7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 1/503
800 East 96th StreetIndianapolis, IN 46240 USA
Cisco Press
CCDA/CCDP Self-Study
CCDA/CCDP Flash Cardsand Exam Practice Pack
Anthony Sequeira
Kevin Wallace, CCIE No. 7945
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 2/503
ii
CCDA/CCDP Flash Cards and Exam Practice PackAnthony Sequeira
Kevin Wallace
Copyright© 2004 Cisco Systems, Inc.
Published by:Cisco Press800 East 96th StreetIndianapolis, IN 46240 USA
All rights reserved. No part of this book may be reproduced or transmitted in anyform or by any means, electronic or mechanical, including photocopying,recording, or by any information storage and retrieval system, without writtenpermission from the publisher, except for the inclusion of brief quotations in a
review.Printed in the United States of America 1 2 3 4 5 6 7 8 9 0
Library of Congress Cataloging-in-Publication Number: 2003116491
ISBN: 1-58720-117-8
First Printing February 2004
Trademark AcknowledgmentsAll terms mentioned in this book that are known to be trademarks or service
marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc.cannot attest to the accuracy of this information. Use of a term in this bookshould not be regarded as affecting the validity of any trademark or service mark.
Warning and DisclaimerThis book is designed to provide information about the CCDA and CCDPCertification Exams. Every effort has been made to make this book as completeand accurate as possible, but no warranty or fitness is implied.
The information is provided on an “as is” basis. The author, Cisco Press, andCisco Systems, Inc., shall have neither liability nor responsibility to any personor entity with respect to any loss or damages arising from the informationcontained in this book or from the use of the discs or programs that mayaccompany it.
The opinions expressed in this book belong to the author and are not necessarilythose of Cisco Systems, Inc.
Corporate and Government SalesCisco Press offers excellent discounts on this book when ordered in quantity forbulk purchases or special sales.
For more information, please contact: U.S. Corporate and Government Sales1-800-382-3419 [email protected]
For sales outside of the U.S. please contact: International Sales [email protected]
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 3/503
iii
Feedback InformationAt Cisco Press, our goal is to create in-depth technical books of the highestquality and value. Each book is crafted with care and precision, undergoing
rigorous development that involves the unique expertise of members from theprofessional technical community.
Readers’ feedback is a natural continuation of this process. If you have anycomments regarding how we could improve the quality of this book, orotherwise alter it to better suit your needs, you can contact us through e-mail [email protected]. Please make sure to include the book title and ISBNin your message.
We greatly appreciate your assistance.
Publisher John WaitEditor-in-Chief John KaneExecutive Editor Brett BartowAcquisitions Editor Michelle GrandinCisco Representative Anthony WolfendenCisco Press Program Manager Nannette M. NobleProduction Manager Patrick KanouseSenior Editor Sheri CainCopy Editor Bridget CollinsTechnical Editors Andy Barkl, Matt Birkner, Jesse J. Herrera
Media Developers Brandon Penticuff, Boson SoftwareTeam Coordinator Tammi BarnettCover Designer Louisa AdairComposition Mark ShirarProofreader Angela Rosio
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 4/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 5/503
v
About the Technical ReviewersAndy Barkl has more than 19 years of experience in the IT field. He is the
owner of MCT & Associates, LLC, a technical training and consultingfirm in Phoenix, Arizona. He enjoys dividing his time between classroom,writing, and consulting on Cisco and Windows deployments. He is alsothe online editor for MCPMag.com, TCPMag.com, CertCities.com, anda contributing author and editor for Cisco Press and Sybex. He hostsseveral monthly exam-preparation chats on MCPMag.com, TCPMag.com,and CertCities.com. Andy holds the following certifications: CCNP,CCDP, CISSP, MCT, MCSE: Security, MCSA: Security, MCSA: Messaging,A+, CTT+, i-Net+, Network+, Security+, Server+, and CNA.
Matthew H. Birkner, CCIE, is a network-consulting engineer who worksfor Cisco Systems in the Network Supported Accounts (NSA) Program.He currently supports and designs enterprise networks. Matt has been anetwork design engineer, network operations center engineer, and technicalsupport specialist. He also holds the CCDP certification, and is a CertifiedNetware Engineer (CNE) and Bay Networks Certified Specialist (BNCS).
Jesse J. Herrera is a senior systems analyst for a Fortune 100 Companylocated in Houston, Texas. Jesse holds a bachelor of science in computer
science from the University of Arizona and a master of science intelecommunications management from Southern Methodist University.His current Cisco certifications include CCNP and CCDP.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 6/503
vi
DedicationsAnthony Sequeira:
I would like to dedicate this book to my beautiful daughter, Annabella Joy Sequeira. You are the most incredible gift a man could receive.
Kevin Wallace:
I dedicate this book to my daughters, Sabrina and Stacie, who constantlyremind me of the joy found in learning, and to my wife Vivian for herlove, encouragement, and support along our way to forever together.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 7/503
vii
AcknowledgmentsAnthony Sequeira:
As always, thanks to my wife Joette for her patience and understandingduring my frequent weekend-writing projects!
Thanks to Tom Warrick, Frank Gartland, and all the other incrediblytalented employees of KnowledgeNet. You have had such a profoundeffect on my career—it is amazing!
Thanks also to all the awesome people at Cisco Press—especially BrettBartow and Michelle Grandin.
Kevin Wallace:
Thanks to my family for their inspiration and support. Viv, you are anamazing wife, and I love you with all of my heart. Stacie, I am so proudto be your Dad. Your kind heart and brilliant mind will lead you tosuccess in whatever you do. Sabrina, I’m equally proud to be your Dad.Your infectious laughter, beautiful smile, and love for learning make youan all-around winner. Most of all, I thank my Heavenly Father, whodirects my steps.
Thanks to Tom Warrick, Frank Gartland, and the entire KnowledgeNetteam. You constantly encourage me to be the best I can be.
Another big thanks to my co-author, Anthony Sequeira. You gave me theopportunity to join you in this endeavor, and it has been an honor.Finally, thank you to Michelle Grandin at Cisco Press, who made thework on this book a pleasure.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 8/503
viii
Table of Contents
Foreword xv
Introduction xvi
Part I: CCDA-DESGN 3
Section 1 Network Design Methodologies 4
Section 2 Evaluating Organizational Policies and Procedures 12
Section 3 Examining Customer Requirements 18
Section 4 Characterizing the Existing Network 30
Section 5 Implementing the Design Methodology 40
Section 6 Network Hierarchies 46
Section 7 Modular Network Designs 56
Section 8 Switching Design Considerations 66
Section 9 Campus Design Details 76
Section 10 Enterprise WAN Solutions 90
Section 11 IP Addressing 104Section 12 Routing Protocols 120
Section 13 Security 142
Section 14 Voice 156
Section 15 Network Management 176
CCDA-DESGN Quick Reference Sheets 190
Network Design Methodologies 190
PDIOO 190
Design Methodology 190
ROI 190
Top-Down Design Approach 190
Bottom-Up Design Approach 190
Decision Tables 190
Evaluating Organizational Policies and Procedures 191
Network Organization Models 191
Network Organizational Architecture Components 191
Organizational Policies 191
Organizational Procedures 191
Examining Customer Requirements 191
Scope 191
Design Data-Gathering Steps 191
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 9/503
ix
Characterizing the Existing Network 191
Network Auditing 192
Network Auditing Recommendations 192Manual Network Auditing Tools 192
Automated Network Auditing Tools 192
Network Traffic Analysis 192
Summary Report 192
Implementing the Design Methodology 192
Pilot Versus Prototype 192
Documenting the Design 193
Network Hierarchies 193
Modular Network Designs 193
Enterprise Composite Network Model 193
Switching Design Considerations 195
Shared Versus Switched 195
Network Application Comparison Criteria 195
L2 and L3 Design Considerations 195
Spanning Tree Protocol 195
Campus Design Details 196
80/20 Rule 196
20/80 Rule 196
Multicast 196
QoS 196
Access Layer Considerations 196
Distribution Layer Considerations 197
Core Layer Considerations 197
Single L2 VLAN Core Design 197
Split L2 Core Design 197
L3 Core Design 197
Dual-Path L3 Core Design 197
Server Farm Module 197Edge Distribution Module 197
Enterprise WAN Solutions 197
Traditional WAN Technologies 197
Emerging Technologies 198
Application Drivers for WAN Selection 198
Bandwidth Optimization Techniques 198
Window Size 198
Queuing Services 198
WAN Backup Technologies 198MPLS 199
IP Addressing 199
Address Classes 199
Conversion Table 199
Defining Subnets 199
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 10/503
x
Design Questions to Answer 199
Private IPv4 Addresses 199
Network Address Translation 199Route Summarization 199
Fixed Length Subnet Masking 199
Variable Length Subnet Masking 199
Classful Versus Classless Routing Protocols 199
Assigning Addresses 200
Name Resolution 200
IPv6 200
IPv6 Address Formats 200
IPv6 Header 200
IPv6 Address Types 200
IPv6 Routing Protocols 200
IPv6 Address Assignment 200
IPv4 to IPv6 Deployment 200
Routing Protocols 201
Static Versus Dynamic 201
Distance Vector Versus Link-State 201
Interior Versus Exterior 201
Hierarchical Versus Flat 201
ODR Routing 201
RIP v2 202
EIGRP 202
OSPF 202
Integrated IS-IS 202
BGP 202
Security 202
Denial of Service Attacks 202
Reconnaissance Attacks 202
Traffic Attacks 202Network Security Practices 202
Physical Security 202
AAA 202
SAFE Blueprint 203
SAFE Guidelines for Securing the Internet Connectivity Module 203
SAFE Guidelines for Securing the E-Commerce Module 203
SAFE Guidelines for Securing the Remote Access and VPN Module 203
SAFE Guidelines for Securing the WAN Module 203
SAFE Guidelines for Securing the Network Management Module 203SAFE Guidelines for Securing the Server Farm Module 203
Voice 203
PBX 203
PSTN Switch 204
Telephone Infrastructure 204
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 11/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 12/503
xii
Section 6 Quality of Service 308
Section 7 IP Multicasting 324
Section 8 VPNs 344
Section 9 Wireless LANs 366
Section 10 IP Telephony 386
Section 11 Content Networking 408
Section 12 Storage Networking 422
CCDP-ARCH Quick Reference Sheets 436
Network Architectures 436
AVVID 436
Network Deployment Concerns 436
Enterprise Composite Network Model 436
Enterprise Campus Components 436
Enterprise Edge Components 437
Service Provider Edge Components 438
Steps to Campus Design 438
Campus Design: Step 1 438
Campus Design: Step 2 438
Campus Design: Step 3 439
Campus Design: Step 4 440
Campus Design: Step 5 440
Campus Design: Step 6 440
Campus Design: Step 7 441
Server Farm Design 441
The Enterprise Edge 441
Steps to Enterprise Edge Design 441
Enterprise Edge Design: Step 1 441
Enterprise Edge Design: Step 2 441
Enterprise Edge Design: Step 3 442Enterprise Edge Design: Step 4 442
Enterprise Edge Design: Step 5 442
Enterprise Edge Design: Step 6 442
Enterprise Edge Design: Step 7 443
Enterprise Edge Design: Step 8 443
Remote Access and VPN Module 443
Internet Connectivity Module 444
Network Management 444
Network Management Goals 444Policies and Procedures 445
Functions of the Network Management Module 445
CiscoWorks 445
Network Management Infrastructure 446
Network Management Data Collection 447
Sizing Recommendations 447
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 13/503
xiii
High Availability 447
High Availability Measurement 447
High Availability Design 447
Fault-Tolerant Campus Design 447Hardware Redundancy 448
Layer 3 Redundancy 448
Spanning Tree Protocol Redundancy 448
Design Considerations for High Availability Networks 449
High Availability Best Practices 449
Server Farm High Availability Design 449
Enterprise Edge High Availability Design 449
Network Security 449
Security Risks 449
Security Policy 449
Security Process 450
Security Keys 450
Security Attacks and Mitigations 450
Firewall Considerations 451
Intrusion Detection System Considerations 451
AAA 451
IPSec 451
Securing Network Components 452
SAFE 452
Quality of Service 452
QoS Design Requirements 452
IntServ and DiffServ 453
Classification and Marking 453
Congestion Avoidance 453
Congestion Management 454
Traffic Conditioning 454
Signaling 454
Link Efficiency Mechanisms 454
QoS Design 455
IP Multicasting 455
Importance of IP Multicast 455
Multicast Forwarding 456
Group Membership/Distribution Trees 456
PIM 457
Control Mechanisms 457
IP Multicast Networks 458
VPNs 458The Need for VPNs 458
VPN Tunneling 458
VPN Security 458
Site-to-Site Designs 459
Challenge of Fragmentation 460
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 14/503
xiv
IPSec VPN Modes 460
Remote Access Designs 460
Remote Access Provisioning 461
Remote Access NAT Considerations 461
Split-Tunneling 461
Wireless LANs 461
Need for Wireless Networks 461
802.11 Standards 461
Cisco Wireless Products 461
WLAN Design and Planning 462
WLAN Redundancy 463
Mobility, Multicast, and QoS WLAN Support 463
Designing WLAN Security 463
Small Office WLAN Design 463
Enterprise WLAN Design 463
WLAN Design for SOHO Environments 463
WLAN Design for Enterprise Environments 464
IP Telephony 464
Components of an IP Telephony Network 464
Cisco CallManager Platform 464
CCM Scalability (for CCM Version 3.1) 464
CCM Design Models 464Gateway Selection 464
Transcoding, MTP, and Conferencing 465
Add-On Applications 465
CCM Clusters 465
CCM Design Guidelines 465
IP Telephony Infrastructure Design 467
Management, Availability, Security, and QoS Considerations 468
Content Networking 468
Components of Content Networking 468Content Caching 469
Content Switching 469
Content Routing 469
Content Distribution and Management 469
Services 469
Designing Content Networks 469
Designing Content Networking Solutions 470
Storage Networking 470
Need for Storage Networking 470
Network Storage Models 471
Underlying Technology 471
Storage Network Services 471
Designing Storage Networks 471
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 15/503
xv
ForewordCCDA/CCDP Flash Cards and Exam Practice Pack is a late-stagepractice tool that provides you with a variety of proven exam-preparation methods, including physical and electronic flash cards,study- and practice-mode assessment tests, and review-oriented quickreference sheets. Together, these elements help you assess yourknowledge of CCDA and CCDP concepts and focus your practice onthose areas where you need the most help. This book was developed incooperation with the Cisco Internet Learning Solutions Group. CiscoPress books are the only self-study books authorized by Cisco Systemsfor CCDA and CCDP exam preparation.
Cisco and Cisco Press present this material in a text-based format toprovide another learning vehicle for our customers and the broader usercommunity, in general. Although a publication does not duplicate theinstructor-led or e-learning environment, we acknowledge that noteveryone responds to the same delivery mechanism in the same way. It isour intent that presenting this material through a Cisco Press publicationwill enhance the transfer of knowledge to a broad audience ofnetworking professionals.
Cisco Press presents existing and future practice test products throughthese Flash Cards and Exam Practice Packs to help achieve the CiscoInternet Learning Solutions Group principal objectives: to educate theCisco community of networking professionals and to enable thatcommunity to build and maintain reliable, scalable networks. The CiscoCareer Certifications and classes that support these certifications aredirected at meeting these objectives through a disciplined approach toprogressive learning. To succeed on the Cisco Career Certificationsexams and in your daily job as a Cisco certified professional, we
recommend a blended learning solution that combines instructor-led, e-learning, and self-study training with hands-on experience. Cisco Systemshas created an authorized Cisco Learning Partner program to provide youwith the most highly qualified instruction and invaluable hands-onexperience in lab and simulation environments. To learn more about CiscoLearning Partner programs that are available in your area, please visithttp://www.cisco.com/go/authorized/training.
The books Cisco Press creates, in partnership with Cisco Systems, meetthe same standards for content quality that are demanded of the courses
and certifications. We hope that you will find this and subsequent CiscoPress certification and training publications valuable as you build yournetworking knowledge base.
Thomas M. KellyVice President, Internet Learning Solutions GroupCisco Systems, Inc.December 2003
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 16/503
xvi
IntroductionSince the Cisco Systems, Inc. career certification programs were
announced in 1998, they have been the most sought-after andprestigious certifications in the networking industry. Achieving one’sCCDA certification demonstrates a fundamental ability to designnetworks based on Cisco products and technologies. The CCDPcertification signifies advanced competency in network design.
Notorious for being some of the most difficult certifications in thenetworking industry, Cisco exams can cause the ill-prepared much stress.Unlike other certification exams, the Cisco exams require that students
truly understand the material rather than simply memorizing answers.This pack is designed to help you assess whether you are prepared to passthe CCDA (DESGN—Designing for Cisco Internetwork Solutions, exam640-861) and/or CCDP (ARCH—Designing Cisco Network Architec-tures, exam 642-871) exams. It contains flash cards that assist inmemorization, quick reference sheets that provide condensed examinformation, and a powerful exam engine to help you determine whetheryou are prepared for the actual exam.
The Purpose of Flash CardsFor years, flash cards have been recognized as a quick and effective studyaid. They have been used to complement classroom training andsignificantly boost memory retention.
The flash cards in this pack serve as a final preparation tool for theCCDA and CCDP exams. Note that content for the BSCI and BCMSNexams are also part of the CCDP certification track; material on theseexams is presented in the CCNP Flash Cards and Exam Practice Pack
(ISBN 1-58720-091-0), which is also available from Cisco Press.Therefore, this publication does not repeat BSCI and BCMSN content.
These flash cards work best when used in conjunction with official studyaids for the CCDA DESGN and CCDP ARCH exams. Table I-1 presentsthe required exams and recommended study for CCDA and CCDPcertification. Note that these cards and quick reference sheets can be usedin conjunction with any other CCDA and CCDP exam preparation bookor course of study. They might also be useful to you as a quick desk orfield reference guide. A composite exam, 642-891, which covers BSCIand BCMSN, can also be taken in place of the individual BSCI andBCMSN exams.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 17/503
xvii
*Note that a valid CCDA certification is required to obtain CCDP certification.
Whom These Flash Cards Are Intended ForThese flash cards are designed for network administrators, networkdesigners, and any professional or student looking to advance his careerby achieving Cisco CCDA and/or CCDP certifications.
How to Use These Flash CardsReview one section at a time, reading each flash card until you cananswer it correctly on your own. When you can correctly answer everycard in a given section, move on to the next section.
These flash cards are a condensed form of study and review. Do not rushthrough each section. The amount of time you spend reviewing the cardsdirectly affects how long you will be able to retain the information
needed to pass the test. Review each section as a final refresher a coupleof days before your exam.
Although these flash cards are designed as a final-stage study aid (30 daysbefore the exam), they can also be used in the following situations:
• Pre-study evaluation—Before charting out your course of study,read one or two questions at the beginning and end of eachsection to gauge your competence in the specific areas.
• Reinforcement of key topics—After you complete your study ofeach area, read through the answer cards (on the left side of thepages) to identify key topics and reinforce concepts.
• Identifying areas for last-minute review—In the days before anexam, review the study cards and carefully note your areas ofweakness. Concentrate your remaining study time on these areas.
Table I-1 Exams and Courses Required to Achieve CCDA/CCDP Certifications
Certification
Exam
Number Name
Course Most Closely Matching
Exam Requirements
CCDA #640-861 CCDAExam
Designing for Cisco InternetworkSolutions (DESGN)
CCDP* #642-801 BSCIExam
Building Scalable CiscoInternetworks (BSCI)
#642-811 BCMSNExam
Building Cisco Multilayer SwitchedNetworks (BCMSN)
#642-871 ARCH
Exam
Designing Cisco Network Service
Architectures (ARCH)
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 18/503
xviii
• Post-study quiz—By flipping through this book at random andviewing the questions on the right side of the pages, you can
randomize your self-quiz to ensure that you are prepared in allareas.
