- What the three modules of the network design?
- What is the purpose of the campus core module?
1.1.2.3 /
- How does a deterministic network help in network design?
1.1.3 /
Network Design Methodologies
1.1.3.1 /- What are the two categories of identifying network requirements?
- What is the purpose of characterizing the existing network?
- What is a common network strategy used in network design?
1.1.3.2 /
- List some of the factors that can change the scope of a network design.
1.1.3.3 /
- What are some network requirements that may not affect the entire network when planning a network design?
1.2 / Investigating Core Layer Design Considerations
1.2.1 / What happens at the Core Layer
1.2.1.1 /
- What are the goals of the core layer
- What technologies to you find at the core layer?
1.2.1.2 /
- What ensures that network devices can find alternate paths in a network design?
- Core layers use what type of topology?
- What is the advantage of a partial mesh over a full mesh topology?
1.2.2 /
Network Traffic Prioritization
1.2.2.1 /- What is a hot-swappable device?
- What accounts for as many network outages as applications failures?
- What is a back-out strategy?
1.2.3 /
Network Convergence
1.2.3.1 /- What two factors affect convergence time?
- What characteristic must a routing protocol have in a large network?
- What other techniques can an administrator use to improve the network convergence?
1.3 /
Investigating Distribution Layer Considerations
1.3.1 /What Happens at the Distribution Layer
1.3.1.1 /- What devices are used in the distribution layer and what are their goals?
1.3.1.2 /
- Why are trunks used in the distribution layer/?
- How are redundant links used at the distribution layer?
- What type of link is used to interconnect distribution devices?
1.3.2 / Limiting the Scope of Network Failures
1.3.2.1 /
- How are failure domain sizes controlled at the distribution layer?
- What is switch block deployment?
1.3.3 / Building a Redundant Network
1.3.3.1 /
- Why is STP (802.1d) important in redundant networks?
1.3.3.2 /
- What is a common cause of frequent STP recalculation and why can it be costly if RSTP is not used?
1.3.4 / Traffic Filtering at the Distribution Layer
1.3.4.1 /
- What is used at the distribution layer to filter traffic?
- What criteria can extended ACL’s use to filter packets?
- What must be done before a Dynamic ACL is applied?
- What is the difference between the established command and a reflexive ACL?
- Define Time-based ACL’s.
- Extended ACL’s should be placed where?
1.3.5 /
Routing Protocols at the Distribution Layer
1.3.5.1 /- What are the advantages of using route summarization?
- Which routing protocols support route summarization?
1.4 /
Investigating Access Layer Considerations
1.4.1 /What Happens at the Access Layer?
1.4.1.1 /- What determines the design of the Access layer infrastructure?
- What is different in the design of a server-wiring closet compared to a typical access layer closet?
1.4.1.2 /
- What implications does the modern computer network put on the access layer design?
- What is one strategy that can be implemented at the access layer to address this need for availability?
1.4.1.3 /
- What must be considered to improve the manageability of the access layer?
- Standardization of configurations and equipment is important in design manageability.
1.4.2 /
Network Topologies at the Access Layer
1.4.2.1 /- What are the advantages of a star topology?
- What the disadvantages of a star topology?
- What type of cable is typically used to connect to the distribution layer devices?
- What is a disadvantage of an enterprise network mesh topology?
1.4.3 /
How VLANs Segregate and Control Network Traffic
52.How are broadcasts contained in the video?
1.4.3.1 /53.How has the use of vlans changed and why has it changed?
1.4.4 /Services at the Network Edge
1.4.4.1 /54.What mechanism helps congestion on the network?
55.How is classification used to ensure the quality of voice traffic on the network?
1.4.5 /Services at the Network Edge
1.4.5.1 /56.What steps can a network designer take to help improve security?
1.4.6 /Security Measures
1.4.6.1 /57.What can be done to secure the physical security of a network?
58.What are the measures that can provide security at the access layer?
59.What is ultimately needed to achieve effective security?
1.5 /Investigating Server Farms and Security
1.5.1 /What is a Server Farm?
1.5.1.1 /60.Where are centralized server farms usually located?
61.What are the benefits that a server farm offers to a network design?
1.5.2 /Security, Firewalls, and DMZs
1.5.2.1 /62.What network products can be deployed in a server farm to increase the security over a basic firewall?
63.What does this icon represent?
64.What does this icon represent?
1.5.2.2 /65.How has the concept of the DMZ changed in modern network design?
1.5.3 /High Availability
1.5.3.1 /66.What does a high availability network mean?
- What protocols can be used at layer 2 to manage redundant links?
68.What protocols are used at layer 3?
69.What is a benefit of virtualization?
1.6.1 /Considerations Unique to WLAN
1.6.1.1 /- List some examples that a site survey will identify about the network requirements.
1.6.1.2 /
- What requirements should be identified in the physical site survey?
- What would a complex wireless design include in a logical network design?
1.6.2 /
Considerations Unique to WLAN
1.6.2.1 /- On a guest access network, what is done to make access easier and also document the guest usage?
74.List the recommended practices for a secured employee access network.
1.7.1 /Design Considerations at the Enterprise Edge
1.7.1.1 /- What design requirements need to be considered at the enterprise edge?
1.7.2 /
Integrating Remote Sites Into the Network Design Design
1.7.2.1 /- List the traditional WAN technologies.
- List the newer WAN technologies.
- What does a SLA provide to WAN technologies?
- What is the fastest leased line technology?
- How does MPLS handle the different WAN technologies such as Frame Relay, ATM or IP?
1.7.2.1 /
- What is the big advantage that MPLS offers to scalable network design?
1.7.2.2 /
- What is a common connectivity option for remote or mobile a worker that does not require a leased line?
1.7.3 /
Redundancy and Backup Links
1.7.3.1 /- How can a backup link be secures if it requires an alternate route over a public network?
- What type of data should be given priority if a slower backup link needs to be used?
- Explain how a backup link can be used in load sharing.
Discovery Designing and Supporting Computer Networks – 07 Prototyping the Campus Network
1of 8