-
Which of the three options correctly associate a layer of the hierarchical design model with its function? (Choose three.)
A. Core - interface for the end devices
B. Distribution - traffic control and security policies
C. Access - interface for end devices
D. Distribution - high-speed backbone
E. Core - high-speed backbone
F. Access - implementation of security policies
- B. Distribution - traffic control and security policies
- C. Access - interface for end devices
- E. Core - high-speed backbone
- These are the principal characteristics of the respective design layers
-
With respect to network design, what is convergence?
A. Implementation of standard equipment sets for LAN design
B. Implementation of a core-distribution-access design model for all sites in an enterprise.
C. A point in the network where all traffic "converges" before transmission to the destination, normally the core switch
D. Combining conventional data with voice and video on a common network
-
Which three options are potential benefits of a converged network? (Choose three.)
A. Simplified data network configuration
B. Combines voice and data network staffs
C. Combines voice, video, and applications in one computer
D. Simpler maintenance than hierarchical networks
E. Simplified network changes
F. Lower quality of service configuration requirements
-
Which four options describe data store and data server analysis actions? (Choose four.)
A) Workstation ports required for a department
B) Amount of server-to-server traffic
C) Intensity of use of a department application server
D) Amount of traffic for a SAN
E) Anticipated department port growth
F) Data backed up to tape
G) Network attached to storage
-
Describes the portion of the network where devices connect to the network and includes controls for allowing devices to communicate on the network.
Access Layer
-
In the hierarchical network design model, the later that invokes policy and routing control.
Distribution Layer
-
At which layer in the hierarchical network design model are VLANs typically defined?
Distribution Layer
-
The backbone of a switched LAN. All traffic to end from peripheral networks must pass through this layer. It includes high-speed switching devices that can handle relatively large amounts of traffic.
Core Layer
-
A desirable property of a network to handle growing amounts of traffic in a graceful manner.
Scalability
-
The duplication of devices, services, or connections so that, in the event of a failure, the redundant devices, services, or connections can perform the work of those that failed.
Redundancy
-
A loosely defined networking measure based on throughput and error rates.
Performance
-
An encompasing term describing the prevention and means of prevention of unauthorized access to an entity, location, or system.
Security
-
A measure of the lack of difficulty in a managing network devices and associated software in working order.
Manageability
-
A measure of the lack of difficulty in keeping network devices and associated software in working order.
Maintainability
-
The capability to carry voice traffic over an IP-based network with POTS-like functionality, reliability, amd voice quility. Enables a router to corry voice traffic over an IP network.
Voice Over IP (VoIP)
-
Voice packets are transported using...
IP in compliance with ITU-T spcification H.323
-
The speed and compatibility of a group of switches running STP to agree on a loop-free Layer 2 topology for a switched LAN.
Convergence
-
A measure of performance for a transmission system that reflects its transmission quality and service available.
Quality of Service (QoS)
-
A digital or analog telephone switchboard located on the subscriber premises and used to connect private and public telephone networks.
Private Branch Exchange (PBX)
-
A large and diverse network connecting major sites within a company or other organization.
Enterprise Network
-
How does a enterprise network differ from a WAN?
An enterprise network is privately owned and maintained
-
The powering of network devices over Ethernet cable.
Power over Ethernet (PoE)
-
Filters and forewards packets based on OSI layer 2 through Layer 7 information at wire-speed by utilizing dedicated hardware that stores data structures mirroring routing table, ARP table, and ACL information.
Multilayer Switch
-
Which three options correctly associate a layer of the hierarchical design model with its function? (Choose three.)
Core - interface for end devices
Distribution - traffic control and security policies
Access - interface for end devices
Distribution - high-speed backbone
Core - high-speed backbone
Access - implementation of security policies
- Distribution - traffic control and security policies
- Access - interface for end devices
- Core - high-speed backbone
-
With respect to network design, what is convergence?
a) implementation of standard equipment sets for LAN design
b) implementation of a core-distribution-access design model for all sites in an enterprise
c) a point in the network where all traffic "converges" before transmission to the destination, normally the core switch
d) combining conventional data with voice on a common network
d) combining conventional data with voice on a common network
-
Name three potential benefits of a converged network.
combines voice, video, and applications in one computer
simplified network changes
combines voice and data network staffs
-
What factor may complicate user communities analysis?