• Desk reference or field guide to core concepts (quick referencesheets section only)—Networking professionals, salesrepresentatives, and help-desk technicians alike can benefit froma handy, simple-to-navigate book that outlines the major topicsaligned with networking principles and CCDA and CCDPcertifications.
Quick Reference SheetsAt the conclusion of each part of this book, you can find more than 55total pages of quick reference sheets. These sheets serve as both a studyguide for the CCDA and CCDP exams, and as a companion reference tothe text. For readers who seek CCDA and/or CCDP certifications, thesequick reference sheets are well suited to reinforce the concepts learned inthe text, rather than as a sole source of information. For readers whohave either already obtained CCDA and/or CCDP certification or simplyneed a basic overview, these sheets can serve as a standalone reference. Acomplete set of these sheets can also be printed from the enclosed CD-ROM.
What the CD-ROM IncludesThe CD-ROM includes copies of the 350+ flash cards and quickreference sheets presented in the physical book. It also includes anelectronic version of the flash cards that runs on most Windows andPalm platforms. The CD-ROM allows you to randomize your study byshuffling the flash cards. It also includes a powerful 550-questionpractice test engine that simulates each of the CCDA and CCDP exams.The practice test engine familiarizes you with the format of the examsand reinforces the knowledge you need to pass them.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 19/503
xix
Special FeaturesYou might notice that some flash cards on the CD-ROM provide
pointers to the quick reference sheets included on PDF to provide youwith an additional mode of reviewing. Additional CD-ROM featuresinclude the following:
• Palm OS format, which enables you to study for the CCDA andCCDP exams on your Palm.
• The ability to shuffle the flash cards and the option to reviewcustom sets that focus your study on difficult terms, basicconcepts, or a “final exam.”
Exam RegistrationThe CCDA DESGN and CCDP ARCH exams are computer-based exams,with multiple-choice, fill-in-the-blank, and list-in-order questions. Youcan take the exam at any Pearson VUE (http://www.pearsonvue.com) orPrometric (http://www.2test.com) testing center. Your testing center cantell you the exact length of the exam. Be aware that when you registerfor the exam, you might be told to allow a certain amount of time to take
the exam that is longer than the testing time indicated by the testingsoftware when you begin. This is because VUE and Prometric want youto allow for some time to get settled and take the tutorial about thetesting engine.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 20/503
P a
r t I
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 21/503
Part I: CCDA-DESGN 3
CCDA-DESGNSection 1
Network Design Methodologies
Section 2
Evaluating Organizational Policies and Procedures
Section 3
Examining Customer Requirements
Section 4
Characterizing the Existing NetworkSection 5
Implementing the Design Methodology
Section 6
Network Hierarchies
Section 7
Modular Network Designs
Section 8Switching Design Considerations
Section 9
Campus Design Details
Section 10
Enterprise WAN Solutions
Section 11
IP Addressing
Section 12
Routing Protocols
Section 13
Security
Section 14
Voice
Section 15
Network Management
CCDA-DESGN Quick Reference Sheets
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 22/503
C
C D A
- D E S
G N
Section 1Network DesignMethodologies
As the importance of networks has increased, so hastheir complexity and the demands placed on networkprofessionals. Network designers are certainly no
exception.When approaching a new design engagement,designers today must have solid and well-designednetwork design methodologies from which to choose.These methodologies not only simplify the task ofdesigning complex networks, but they can alsoimprove the overall end design and ensure that thedesign meets the client organization’s business andorganizational needs.
This section’s flash cards ensure that you are familiarwith the planning, design, implementation, operation,and optimization methodology that you can use toderive a design methodology. They also expose you todecision tables and review the value of these tools whendesigning networks.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 23/503
CCDA-DESGN Section 1: Network Design Methodologies 5
Question
Question
N e t w o r k
D e s i g n
M e t h o d o
l o g i e s
N e t w o r k D e s i g n
M e t h o d o l o g i e s
1
What does theP
stand for in the PDIOO lifecycle?
2
Cisco recommends that a particular design
methodology be used. This methodology
follows and is derived from PDIOO. What is the
first of the design methodology’s eight steps?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 24/503
6 CCDA-DESGN Section 1: Network Design Methodologies
Question
Question
1 Answer
In the PDIOO life cycle, P stands for planning. D is design; I isimplementation; O is operation; and O is optimization.
2 Answer
The first step in the design methodology is to identify thecustomer requirements.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 25/503
CCDA-DESGN Section 1: Network Design Methodologies 7
Question
Question
N e t w o r k
D e s i g n
M e t h o d o
l o g i e s
N e t w o r k D e s i g n
M e t h o d o l o g i e s
3
Cisco recommends that you follow a specificdesign methodology when designing a
network. This methodology consists of eight
steps. What is the last step in this
recommended design methodology?
4
What is an advantage to the use of the top-
down design approach?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 26/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 27/503
CCDA-DESGN Section 1: Network Design Methodologies 9
Question
Question
N e t w o r k
D e s i g n
M e t h o d o
l o g i e s
N e t w o r k D e s i g n
M e t h o d o l o g i e s
5
What is the purpose of a decision table?
6
Give a specific example of when a decision table
might prove useful in a design engagement.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 28/503
10 CCDA-DESGN Section 1: Network Design Methodologies
Question
Question
5 Answer
A decision table allows you to make a systematic decision whenmultiple potential solutions exist for a given problem.
6 Answer
You might use a decision table when deciding on the following:
• Routing protocol
•
Type of security• Physical topology
• WAN technology
• Switching technology
• Redundancy methods
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 29/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 30/503
C
C D A
- D E S
G N
Section 2Evaluating OrganizationalPolicies and Procedures
Many network designers forget to analyze theorganizational policies and procedures that help definea business. These factors can often be as critical as
purely technical factors. This section reviews the keyaspects a network designer should be familiar with,including organizational models, policies, andprocedures.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 31/503
CCDA-DESGN Section 2: Evaluating Organizational Policies and Procedures 13
Question
Question
E v
a l u a t i n g
O r g a n i z a t i o n a l
P o l i c i e s
E v a l u a t i n g
O r g a n i z a t i o n a l
P o l i c i e s
1
Why is a network organizational model basedon vertical integration often less beneficial than
a horizontal integration model?
2
Name at least two of the network
organizational architecture components.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 32/503
14 CCDA-DESGN Section 2: Evaluating Organizational Policies and Procedures
Question
Question
1 Answer
In an organizational model that is based on vertical integration,almost all of the production comes from within the organization.Based upon the horizontal integration model, modern internet-working leverages partnerships with entities outside theorganization. These partnerships can dramatically increasecompetitive advantage.
2 Answer
The network organizational architectures components include
• Applications
•
Enabling network solutions• Prerequisite systems
• Network infrastructure including intelligent networkservices (content networking, storage networking, Voiceover IP)
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 33/503
CCDA-DESGN Section 2: Evaluating Organizational Policies and Procedures 15
Question
Question
E v
a l u a t i n g
O r g a n i z a t i o n a l
P o l i c i e s
E v a l u a t i n g
O r g a n i z a t i o n a l
P o l i c i e s
3
Name an organizationally specific policy thatcould dramatically impact network design
decisions.
4
The network that a designer recommends
should help the organization achieve its
business goals. This is accomplished by
adhering to the network’s guidelines, such as
scalability, manageability, and efficiency. Name
at least two additional guidelines.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 34/503
16 CCDA-DESGN Section 2: Evaluating Organizational Policies and Procedures
Question
Question
3 Answer
Examples of organizationally specific policies that could impactnetwork design decisions include vendor preferences, technologypreferences, and employment policies.
4 Answer
The network should contribute to all of the organizational goalsby adhering to the following:
• Functionality
• Scalability
• Availability
• Performance
• Manageability
• Efficiency
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 35/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 36/503
C
C D A
- D E S
G N
Section 3Examining CustomerRequirements
Carefully extracting the customer requirements beforeengaging in a network design is critical for a customer.It is important to examine the project’s scope. Is it
going to be an entirely new network? Is the designengagement to simply replace one small portion of thenetwork? Is the goal to add new functionality to thenetwork? For example, perhaps Voice over IPfunctionality is required.
Examination of the organizational goals and thenetwork design goals is also critical. It is important toensure that the design helps the organization meetthese goals. You should not recommend technologies
simply for the sake of recommending newtechnologies.
You should also examine organizational constraints,including such factors as the budget, personnel, andscheduling issues.
Finally, you must carefully examine the organization’stechnical requirements and constraints. Technicalconstraints might include bandwidth availability and
application compatibility.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 37/503
CCDA-DESGN Section 3: Examining Customer Requirements 19
Question
Question
E x a m i n i n g
C u s t o m e r
R e q u i r e m e n t s
E x a m i n i n g
C u s t o m e r
R e q u i r e m e n t s
1
What is an example of a question that should beasked regarding the scope of a network design?
2
Which of the OSI model layers deals with the
design of routing and addressing issues?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 38/503
20 CCDA-DESGN Section 3: Examining Customer Requirements
Question
Question
1 Answer
Following are possible questions that should be asked during ascope analysis:
• Is the design for a single network segment?
• Is the design for a single network module?
• Is the design for a subset of the overall network?
• Is the design for the entire network?
• Is the design’s purpose to add a single network function?
• Is the design’s purpose to add entire network functionality?
2 Answer
The Open System Interconnection (OSI) model’s network layerdesigns routing and addressing issues. The OSI model’sapplication layer includes the design of voice over IP, for
example. Physical and data link layer design decisions includefiber versus copper and ATM versus Frame Relay, for example.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 39/503
CCDA-DESGN Section 3: Examining Customer Requirements 21
Question
Question
E x a m i n i n g
C u s t o m e r
R e q u i r e m e n t s
E x a m i n i n g
C u s t o m e r
R e q u i r e m e n t s
3
After you determine the organizational goalsduring the design engagement, what should
you do next?
4
After you determine the technical goals during
the design engagement, what should you do
next?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 40/503
22 CCDA-DESGN Section 3: Examining Customer Requirements
Question
Question
3 Answer
After determining the organizational goals, you shoulddetermine the organizational constraints.
4 Answer
After determining the technical goals, you should determine thetechnical constraints.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 41/503
CCDA-DESGN Section 3: Examining Customer Requirements 23
Question
Question
E x a m i n i n g
C u s t o m e r
R e q u i r e m e n t s
E x a m i n i n g
C u s t o m e r
R e q u i r e m e n t s
5
Provide an example of an organizational goalthat might be discovered during the design
engagement.
6
Provide an example of an organizational
constraint.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 42/503
24 CCDA-DESGN Section 3: Examining Customer Requirements
Question
Question
5 Answer
The following are examples of organizational goals:• Increase revenue
• Increase profits
• Shorten development cycles
• Increase competitiveness
• Add new customers
•
Enhance productivity• Improve customer service
• Improve customer satisfaction
• Improve the sharing of data inside and outside of theorganization
6 Answer
The following are examples of organizational constraints:
• Budget
•
Personnel• Policies
• Scheduling
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 43/503
CCDA-DESGN Section 3: Examining Customer Requirements 25
Question
Question
E x a m i n i n g
C u s t o m e r
R e q u i r e m e n t s
E x a m i n i n g
C u s t o m e r
R e q u i r e m e n t s
7
Provide an example of a planned application ina design engagement.
8
Provide an example of a planned network
service in a design engagement.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 44/503
26 CCDA-DESGN Section 3: Examining Customer Requirements
Question
Question
7 Answer
Planned applications for an organization might include thefollowing:
• Groupware
• Voice networking
• WWW
• Video on Demand
• Database
8 Answer
Planned network services might include
• Security
•
Quality of service (QoS)• Network Management
• High Availability (Service Level Offerings)
• IP Multicast
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 45/503
CCDA-DESGN Section 3: Examining Customer Requirements 27
Question
Question
E x a m i n i n g
C u s t o m e r
R e q u i r e m e n t s
E x a m i n i n g
C u s t o m e r
R e q u i r e m e n t s
9
Provide several examples of technical goalsthat an organization might possess.
10
Provide an example of a technical constraint
that might be discovered during a design
engagement.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 46/503
28 CCDA-DESGN Section 3: Examining Customer Requirements
Question
Question
9 Answer
Following are examples of technical goals that an organizationmight possess:
• Simplify network management
• Improve scalability
• Replace legacy equipment
• Improve availability
• Increase security
• Improve performance
• Improve reliability
10 Answer
The following are examples of technical constraints that mightbe discovered:
• Legacy equipment
• Bandwidth availability
• Application compatibility
• Personnel qualifications
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 47/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 48/503
C
C D A
- D E S
G N
Section 4Characterizing theExisting Network
Yet another critical task early in the design engagementis for the network designer to carefully analyze andcharacterize the existing network. This is, of course,
provided that there is an existing network!Careful analysis of the existing network culminates inthe creation of a summary report, which includesinformation about the current health of the networkand recommendations for new equipment andtechnologies to meet the organization’s business andtechnical goals.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 49/503
CCDA-DESGN Section 4: Characterizing the Existing Network 31
Question
Question
C h a r a c t e r i
z i n g t h e
E x i s t i n g N
e t w o r k
C h a r a c t e r i z i n g t h e
E x i s t i n g N e t w o r k
1
Name at least one step in which a designershould engage when characterizing the existing
customer network.
2
List four components a network designer
should collect during the network audit of an
existing network.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 50/503
32 CCDA-DESGN Section 4: Characterizing the Existing Network
Question
Question
1 Answer
The following are the three general steps a designer shouldengage in when characterizing the existing network:
• Collect customer input
• Perform a network audit
• Perform traffic analysis
2 Answer
The network audit of the existing network might include thefollowing components:
• Detailed list of devices in the network
• Hardware specifications of devices in the network
• Software specifications of devices in the network
• Device configurations
• Output from various auditing tools
• Expandability information for devices
• Utilization statistics for devices
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 51/503
CCDA-DESGN Section 4: Characterizing the Existing Network 33
Question
Question
C h a r a c t e r i
z i n g t h e
E x i s t i n g N
e t w o r k
C h a r a c t e r i z i n g t h e
E x i s t i n g N e t w o r k
3
Name at least one network auditingrecommendation.
4
You are interested in using a Cisco network-
auditing tool that can provide topology
information and details about hardware and
software configurations in an automated
fashion. What tool should you use?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 52/503
34 CCDA-DESGN Section 4: Characterizing the Existing Network
Question
Question
3 Answer
Network auditing recommendations include• Leverage existing auditing tools, if such tools exist.
• Introduce additional tools as needed.
• Minor changes to the network might be necessary forcollecting the required data; when complete, log thesechanges and reverse.
• Automated auditing approaches should be employed in
large networks.• Create summary reports based on detailed information.
4 Answer
CiscoWorks provides dynamic topology information for Ciscodevices through use of the Campus Manager application.Campus Manager can work in conjunction with Resource
Manager Essentials, which provides details about hardware andsoftware configurations.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 53/503
CCDA-DESGN Section 4: Characterizing the Existing Network 35
Question
Question
C h a r a c t e r i
z i n g t h e
E x i s t i n g N
e t w o r k
C h a r a c t e r i z i n g t h e
E x i s t i n g N e t w o r k
5
You are performing a manual network audit ofan existing customer network. What command
should you use on a Cisco router to determine
the exact version of IOS that is in place and the
hardware modules that are installed?
6
You are performing a manual network audit of
an existing customer network. What command
should you use on a Cisco router to determine
the extent of CPU utilization?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 54/503
36 CCDA-DESGN Section 4: Characterizing the Existing Network
Question
Question
5 Answer
You should use the show version command to determine theexact version of software and the network modules in use. Theshow version command also provides the amount of uptime forthe device.
6 Answer
You should use the show processes cpu command to gainvaluable information about device CPU utilization. To increasethe effectiveness of this command, consider examining the
output over a period of samples. Also, to view non-zeroprocesses, use show processes cpu | exclude 0.0.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 55/503
CCDA-DESGN Section 4: Characterizing the Existing Network 37
Question
Question
C h a r a c t e r i
z i n g t h e
E x i s t i n g N
e t w o r k
C h a r a c t e r i z i n g t h e
E x i s t i n g N e t w o r k
7
You are engaged in a manual analysis ofnetwork traffic in an existing customer
network. You would like to rely on IOS-based
tools and, specifically, you would like to display
statistics for all interfaces that are broken down
by protocol and an average 30-second bit rate.
What tool should you use?
8
Based on a characterization of the existing
customer network, name at least two
components that should be included in the
summary report.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 56/503
38 CCDA-DESGN Section 4: Characterizing the Existing Network
Question
Question
7 Answer
Thanks to the NBAR Protocol Discovery feature, the Cisco IOSNBAR tool provides such statistics.
8 Answer
The summary report document should summarize the results ofcharacterizing the existing network. It should do the following:
• Describe the required software features
• Describe possible problems
• Identify actions needed to modify the network
• Influence the customer in terms of requirements and changes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 57/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 58/503
C
C D A
- D E S
G N
Section 5Implementing the DesignMethodology
It is important to follow a structured approach whenyou are ready to implement the design you haveworked so hard on. If the design is very complex,
consisting of many steps, you should implement thesteps separately and carefully. There should also bedetailed implementation documentation.
You should consider a pilot or prototype to prove thatyour design works. You should also possess a detaileddesign document.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 59/503
CCDA-DESGN Section 5: Implementing the Design Methodology 41
Question
Question
I m p l e m e n t i n g t h e
D e s i g n
M e t h o d o l o g y
I m p l e m e n t i n g t h e
D e s i g n
M e t h o d o l o g y
1
Why is it beneficial to implement each step ofthe design separately if the steps are complex?
2
A network design implementation should
consist of several phases, each of which should
consist of separate steps. Name at least two
components that each step should contain.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 60/503
42 CCDA-DESGN Section 5: Implementing the Design Methodology
Question
Question
1 Answer
It is beneficial to implement each complex step of the designseparately for two main reasons:
• To reduce troubleshooting in the event of failures
• To reduce the time to roll-back in the result of failure
2 Answer
Each step should contain the following elements:
• Description
•
Reference to appropriate design documents• Detailed implementation guidelines
• Detailed roll-back guidelines
• Estimated time required for implementation
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 61/503
CCDA-DESGN Section 5: Implementing the Design Methodology 43
Question
Question
I m p l e m e n t i n g t h e
D e s i g n
M e t h o d o l o g y
I m p l e m e n t i n g t h e
D e s i g n
M e t h o d o l o g y
3
You are interested in proving your designconcept to the customer of your design
engagement. You plan on testing and verifying
the redesign in an isolated network at your
facility. What is this type of proof of concept
called?
4
Name at least four components you should
include in the final design document.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 62/503
44 CCDA-DESGN Section 5: Implementing the Design Methodology
Question
Question
3 Answer
When you test and verify a redesign in an isolated network, youare engaging in what is called a prototype network.
A pilot network tests and verifies the design before it is launched.
4 Answer
The final design document should include the followingcomponents:
• Description
• Reference to appropriate design documents
• Detailed implementation guidelines
• Detailed roll-back guidelines
• Estimated time required for implementation
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 63/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 64/503
C
C D A
- D E S
G N
Section 6Network Hierarchies
Today’s networks are complex and sophisticated. Toproperly design modern networks, designers cansimplify the process by using network models. Ciscoproposed an early model—the network hierarchicalmodel—that is still used today. This model allows for a
simplification of complex networks and more efficientdesign engagements.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 65/503
CCDA-DESGN Section 6: Network Hierarchies 47
Question
Question
N e t w o r k
H i e r a r c h i e s
N e t w o r k
H i e r a r c h i e s
1
What are the three layers of the Ciscohierarchical network model?
