Designing and Supporting Computer Networks – Introducing Network Design Concepts

Chp1 Online Study Guide

CURR / Question / Answer
1.1 /

Discovering Network Design Basics

1.1.1 / Network Design Overview
1.1.1.1 /
  1. What are the five steps in designing a good network?

1.1.1.2 /
  1. What are the four fundamental design goals?

  1. Which fundamental design goal accounts for network growth?

1.1.2 /

The Benefits of a Hierarchal Network Design

1.1.2.1 /
  1. List the three basic layers of a hierarchal network design.

  1. What are the major benefits to a hierarchal network that a flat network does not provide?

1.1.2.2 /
  1. What is the Cisco Enterprise Architecture?

  1. What the three modules of the network design?

  1. What is the purpose of the campus core module?

1.1.2.3 /
  1. How does a deterministic network help in network design?

1.1.3 /

Network Design Methodologies

1.1.3.1 /
  1. What are the two categories of identifying network requirements?

  1. What is the purpose of characterizing the existing network?

  1. What is a common network strategy used in network design?

1.1.3.2 /
  1. List some of the factors that can change the scope of a network design.

1.1.3.3 /
  1. What are some network requirements that may not affect the entire network when planning a network design?

1.2 / Investigating Core Layer Design Considerations
1.2.1 / What happens at the Core Layer
1.2.1.1 /
  1. What are the goals of the core layer

  1. What technologies to you find at the core layer?

1.2.1.2 /
  1. What ensures that network devices can find alternate paths in a network design?

  1. Core layers use what type of topology?

  1. What is the advantage of a partial mesh over a full mesh topology?

1.2.2 /

Network Traffic Prioritization

1.2.2.1 /
  1. What is a hot-swappable device?

  1. What accounts for as many network outages as applications failures?

  1. What is a back-out strategy?

1.2.3 /

Network Convergence

1.2.3.1 /
  1. What two factors affect convergence time?

  1. What characteristic must a routing protocol have in a large network?

  1. What other techniques can an administrator use to improve the network convergence?

1.3 /

Investigating Distribution Layer Considerations

1.3.1 /

What Happens at the Distribution Layer

1.3.1.1 /
  1. What devices are used in the distribution layer and what are their goals?

1.3.1.2 /
  1. Why are trunks used in the distribution layer/?

  1. How are redundant links used at the distribution layer?

  1. What type of link is used to interconnect distribution devices?

1.3.2 / Limiting the Scope of Network Failures
1.3.2.1 /
  1. How are failure domain sizes controlled at the distribution layer?

  1. What is switch block deployment?

1.3.3 / Building a Redundant Network
1.3.3.1 /
  1. Why is STP (802.1d) important in redundant networks?

1.3.3.2 /
  1. What is a common cause of frequent STP recalculation and why can it be costly if RSTP is not used?

1.3.4 / Traffic Filtering at the Distribution Layer
1.3.4.1 /
  1. What is used at the distribution layer to filter traffic?

  1. What criteria can extended ACL’s use to filter packets?

  1. What must be done before a Dynamic ACL is applied?

  1. What is the difference between the established command and a reflexive ACL?

  1. Define Time-based ACL’s.

  1. Extended ACL’s should be placed where?

1.3.5 /

Routing Protocols at the Distribution Layer

1.3.5.1 /
  1. What are the advantages of using route summarization?

  1. Which routing protocols support route summarization?

1.4 /

Investigating Access Layer Considerations

1.4.1 /

What Happens at the Access Layer?

1.4.1.1 /
  1. What determines the design of the Access layer infrastructure?

  1. What is different in the design of a server-wiring closet compared to a typical access layer closet?

1.4.1.2 /
  1. What implications does the modern computer network put on the access layer design?

  1. What is one strategy that can be implemented at the access layer to address this need for availability?

1.4.1.3 /
  1. What must be considered to improve the manageability of the access layer?

  1. Standardization of configurations and equipment is important in design manageability.
/ True / False
1.4.2 /

Network Topologies at the Access Layer

1.4.2.1 /
  1. What are the advantages of a star topology?

  1. What the disadvantages of a star topology?

  1. What type of cable is typically used to connect to the distribution layer devices?

  1. What is a disadvantage of an enterprise network mesh topology?

1.4.3 /

How VLANs Segregate and Control Network Traffic

52.How are broadcasts contained in the video?

1.4.3.1 /

53.How has the use of vlans changed and why has it changed?

1.4.4 /

Services at the Network Edge

1.4.4.1 /

54.What mechanism helps congestion on the network?

55.How is classification used to ensure the quality of voice traffic on the network?

1.4.5 /

Services at the Network Edge

1.4.5.1 /

56.What steps can a network designer take to help improve security?

1.4.6 /

Security Measures

1.4.6.1 /

57.What can be done to secure the physical security of a network?

58.What are the measures that can provide security at the access layer?

59.What is ultimately needed to achieve effective security?

1.5 /

Investigating Server Farms and Security

1.5.1 /

What is a Server Farm?

1.5.1.1 /

60.Where are centralized server farms usually located?

61.What are the benefits that a server farm offers to a network design?

1.5.2 /

Security, Firewalls, and DMZs

1.5.2.1 /

62.What network products can be deployed in a server farm to increase the security over a basic firewall?

63.What does this icon represent?

64.What does this icon represent?

1.5.2.2 /

65.How has the concept of the DMZ changed in modern network design?

1.5.3 /

High Availability

1.5.3.1 /

66.What does a high availability network mean?

  1. What protocols can be used at layer 2 to manage redundant links?

68.What protocols are used at layer 3?

69.What is a benefit of virtualization?

1.6.1 /

Considerations Unique to WLAN

1.6.1.1 /
  1. List some examples that a site survey will identify about the network requirements.

1.6.1.2 /
  1. What requirements should be identified in the physical site survey?

  1. What would a complex wireless design include in a logical network design?

1.6.2 /

Considerations Unique to WLAN

1.6.2.1 /
  1. On a guest access network, what is done to make access easier and also document the guest usage?

74.List the recommended practices for a secured employee access network.

1.7.1 /

Design Considerations at the Enterprise Edge

1.7.1.1 /
  1. What design requirements need to be considered at the enterprise edge?

1.7.2 /

Integrating Remote Sites Into the Network Design Design

1.7.2.1 /
  1. List the traditional WAN technologies.

  1. List the newer WAN technologies.

  1. What does a SLA provide to WAN technologies?

  1. What is the fastest leased line technology?

  1. How does MPLS handle the different WAN technologies such as Frame Relay, ATM or IP?

1.7.2.1 /
  1. What is the big advantage that MPLS offers to scalable network design?

1.7.2.2 /
  1. What is a common connectivity option for remote or mobile a worker that does not require a leased line?

1.7.3 /

Redundancy and Backup Links

1.7.3.1 /
  1. How can a backup link be secures if it requires an alternate route over a public network?

  1. What type of data should be given priority if a slower backup link needs to be used?

  1. Explain how a backup link can be used in load sharing.

Discovery Designing and Supporting Computer Networks – 07 Prototyping the Campus Network

1of 8