a) application changes may radically affect predicted data growth
b) server to server traffic may skew user port usage data
c) application usage is now always bound by department, or physical location
d) different organization applications may share data stores
c) application usage is now always bound by department, or physical location
-
Data rate that each port on the switch is capable of attaining
Wire Speed
-
number of ports available on a single switch
Port Density
-
Processing apabilities of a switch by quantifying performance of the switch by how much data it can process per second
Forwarding Rates
-
Ability to utilize multiple switch ports currently for higher throughput data communication
Link Aggregation
-
What would be the port capacity of a single port on a 48-port Gigabit Ethernet switch?
a) 48 Gbps
b) 10 Mbps
c)1000 Mbps
d)100 Mbps
c)1000 Mbps
-
A switch that uses MAC addresses to foreward frames operated at which layer of the OSI model?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
b) Layer 2
-
What is a feature offered by all stackable switches?
a) predetermined number of ports
b) fully redundant backplane
c) support for Gigabit connectivity
d) low bandwidth for inter-switch communications
e) PoE Capability
b) fully redundant backplane
-
What function is performed by a Cisco access level switch?
a) inter-VLAN support
b) routing
c) providing PoE
d) link aggregation
c) providing PoE
-
Classifying and prioritizing traffic based on type of data.
QoS (Quality of Service)
-
Allow you to segment the traffic on a switch into separate subnetworks.
VLANs
-
Controls which end devices are allowed to communicate on the network.
Access Layer
-
Distribution layer and core layer are combined into one layer.
collapsed core
-
High-speed backbone of the internetwork capable of forwarding large amounts of data quickly.
Core Layer
-
Determine the design requirements for a network
Business Goals
-
Access layer switches can be configured with this option to provide control over which devices are allowed to connect to the network
port security
-
Cisco proproetary link aggregation technology
EtherChannel
-
Properly designed hierarchical networks can achieve near wire speed between all devices
Performance
-
Consistency between switches at each layer allows for rapid recovery and simplified troubleshooting.
manageability
-
Dramatically increases availability
redundancy
-
Controls the flow of the network traffic using policies and delineates breadcast domains be performing rounting functions between virtual LANs(VLANs).
Distribution Layer
-
The process of combining voice and video communications on a data network
Convergence
-
The modularity of the hierarchical design facilitates ease of network expansion.
scalability
-
A graphical representation of a network infrastructure.
topology diagram
-
Cannot add hardware features or options beyond those that originally came with the switch
fixed configuration switches
-
allow installation of different line cards
modular switches
-
A process of measuring the bandwidth usage on a network and analyzing the data for the purpose of performance tuning, capacity planning, and making hardware improvement decisions.
traffic flow analysis
-
Reduces bottlenecks of traffic by allowing up to eight switch ports to be bound together for data communications.
link aggregation
-
The number of ports available on a single switch.
port density
-
Uses the network cable to deliver electicity to devices.
Power over Ethernet (PoE)
-
Generated between data storage devices on the network.
Server-server traffic
-
Interconnected using a special backplane cable
stackable switches
-
Typically traverses multi[le switches to reach its destination
client-server traffic
-
Defines the capabilities of a switch by classifying how much data the switch can process per second
forwarding rates
-
also know as Layer 3 switches
multilayer switches
-
A process of idenifying various groups and their impact on network performance.
user community analysis
-
Features of the Access Layer (6)
- Bandwidth Aggregation
- Fast Ethernet/Gigabit Ethernet
- Port Security
- Power over Ethernet (PoE)
- Quality of Service (QoS)
- VLANs
-
Features of hte Distribution Layer (7)
- Bandwidth Aggregation
- Gigabit Ethernet/10-Gigabit Ethernet
- High Forwarding Rate
- Layer 3 support
- Quality of Service (QoS)
- Redundant Components
- Security Policies/Access Control Lists
-
Features of the Core Layer (6)
- Bandwidth Aggregation
- Gigabit Ethernet/10-Gigabit Ethernet
- Very High Forwarding Rate
- Layer 3 Support
- QoS
- Redundant Components
-
What is the effect of entering the banner login #Authorized Personnel Only!# command?
a) #Authorized Personnel Only!# appears after the user logs in.
b) Authorized Personnel Only! appears only when the user makes a Telnet connection.
c) #Authorized Personell Only!# appears only when the user enters the global configuration mode.
d) Authorized Personnel Only! appears before the username and password login prompts for any connection.
d) Authorized Personnel Only! appears before the username and password login prompts for any connection.