2
Which layer of the Cisco hierarchical network
model features speed as its biggest focus?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 66/503
48 CCDA-DESGN Section 6: Network Hierarchies
Question
Question
1 Answer
This Cisco hierarchical network model consists of three layers,which include the following:
• Access layer
• Distribution layer
• Core layer
2 Answer
The core layer is most concerned with speed. In fact, security andother such measures are typically not employed in this layer toensure that packets move as quickly as possible.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 67/503
CCDA-DESGN Section 6: Network Hierarchies 49
Question
Question
N e t w o r k
H i e r a r c h i e s
N e t w o r k
H i e r a r c h i e s
3
Which layer of the Cisco hierarchical networkmodel is most likely to feature QoS controls?
4
Redundancy is most important at which layer of
the Cisco hierarchical network model?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 68/503
50 CCDA-DESGN Section 6: Network Hierarchies
Question
Question
3 Answer
The distribution layer most often features QoS measures. Thisensures that certain types of traffic take precedence over othertypes of traffic.
4 Answer
Redundancy is critical at the core layer of the Cisco hierarchicalnetwork model. This ensures that failures do not have a majorimpact on network connectivity. While this is the correct
certification response, remember that redundancy can be criticalat all layers of the model—especially the distribution layer.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 69/503
CCDA-DESGN Section 6: Network Hierarchies 51
Question
Question
N e t w o r k
H i e r a r c h i e s
N e t w o r k
H i e r a r c h i e s
5
At which layer of the Cisco hierarchical networkmodel are you most likely to find authentication
to take place?
6
Which layer of the Cisco hierarchical network
model is most likely to feature Layer 2
switching?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 70/503
52 CCDA-DESGN Section 6: Network Hierarchies
Question
Question
5 Answer
The access layer frequently features authentication to ensure thatnetwork users are actually permitted to use the network. Whilethis is the optimal certification response, understand thatauthentication also takes place in the distribution layer,especially in the case of VPNs.
6 Answer
The access layer of the Cisco network hierarchical model mostoften features Layer 2 switching. These low-cost switchesprovide full duplex network access to clients.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 71/503
CCDA-DESGN Section 6: Network Hierarchies 53
Question
N e t w o r k
H i e r a r c h i e s
7
Which layer of the Cisco hierarchical networkmodel is most likely to feature Layer 3
switching?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 72/503
54 CCDA-DESGN Section 6: Network Hierarchies
Question
Question
7 Answer
The distribution layer of the Cisco hierarchical network modeloften features Layer 3 switching. This permits packets to berouted to other areas of the network or beyond.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 73/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 74/503
C
C D A
- D E S
G N
Section 7Modular Network Designs
The Cisco hierarchical network model is a powerfultool for network designers. However, as networks havegrown more complex and sophisticated, the model hashad its problems. Specifically, network designers whorely solely on this model find it too difficult to scale
networks based on the simple blueprint of access,distribution, and core.
Cisco has created a much more elaborate and modularnetwork design model to assist the modern Cisconetwork designer. It is called the Enterprise CompositeNetwork Model and it does not abandon the earlierhierarchical network model. The earlier hierarchicalnetwork model integrates nicely into the new model’snetwork, as needed.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 75/503
CCDA-DESGN Section 7: Modular Network Designs 57
Question
Question
M o d u l a r N
e t w o r k
D e s i g
n s
M o d u l a r N e t w o r k
D e s i g n s
1
What are the Enterprise Composite NetworkModel’s three main functional areas?
2
What are the four major modules that make up
the Enterprise Campus major functional area of
the Enterprise Composite Network Model?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 76/503
58 CCDA-DESGN Section 7: Modular Network Designs
Question
Question
1 Answer
The three main functional areas of the Enterprise CompositeNetwork Model are
• Enterprise Campus
• Enterprise Edge
• Service Provider Edge
2 Answer
The Enterprise Campus major functional area consists of thefollowing modules:
• Campus infrastructure
• Network management
• Server farm
• Edge distribution
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 77/503
CCDA-DESGN Section 7: Modular Network Designs 59
Question
Question
M o d u l a r N
e t w o r k
D e s i g
n s
M o d u l a r N e t w o r k
D e s i g n s
3
What are the three submodules of the CampusInfrastructure module of the Enterprise
Composite Network Model?
4
The Network Management module is a module
of the Enterprise Campus major functional area.
Name at least three functions that this module
performs.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 78/503
60 CCDA-DESGN Section 7: Modular Network Designs
Question
Question
3 Answer
The Enterprise Composite Network Model’s CampusInfrastructure module consists of the following threesubmodules:
• Building access
• Building distribution
• Campus backbone
4 Answer
The Network Management module can perform the followingfunctions for an organization:
• Intrusion detection
• System logging
• Authentication
• Network monitoring
• Configuration management
• Terminal services (remote control)
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 79/503
CCDA-DESGN Section 7: Modular Network Designs 61
Question
Question
M o d u l a r N
e t w o r k
D e s i g
n s
M o d u l a r N e t w o r k
D e s i g n s
5
Name at least three examples of servers thatmight be found in the Enterprise Campus major
functional area’s server farm module.
6
What is the purpose of the Enterprise Campus
major functional area’s Edge Distribution
module?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 80/503
62 CCDA-DESGN Section 7: Modular Network Designs
Question
Question
5 Answer
Many types of servers can exist in the Server Farm module of theEnterprise Campus major functional area. Some of these serversinclude the following:
• Application
• File and Print
• DNS
• Database
• IP telephony
6 Answer
The Edge Distribution module of the Enterprise Campus majorfunctional area aggregates the connectivity from the EnterpriseEdge and routes the traffic into the campus backbone
submodule.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 81/503
CCDA-DESGN Section 7: Modular Network Designs 63
Question
Question
M o d u l a r N
e t w o r k
D e s i g
n s
M o d u l a r N e t w o r k
D e s i g n s
7
What are the four modules that comprise theEnterprise Edge functional area of the
Enterprise Composite Network module?
8
What three modules are commonly found in the
Service Provider Edge functional area?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 82/503
64 CCDA-DESGN Section 7: Modular Network Designs
Question
Question
7 Answer
The four modules that comprise the Enterprise Edge functionalarea of the Enterprise Composite Network module are
• E-commerce
• Internet connectivity
• Remote access and VPN
• WAN
8 Answer
Three modules that are commonly found in the Service ProviderEdge functional area are
• Internet service provider
• PSTN (Public Switched Telephone Network)
• Frame Relay/Asynchronous Transfer Mode (ATM)
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 83/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 84/503
C
C D A
- D E S
G N
Section 8Switching DesignConsiderations
After you design the perfect modular network, you arenot finished making important decisions—and thesedecisions are in the campus module alone. You must
decide on the appropriate physical layerimplementation and other such considerations.
This section reminds you of key factors you shouldconsider when designing the campus module.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 85/503
CCDA-DESGN Section 8: Switching Design Considerations 67
Question
Question
S w i t c
h i n g D e s i g n
C o n s i d e r a t i o n s
S w i t c h i n g D e s i g n
C o n s i d e r a t i o n s
1
Name at least three major campus designdecisions that are typical for a design
engagement.
2
Which is more expensive to install and
implement as a physical layer transmission
medium: copper or fiber?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 86/503
68 CCDA-DESGN Section 8: Switching Design Considerations
Question
Question
1 Answer
You must meet several major decision areas when designing scalableand efficient campus networks. These design considerations might
include the following:
• Geography
• Applications
• Transmission media
• Switched or shared
• L2 or L3 switching
2 Answer
Fiber is more expensive to implement than copper. This isprimarily because strict optical cable coupling requirementsmust be met.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 87/503
CCDA-DESGN Section 8: Switching Design Considerations 69
Question
Question
S w i t c
h i n g D e s i g n
C o n s i d e r a t i o n s
S w i t c h i n g D e s i g n
C o n s i d e r a t i o n s
3
What is long reach Ethernet, and upon whatphysical medium does it rely?
4
If you should opt for a switched design (as
opposed to a shared design) in your campus
network, you achieve the benefit of larger
network diameters. Why?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 88/503
70 CCDA-DESGN Section 8: Switching Design Considerations
Question
Question
3 Answer
Long Reach Ethernet (LRE) relies upon copper media. As itsname implies, it permits longer distances than traditionalEthernet. Specifically, it permits runs of up to 1.5 km. It istypically used as a distribution technology for broadbandbuilding access.
4 Answer
Larger network diameters are possible with switched designsbecause no collision detection algorithm is necessary.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 89/503
CCDA-DESGN Section 8: Switching Design Considerations 71
Question
Question
S w i t c
h i n g D e s i g n
C o n s i d e r a t i o n s
S w i t c h i n g D e s i g n
C o n s i d e r a t i o n s
5
You are interested in performing load sharing inyour campus network design. You are
specifically interested in engaging in IP load
sharing between specific ports based on IP
addresses. Should you engage in Layer 2 or
Layer 3 switching?
6
You are considering recommending the use of
PortFast in a campus network design. Where is
this Spanning Tree protocol enhancement
typically implemented? Why?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 90/503
72 CCDA-DESGN Section 8: Switching Design Considerations
Question
Question
5 Answer
L3 switching permits load sharing based on IP addresses. Anyports can be used to implement this sharing behavior. L2switching permits limited load sharing based on VLANs acrossuplink ports only.
6 Answer
PortFast allows for a much faster transition from the blockingstate to the forwarding state for a switch port. Because PortFastshould be used to connect end systems to the network, it is
typically implemented in the campus network’s wiring closet (theaccess layer).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 91/503
CCDA-DESGN Section 8: Switching Design Considerations 73
Question
Question
S w i t c
h i n g D e s i g n
C o n s i d e r a t i o n s
S w i t c h i n g D e s i g n
C o n s i d e r a t i o n s
7
You are recommending the use of UplinkFast ina campus network design. Where is this
Spanning Tree protocol enhancement typically
implemented?
8
Where would you implement BackboneFast in a
campus design?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 92/503
74 CCDA-DESGN Section 8: Switching Design Considerations
Question
Question
7 Answer
UplinkFast is a wiring closet switch (access layer) technologythat permits the quick failover to an alternate uplink when adirect link failure is detected.
8 Answer
BackboneFast allows for a faster convergence following thefailure of a remote link in the topology. BackboneFast must beimplemented on all switches in the campus.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 93/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 94/503
C
C D A
- D E S
G N
Section 9Campus Design Details
What specific considerations must you manage ascampus network designer? This section ensures thatyou know these and tests your knowledge of campusmodule by campus module, from the access layer to theserver farm.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 95/503
CCDA-DESGN Section 9: Campus Design Details 77
Question
Question
C a m p u s D e s i g n
D e t a i l s
C a m p u s D e s i g n
D e t a i l s
1
You are going to engage in a detailed design ofthe campus network for a business client. In
which campus modules would performance be
the biggest concern?
2
You are going to engage in a detailed design of
the campus network for a business client. In
which module of the campus would scalability
be the biggest concern?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 96/503
78 CCDA-DESGN Section 9: Campus Design Details
Question
Question
1 Answer
Performance is the greatest concern in the server farm module or thebackbone (core) module.
2 Answer
Scalability is a large concern for the access module of the campus
network. This module must be able to easily grow to support
additional users who might require network connectivity.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 97/503
CCDA-DESGN Section 9: Campus Design Details 79
Question
Question
C a m p u s D e s i g n
D e t a i l s
C a m p u s D e s i g n
D e t a i l s
3
What is the 80/20 rule of network trafficpatterns?
4
What is the technology described by the
following statement:
This is a Cisco proprietary solutionimplemented in some Cisco switches that
permits the switch to learn multicast receiver
registration information from Cisco routers.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 98/503
80 CCDA-DESGN Section 9: Campus Design Details
Question
Question
3 Answer
The 80/20 rule of network traffic flows states that 80 percent of thetraffic remains within the local workgroup. Only 20 percent is
destined for remote systems. This is now considered a legacy design
because modern networks feature much more remote resources. The
modern traffic pattern follows a 20/80 rule.
4 Answer
This is a description of the Cisco Group Management Protocol
(CGMP).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 99/503
CCDA-DESGN Section 9: Campus Design Details 81
Question
Question
C a m p u s D e s i g n
D e t a i l s
C a m p u s D e s i g n
D e t a i l s
5
You are interested in controlling traffic flows inyour Enterprise WAN, which consists of Frame
Relay connections between several campus
segments. You want to drop or lower the
priority of a frame that resides outside of a
traffic profile that you define. Is this a description
of traffic shaping or traffic policing?
6
Name at least two major considerations a
network designer should have when designing
the access layer of a campus network.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 100/503
82 CCDA-DESGN Section 9: Campus Design Details
Question
Question
5 Answer
Traffic policing drops or lowers the priority of frames that fall outsidethe policy that you define. You should contrast this with traffic
shaping that controls transmission rates through the buffering of
traffic.
6 Answer
The designer should have the following considerations:
• Number of ports required
•
Physical layer cabling• Performance required
• Redundancy required
• Speeds required
• VLANs and STP configuration
• Additional features (QoS, multicast, etc.)
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 101/503
CCDA-DESGN Section 9: Campus Design Details 83
Question
Question
C a m p u s D e s i g n
D e t a i l s
C a m p u s D e s i g n
D e t a i l s
7
Name at least two major considerations anetwork designer should have when designing
a campus network’s distribution layer.
8
Name at least two major considerations a
network designer should have when designing
a campus network’s core layer.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 102/503
84 CCDA-DESGN Section 9: Campus Design Details
Question
Question
7 Answer
The following considerations should be the focus of the distributionlayer module:
• L2 or L3 switching
• Performance required
• Number of ports required
• Redundancy required
• Additional features
• Manageability required
8 Answer
The following considerations should be the focus of the core layer
module:
• L2 or L3 switching
• Performance required
• Number of ports required
• Redundancy required
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 103/503
CCDA-DESGN Section 9: Campus Design Details 85
Question
Question
C a m p u s D e s i g n
D e t a i l s
C a m p u s D e s i g n
D e t a i l s
9
Name at least two options for connectingservers to the network in a server farm campus
module design.
10
Name at least two types of attacks a designer
should consider when designing the Edge
Distribution module.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 104/503
86 CCDA-DESGN Section 9: Campus Design Details
Question
Question
9 Answer
Servers can connect to the network in several ways, including thefollowing:
• Single NIC
• Dual NIC
• Server load-balancing switch
10 Answer
Designers must be aware of the following types of attacks:
• Unauthorized access
•
IP spoofing• Network reconnaissance
• Packet sniffers
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 105/503
CCDA-DESGN Section 9: Campus Design Details 87
Question
Question
C a m p u s D e s i g n
D e t a i l s
C a m p u s D e s i g n
D e t a i l s
11
Name a disadvantage found with the single L2VLAN core design.
12
Name at least one advantage of the dual-path
L3 core design.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 106/503
88 CCDA-DESGN Section 9: Campus Design Details
Question
Question
11 Answer
Disadvantages to the single L2 VLAN core design include thefollowing:
• No broadcast/multicast controls
• L3 peering issues in the distribution layer
12 Answer
Advantages to this design model include the following:
• Two equal-cost paths to every network destination
•
Quick recovery from link failures• Double link capacity
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 107/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 108/503
C
C D A
- D E S
G N
Section 10Enterprise WAN Solutions
Today, organizations can implement a variety of WANsolutions. WAN components are a key part of thedesign because they represent a huge portion of theexpense of designing and continuously running anetwork.
This section ensures that you are knowledgeable abouttraditional WAN design options and new and emergingtechnologies.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 109/503
CCDA-DESGN Section 10: Enterprise WAN Solutions 91
Question
Question
E n t e r p r i s e W A N
S o l u t i o n s
E n t e r p r i s e W A N
S o l u t i o n s
1
ISDN falls into which category of traditionalWAN technologies?
2
Which emerging WAN technology offers high-
speed data transfers for the SOHO WAN site
using traditional telephone copper lines?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 110/503
92 CCDA-DESGN Section 10: Enterprise WAN Solutions
Question
Question
1 Answer
ISDN and asynchronous serial dialup connections are perfectexamples of circuit-switched traditional WAN technologies.
2 Answer
Digital subscriber line (DSL) permits high-speed transfers for SOHO
WAN sites. Typically, upload speeds do not equal download speeds,
however. This is true for the most common form of small business,
residential installations of a technology called Asynchronous DSL(ADSL).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 111/503
CCDA-DESGN Section 10: Enterprise WAN Solutions 93
Question
Question
E n t e r p r i s e W A N
S o l u t i o n s
E n t e r p r i s e W A N
S o l u t i o n s
3
Describe the concept known as jitter.
4
Which WAN technology is noted for trans-
mission speeds of 15 Mbps?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 112/503
94 CCDA-DESGN Section 10: Enterprise WAN Solutions
Question
Question
3 Answer
Jitter is variable delay that the network experiences. This can bedamaging for clear voice transmissions. Voice calls are intolerantof variations in the delay within the network.
4 Answer
Long Reach Ethernet dramatically expands the maximum cable runs
that can be used for transmissions and features a transmission speed
of 15 Mbps.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 113/503
CCDA-DESGN Section 10: Enterprise WAN Solutions 95
Question
Question
E n t e r p r i s e W A N
S o l u t i o n s
E n t e r p r i s e W A N
S o l u t i o n s
5
Which queuing mechanism supported on Ciscorouters features 16 interface output queues and
guarantees some level of service to all traffic?
6
Name at least two issues that occur when a full
mesh Frame Relay topology is chosen.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 114/503
96 CCDA-DESGN Section 10: Enterprise WAN Solutions
Question
Question
5 Answer
Custom queuing uses 16 interface output queues. This method ofsoftware queuing provides some level of service to all traffic and is
therefore often considered better than priority queuing, which can
starve some types of traffic.
6 Answer
Full mesh Frame Relay topologies do have advantages, but they also
have disadvantages, including the following:
• The large number of virtual circuits can be quite expensive.
• Several packets might have to be replicated in the topology.
• Configurations can be quite complex.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 115/503
CCDA-DESGN Section 10: Enterprise WAN Solutions 97
Question
Question
E n t e r p r i s e W A N
S o l u t i o n s
E n t e r p r i s e W A N
S o l u t i o n s
7
Describe a shadow PVC as it is used for WANbackup.
8
What is the main difference between ADSL and
SDSL?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 116/503
98 CCDA-DESGN Section 10: Enterprise WAN Solutions
Question
Question
7 Answer
A shadow PVC is a secondary permanent virtual circuit that isimplemented from the provider to backup a primary WAN
connection. Typically, there is no charge for this second PVC. Often,
a charge for the second link is levied should usage exceed a certain
threshold.
8 Answer
ADSL often features dramatic differences in transmission speeds
upstream and downstream. SDSL features identical speeds upstream
and downstream.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 117/503
CCDA-DESGN Section 10: Enterprise WAN Solutions 99
Question
Question
E n t e r p r i s e W A N
S o l u t i o n s
E n t e r p r i s e W A N
S o l u t i o n s
9
Name two of the three different typical wirelessimplementations.
10
What are the two main methods of tunneling
private networks over the public Internet.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 118/503
100 CCDA-DESGN Section 10: Enterprise WAN Solutions
Question
Question
9 Answer
Typical implementations of wireless technologies include thefollowing:
• Broadband fixed wireless
• Mobile wireless
• Wireless LAN
10 Answer
The two main methods are
• IPSec
•
GRE
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 119/503
CCDA-DESGN Section 10: Enterprise WAN Solutions 101
Question
E n t e r p r i s e W A N
S o l u t i o n s
11
Describe MPLS.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 120/503
102 CCDA-DESGN Section 10: Enterprise WAN Solutions
Question
Question
11 Answer
With MPLS, packets are labeled for quick and efficientforwarding through an MPLS network.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 121/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 122/503
C
C D A
- D E S
G N
Section 11IP Addressing
A large part of designing a TCP/IP based networkproperly involves ensuring that TCP/IP addressing isdone correctly. This not only includes planning the IPaddresses carefully, but also deciding how theaddresses are to actually be implemented on the
equipment.
The CCDA candidate must also have a firm grasp ofIPv6, since more and more networks are supportingthis next generation IP addressing technology. Thissection reviews these issues—including key pointsregarding IPv6.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 123/503
CCDA-DESGN Section 11: IP Addressing 105
Question
Question
I P A
d d r e s s i n g
I P A d d r e s s i n g
1
Provide an example of a flat address that is usedin modern computer networking.
2
What is the meaning of the following
statement:
IP addresses are hierarchical.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 124/503
106 CCDA-DESGN Section 11: IP Addressing
Question
Question
1 Answer
A Media Access Control (MAC) address is an example of a flataddress that is used in modern computer networks. MAC addresses
are used for Layer 2 addressing in Ethernet networks. These address
uniquely identify a system on the network.
2 Answer
This means that IP addresses are composed of multiple parts, each
having a specific meaning. IP addresses are composed of a network
portion and a host portion.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 125/503
CCDA-DESGN Section 11: IP Addressing 107
Question
Question
I P A
d d r e s s i n g
I P A d d r e s s i n g
3
How many bits does an IP address contain, andhow is it typically presented?
4
The following IP address and subnet mask are
used on a workstation in a subnet of the
network.
IP Address: 172.16.2.100
Subnet Mast: 255.255.255.240
How many total host addresses are available in
the subnet?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 126/503
108 CCDA-DESGN Section 11: IP Addressing
Question
Question
3 Answer
An IP address consists of 32 bits. It is typically presented in dotteddecimal form. For example: 10.24.65.128.
4 Answer
Given the subnet mask of 255.255.255.240, 28 bits are used for the
network identification. This leaves four bits for host addressing. 2
raised to the 4th power is 16, minus 2 equals 14. Therefore, there are
14 total available host addresses in the subnet.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 127/503
CCDA-DESGN Section 11: IP Addressing 109
Question
Question
I P A
d d r e s s i n g
I P A d d r e s s i n g
5
What is the range of possible values in the firstoctet for a Class B IP address?
6
List at least two questions that should be asked
before designing a network’s IP addressing.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 128/503
110 CCDA-DESGN Section 11: IP Addressing
Question
Question
5 Answer
128–191Class A—first octet starts with 0; 0 to 127
Class B—first octet starts with 10; 128–191
Class C—first octet starts with 110; 192–233
Class D—first octet starts with 1110; 224–239
Class E—first octet starts with 1111; 240–255
6 Answer
It is important to ask all the following questions:
• How large is the network?
•
How many locations exist?• What are the IP addressing requirements for locations?
• What class and how many networks can be obtained fromthe public number authority?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 129/503
CCDA-DESGN Section 11: IP Addressing 111
Question
Question
I P A
d d r e s s i n g
I P A d d r e s s i n g
7
Name at least two private address ranges.
8
What technology allows multiple internal
addresses to be converted at a router into
addresses that are usable on the public
Internet?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 130/503
112 CCDA-DESGN Section 11: IP Addressing
Question
Question
7 Answer
The private IP address ranges are• 10.0.0.0/8
• 172.16.0.0/12
• 192.168.0.0/16
8 Answer
Network Address Translation allows internal network addresses to be
translated into global Internet addresses. Port address translation
allows multiple internal addresses to be mapped to a single external
address.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 131/503
CCDA-DESGN Section 11: IP Addressing 113
Question
Question
I P A
d d r e s s i n g
I P A d d r e s s i n g
9
A popular characterization of dynamic routingprotocols examines whether a routing update
contains subnet mask information. What is this
characterization called, and which type of
routing includes the subnet mask information?
10
How many bits does an IPv6 address contain,
and how is it typically presented?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 132/503
114 CCDA-DESGN Section 11: IP Addressing
Question
Question
9 Answer
The characterization is classless versus classful. Classless routingprotocols include the subnet mask information in routing updates.
These protocols are considered second generation and can use
VLSM.
10 Answer
An IPv6 IP address contains 128 bits. They are typically presented as
hexadecimal numbers separated by colons.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 133/503
CCDA-DESGN Section 11: IP Addressing 115
Question
Question
I P A
d d r e s s i n g
I P A d d r e s s i n g
11
What is the meaning of two colons (::) in an IPv6address?
12
What field is used in an IPv6 header to facilitate
special handling, such as QoS?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 134/503
116 CCDA-DESGN Section 11: IP Addressing
Question
Question
11 Answer
Two colons can be used to represent successive hexadecimal fields ofzeros. This can be done once within an IP address.
12 Answer
The Flow Label field is used to label packets for special handling.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 135/503
CCDA-DESGN Section 11: IP Addressing 117
Question
Question
I P A
d d r e s s i n g
I P A d d r e s s i n g
13
What IPv6 address scope type allows for astation to send data to the nearest interface
with the configured address type?
14
Name at least two transition strategies for IPv6.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 136/503
118 CCDA-DESGN Section 11: IP Addressing
Question
Question
13 Answer
The new anycast address scope permits this behavior. It can beconsidered one to nearest behavior.
14 Answer
Following are the three major mechanisms that should assist with the
deployment and transition to IPv6:
• Dual Stack—System runs both IPv4 and IPv6.
• Tunneling—Encapsulates IPv6 packets into IPv4 packets, and
vice versa.
• Translation—One protocol is translated into another to facilitate
communications.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 137/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 138/503
C
C D A
- D E S
G N
Section 12Routing Protocols
A variety of routing solutions can be implemented inCisco equipment. Routing protocols can be categorizedby the following solutions, to name a few:
• Static versus dynamic
• Flat versus hierarchical
• Distance vector versus link state
• Classful versus classless
This variety in the world of routing protocols ensuresthat network designers must face tough decisions whenplanning for the deployment of a particular routingprotocol for a particular network. This section recallsthese issues and ensures that you understand thefundamental differences in routing protocols so youcan make these key decisions effectively.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 139/503
CCDA-DESGN Section 12: Routing Protocols 121
Question
Question
R o u t i n g
P r o t o c o l s
R o u t i n g
P r o t o c o l s
1
Name at least two cases where static routing isappropriate within a network design.
2
You are considering using static routes in a stub
area configuration with a network. What are
two advantages that exist through the use of a
static route in this design?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 140/503
122 CCDA-DESGN Section 12: Routing Protocols
Question
Question
1 Answer
Static routing is appropriate in the following cases:• The network is small and not complex; the network also has
a very slow rate of expansion or change.
• The network consists of a main larger network with one ormore stub networks.
• The network should include special features, such as dial-on-demand routing.
2 Answer
By using a static route with a stub network, the following advantages
exist:
• Dynamic routing protocol control information is not used
on the link to the stub, or in the stub network; this reducesthe amount of routing protocol traffic the network mustcarry.
• Smaller routing tables are present in routers with the stuband central networks.
• Low end routers can be used in the stub network.
• Processor requirements for routers are lower.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 141/503
CCDA-DESGN Section 12: Routing Protocols 123
Question
Question
R o u t i n g
P r o t o c o l s
R o u t i n g
P r o t o c o l s
3
Which of the following routing protocols areconsidered distance vector?
• EIGRP
• OSPF
• IS-IS
• BGP
• RIP v1
• IGRP
• RIP v2
4
Because it is a routing protocol that features
the best of distance vector mechanisms and
the best of link state mechanisms, it is often
considered a hybrid routing protocol. Which is it?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 142/503
124 CCDA-DESGN Section 12: Routing Protocols
Question
Question
3 Answer
BGP, RIP v1 and v2, and IGRP are all considered distance vectorrouting protocols. EIGRP is considered a hybrid routing protocol.
4 Answer
EIGRP offers the best features of both types of protocols and, as a
result, is often considered a hybrid routing protocol.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 143/503
CCDA-DESGN Section 12: Routing Protocols 125
Question
Question
R o u t i n g
P r o t o c o l s
R o u t i n g
P r o t o c o l s
5
What algorithm does link state routingprotocols use to select the best path to a
destination?
6
What is the most common Exterior Gateway
Protocol in use today, and what is its function?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 144/503
126 CCDA-DESGN Section 12: Routing Protocols
Question
Question
5 Answer
The common shortest path first, or Dijkstra’s algorithm, is used.
6 Answer
BGP Version 4 powers the routing functions of the Internet as we
know it today. BGP+ takes over once IPv6 is fully deployed. BGP is
responsible for routing between separate autonomous systems.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 145/503
CCDA-DESGN Section 12: Routing Protocols 127
Question
Question
R o u t i n g
P r o t o c o l s
R o u t i n g
P r o t o c o l s
7
What default metrics does EIGRP use?
8
What is the default metric used by OSPF? From
what is this value derived, by default?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 146/503
128 CCDA-DESGN Section 12: Routing Protocols
Question
Question
7 Answer
The default metrics used by EIGRP are bandwidth and delay.
8 Answer
The default metric used by OSPF is cost. By default, this metric is
derived from bandwidth.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 147/503
CCDA-DESGN Section 12: Routing Protocols 129
Question
Question
R o u t i n g
P r o t o c o l s
R o u t i n g
P r o t o c o l s
9
What default metric does RIP use?
10
Which type of routing protocol converges
faster: distance vector or link state? Why?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 148/503
130 CCDA-DESGN Section 12: Routing Protocols
Question
Question
9 Answer
The default metric used by RIP is hop count.
10 Answer
Link state routing protocols converge faster than distance vector
protocols because they instantly propagate route updates, while
distance vector technologies rely on a periodic update. This statement
remains true when the distance vector routing protocols use theirdefault timers, of course.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 149/503
CCDA-DESGN Section 12: Routing Protocols 131
Question
Question
R o u t i n g
P r o t o c o l s
R o u t i n g
P r o t o c o l s
11
What is the main difference between a classfulrouting protocol and a classless routing
protocol?
12
Describe variable length subnet masking.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 150/503
132 CCDA-DESGN Section 12: Routing Protocols
Question
Question
11 Answer
A classful routing protocol does not send the subnet maskinformation with routing updates. A classless routing protocol
includes this information.
12 Answer
Variable length subnet masking allows the administrator to assign
different subnet masks to different parts of the network. This allows
for more efficient use of available IP address space, and for more
hierarchical-based network designs. As a result, summarization canbe performed, and more efficient dynamic routing is achieved.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 151/503
CCDA-DESGN Section 12: Routing Protocols 133
Question
Question
R o u t i n g
P r o t o c o l s
R o u t i n g
P r o t o c o l s
13
Which type of routing supports VSLM: classfulor classless?
14
Which of the following routing protocols are
classless routing protocols?
• IGRP• EIGRP
• RIP v1
• RIP v2
• OSPF
•
BGP• IS-IS
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 152/503
134 CCDA-DESGN Section 12: Routing Protocols
Question
Question
13 Answer
Classless routing protocols support VLSM.
14 Answer
EIGRP, RIP v2, OSPF, BGP, and IS-IS are all classless routing
protocols.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 153/503
CCDA-DESGN Section 12: Routing Protocols 135
Question
Question
R o u t i n g
P r o t o c o l s
R o u t i n g
P r o t o c o l s
15
Name at least two aspects/advantages of on-demand routing.
16
What is the metric, and what is the metric limit
with RIP v2?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 154/503
136 CCDA-DESGN Section 12: Routing Protocols
Question
Question
15 Answer
On-demand routing (ODR) has the following characteristics/advantages:
• Reduces dynamic routing traffic overhead
• Ideal for hub and spoke topologies
• No IP routing protocol on the stub networks is required
• ODR relies upon CDP
16 Answer
RIP v2 uses hop count as a metric. The hop count limit is 15.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 155/503
CCDA-DESGN Section 12: Routing Protocols 137
Question
Question
R o u t i n g
P r o t o c o l s
R o u t i n g
P r o t o c o l s
17
Name at least two advantages that RIP v2 hasover its RIP v1 counterpart.
18
Which dynamic routing protocol offers built-in
support for routing IP and OSI protocols?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 156/503
138 CCDA-DESGN Section 12: Routing Protocols
Question
Question
17 Answer
The following advantages exist:• VLSM support
• Multicast, instead of broadcast
• Faster convergence
• Manual route summarization
• Authentication
18 Answer
The IS-IS protocol can do both. It is called Integrated IS-IS when it is
used for routing TCP/IP traffic.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 157/503
CCDA-DESGN Section 12: Routing Protocols 139
Question
R o u t i n g
P r o t o c o l s
19
When BGP is running between routers in asingle autonomous system, what is it called?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 158/503
140 CCDA-DESGN Section 12: Routing Protocols
Question
Question
19 Answer
iBGP, or Interior BGP
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 159/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 160/503
C
C D A
- D E S
G N
Section 13Security
More and more attacks against networks arise everyyear. Many of these attacks receive major publicitybecause they cause billions of dollars in damages tocorporations and even small businesses. As the leaderin networking equipment, Cisco Systems has
responded with a powerful SAFE blueprint for securingcorporate networks. This section ensures that you arefamiliar with this blueprint and that you have minimaldifficulty answering questions about security in theexam environment.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 161/503
CCDA-DESGN Section 13: Security 143
Question
Question
S e c u r i t y
S e c u r i t y
1
Network security aims to provide data integrity,data confidentiality, and system availability.
What is the meaning of data integrity?
2
Many types of attacks involve sending a host a
malformed message that is known to cause an
error, or overwhelming the host with massive
amounts of data. What are these types of
attacks typically called?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 162/503
144 CCDA-DESGN Section 13: Security
Question
Question
1 Answer
Data integrity means that the network data is valid and has not beenchanged or tampered with in any way.
2 Answer
These types of attacks are typically called denial of service attacks.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 163/503
CCDA-DESGN Section 13: Security 145
Question
Question
S e c u r i t y
S e c u r i t y
3
Many attacks involve searching the network foraddresses, possible targets, and security gaps.
What are these types of attacks typically called?
4
Provide at least two reasons why it so
important to physically secure a router or
switch.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 164/503
146 CCDA-DESGN Section 13: Security
Question
Question
3 Answer
These attacks are typically called reconnaissance attacks.
4 Answer
It is important to physically secure these devices for the following
reasons:
• Console access allows an administrator to override any
security that is placed on the device.
• Theft.
• Installation of software directly.
• Installation of new hardware directly.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 165/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 166/503
148 CCDA-DESGN Section 13: Security
Question
Question
5 Answer
Cisco recommends the following physical security guidelines:• Deploy adequate physical access controls.
• To the extent possible, ensure that physical access cannotcomprise other security measures.
• Ensure that you can recover easily in the event of devicetheft.
• Be sure to use cryptography for data that travels on
equipment or networks that are out of your control.
6 Answer
AAA stands for
• Authentication—Verifying a network user’s identity
•
Authorization—Verifying that the user is permitted to dowhat they are trying to do
• Accounting—Auditing access of recourses for security andbilling purposes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 167/503
CCDA-DESGN Section 13: Security 149
Question
Question
S e c u r i t y
S e c u r i t y
7
Name at least five ways a user can authenticatehimself on a computer network.
8
Name at least two authentication guidelines
that are recommended by Cisco.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 168/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 169/503
CCDA-DESGN Section 13: Security 151
Question
Question
S e c u r i t y
S e c u r i t y
9
Name at least one Cisco recommendation whenit comes to network authorization.
10
Name at least one guideline that Cisco
recommends for the transmission of
confidential data.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 170/503
152 CCDA-DESGN Section 13: Security
Question
Question
9 Answer
Cisco recommends the following when it comes to authorization onthe network:
• Use the principle of least privilege—Each user should use anaccount that gives him just enough privileges to accomplishwhat he needs, and no more.
• Use the principle of defense in depth for valuableresources—Each security mechanism should back up others.
• Never trust client-supplied settings.
10 Answer
These guidelines include the following:
• Carefully evaluate locations in which confidentiality isnecessary.
• Use strongest cryptography possible.
• Use well known and strong cryptography algorithms.
• Do not merely focus on confidentiality.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 171/503
CCDA-DESGN Section 13: Security 153
Question
Question
S e c u r i t y
S e c u r i t y
11
The Internet Connectivity Module oftenfeatures a DMZ. What is a DMZ?
12
What is spoofing in network security?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 172/503
154 CCDA-DESGN Section 13: Security
Question
Question
11 Answer
A demilitarized zone (DMZ) network contains a host that has beencompromised. A DMZ is typically created using two firewalls, and it
permits public access for select services.
12 Answer
Spoofing means that the client is falsifying its true identity. IP address
spoofing is a common method for gaining access to secured networks.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 173/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 174/503
C
C D A
- D E S
G N
Section 14Voice
An exciting area of networking technology involves thepacketizing of voice and the transmission of thesepackets across the data network. This allowsorganizations to save on toll charges for Telco andeliminate expenses related to traditional PBX
maintenance. This section ensures your readiness toanswer questions about voice technologies and basicvoice design concepts.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 175/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 176/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 177/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 178/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 179/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 180/503
162 CCDA-DESGN Section 14: Voice
Question
Question
5 Answer
The three layers of the model are as follows:• Packet Infrastructure layer
• Call Control layer
• Open Service Application layer
6 Answer
The H.323 protocol features the following benefits:
• Establishes standards for compression and decompression
•
Provides for interoperability• Provides network independence
• Permits platform and application independence
• Permits bandwidth management
• Supports multicast
• Enhanced flexibility
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 181/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 182/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 183/503
CCDA-DESGN Section 14: Voice 165
Question
Question
V o i c e
V o i c e
9
What mechanism allows you to associatedestination phone numbers with IP addresses?
10
Variation in the delay of received packets is
referred to as what?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 184/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 185/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 186/503
168 CCDA-DESGN Section 14: Voice
Question
Question
11 Answer
Mean Opinion Score (MOS), which is a common, subjectivebenchmark for quantifying the performance of the speech codec.
Sound quality, on the other hand, is called fidelity.
12 Answer
Voice Over ATM (VoATM)
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 187/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 188/503
170 CCDA-DESGN Section 14: Voice
Question
Question
13 Answer
Sources of delay include• Propagation delay
• Serialization delay
• Processing delay
14 Answer
Voice Activity Detection suppresses packets of silence.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 189/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 190/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 191/503
CCDA-DESGN Section 14: Voice 173
Question
Question
V o i c e
V o i c e
17
What is a hardware component on a voicegateway that converts voice signal information
to packet-based protocols?
18
What mechanism helps to keep excess voice
traffic off of the data network?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 192/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 193/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 194/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 195/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 196/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 197/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 198/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 199/503
CCDA-DESGN Section 15: Network Management 181
Question
Question
N e t w o r k
M a n a g e m e n t
N e t w o r k
M a n a g e m e n t
5
What major enhancement does RMON2present?
6
At what layer of the OSI model does CDP
operate?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 200/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 201/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 202/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 203/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 204/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 205/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 206/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 207/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 208/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 209/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 210/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 211/503
Modular Network Designs 193
D o c u m e n t i n g t h e D e s i g n
T h e fi n a l d e s i g n d o c u m e
n t s h o u l d c o n t a i n e l e m e n t s s u c h a s t h e f o l l o w i n g :
• I n t r o d u c t i o n
• D e s i g n r e q u i r e m e n t
s
• E x i s t i n g n e t w o r k i n
f r a s t r u c t u r e
• D e s i g n
• P r o o f o f c o n c e p t
• I m p l e m e n t a t i o n p l a
n
• A p p e n d i c e s
N e t w o r k H i e r a r c h i e s
B e c a u s e o f t h e c o m p l e x i t y o f m o d e r n n e t w o r k s a n d t h e c r i t i c a l n a t u r e t h e s e n e t w o r k s
p l a y i n t o d a y ’ s o r g a n i z a t i o n s h i e r a r c h i c a l d e s i g n s a r e n e c e s s a r y .