-
Nonvolatile memory that can be read, but not written to, by the microprocessor
Read-Only Memory (ROM)
-
A 3-byte hexadecimal number that IEEE Registration Authority assigns to any company that manufactures components under the ISO/IEC 8802 standard.
Original Unique Identifier (OUI)
-
Refers to the transmission of data just one direction at a time. At any given instant, the device can transmit or receive but not both simultaneously
Half Duplex
-
The capability of a port for simultaneous data transmission and reception
Full Duplex
-
When this feature is enabled, the switch detects the required cable type for copper Ethernet connections and configures the interface pin-outs accordingly, enabling the use of either a crossover cable or a straight-through cable for commections to a 10/100/1000 port on the switch, regardless of the type of device on the other end of the connection.
Auto-MDIX
-
The data trafficking technique used by switches in which traffic received on an interface is sent out to all the other interfaces of the switch.
Flooding
-
A group of hosts with a common set of requirements that communicate as if they were attached to the same sire, regardless of their physical location
Virtual LAN (VLAN)
-
The time lag between the departure of a signal from the source and the arival of the signal at the destination.
Propagation Delay
-
A technique in which frames are completely processed before being forwarded out the appropriate port. The processing includes calculating the CRC and checking the destination address. In addition, frames must be temporarily stored until network resources are available to forward the message.
Store-and-forward Switching
-
An Ethernet frame switching approach that streams data through a switch so that the leading edge of a packet exits the switch at the egress port before the packet finishes entering the ingress port.
Cut-through Switching
-
An environment that uses pictorial as well as textual representations of the input and output of applications and tha data structure in which info is stored.
Graphical User Interface (GUI)
-
Used to monitor and control network devices, and to manage configurations, statistics collection, performance, and security.
Simple Network Management Protocol (SNMP)
-
RAM that retains its contents when a device is powered off. Used to store configuration files.
Nonvolative RAM (NVRAM)
-
A simplified version of FTP that allows files to be transferred from one computer to another over a network in clear text without authentication.
Trivial File Transfer Prolotoc (TFTP)
-
The application of a specific algorithm to data so as to alter the appearance of the data, making it incomprehensible to those who are not authorzed to see the info.
Encryption
-
The act of a packet or frame being represented with a false source address to mask its true source. Designed to fail network security mechanisms such as filters and access lists.
Spoofing
-
A media-and-protocol-independent device-discovery protocol that runs on all Cisco-manufactured equipment, including routers, access servers, bridges, and switches. Using this, a device can advertise its existence to other devices and receive info about other devices on the same LAN or on the remote side of a WAN.
Cisco Discovery Protocol (CDP)
-
bidirectional data flow
half-duplex communication
-
A special set of rules used in Ethernet LANs operating in half-duplex mode
CSMA/CD
-
Unidirectional data flow
full-duplex communication
-
A frame is sent to a specific group of devices or clients
multicast transmission
-
the average amount of data that is actually transmitted as opposed to the rating of the port
throughput
-
the time a frame of a packet takes to travel from the source to the destination
latency
-
Layer 2 identifier for the frame's originating NIC
Source MAC Address
-
A type of checksum used to detect errors in a transmitted frame
cyclical redundancy chech
-
Time it takes to place a fron on the wire or read the frame off the wire.
NIC delay
-
Dedicated connection between two hosts
microsegment
-
Time it takes for a signal to travel through the media
propagation delay
-
the network area where frames originate and collide
collision domain
-
A fram is sent from one host to on specific destination
unicast transmission
-
A frame is send from one address to all other addresses
broadcast transmission
-
Integrated circuits that control the data paths through the switch
switch fabric
-
Layer 2 identifier for the intended recipient
Destination MAC address
-
Bounded by a router or a switch with VLANs
broadcast domans
-
Automatically detects the required cable type for copper Ethernet connections
Auto-MDIX
-
7 Parts of an Ethernet frame and how many bits each
- Preamble - 7
- Start of Frame Delimiter - 1
- Destination Address - 6
- Source Address - 6
- Length/Type- 2
- 802.2 Header and Data - 46-1500
- Frame check sequence - 4
-
Catalyst switch VLAN configuration info is stored with a VLAN database file. Located in the flash memory of a switch.
vlan.dat
-
Technology developed by Intel and licensed to other semiconductor companies. Allows software images to be stored, booted, and rewritten as necessary.
Flash
-
A Cisco-proprietary Layer 2 protocol that enables a network manager to configure a single switch so that it propagates VLAN configuration info to other switches in the network, as well as synchronizes the info with the switches in the VTP domain.