T h e C i s c o c l a s s i c h i e r a r c
h i c a l n e t w o r k m o d e l c o n s i s t s o f t h e
f o l l o w i n g t h r e e l a y e r s :
• A c c e s s l a y e r — U s e d
t o p r o v i d e a c c e s s t o t h e n e t w o r k f o r n e t w o r k u s e r s ; s e c u r i t y
( e s p e c i a l l y a u t h e n t i c a t i o n ) i s i m p o r t a n t a t t h i s l a y e r t o v e r i f y t h a t t h e u s e r s h o u l d
a c c e s s t h e n e t w o r k ;
L 2 s w i t c h i n g i s t y p i c a l l y u s e d i n c o n
j u n c t i o n w i t h V L A N s ; L 3
s w i t c h i n g c a n b e u s e d t o c o n n e c t r e m o t e o f fi c e s .
• D i s t r i b u t i o n l a y e r —
A l l o w s u s e r s t o a c c e s s r e s o u r c e s t h a t a r e n o t l o c a l t o t h e m ;
o f t e n r e f e r r e d t o a s
p o l i c y - b a s e d c o n n e c t i v i t y b e c a u s e q u a l i t y o f s e r v i c e ( Q o S )
m e c h a n i s m s a r e o f t e n u s e d ; m e d i a t r a n s l a t i o n s a r e o f t e n p e r f o r m e d a t t h i s l a y e r ;
L 3 s w i t c h i n g i s p e r f
o r m e d h e r e .
• C o r e l a y e r — H i g h - s p e e d t r a n s f e r o f i n f o r m a t i o n t h r o u g h t h e n e t w o r k ; f a u l t - t o l e r -
a n c e i s o f t e n p e r f o r m e d h e r e t o g u a r a n t e e c o n n e c t i v i t y t h r o u g h t h e n e t w o r k ; L 2
o r L 3 s w i t c h i n g i s i m p l e m e n t e d i n t h e c o r e .
M
o d u l a r N e t w o r k D e s i g n s
T
h e t h r e e - l a y e r n e t w o r k h i e r a r c h i c a l
n e t w o r k m o d e l i s t o o s i m p l i s t i c . I n s
t e a d , a n e w ,
m
o r e s o p h i s t i c a t e d m o d e l i s n e e d e d .
E
n t e r p r i s e C o m p o s i t e N e t w o r k M o d e l
T
h e n e t w o r k h i e r a r c h i c a l m o d e l c a n s t i l l b e u s e d w i t h i n t h e E n t e r p r i s e C o m p o s i t e
N
e t w o r k m o d e l ; i t c a n e x i s t i n a n y o f t h e m o d u l e s , a s n e e d e d .
T
h e E n t e r p r i s e C o m p o s i t e N e t w o r k m
o d e l c o n s i s t s o f t h e f o l l o w i n g t h r e e m a i n f u n c -
t i o n a l a r e a s :
• E n t e r p r i s e c a m p u s — C o n t a i n s m o d u l e s t h a t b u i l d a r o b u s t c a m p u s n
e t w o r k .
• E n t e r p r i s e E d g e — C o n t a i n s e l e m e n t s t h a t a r e r e q u i r e d t o s e c u r e c o m m u n i c a t i o n s
f r o m t h e C a m p u s t o r e m o t e p a r t n e r s , m o b i l e u s e r s , a n d t h e I n t e r n e t .
• S e r v i c e P r o v i d e r E d g e — T h e s e m o d u l e s e n a b l e c o m m u n i c a t i o n w i t h W A N t e c h -
n o l o g i e s a n d I S P s .
A c c e s s L a y e r
D i s t r i b u t i o n L a y e r
C o r e L a y e r
T h r e e
L a y e r
H i e r a r c
h i c a
l N e
t w o r k
M o
d e
l
E n t e r p r i s e C a m p u s
E n t e r p r i s e E d g e
S e r v i c e P r o v i d e r E d g e
E n
t e r p r i s e
C o m
p o s
i t e N e
t w o r k
M o
d e
l
M a n a g e m e n t M o d u l e
B u i l d i n g A c c e s s
M o d u l e
B u i l d i n g D i s t r i b u t i o n
M o d u l e
C a m p u s B a c k b o n e
M o d u l e
S e r v e r F a r m M o d u l e
E d g e D i s t r i b u t i o n
M o d u l e
E - C o m m e r c e M o d u l e
I n t e r n e t C o n n e c t i v i t y
M o d u l e
R e m
o t e A c c e s s / V P N
M o d u l e
W A N M o d u l e
I S P M o d u l e s
P u b l i c S w i t c h e d
T e l e p h o n e N e t w o
r k
( P S T N ) M o d u l e
F r a m e
R e l a y / A T M / P P P
M o d u l e
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 212/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 213/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 214/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 215/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 216/503
198 CCDA-DESGN Quick Reference Sheets
• P a c k e t s w i t c h e d — F r a m e R e l a y , S M D S , P V C s , o r S V C s
u s e d t o d e l i v e r d a t a
b e t w e e n e n d p o i n t s
— S t a r t o p o l o g y
— F u l l y m e s h e d
— P a r t i a l m e s h
• C e l l s w i t c h e d — A T M
; fi x e d s i z e d c e l l s t r a n s m i t t e d q u i c k l y t h r o u g h t h e W A N
E m e r g i n g T e c h n o l o g i e s
• D S L — H i g h b a n d w i d t h o v e r e x i s t i n g c o p p e r t e l e p h o n e l i n e s
• L o n g R e a c h E t h e r n e t ( L R E ) — O f f e r s 1 5 M b p s a c r o s s i n c r e a s e d d i s t a n c e s ; r e l i e s o n
t e c h n o l o g i e s f r o m D
S L
• C a b l e — H i g h - s p e e d
c o n n e c t i o n s t h a t u s e a h y b r i d o f c o a x i a l c a b l e a n d fi b e r o p t i c
m e d i a
• W i r e l e s s — E l e c t r o m
a g n e t i c w a v e s f o r m t h e p h y s i c a l m e d i a
A p p l i c a t i o n D r i v e r
s f o r W A N S e l e c t i o n
• R e s p o n s e T i m e
• T h r o u g h p u t
• P a c k e t L o s s
• R e l i a b i l i t y
T a b l e 3
B a n d w i d t h
B
a n d w i d t h O p t i m i z a t i o n T e c h n i q u e s
B a n d w i d t h o p t i m i z a t i o n t e c h n i q u e s s u p p o r t t h e f o l l o w i n g c o m p r e s s i o n o
p t i o n s :
• F R F . 9 F r a m e R e l a y P a y l o a d C o m
p r e s s i o n
• S T A C o r P r e d i c t o r
• H D L C
• X . 2 5
• P P P u s i n g P r e d i c t o r
• V a n J a c o b s o n T C P / I P H e a d e r C o
m p r e s s i o n
• M P C C
I t
i s m o r e e f fi c i e n t t o h a v e s p e c i a l h a r
d w a r e h a n d l e c o m p r e s s i o n v e r s u s h a v i n g
s o f t w a r e e n a b l e c o m p r e s s i o n .
W
i n d o w S i z e
W
i n d o w s i z e r e f e r s t o t h e m a x i m u m a m o u n t o f d a t a t h a t c a n b e t r a n s m i t t e d b e f o r e a n
a c k n o w l e d g m e n t i s r e q u i r e d .
Q
u e u i n g S e r v i c e s
T
h e h a r d w a r e q u e u e u s e s fi r s t - i n , fi r s t - o u t ( F I F O ) .
T
h e s o f t w a r e q u e u e c a n u s e o t h e r m e
t h o d s :
• W F Q — W e i g h t e d f a i r q u e u i n g
• P Q — P r i o r i t y q u e u i n g
• C Q — C u s t o m q u e u i n g
N
o t e
F o r d e t a i l s o n t r a f fi c s h a p i n g
v e r s u s p o l i c i n g , r e f e r t o t h e Q o S i n t h e s e c t i o n ,
“ C a m p u s D e s i g n D e t a i l s . ”
W
A N B a c k u p T e c h n o l o g i e s
• D i a l b a c k u p r o u t i n g
• P e r m a n e n t s e c o n d a r y W A N l i n k
• S h a d o w P V C
• D i a l b a c k u p
• I n t e r n e t
— G e n e r i c r o u t i n g e n c a p s u l a t i o n
( G R E )
— I P S e c
T e c h n o l o g y
A p p r o x i m a t e B a n
d w i d t h
A s y n c h r o n o u s d i a l u p
5 6 K b p s
I S D N – B R I
1 2 8 K b p s
I S D N – P R I , F r a m e R e l a y
1 . 5 4 4 M b p s
A D S L
8 M b p s
L R E
1 5 M b p s
C a b l e
2 7 M b p s
W i r e l e s s
4 4 M b p s
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 217/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 218/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 219/503
Routing Protocols 201
R o u t i n g P r o t o c o l s
S t a t i c V e r s u s D y n a m i c
S t a t i c ( m a n u a l l y ) c r e a t e d
r o u t e s d o h a v e t h e i r p l a c e , a s s h o w n b y t h e f o l l o w i n g e x a m p l e s :
• R o u t i n g t o a n d f r o m
a s t u b n e t w o r k
• S m a l l n e t w o r k s
• S p e c i a l f e a t u r e s , s u c
h a s d i a l - o n - d e m a n d r o u t i n g ( D D R )
• S p e c i f y i n g r o u t e s f o
r d i a l i n e n v i r o n m e n t s
D i s t a n c e V e c t o r V e r s u s L i n k - S t a t e
D i s t a n c e V e c t o r
• E x a m p l e s i n c l u d e R
I P v 1 , R I P v 2 , a n d I G R P ( I n t e r i o r G
a t e w a y R o u t i n g P r o t o c o l ) .
• E n t i r e r o u t i n g t a b l e
s a r e t r a n s f e r r e d p e r i o d i c a l l y b e t w e e n s y s t e m s .
• T e n d t o c o n v e r g e s l o w l y .
• O f f e r l i m i t e d s c a l a b
i l i t y .
• E a s y t o i m p l e m e n t a n d m a i n t a i n .
L i n k - S t a t e
• E x a m p l e s i n c l u d e O
S P F a n d I S - I S .
• E a c h r o u t e r m a k e s i n d e p e n d e n t r o u t i n g d e c i s i o n s b a s e d
o n l o c a l d a t a b a s e s .
• F a s t e r c o n v e r g e n c e .
• B e t t e r s c a l a b i l i t y .
• F e a t u r e l e s s r o u t i n g
t r a f fi c o v e r h e a d .
• A d v e r t i s e u p d a t e s t h a t o c c u r i n t h e r a t h e r t h a n fl o o d i n g
u p d a t e s , l i k e d i s t a n c e
v e c t o r .
• R e q u i r e s m o r e k n o w l e d g e a n d e x p e r t i s e t o c o n fi g u r e .
H y b r i d
• A n e x a m p l e i s E I G R
P .
• I t h a s f e a t u r e s o f b o
t h d i s t a n c e v e c t o r a n d l i n k s t a t e p r o
t o c o l s .
I n t e r i o r V e r s u s E x t e r i o r
I n t e r i o r G a t e w a y P r o t o c
o l s ( I G P s )
• E x a m p l e s i n c l u d e O
S P F , I S - I S , E I G R P , a n d R I P .
• T h e s e r o u t i n g p r o t o
c o l s h a n d l e t h e d y n a m i c r o u t i n g t h a t o c c u r s w i t h i n p r i v a t e
c o m p a n y n e t w o r k s .
• T h e y f e a t u r e f a s t c o
n v e r g e n c e a n d e a s i e r c o n fi g u r a t i o n .
E x t e r i o r G a t e w a y P r o t o c o l s ( E G P s )
• A n e x a m p l e i n c l u d e s B G P .
• T h e y h a n d l e r o u t i n g b e t w e e n a u t o n o m o u s s y s t e m s .
• T h e y f e a t u r e s l o w e r c o n v e r g e n c e
a n d r e q u i r e m o r e c o m p l e x c o n fi g u r a t i o n s .
R
o u t i n g P r o t o c o l s M e t r i c s
• R I P — H o p c o u n t
• I G R P — B a n d w i d t h , d e l a y
• E I G R P — B a n d w i d t h , d e l a y
• B G P — A S - P A T H
• O S P F — C o s t ( b a n d w i d t h )
• I S - I S — L i n k m e t r i c s ( d e f a u l t )
R
o u t i n g P r o t o c o l C o n v e r g e n c e
• R I P — H o l d - d o w n + 1 o r 2 u p d a t e i n t e r v a l s
• I G R P — H o l d - d o w n + 1 o r 2 u p d
a t e i n t e r v a l s
• E I G R P — S e c o n d s
• O S P F — S e c o n d s
H
i e r a r c h i c a l V e r s u s F l a t
F l a t R o u t i n g P r o t o c o l s
• E x a m p l e s a r e c l a s s f u l r o u t i n g p r o t o c o l s .
• P r o p a g a t e r o u t i n g i n f o r m a t i o n t h r o u g h o u t t h e e n t i r e n e t w o r k .
• T h e y a r e n o t s c a l a b l e .
H
i e r a r c h i c a l R o u t i n g P r o t o c o l s
• E x a m p l e s a r e c l a s s l e s s .
• D i v i d e t h e n e t w o r k i n t o a r e a s ; t h
e y d o n o t p r o p a g a t e i n f o r m a t i o n t h
r o u g h o u t
t h e e n t i r e n e t w o r k — a r e a s a r e u s e d i n s t e a d .
• T h e y a r e s c a l a b l e .
O
D R R o u t i n g
H
u b r o u t e r s c a n d y n a m i c a l l y m a i n t a i n r o u t e s t o s t u b n e t w o r k r o u t e r s . T h a n k s t o
O
D R ( C i s c o p r o p r i e t a r y ) , t h e r e i s n o t t
h e o v e r h e a d w i t h a f u l l - fl e d g e d d y n a m
i c r o u t i n g
p r o t o c o l ; t h i s i s i d e a l f o r h u b a n d s p o k e t o p o l o g i e s . O D R r e l i e s u p o n t h e C i s c o D i s c o v e r y
P r o t o c o l ( C D P ) .
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 220/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 221/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 222/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 223/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 224/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 225/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 226/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 227/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 228/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 229/503
Part II: CCDP-ARCH 211
CCDP-ARCH
Section 1Network Architectures
Section 2
The Enterprise Edge
Section 3
Network Management
Section 4High Availability
Section 5
Network Security
Section 6
Quality of Service
Section 7
IP Multicasting
Section 8
VPNs
Section 9
Wireless LANs
Section 10
IP Telephony
Section 11
Content Networking
Section 12
Storage Networking
CCDP-ARCH Quick Reference Sheets
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 230/503
C C D
P - A R C H
Section 1Network Architectures
With the myriad of requirements for today’s networks,the design process requires a robust modular frame-work that network designers can leverage. For years,the Cisco three-layer hierarchical design model (i.e.,access, distribution, and core layers) was sufficient.
However, e-commerce, security, virtual private net-works (VPNs), and other emerging technologiesrequire a more modern approach. Fortunately, Ciscodeveloped a far more comprehensive model: theEnterprise Composite Network Model.
The flash cards in this section review the componentsof the Enterprise Composite Network Model andinclude step-by-step design processes for designing theEnterprise campus and the Server Farm modules. Theyalso require you to make appropriate design decisionsgiven a set of criteria. For example, you should be ableto identify where technologies such as FastEthernetand Gigabit Ethernet are most applicable in a design.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 231/503
CCDP-ARCH Section 1: Network Architectures 213
Question
Question
N e t w
o r k
A r c h i t e c
t u r e s
N e t w o r k
A r c h i t e c t u r e s
1
Identify the three primary key components ofthe Cisco AVVID framework.
2
List at least two benefits provided by the Cisco
AVVID framework.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 232/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 233/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 234/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 235/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 236/503
218 CCDP-ARCH Section 1: Network Architectures
Question
Question
5 Answer
The Enterprise Network Composite Model includes three functionalareas: Enterprise campus, Enterprise Edge, and Service Provider
Edge. The Enterprise campus functional area is comprised of the
following modules, which are used for campus networks:
• Campus infrastructure
• Network management
• Server farm
•
Edge distribution
6 Answer
The Enterprise Edge functional area sits between the Enterprise
campus and the Service Provider Edge and contains the following
modules:
• E-commerce
• Internet connectivity
• Remote access and VPN
• WAN
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 237/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 238/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 239/503
CCDP-ARCH Section 1: Network Architectures 221
Question
Question
N e t w
o r k
A r c h i t e c
t u r e s
N e t w o r k
A r c h i t e c t u r e s
9
In the Enterprise Composite Network Model,what is the purpose of the WAN module?
10
Identify the Enterprise Edge module that
contains dial-in access concentrators.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 240/503
222 CCDP-ARCH Section 1: Network Architectures
Question
Question
9 Answer
The WAN module, which is one of the four Enterprise Edge modules,provides connectivity between a central site and remote sites. For
example, a company might have a headquarters site and three remote
sales office sites. If those remote sites connect back to the head-
quarters via WAN technologies (such as PPP, ATM, or Frame Relay),
they are connecting to the WAN module.
10 Answer
The remote access and VPN module of the Enterprise Edge module
allow remote users and remote sites to connect back to a central site.
One option for remote access is to allow users to dial directly into the
central site via a modem. Therefore, the dial-in access concentrator iscategorized as part of the remote access and VPN module.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 241/503
CCDP-ARCH Section 1: Network Architectures 223
Question
Question
N e t w
o r k
A r c h i t e c
t u r e s
N e t w o r k
A r c h i t e c t u r e s
11
Describe the Service Provider Edge functionalarea of the Enterprise Composite Network
Model.
12
Under which functional area of the Enterprise
Composite Network Model would the PSTN be
classified?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 242/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 243/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 244/503
226 CCDP-ARCH Section 1: Network Architectures
Question
Question
13 Answer
The Enterprise campus network must meet the following designrequirements:
• Functionality
• Performance
• Scalability
• Availability
• Manageability
• Cost effectiveness
14 Answer
Designing the logical network topology is the second step in the
Enterprise campus design methodology. The following seven steps
are presented in the ARCH course for the Enterprise campus design
methodology:1 Identify requirements of existing enterprise applications and
data flows.
2 Design the logical network topology (for example, identify
VLANs).
3 Design the physical network topology (for example, identify
Layer 1 through 3 components and technologies).
4 Identify Cisco devices that meet the previous criteria and
diagram the network topology.5 Select an appropriate IP addressing scheme.
6 Choose routing protocols.
7 Design the Edge Distribution module, which connects the
Enterprise campus to the Enterprise Edge.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 245/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 246/503
228 CCDP-ARCH Section 1: Network Architectures
Question
Question
15 Answer
While characterizing applications, typical application characteristicsthat you could identify include the following:
• Location of application
• Name of application
• Type of application
• Number of users
• Number of servers
• Bandwidth/delay tolerance/loss characteristics
16 Answer
VLANs are broadcast domains that segment traffic. VLANs are often
defined based on departmental or organizational boundaries;
however, they can be defined based on geographical location. Another
common approach to defining VLANs is to create VLANs for specificapplications (such as voice, video, and data).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 247/503
CCDP-ARCH Section 1: Network Architectures 229
Question
Question
N e t w
o r k
A r c h i t e c
t u r e s
N e t w o r k
A r c h i t e c t u r e s
17
Describe why campus-wide VLANs should notbe used in a design.
18
Arrange the following transmission media
types from least expensive to most expensive:
multimode fiber, twisted pair, and single-mode
fiber.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 248/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 249/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 250/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 251/503
CCDP-ARCH Section 1: Network Architectures 233
Question
Question
N e t w
o r k
A r c h i t e c
t u r e s
N e t w o r k
A r c h i t e c t u r e s
21
List two Ethernet trunking protocols.
22
You have a Layer 2 switch that contains ports
that belong to two different VLANs. Describe
how ports from one VLAN can communicate
with ports in the other VLAN.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 252/503
234 CCDP-ARCH Section 1: Network Architectures
Question
Question
21 Answer
Trunking protocols allow traffic from multiple VLANs to be carriedover a single physical link. The Cisco proprietary trunking protocol is
Inter-Switch Link (ISL). The IEEE defined another trunking protocol:
IEEE 802.1Q. With its recent enhancements, the IEEE 802.1Q
standard is gaining popularity over ISL.
22 Answer
VLANs are broadcast domains. So, you can think of a VLAN as being
its own subnet. Routing must occur to transport traffic from one
subnet to another; therefore, you need a device that makes forwarding
decisions based on Layer 3 information (such as a router or a Layer 3switch). So, the Layer 2 switch described in this scenario needs an
external router or Layer 3 switch to transport traffic from one VLAN
to another.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 253/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 254/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 255/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 256/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 257/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 258/503
240 CCDP-ARCH Section 1: Network Architectures
Question
Question
27 Answer
EIGRP and OSPF are appropriate routing protocols to use on FrameRelay point-to-multipoint networks. RIP and IGRP are not
appropriate because of their periodic flooding of route information
and their slow time to converge. Also, IS-IS does not adapt well to
NBMA point-to-multipoint networks.
28 Answer
SLB allows multiple requests for the same content to be distributed
across multiple servers, each housing the same content. SLB
therefore contributes to a server farm module design’s scalability.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 259/503
CCDP-ARCH Section 1: Network Architectures 241
Question
Question
N e t w
o r k
A r c h i t e c
t u r e s
N e t w o r k
A r c h i t e c t u r e s
29
What are the characteristics of a serverdistribution switch (for example, low-end, mid-
range, high-end, Layer 2, or Layer 3) in the
server farm module?
30
Identify at least one technology that you could
add to a server farm module to increase per-
formance and scalability within that module.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 260/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 261/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 262/503
C C D
P - A R C H
Section 2The Enterprise Edge
The Enterprise Edge provides connectivity between theEnterprise Campus and the outside world. Specifically,traffic flowing to and from the Internet must passthrough the Enterprise Edge. Remote users or sites thatconnect back to the Enterprise Campus connect
through the Enterprise Edge. Also, WAN connectionsfrom remote offices often terminate in the EnterpriseEdge.
Also consider e-commerce servers. You want Internetusers to securely enter your site and perform trans-actions. However, you do not want them to reach theEnterprise Campus network. Therefore, the EnterpriseEdge serves as an ideal location for e-commerceservers.
The flash cards in this section review the modules thatcomprise the Enterprise Edge. They also require you tomake appropriate design decisions given a set ofcriteria. For example, you should be able to selectappropriate Layer 1 and Layer 2 technologies based onparameters such as cost and speed.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 263/503
CCDP-ARCH Section 2: The Enterprise Edge 245
Question
Question
T h e
E n t e r p r i s e
E d g e
T h e E n t e r p r i s e
E d g e
1
Identify the final step in the Cisco eight-stepprocess for Enterprise Edge design.
2
List at least three design considerations for the
Enterprise Edge WAN module.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 264/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 265/503
CCDP-ARCH Section 2: The Enterprise Edge 247
Question
Question
T h e
E n t e r p r i s e
E d g e
T h e E n t e r p r i s e
E d g e
3
In the Enterprise Edge, when should redundantlinks be used to connect a branch office WAN to
the Regional Edge?
4
Explain the need for redundant links between
the Branch Edge and the Central Site Edge in an
Enterprise Edge design.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 266/503
248 CCDP-ARCH Section 2: The Enterprise Edge
Question
Question
3 Answer
Redundancy is not usually required between the branch office WANand the Regional Edge because the branch office does not act as an
aggregation point for other routers. However, redundant links might
be desirable if the branch office operation is mission-critical, or if
several users are impacted.
4 Answer
The Branch Edge is typically an aggregation point for other routers
(for example, branch office routers). Therefore, many users are
impacted if the Branch Edge cannot contact the central site.
Redundant links between the Branch Edge and the central site edgeincrease the availability of the network for these users. Additionally,
these redundant links can be leveraged by load-sharing traffic across
the primary and backup links.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 267/503
CCDP-ARCH Section 2: The Enterprise Edge 249
Question
Question
T h e
E n t e r p r i s e
E d g e
T h e E n t e r p r i s e
E d g e
5
Identify the topology that sites in the EnterpriseWAN backbone typically use.
6
List at least three criteria to consider when
selecting a service provider for your Enterprise
Edge design.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 268/503
250 CCDP-ARCH Section 2: The Enterprise Edge
Question
Question
5 Answer
The Enterprise WAN backbone serves as the core of a company’sWAN. To maintain required levels of service between remote and
branch locations, availability and throughput between these backbone
sites is critical. Therefore, sites that comprise the Enterprise WAN
Backbone are typically interconnected in a full-mesh topology to
minimize delay, increase availability, and increase the network’s
overall throughput.
6 Answer
If your network spans multiple geographical regions, WAN services
that are available in one location might not be available in another.
Consequently, you might have to negotiate with multiple service
providers. Consider the following characteristics when selecting a
service provider:
• Price—Both one-time and recurring costs.
• Available speeds—Enough speed to support applicationdemands.
• Offered features—Features, such as traffic shaping, thatvary based on the Layer 2-specific technology chosen.
• Geographic availability—Locations that a specific serviceprovider offers a specific type of service.
• Service Level Agreements (SLAs) —A contract between thecustomer and the service provider that stipulates such termsas available bandwidth, network delay, availability ofnetwork services, and packet loss through the network.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 269/503
CCDP-ARCH Section 2: The Enterprise Edge 251
Question
Question
T h e
E n t e r p r i s e
E d g e
T h e E n t e r p r i s e
E d g e
7
Identify which of the following data link layertechnologies supports the lowest link quality:
PPP, Frame Relay, ATM, or X.25.
8
Some physical layer technologies are “always
on,” while others are “on-demand.” From the
following list, identify which physical layer
protocols are always on and which are on-
demand: leased line, DSL, dialup, ISDN, and
optical.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 270/503
252 CCDP-ARCH Section 2: The Enterprise Edge
Question
Question
7 Answer
X.25 supports the lowest link quality because it was developed at atime when the quality of transmission facilities was much less than is
commonplace today. As a result, X.25 incorporates more error
checking than do the other listed protocols. However, this increased
error checking increases overhead costs.
8 Answer
A leased line is always on.
DSL is always on.
Dialup is on-demand.ISDN’s control channel (or the D Channel) is always on. However,
ISDN’s data channels (or the B Channels) are on-demand.
Optical is always on.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 271/503
CCDP-ARCH Section 2: The Enterprise Edge 253
Question
Question
T h e
E n t e r p r i s e
E d g e
T h e E n t e r p r i s e
E d g e
9
What WAN technology offers “service classes”such as CBR, ABR, UBR, RT-VBR, and NRT-VBR?
10
When should static routes be used in a site-to-
site WAN design?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 272/503
254 CCDP-ARCH Section 2: The Enterprise Edge
Question
Question
9 Answer
Asynchronous Transfer Mode (ATM) uses one of five service classesto determine what priority level is given to various traffic types.
ATM’s service classes are described as follows:
• CBR—Guaranteed bandwidth for high priority traffic (forexample, video)
• RT-VBR—Useful for latency-sensitive traffic (for example,voice)
• NRT-VBR—Assigns a medium priority to traffic that is not
sensitive to latency
• ABR—Similar to VBR-NRT, ABR assigns a medium priorityto traffic
• UBR—Gives “best-effort” priority to low priority traffic
10 Answer
Static routing is appropriate for smaller environments that have few
WAN connections. For example, consider a single link between a
central site and a remote site. The central site could have a static route
that points to the remote site’s network, and the remote site’s routercould have a default static route that points back to the central site.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 273/503
CCDP-ARCH Section 2: The Enterprise Edge 255
Question
Question
T h e
E n t e r p r i s e
E d g e
T h e E n t e r p r i s e
E d g e
11
List at least three questions that you, as adesigner, should ask when selecting the IP
addressing scheme for the WAN module in the
Enterprise Edge.
12
List the two primary categories of remote
access networks.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 274/503
256 CCDP-ARCH Section 2: The Enterprise Edge
Question
Question
11 Answer
Consider the following questions when selecting an IP addressingscheme for the WAN module:
• How many devices does the network contain? (Note that itis a best practice to add 20 percent to this number toaccommodate future growth.)
• How many sites does the network contain, and how manydevices reside at each site?
• How many network addresses are available from the public
numbering authority?
• What is the total number of addresses that are required forthe network?
• Are public and/or private address spaces required?
• How will the IP addressing hierarchy be completed?
12 Answer
Site-to-site and user-to-site are the two primary categories of remote
access networks. Site-to-site remote access networks are useful for
interconnecting geographically separated offices, while user-to-site
remote access networks allow mobile users to connect back to thecorporate network.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 275/503
CCDP-ARCH Section 2: The Enterprise Edge 257
Question
Question
T h e
E n t e r p r i s e
E d g e
T h e E n t e r p r i s e
E d g e
13
List at least two technologies that can be usedto provide remote dialup access to end users.
14
Identify two technologies that can be used to
provide remote broadband access to end users.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 276/503
258 CCDP-ARCH Section 2: The Enterprise Edge
Question
Question
13 Answer
Remote dialup access options include the following:Modem—Slower speed with moderate cost
ISDN—Moderate speed with moderate cost
Cell phone—Low speed with high cost
14 Answer
Remote broadband access options include
Digital subscriber line (DSL)/cable—Low to high speed withmoderate cost
Satellite—Moderate to high speed with high cost
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 277/503
CCDP-ARCH Section 2: The Enterprise Edge 259
Question
Question
T h e
E n t e r p r i s e
E d g e
T h e E n t e r p r i s e
E d g e
15
What formula should you use to determine thetotal required bandwidth when provisioning
bandwidth for the central site remote access
connection?
16
When designing the Internet connectivity
module, what extra design requirement do you
have for traffic flowing from the Internet into
your site, versus traffic flowing from your site
into the Internet?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 278/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 279/503
CCDP-ARCH Section 2: The Enterprise Edge 261
Question
Question
T h e
E n t e r p r i s e
E d g e
T h e E n t e r p r i s e
E d g e
17
Describe the difference between NAToverloading and dynamic NAT.
18
What type of routing is used for a router
pointing to an ISP in a single-homed
configuration?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 280/503
262 CCDP-ARCH Section 2: The Enterprise Edge
Question
Question
17 Answer
NAT overloading uses a single outside public IP address to servicerequests for multiple inside IP addresses by building a table that keeps
track of Layer 4 port numbers associated with each session. Note that
NAT overloading is sometimes called Port Address Translation
(PAT).
Dynamic NAT maps private inside IP addresses to a pool of public
outside IP addresses.
18 Answer
A default route pointing to the ISP is appropriate for an edge router
in a single-homed configuration because, if there is only one path to
the Internet, the router is not required to maintain a copy of the entire
Internet routing table.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 281/503
CCDP-ARCH Section 2: The Enterprise Edge 263
Question
Question
T h e
E n t e r p r i s e
E d g e
T h e E n t e r p r i s e
E d g e
19
What routing protocol is appropriate for arouter that points to multiple ISPs in a
multihomed configuration?
20
Describe the purpose of the remote access and
VPN module, which is part of the Enterprise
Edge.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 282/503
264 CCDP-ARCH Section 2: The Enterprise Edge
Question
Question
19 Answer
The Border Gateway Protocol (BGP) is appropriate for a router thatpoints to multiple ISPs in a multi homed configuration. BGP forwards
traffic based on autonomous system (AS) paths. By configuring your
AS for BGP, the Internet can see multiple paths through which your
AS can be reached (for example, a path via each of your ISPs).
In this configuration, your site can still reach the Internet, and Internet
users can still reach your site’s resources in the event of a single
failure between your AS and one of your ISPs. Additionally, a multi-
homed design adds load balancing.
20 Answer
The remote access and VPN module is the piece of the Enterprise
Composite Network Model that allows end users to access resources
remotely. Common components in this module include access servers
(for authentication and authorization), firewalls, and IntrusionDetection Systems (IDSs).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 283/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 284/503
C C D
P - A R C H
Section 3Network Management
Network management services help you proactivelymonitor, manage, configure, and even troubleshoot theenterprise network. CiscoWorks is the Cisco flagshipnetwork management product. However, CiscoWorksis not a single software package; it has multiple add-on
modules, such as the LAN Management Solution(LMS) and the Routed WAN (RWAN) ManagementSolution.
CiscoWorks functions as part of an overall networkmanagement strategy that you devise for yournetwork. This strategy identifies network managementgoals, policies, and procedures. For example, you mustdocument a series of response steps to perform in theevent of various “what if” scenarios.
The flash cards in this section review the componentsof a network management strategy. They also focus onthe components of the CiscoWorks network manage-ment solution and design guidelines.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 285/503
CCDP-ARCH Section 3: Network Management 267
Question
Question
N e t w o r k
M a n a g e m e n t
N e t w o r k
M a n a g e m e n t
1
The goals of network management can besummarized in the acronym FCAPS. Identify
what each letter in FCAPS represents.
2
List at least four services that might be found in
the Network Management module.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 286/503
268 CCDP-ARCH Section 3: Network Management
Question
Question
1 Answer
The ISO defined a framework for network management that isreferred to as FCAPS. FCAPS is an acronym that represents the
following:
• Fault Management
• Configuration Management
• Accounting Management
• Performance Management
• Security Management
2 Answer
The following services are often found in a Network Management
module:
• Authentication server
• Access control server
• Network monitoring server
• IDS director
• Syslog server
• System administration server
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 287/503
CCDP-ARCH Section 3: Network Management 269
Question
Question
N e t w o r k
M a n a g e m e n t
N e t w o r k
M a n a g e m e n t
3
What is the first CiscoWorks componentinstalled on a management server, and what
applications does it contain?
4
Identify the three components that are
packaged as part of the CiscoWorks LMS.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 288/503
270 CCDP-ARCH Section 3: Network Management
Question
Question
3 Answer
The first CiscoWorks component installed on a management server isCD One, which includes the following applications:
• CiscoView
• CiscoWorks Management Server
• Integration Utility
4 Answer
The CiscoWorks LAN Management Solutions (LMS) includes the
following:
• Campus Manager
• nGenius Real-Time Monitor
• Device Fault Manager
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 289/503
CCDP-ARCH Section 3: Network Management 271
Question
Question
N e t w o r k
M a n a g e m e n t
N e t w o r k
M a n a g e m e n t
5
Describe the purpose of the CiscoWorks ACLManager.
6
How many managed network devices does a
single instance of the CiscoWorks LMS
support?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 290/503
272 CCDP-ARCH Section 3: Network Management
Question
Question
5 Answer
The ACL Manager is part of the CiscoWorks RWAN product bundle,and it provides a convenient way to create, edit, and distribute access
lists to multiple IOS devices.
6 Answer
A single instance of the CiscoWorks LAN Management Solution
(LMS) can support networks of up to 2000 managed devices or
40,000 end-user stations.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 291/503
CCDP-ARCH Section 3: Network Management 273
Question
Question
N e t w o r k
M a n a g e m e n t
N e t w o r k
M a n a g e m e n t
7
What is the Cisco recommendation for themaximum number of managed devices
supported on a single RME server?
8
What is the maximum number of devices that
a single CiscoWorks Central Resource
Management server should support?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 292/503
274 CCDP-ARCH Section 3: Network Management
Question
Question
7 Answer
Cisco recommends a maximum of 500 managed devices per RMEserver. However, on higher-end systems, that number could grow to
as large as 1000 managed devices.
8 Answer
A single Central Resource Management server can support up to
5000 user devices. The Central Resource Management can, for
example, act as a repository for inventory, configurations, changes,
and software distribution.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 293/503
CCDP-ARCH Section 3: Network Management 275
Question
Question
N e t w o r k
M a n a g e m e n t
N e t w o r k
M a n a g e m e n t
9
What is the approximate maximum number ofdevices supported in a single CiscoWorks
management domain, running LMS or RWAN?
10
Describe how the CiscoWorks IPM determines
network conditions for multiple traffic types.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 294/503
276 CCDP-ARCH Section 3: Network Management
Question
Question
9 Answer
A management domain divides management responsibilities (such asresource network management, campus network management, and
device fault management) across multiple servers. However, the
domain’s maximum capacity is not greater than that of a single
management server. Therefore, the approximate number of devices
supported in a single management domain, running LMS or RWAN,
is 2000.
10 Answer
The Internet Performance Monitor (IPM) sends Service Assurance
Agent (SAA) probes out into the network. These SAA probes can
emulate the appearance of various traffic types, such as HTTP or
VoIP. By discovering how the network treats these probes, you canmore effectively monitor and troubleshoot network conditions for
application-specific traffic.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 295/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 296/503
C C D
P - A R C H
Section 4High Availability
Previously, you considered the Common NetworkInfrastructure portion of the Cisco AVVID model.Next, consider AVVID’s Intelligent Network Servicesportion. These services build on top of the infrastruc-ture, ultimately providing a foundation for AVVID’s
network solutions. High availability is one of thoseintelligent network services.
The converged nature of today’s enterprise networksrequires you to support voice, video, and data over thesame network. Some applications are mission-critical,and as a designer, you must maximize network uptime.
The flash cards in this section identify high availabilitymeasurements, and they examine approaches to
achieving high availability at Layers 1, 2, and 3. Theyalso review design best practices.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 297/503
CCDP-ARCH Section 4: High Availability 279
Question
Question
H i g h A v a i l a b i l i t y
H i g h A v a i l a b i l i t y
1
How much downtime per year is represented bya high availability measurement of “five
nines?”
2
Describe how the Mean Time To Repair (MTTR)
measurement influences availability.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 298/503
280 CCDP-ARCH Section 4: High Availability
Question
Question
1 Answer
The “five nines” refers to 99.999 percent uptime, which translates to5 minutes of downtime per year. The “six nines” (or 99.9999 percent
uptime) equates to only 30 seconds of yearly downtime.
2 Answer
Availability of a system increases as the Mean Time To Repair
(MTTR) decreases. In other words, if a device can be repaired
quickly, its uptime increases.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 299/503
CCDP-ARCH Section 4: High Availability 281
Question
Question
H i g h A v a i l a b i l i t y
H i g h A v a i l a b i l i t y
3
Discuss how the Mean Time Between Failure(MTBF) measurement influences availability.
4
Describe how a Standby Route Processor in a
Layer 3 switch increases the switch’s
availability.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 300/503
282 CCDP-ARCH Section 4: High Availability
Question
Question
3 Answer
Availability of a system increases as the Mean Time Between Failure(MTBF) increases because less frequent downtime translates to
increased uptime.
4 Answer
A Layer 3 switch can have an Active Route Processor (RP) and a
Standby RP. If the Active RP fails, the Standby RP takes over switch
operation. However, the Standby RP does not process packets when
in standby mode.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 301/503
CCDP-ARCH Section 4: High Availability 283
Question
Question
H i g h A v a i l a b i l i t y
H i g h A v a i l a b i l i t y
5
Identify the pros and cons of the active-activeand active-standby models of NIC redundancy.