VLAN Trunking Protocol (VTP)
-
A VLAN that is configured to carry only user-generated traffic. Does not carry voice-based traffic or traffic used to manage a switch.
Data VLAN
-
The VLAN that all the ports are on a switch are members of when a switch is reset to factory defaults. All switch ports are members of the VLAN after the initial boot of the switch.
Default VLAN
-
A dummy VLAN distinct from all other VLANs. All unused ports are assigned to this VLAN so that any device connecting to an unused switch port will be assigned to this VLAN. Any traffic associated with this VLAN is not allowed on trunk links, thus preventing any device associated with this VLAN from communicating beyond the switch to which it is connected.
Black Hole VLAN
-
A project in the IEEE 802 standards process to develop a mechanism to allow multiple bridged networks to transparently share the same physical network link without leaking info between networks. Also the name of the encapsulation protocol used to implement this mechanism over Ethernet networks.
IEEE 802.1Q
-
A means of accessing the management capabilities of a switch.
Management VLAN
-
Designed for and dedicated to the transmission of voice traffic involving Cisco IP phones or Cisco Softphones.
Voice VLAN
-
IP telephony traffic responsible for call setup, progress, and teardown, traversing the network end-to-end.
Signaling Traffic
-
One in which ports on the switch are manually assigned.
Static VLAN
-
A Layer 3 logical interface associated with a specific VLAN.
Switch Virtual Interface (SVI)
-
An Ethernet point-to-point link between an Ethernet switch interface and an Ethernet interface on another networking device, such as a router or a switch, carrying the traffic of multiple VLANs over the singular link. Allows you to extend the VLANs across an entire switched LAN.
VLAN Trunk
-
A standard that provides traffic class expediting. It provides a mechanism for implementing QoS at the MAC sublayer.
IEEE 802.1p
-
A single bit flag value in the IEEE 802.1Q header. Indicates that all MAC address info present in the MAC address data.
Canonical Format Identifier (CFI)
-
The parameter in the IEEE 802.1Q tag that indicates the VLAN the frame is associated with.
VLAN ID (VID)
-
A normal Ethernet frame in a switched LAN.
Untagged Frame
-
A Cisco-proprietary protocol that maintains VLAN info as traffic flows between switches and routers, or switches and switches. Used by trunk ports to encapsulate Ethernet frames between network devices.
Inter-Switch Link (ISL)
-
A Cisco-proprietary protocol that negotiates both the status and encapsulation of trunk ports.
Dynamic Trunking Protocol (DTP)
-
Used by DTP to negotiate the status of a trunk port.
Trunking Mode
-
The trunking option that sets the local port to be in an unconditional trunking state with DTP disabled. Use this feature when you need to configure a trunk with a switch from another switch vendor.
Nonegotiate
-
A DTP setting whereby the local switch port advertises to the remote switch port it is able to trunk but does not request to go to the trunking state.
Dynamic Auto
-
A DTP setting whereby the local switch port advertises to the remote switch port that it is able to trunk and ask the remote switch port to go to the trunking state.
Dynamic Desirable
-
Each VLAN trunk supports a set of allowed VLANs. Data associated with these VLANs is transmitted over the respective trunk link; remaining data is not transmitted over the link.
Allowed VLAN
-
A Cisco-proprietary Layer 2 protocol that enables a network manager to configure a single switch so that it propagates VLAN configuration info to other switches in the network, as well as synchronizes the info with the switches in this domain.
VLAN Trunking Protocol (VTP)
-
A set of Catalyst switches with the same VTP domain name; all switches share the same synchronized VTP info.
VTP Domain
-
Messages transmitted between Catalyst switches to share and synchronize VLAN configuration details in the switched LAN.
VTP Advertisements
-
VTP has three operating modes: server, client, and transparent. The operating mode determines how the switch uses and shares VLAN info within the VTP domain.
VTP Modes
-
VTP server advertise the VTP domain VLAN info to other VTP-enabled switches in the same VTP domain. VTP servers store the VLAN info for the entire domain in NVRAM. The server is where VLANs can be created, deleted, or renamed for the domain. It may take multiple subset advertisements to fully update the VLAN info.
VTP Server
-
VTP clients participate in VTP operation, but do not permit creating, changing, or deleting of VLANs on the client itself. A VTP domain only while the switch is powered on. A switch reset deletes the VLAN info. A switch must be manually configured to change its mode from VTP server to VTP client.
VTP Client
|
|