6
Identify a Cisco-proprietary and an industry
standard approach to providing first hop
redundancy (such as maintaining an IP address
for a device’s default gateway).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 302/503
284 CCDP-ARCH Section 4: High Availability
Question
Question
5 Answer
For redundancy, a server or end-user station can have an additionalNetwork Interface Card (NIC). With the active-active implemen-
tation, both NICs are simultaneously active, thereby reducing
downtime in the event of an NIC failure. However, because each NIC
has its own Media Access Control (MAC) address and IP address,
troubleshooting becomes more difficult.
The active-standby implementation places one of the NICs on
standby. Therefore, the standby NIC does not forward packets until
the active NIC fails. This cutover process introduces a slight delay for
the active-standby implementation as compared to the active-activeimplementation. However, the active-standby approach maintains a
common IP and MAC address, regardless of which NIC is active; this
results in simplified troubleshooting.
6 Answer
First hop redundancy means that a different fault gateway can service
an end station that is pointing to a default gateway in the event of a
failure. A Cisco-proprietary approach to first hop redundancy is the
Hot Standby Router Protocol (HSRP). An industry standard approachis the Virtual Router Redundancy Protocol (VRRP).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 303/503
CCDP-ARCH Section 4: High Availability 285
Question
Question
H i g h A v a i l a b i l i t y
H i g h A v a i l a b i l i t y
7
Describe the Cisco EtherChannel feature.
8
Describe the advantage of Multiple Spanning
Tree (IEEE 802.1s) over the Cisco Per-VLAN
Spanning Tree.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 304/503
286 CCDP-ARCH Section 4: High Availability
Question
Question
7 Answer
The EtherChannel feature allows a switch to logically combinemultiple physical connections (up to eight) into a single logical
channel. Not only does EtherChannel improve throughput between
switches by load balancing across the physical links, but it also
improves redundancy. Specifically, if a link within the EtherChannel
fails, the remaining EtherChannel physical links carry all of the
traffic.
8 Answer
With the Cisco traditional Per-VLAN Spanning Tree approach, each
VLAN required its own instance of Spanning Tree, even if some of
those instances were identical. This increased the switch’s CPU
overhead. However, with Multiple Spanning Tree (MST), also knownas IEEE 802.1s, you define the number of Spanning Tree instances
you need and then assign VLANs to those instances. This approach
reduces the CPU overhead that is required to maintain extra instances
of Spanning Tree.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 305/503
CCDP-ARCH Section 4: High Availability 287
Question
Question
H i g h A v a i l a b i l i t y
H i g h A v a i l a b i l i t y
9
What Cisco proprietary enhancement to theIEEE 802.1D STP is appropriate for Building
Access switches and reduces STP convergence
time to approximately 1 to 5 seconds in the
event of an uplink failure?
10
The availability of a switched infrastructure can
be improved through the use of module
redundancy and/or chassis redundancy.
Contrast the characteristics of module
redundancy with those of chassis redundancy.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 306/503
288 CCDP-ARCH Section 4: High Availability
Question
Question
9 Answer
UplinkFast is a Cisco-proprietary feature that reduces the SpanningTree Protocol (STP) convergence time between Building Access
switches and Building Distribution switches to approximately 1 to 5
seconds. This reduced time is made possible because the Building
Access switch cuts over to a blocked port when its root port goes
down, and because the Building Access switch sends a series of
multicast frames, with the source MAC addresses being the MAC
addresses of the directly attached end-user stations. The flooding of
these multicast frames quickly trains the other switches in the
topology to reach the directly attached end-stations over the backuplink.
10 Answer
Module redundancy enhances high availability by having back-up
modules within a chassis take over in the event of a module failure.
For example, if a primary route processor fails, a standby route
processor takes over. The operating system within the chassisdetermines the cutover time. This approach is typically cost effective
because additional chassis do not have to be purchased.
Chassis redundancy enhances high availability by interconnecting
redundant chassis via multiple links. For example, if a single chassis
or a single link fails, there is still a path through the network.
However, having additional chassis and links can increase complexity
and expense.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 307/503
CCDP-ARCH Section 4: High Availability 289
Question
Question
H i g h A v a i l a b i l i t y
H i g h A v a i l a b i l i t y
11
Identify the second step in the Cisco five-stephigh availability design process.
12
Identify at least one design best practice for
providing high availability in the server farm
module.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 308/503
290 CCDP-ARCH Section 4: High Availability
Question
Question
11 Answer
The second step in the Cisco five-step high availability design processis: Identify the budget to fund high availability features.
The following five design steps contain the Cisco high availability
best practices:
1 Examine technical goals.
2 Identify the budget to fund high availability features.
3 Categorize business applications into profiles.
4 Establish performance standards for high availabilitysolutions.
5 Define how to manage and measure the high availability
solution.
12 Answer
Design best practices for the server farm include the following:
• Have redundant components in networking devices.
•
Provide redundant paths between devices.• Optionally, use multiple NICs in the servers (i.e., dual
homing).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 309/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 310/503
C C D
P - A R C H
Section 5Network Security
Securing network resources is considered one of theIntelligent Network Services of AVVID. The impor-tance of network security increased dramatically overthe past two decades because of the increased avail-ability of advanced hacking tools. Today, even an
unsophisticated hacker can download tools from theInternet, perform reconnaissance on your network,and attempt to breach your network security.
The flash cards in this section identify security risks andpossible mitigations against those threats. Cisco hasalso integrated the concept of network security into theEnterprise Composite Network Model by creating theSAFE blueprint, which identifies which devices residein which Enterprise Composite Network Modelmodule, the potential security threats for each module,and the mitigations that can be used within eachmodule.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 311/503
CCDP-ARCH Section 5: Network Security 293
Question
Question
N
e t w o r k
S
e c u r i t y
N e t w o r k
S e c u r i t y
1
Identify four common security threats toenterprise networks.
2
List at least three common components of a
documented security policy.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 312/503
294 CCDP-ARCH Section 5: Network Security
Question
Question
1 Answer
Four common security threats to enterprise networks include thefollowing:
Loss of privacy—For example, obtaining another user’spassword via eavesdropping
Data theft—For example, making a copy of a private document
Impersonation—For example, gaining access to restrictedresources by pretending to be a different user
Loss of integrity—For example, manipulating data in transit
2 Answer
A security policy should contain the following components:
• Acceptable use policy—How the network is to be used
•
Identification and authentication policy—How a user’sidentity is verified
• Internet use policy—What actions are valid uses of theInternet
• Campus access policy—When a user is permitted to accesscampus resources from inside the campus
• Remote access policy—When a user is permitted to accesscampus resources from a remote location
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 313/503
CCDP-ARCH Section 5: Network Security 295
Question
Question
N
e t w o r k
S
e c u r i t y
N e t w o r k
S e c u r i t y
3
Name the four components in the Ciscocontinuous security design process.
4
List the Cisco five broad categories of security
solutions.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 314/503
296 CCDP-ARCH Section 5: Network Security
Question
Question
3 Answer
Security design is a continual process; changes are made based onnewly identified threats. The four steps in this continual process
include the following:
• Secure—Apply security solutions.
• Monitor—Observe the operation of the security solutions.
• Test—Verify the network’s integrity by testing variousmethods of compromising the network.
•
Improve—Repeat this process again based on the results ofthe testing.
4 Answer
Cisco categorizes security solutions into the following five
categories:
1 Secure connectivity—Protecting information from
eavesdropping
2 Perimeter security—Ensuring that only authorized usersaccess network resources
3 Intrusion protection—Uses technologies such asvulnerability scanners to test the network’s integrity
4 Identity—Uses access servers, such as the Cisco SecureAccess Control Server (ACS), to authenticate and authorize
users5 Security management—Uses tools to analyze and manage
security solutions on an enterprise-wide basis, perhaps via aGUI
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 315/503
CCDP-ARCH Section 5: Network Security 297
Question
Question
N
e t w o r k
S
e c u r i t y
N e t w o r k
S e c u r i t y
5
List at least two ways to mitigate the securitythreat that is introduced by the presence of a
packet sniffer on the network.
6
What is the only security mitigation for a man-
in-the-middle attack?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 316/503
298 CCDP-ARCH Section 5: Network Security
Question
Question
5 Answer
Packet sniffers can capture packets that flow across the network.The following are approaches to mitigate this threat:
• Use authentication
• Use switches instead of hubs
• Use anti-sniffer tools
• Use cryptography
6 Answer
Cryptography is the only mitigation for a man-in-the-middle attack
(for example, packets are intercepted as they flow through the
network).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 317/503
CCDP-ARCH Section 5: Network Security 299
Question
Question
N
e t w o r k
S
e c u r i t y
N e t w o r k
S e c u r i t y
7
Identify two types of Cisco firewalls from whichyou can select.
8
What are two types of Intrusion Detection
Systems?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 318/503
300 CCDP-ARCH Section 5: Network Security
Question
Question
7 Answer
Cisco offers the PIX Firewall as a standalone firewall appliance.However, for a personal firewall or a small network’s firewall, you
might select the IOS Firewall, which is a Cisco router running a
version of the IOS that contains the Firewall feature set.
8 Answer
Cisco offers both host-based and network-based Intrusion Detection
Systems (IDSs). Host-based IDS is software that you install on a host
to protect that host from attack. Network-based IDSs use hardware
devices to compare packets against signatures of “well-known”attacks. After an attack has been identified, the IDS can send an alarm,
send a TCP Reset, or block traffic from the offending device. The
network-based IDS hardware can be a standalone appliance or a
module in a Catalyst switch.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 319/503
CCDP-ARCH Section 5: Network Security 301
Question
Question
N
e t w o r k
S
e c u r i t y
N e t w o r k
S e c u r i t y
9
In terms of security, what does AAA stand for?
10
Which of the following AAA protocols is the
most secure?
• RADIUS
• TACACS+
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 320/503
302 CCDP-ARCH Section 5: Network Security
Question
Question
9 Answer
AAA stands for Authentication, Authorization, and Accounting.Authentication validates that a user is who he says he is. Authori-
zation specifies what a particular user can do. Accounting keeps track
of what a user does.
10 Answer
TACACS+ is more secure than RADIUS because it encrypts all the
traffic sent between the Cisco device and the TACACS+ server.
RADIUS only encrypts the access-request packet from the client to
the server.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 321/503
CCDP-ARCH Section 5: Network Security 303
Question
Question
N
e t w o r k
S
e c u r i t y
N e t w o r k
S e c u r i t y
11
List at least two goals of IPSec.
12
How many secure tunnels does IPSec establish
between two peers?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 322/503
304 CCDP-ARCH Section 5: Network Security
Question
Question
11 Answer
The four primary goals of IPSec are as follows:• Data confidentiality—Scrambles data so eavesdroppers
cannot interpret it
• Data integrity—Uses hashing algorithms to ensure the datawas not manipulated
• Data origin authentication—Verifies that the packet camefrom the person from whom you think it came
•
Anti-replay—Prevents packets that have been captured by anetwork sniffer from being replayed to spoof the entry ofvalid credentials
12 Answer
IPSec establishes two secure tunnels between two peers—
specifically, it creates an Internet Key Change (IKE) phase I tunnel
and an IKE phase II tunnel.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 323/503
CCDP-ARCH Section 5: Network Security 305
Question
Question
N
e t w o r k
S
e c u r i t y
N e t w o r k
S e c u r i t y
13
Explain the purpose of the AuthenticationHeader (AH) and Encapsulating Security
Payload (ESP) protocols.
14
Define SAFE in the context of security.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 324/503
306 CCDP-ARCH Section 5: Network Security
Question
Question
13 Answer
Both the AH protocol and the ESP protocol can be used as part of IPSecurity (IPSec) to verify a packet’s integrity.
14 Answer
SAFE is the Cisco blueprint for designing secure networks. The
SAFE architecture categorizes devices and security threats into
modules of the Enterprise Composite Network Model. For a
comprehensive examination of the SAFE blueprint, examine thefollowing link: http://www.cisco.com/go/safe.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 325/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 326/503
C C D
P - A R C H
Section 6Quality of Service
Not all applications coursing through your networkneed the same priority level. VoIP traffic typically needsmuch higher priority than, FTP traffic for example.Also, different applications might require differentamounts of bandwidth. Fortunately, QoS mechanisms
allow you to customize the priority and bandwidthgiven to your various traffic types.
The flash cards in this section review the need for QoSand numerous categories of QoS tools, such asclassification and marking, congestion avoidance,congestion management, traffic conditioning,signaling, and link-efficiency mechanisms. Finally, youare challenged to recall QoS design best practices.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 327/503
CCDP-ARCH Section 6: Quality of Service 309
Question
Question
Q u a l i t y o f
S e r v i c e
Q u a l i t y o f
S e r v i c e
1
List three problems that might impact latency-sensitive applications in a network without
QoS enabled.
2
Name the two broad categories of QoS tools.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 328/503
310 CCDP-ARCH Section 6: Quality of Service
Question
Question
1 Answer
In the absence of QoS, applications can suffer from one or more of thefollowing:
• Delay (latency)—Excessive time required for a packet totraverse the network
• Delay variation (jitter)—The uneven arrival of packets,which the listener can interpret as dropped voice packets inthe case of VoIP
• Packet loss—Dropping packets, especially problematic for
UDP traffic (such as VoIP), which does not retransmitdropped packets
2 Answer
The two broad categories of QoS tools are
• Integrated Services (IntServ)
•
Differentiated Services (DiffServ)However, more specific categories include the following:
• Classification and marking
• Congestion avoidance
• Congestion management
• Traffic conditioning
•
Signaling• Link-efficiency mechanisms
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 329/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 330/503
312 CCDP-ARCH Section 6: Quality of Service
Question
Question
3 Answer
The DSCP uses the six left-most bits in an IPv4 header’s type ofservice (ToS) byte. These six bits have 64 possible binary
combinations. Therefore, DSCP can specify up to 64 levels of priority
(0-63).
4 Answer
A trust boundary is placed as close to the source as possible, at a
device you trust to make marking decisions. For example, you might
not trust a user’s PC, but you might trust a Cisco IP phone on that
user’s desktop to make appropriate marking decisions. In thatinstance, you place the trust boundary at the Cisco IP phone.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 331/503
CCDP-ARCH Section 6: Quality of Service 313
Question
Question
Q u a l i t y o f
S e r v i c e
Q u a l i t y o f
S e r v i c e
5
In terms of QoS, what primary congestionavoidance does Cisco use?
6
What is the preferred congestion management
tool for VoIP traffic?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 332/503
314 CCDP-ARCH Section 6: Quality of Service
Question
Question
5 Answer
Weighted Random Early Detection (WRED) is the primaryCongestion Avoidance tool used by Cisco. WRED prevents an
interface’s queue from filling to capacity by discarding packets more
aggressively as the queue depth increases, based on priority
markings.
6 Answer
Low latency queuing (LLQ) is the Cisco preferred queuing (or
congestion management) approach for VoIP traffic. With LLQ, you
can define up to 64 classes of traffic (including a default class) and
specify bandwidth guarantees for each class. With LLQ, you can alsoconfigure one or more of the traffic classes as a priority class.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 333/503
CCDP-ARCH Section 6: Quality of Service 315
Question
Question
Q u a l i t y o f
S e r v i c e
Q u a l i t y o f
S e r v i c e
7
The traffic-conditioning category of QoS toolslimits bandwidth for specified traffic types. List
two categories of traffic conditioning tools.
8
Is RSVP considered an IntServ tool or a DiffServ
tool?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 334/503
316 CCDP-ARCH Section 6: Quality of Service
Question
Question
7 Answer
Policing and shaping are both traffic conditioning tools that limitbandwidth usage. Examples of policing tools include class-based
policing and committed access rate (CAR). Shaping tools include, for
example, Frame Relay Traffic Shaping (FRTS), class-based traffic
shaping, and generic traffic shaping.
8 Answer
The RSVP, which uses signaling, is considered an Integrated Services
(IntServ) tool.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 335/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 336/503
318 CCDP-ARCH Section 6: Quality of Service
Question
Question
9 Answer
LFI fragments large payloads on low-speed links (for example, lessthan 768 kbps) and interleaves smaller packets among the fragments.
This decreases the serialization delay that latency-sensitive traffic
might experience.
10 Answer
cRTP compresses the combined IP, UDP, and RTP header
(approximately 40 bytes in size) down to approximately 2 to 4 bytes.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 337/503
CCDP-ARCH Section 6: Quality of Service 319
Question
Question
Q u a l i t y o f
S e r v i c e
Q u a l i t y o f
S e r v i c e
11
List at least two questions to ask as you designa QoS solution.
12
Identify at least two QoS functions recom-
mended for building access module switches.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 338/503
320 CCDP-ARCH Section 6: Quality of Service
Question
Question
11 Answer
When designing a QoS solution, ask the following questions:• What problems do the QoS tools need to solve?
• Will the IntServ or DiffServ model be used?
• How should the problem be solved?
• How do different solutions compare in terms ofperformance and cost?
12 Answer
QoS functions recommended for a building access module switch
include a switch’s ability to do the following:
• Support multiple VLANs
• Manipulate markings provided by end-user systems
• Create a trust boundary close to the source
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 339/503
CCDP-ARCH Section 6: Quality of Service 321
Question
Question
Q u a l i t y o f
S e r v i c e
Q u a l i t y o f
S e r v i c e
13
Identify at least two QoS functions recom-mended for a building distribution module
switch.
14
Identify two QoS tools that are appropriate for
use in campus backbone switches.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 340/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 341/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 342/503
C C D
P - A R C H
Section 7IP Multicasting
IP multicast technologies allow a source to send trafficto a large number of receivers efficiently. Examples ofIP multicast applications include a company’s CEOsending a corporate-wide video to thousands ofreceivers, or a Cisco CallManager sending music on
hold to multiple IP phones.
The flash cards in this section review the need for andchallenges of IP multicast technologies. It examines theprotocols required to support IP multicast, andchallenges you with IP multicast design guidelines.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 343/503
CCDP-ARCH Section 7: IP Multicasting 325
Question
Question
I P M u l t i c
a s t i n g
I P M u l t i c a s t i n g
1
Describe the potential benefit of multicastversus unicast or broadcast.
2
What range of IP addresses is reserved for IP
multicast addresses?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 344/503
326 CCDP-ARCH Section 7: IP Multicasting
Question
Question
1 Answer
A video feed being sent to multiple users in your organization couldconsume a tremendous amount of bandwidth if the video to each
receiver were unicast. A broadcast sends the packets to devices that
do not want the packets. Fortunately, multicast can send a single copy
of each packet from the source to only those devices that want to
receive the packet.
2 Answer
IP multicast uses Class D IP address, which are in the range of
224.0.0.0 through 239.255.255.255.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 345/503
CCDP-ARCH Section 7: IP Multicasting 327
Question
Question
I P M u l t i c
a s t i n g
I P M u l t i c a s t i n g
3
Name at least two drawbacks of IP multicasttechnologies.
4
Describe the purpose and operation of a
multicast RPF check.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 346/503
328 CCDP-ARCH Section 7: IP Multicasting
Question
Question
3 Answer
IP multicast uses UDP, which is “unreliable.” Therefore, WRED,which works with the TCP slow start mechanism, cannot be used as
a congestion avoidance mechanism for IP multicast. With redundant
pathing in the network, there is the potential that multiple copies of
an IP multicast packet will be received, and the potential for IP
multicast packets to arrive out of order.
4 Answer
A Reverse Path Forwarding (RPF) check combats the issue of
receiving duplicate packets in an IP multicast network. Cisco routers
use the RPF check mechanism to determine whether a multicast
packet is entering a router on the appropriate interface. An RPF checkexamines the source address of an incoming packet and checks it
against the router’s unicast routing table to see what interface should
be used to return to the source network. If the incoming multicast
packet is using that interface, the RPF check passes, and the packet is
forwarded. If the multicast packet is coming in on a different inter-
face, the RPF check fails, and the packet is discarded.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 347/503
CCDP-ARCH Section 7: IP Multicasting 329
Question
Question
I P M u l t i c
a s t i n g
I P M u l t i c a s t i n g
5
Discuss the characteristics of a multicast sourcedistribution tree.
6
Describe the concept of a multicast shared
distribution tree.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 348/503
330 CCDP-ARCH Section 7: IP Multicasting
Question
Question
5 Answer
A source distribution tree creates a loop-free path from each IPmulticast source router to the last-hop router (or the router attached to
the receiver). If multiple sources contain the same content, multiple
trees are created, one from each source router to the last-hop router.
As a result, routers have increased memory utilization. However, the
source distribution tree does create an optimal path between each
source router and the last-hop router.
6 Answer
A shared distribution tree uses the concept of a rendezvous point
(RP). Source routers (or the routers that are attached to the source)
create a source distribution tree to the RP, which then forwards the
multicast traffic down a shared tree to all of the last-hop routers (orthe routers that are attached to receivers). Because the last-hop routers
do not have a multicast routing entry for each server, and because they
are using a wildcard entry to represent all sources for a multicast
group, there is less memory overhead on the routers. However,
because IP multicast packets all flow through the RP, a shared
distribution tree might suffer from a sub-optimal path.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 349/503
CCDP-ARCH Section 7: IP Multicasting 331
Question
Question
I P M u l t i c
a s t i n g
I P M u l t i c a s t i n g
7
Identify where you would use PIM-DM andPIM-SM in a multicast network design.
8
Routers and Layer 2 switches can run what
Cisco proprietary protocol to inform the Layer 2
switch that some of its interfaces are connected
to multicast receivers?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 350/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 351/503
CCDP-ARCH Section 7: IP Multicasting 333
Question
Question
I P M u l t i c
a s t i n g
I P M u l t i c a s t i n g
9
In terms of multicast networks, describe thepurpose and operation of IGMP snooping.
10
List and describe at least two interdomain
multicast routing protocols.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 352/503
334 CCDP-ARCH Section 7: IP Multicasting
Question
Question
9 Answer
IGMP snooping is a method of training a switch about which of itsinterfaces are connected to multicast receivers. However, IGMP
snooping acts independently of router operations and is therefore
even compatible with non-Cisco routers.
The switch enabled for IGMP snooping eavesdrops in on the IGMP
messages that are being exchanged between receivers and a router. By
watching those IGMP packets, the switch can determine which of its
interfaces are connected to receivers for particular multicast groups.
10 Answer
You need an interdomain multicast routing protocol for efficient
multicast operations between BGP (Border Gateway Protocol)
autonomous systems. Following are three interdomain multicast
routing protocols, one of which is still in development, and two thatcan be used today:
• Border Gateway Multicast Protocol (BGMP)—With thegoal of becoming a multicast routing protocol that can scaleto the global Internet, BGMP is still in development.
• Multicast BGP (MBGP)—MBGP is an extension of BGPthat allows autonomous systems to exchange multicast RPFinformation as MBGP multicast NLRI (Network Layer
Reachability Information).• Multicast Source Discovery Protocol (MSDP)—MSDP
works with PIM-SM to allow rendezvous points (RPs) inone domain to announce their sources to another domain.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 353/503
CCDP-ARCH Section 7: IP Multicasting 335
Question
Question
I P M u l t i c
a s t i n g
I P M u l t i c a s t i n g
11
In a multicast network design, what version ofIGMP is required to support SSM?
12
In a multicast network, IGMP is used between
multicast receivers and multicast routers. With
IGMP Version 1 configured with default
settings, what is the maximum amount of time
that can elapse before a router realizes that a
receiver has left the multicast group?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 354/503
336 CCDP-ARCH Section 7: IP Multicasting
Question
Question
11 Answer
Source-Specific Multicast (SSM) requires IGMP Version 3. SSMallows a receiver to specify that it wants to receive content for a
multicast group from a specific source. As a result, servers with
different content can simultaneously transmit to the same multicast
group address.
12 Answer
Nearly three minutes can elapse before an IGMP Version 1 router
realizes that a receiver left. By default, the router sends IGMP queries
every 60 seconds. If two queries are sent and not responded to, the
router concludes that a receiver left the group.Consider a receiver that receives an IGMP query from the router to
see whether the receiver still wants to belong to a group. If the
receiver responds that it still wishes to belong, but shuts down its
multicast application a split-second later, the router does not even
recheck that device until nearly a minute later. After nearly 60
seconds elapse, the router again sends an IGMP query, and the
receiver does not respond, which constitutes the first missed query.
After another 60 seconds elapse, the router sends another IGMP
query, to which the receiver does not respond. Finally, 60 secondsafter the second IGMP query was sent, the router sees that there have
been two missed queries and prunes the interface.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 355/503
CCDP-ARCH Section 7: IP Multicasting 337
Question
Question
I P M u l t i c
a s t i n g
I P M u l t i c a s t i n g
13
Three different versions of the IGMP can beused in multicast networks. List an enhance-
ment of IGMP Version 2 over IGMP Version 1.
14
List at least three steps for designing an IP
Multicast network solution.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 356/503
338 CCDP-ARCH Section 7: IP Multicasting
Question
Question
13 Answer
IGMP Version 2 sends group-specific queries and supports thesending of “leave” messages to inform the router of a receiver’s
departure from the multicast group.
14 Answer
The following are six steps for designing an IP Multicast network
solution:
1 Identify the multicast traffic’s source.
2 Identify which receivers can receive traffic for the group.
3 Specify how receivers join the group.
4 Select PIM Dense Mode (PIM-DM) or PIM Sparse Mode
(PIM-SM) as the router-to-router multicast protocol.
5 If PIM-SM is used, identify one or more rendezvous points
(RPs).
6 Provision bandwidth on links to support multicast traffic.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 357/503
CCDP-ARCH Section 7: IP Multicasting 339
Question
Question
I P M u l t i c
a s t i n g
I P M u l t i c a s t i n g
15
Where should RPs be placed in a small campusmulticast network design?
16
Where should RPs be placed in a large campus
multicast network design?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 358/503
340 CCDP-ARCH Section 7: IP Multicasting
Question
Question
15 Answer
In a small campus design, any single RP could simultaneouslysupport all IP multicast sessions. The RP or RPs should be placed in
the building distribution module. However, in some small campus
designs, you might have a collapsed core, in which the building
distribution module and the campus backbone module are one in the
same. In such a scenario, RP can be placed in the campus backbone.
16 Answer
In a large campus design, distribute the load on your RPs by placing
RPs throughout the network, giving different RPs responsibility for
different ranges of IP multicast addresses.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 359/503
CCDP-ARCH Section 7: IP Multicasting 341
Question
Question
I P M u l t i c
a s t i n g
I P M u l t i c a s t i n g
17
Where should RPs be placed in a design for amulticast network that spans a WAN?
18
Identify a security concern with RPs in a
multicast network design.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 360/503
342 CCDP-ARCH Section 7: IP Multicasting
Question
Question
17 Answer
In a WAN design, you do not want traffic from the source router (orthe router that is attached to the source) to the RP flowing over the
WAN. Such an approach is a very inefficient use of WAN bandwidth.
Therefore, when designing an IP multicast solution for the WAN,
place the RP as close to the source router as possible.
18 Answer
Two security concerns with RPs include the following:
• An inappropriate source can send traffic to a multicastgroup.
• A rogue RP can be introduced into the network.
Access control lists (ACLs) are used to address both of these issues.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 361/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 362/503
C C D
P - A R C H
Section 8VPNs
Traditionally, geographically separated corporate sitesinterconnected via a private WAN. Remote users (ortelecommuters) used technologies such as dialup toaccess a modem bank that was located at the corporateheadquarters. However, with the advent of VPNs, sites
can securely connect with other sites, and users cansecurely connect with the corporate network over thepublic Internet. VPNs are far more scalable and lessexpensive than the legacy approaches mentionedpreviously.
The flash cards in this section identify the componentsof a VPN and review VPN design considerations. Thedesign process for a VPN depends on the type of VPNbeing constructed—either a site-to-site or remoteaccess VPN. These flash cards challenge you to identifyspecific issues for each VPN type.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 363/503
CCDP-ARCH Section 8: VPNs 345
Question
Question
V P N s
V P N s
1
List and describe the two primary categories ofVPNs that Cisco identifies.
2
A GRE tunnel supports what types of traffic that
are not supported by an IPSec tunnel?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 364/503
346 CCDP-ARCH Section 8: VPNs
Question
Question
1 Answer
The two primary categories of VPNs are• Site-to-site—Interconnects two sites as an alternative to a
leased line at a reduced cost
• Remote access—Interconnects a remote user with a site asan alternative to dialup or ISDN connectivity at a reducedcost
2 Answer
IP Security (IPSec) tunnels only support IP unicast traffic. Generic
Router Encapsulation (GRE) tunnels add support for multicast ,
broadcast , and non-IP traffic.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 365/503
CCDP-ARCH Section 8: VPNs 347
Question
Question
V P N s
V P N s
3
What is the purpose of 3DES in a VPN design?
4
As a design best practice, how many site-to-site
tunnels require the use of a dedicated VPN
concentrator versus an IOS router for
termination?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 366/503
348 CCDP-ARCH Section 8: VPNs
Question
Question
3 Answer
Triple Data Encryption Standard (3DES) is an encryption standardthat can be used to encrypt traffic that flows over a VPN. If packets
are encrypted via 3DES, they are rendered virtually unusable to
anyone who might intercept and capture the packets.
4 Answer
An IOS router can be used to support up to 70 site-to-site tunnels.
However, as a best practice, a dedicated VPN concentrator should be
used for 70 or more site-to-site VPN tunnels.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 367/503
CCDP-ARCH Section 8: VPNs 349
Question
Question
V P N s
V P N s
5
What CiscoWorks module is designed for VPNand security management?
6
List at least two components of the CiscoWorks
VPN/Security Management Solution.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 368/503
350 CCDP-ARCH Section 8: VPNs
Question
Question
5 Answer
In addition to other security services the CiscoWorks VPN/Security Management Solution module supports configuration, monitoring,
and troubleshooting of VPNs.
6 Answer
The CiscoWorks VPN/Security Management solution includes the
following components:
• VPN Monitor—Monitors IPSec sessions on routers and
concentrators
• Cisco IDS Host Sensor—Monitors security threats to criticalservers
• Cisco Secure Policy Manager (CSPM)—Manages IDS, IOS,and PIX devices and can report intrusion alerts
• Resource Manager Essentials (RME)—Supports softwaredistribution
• CiscoView—Graphically displays status information andallows you to configure a network element
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 369/503
CCDP-ARCH Section 8: VPNs 351
Question
Question
V P N s
V P N s
7
List at least two of the four key componentsthat can comprise a site-to-site VPN.
8
Name two advantages of using a site-to-site
VPN versus a private WAN to interconnect
multiple corporate sites.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 370/503
352 CCDP-ARCH Section 8: VPNs
Question
Question
7 Answer
The four key components of a site-to-site VPN include the following:1 Cisco head-end VPN routers
2 Cisco VPN access routers
3 IPSec and generic routing encapsulation (GRE) tunnels
4 Internet access
8 Answer
A site-to-site VPN is more scalable and less expensive than a private
WAN. However, a private WAN does have the advantage of being
privately managed and is considered more secure.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 371/503
CCDP-ARCH Section 8: VPNs 353
Question
Question
V P N s
V P N s
9
List at least two of the four primary steps fordesigning a site-to-site VPN.
10
Describe a design scenario that is appropriate
for a hub-and-spoke VPN topology.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 372/503
354 CCDP-ARCH Section 8: VPNs
Question
Question
9 Answer
The four primary steps to site-to-site VPN design are1 Characterize the application demands for the VPN.
2 Select a VPN topology between sites.
3 Add redundant connections.
4 Select a router for the head-end, based on anticipated VPNusage.
10 Answer
A hub-and-spoke VPN topology is appropriate for a network with
multiple remote sites that connect back to a central site, with little if
any traffic traveling between remote sites.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 373/503
CCDP-ARCH Section 8: VPNs 355
Question
Question
V P N s
V P N s
11
What is the main drawback of a full-mesh VPNdesign?
12
Explain the recommendation of hard coding a
VPN client’s MTU to 1400 bytes.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 374/503
356 CCDP-ARCH Section 8: VPNs
Question
Question
11 Answer
A full-mesh VPN design minimizes delay between remote sites andprovides redundancy. However, a full-mesh VPN design is not
scalable.
12 Answer
Configuring a VPN client’s Maximum Transmission Unit (MTU) size
to 1400 bytes prevents the fragmentation that could occur after IPSec
or GRE headers increase the packet size beyond 1500 bytes.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 375/503
CCDP-ARCH Section 8: VPNs 357
Question
Question
V P N s
V P N s
13
List the two modes of IPSec over a VPN.
14
List three common tunneling protocols used by
remote access VPN clients.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 376/503
358 CCDP-ARCH Section 8: VPNs
Question
Question
13 Answer
The two modes of IPSec over a VPN are• Tunnel Mode—Encrypts each packet’s header and payload
• Transport Mode—Only encrypts data
14 Answer
VPN clients use the following three common tunneling protocols:
• IP Security (IPSec)
•
Generic Router Encapsulation (GRE)• Layer 2 Tunneling Protocol (L2TP)
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 377/503
CCDP-ARCH Section 8: VPNs 359
Question
Question
V P N s
V P N s
15
In a VPN design, why should a VPN concen-trator be placed behind a router?
16
List at least three questions to ask when
designing a remote access VPN.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 378/503
360 CCDP-ARCH Section 8: VPNs
Question
Question
15 Answer
A VPN concentrator should be placed behind a router to protect itfrom direct exposure to the public Internet.
16 Answer
When designing a remote access VPN, answer the following
questions:
• Is the primary goal remote access?
• What operating systems can be running on client devices?
• What VPN tunneling protocol is appropriate?
• What routing approach (such as static routes or a specificdynamic routing protocol) is appropriate for the VPNconcentrator?
• How should user authentication be performed?
•
Should the connection be a persistent connection (as in upall the time), or should it have a timeout?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 379/503
CCDP-ARCH Section 8: VPNs 361
Question
Question
V P N s
V P N s
17
Identify at least two questions to ask whenselecting a firewall for a remote access VPN
design.
18
What is the first step in capacity planning for a
remote access VPN?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 380/503
362 CCDP-ARCH Section 8: VPNs
Question
Question
17 Answer
Ask the following questions when selecting a firewall for a remoteaccess VPN design:
• Does a firewall already exist in the topology?
• Is there an existing security policy specifying traffic that ispermitted to pass through the firewall?
• Are firewall interfaces available to protect the VPNconcentrator?
•
Are two firewall interfaces available to protect both thepublic and private VPN interfaces?
• If only one firewall interface is available, which VPNinterface should it protect?
18 Answer
The first step in capacity planning for a remote access VPN is to
approximate the total number of users.
Following is a complete list of capacity planning steps:
1 Determine the approximate number of total users.
2 Determine the approximate number of simultaneous users.
3 Identify the bandwidth of the existing ISP connection.
4 Determine the approximate bandwidth to be required forthe ISP connection.
5 Specify how a user connects to the VPN.
6 Estimate future growth of the VPN.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 381/503
CCDP-ARCH Section 8: VPNs 363
Question
Question
V P N s
V P N s
19
Explain how to enable an IPSec connectionthrough a router configured for PAT.
20
Define “split-tunneling” in the context of VPN
design.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 382/503
364 CCDP-ARCH Section 8: VPNs
Question
Question
19 Answer
IPSec runs directly on IP. Therefore, in a PAT configuration, NATcannot examine port information, thus preventing the creation of
IPSec connections. One way to fix this issue is called NAT Traversal,
where IPSec peers negotiate an IPSec connection, determine whether
NAT is in use, and use a UDP wrapper if NAT is in use. This UDP
wrapper uses port 4500. This fix—sometimes called “packet
stuffing”—allows only one IPSec connection through a NAT router
running PAT.
20 Answer
With split tunneling, only traffic that needs to flow over the VPN is
sent over the VPN. Other traffic (such as web-browsing traffic) is sent
unencrypted over the local default gateway, typically your ISP’s next-
hop router. Be aware that split tunneling introduces a potentialsecurity vulnerability. If a split-tunneling system were compromised
from an attacker on the Internet, the attacker might have access (via
the split-tunnel) to corporate resources that are available over the
VPN.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 383/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 384/503
C C D
P - A R C H
Section 9Wireless LANs
Wireless LANs (WLANs) lend themselves to thefluctuating demands for office space. WLANs cansupport network expansion into an unwired area of abuilding or interconnect two nearby buildings.However, because WLAN network traffic flows
through the air, security is an important designconsideration.
The flash cards in this section review the componentsand options of WLANs. You are challenged withdesign best practices. Also, because security isespecially critical, you must distinguish betweenvarious WLAN security solutions and identify anappropriate use of each one.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 385/503
CCDP-ARCH Section 9: Wireless LANs 367
Question
Question
W i r e l e s s L A N s
W i r e l e s s L A N s
1
What is the purpose of an access point in WLANdesign?
2
Identify at least two factors that can affect the
coverage area of a wireless access point.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 386/503
368 CCDP-ARCH Section 9: Wireless LANs
Question
Question
1 Answer
A wireless access point physically connects to the wired LANnetwork, and it has an antenna that allows communication with
wireless clients. Therefore, an access point is the device that wireless
clients pass through as they connect back to the wired LAN.
2 Answer
The coverage area of a wireless access point varies depending on the
following:
• Type and positioning of the WLAN antenna
• Power levels
• Structural barriers
• Required connection speed
Because of all the variables involved, a site survey is required to
achieve an optimal coverage area.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 387/503
CCDP-ARCH Section 9: Wireless LANs 369
Question
Question
W i r e l e s s L A N s
W i r e l e s s L A N s
3
What is the maximum data rate of the 802.11bwireless standard?
4
What is the maximum data rate of the 802.11a
and 802.11g wireless standards?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 388/503
370 CCDP-ARCH Section 9: Wireless LANs
Question
Question
3 Answer
802.11b has a maximum data rate of 11 Mbps.
4 Answer
802.11a and 802.11g both have a maximum data rate of 54 Mbps.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 389/503
CCDP-ARCH Section 9: Wireless LANs 371
Question
Question
W i r e l e s s L A N s
W i r e l e s s L A N s
5
Identify the 802.11 standard with which the802.11g standard is backward compatible.
6
Describe the purpose of a workgroup bridge in
a WLAN design.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 390/503
372 CCDP-ARCH Section 9: Wireless LANs
Question
Question
5 Answer
Both 802.11b and 802.11g use a frequency band of 2.4 GHz, therebyenabling 802.11g to be backward compatible with 802.11b.
6 Answer
A workgroup bridge typically contains a hub that provides connec-
tivity to a few wired clients in a common location and provides access
back to a wireless access point. With a workgroup bridge, a grouping
of commonly located devices does not have to be converted towireless clients. Rather, these devices can connect directly into the
workgroup bridge.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 391/503
CCDP-ARCH Section 9: Wireless LANs 373
Question
Question
W i r e l e s s L A N s
W i r e l e s s L A N s
7
Describe the purpose of a wireless bridge in awireless network design.
8
What is the Cisco recommendation for the
maximum number of devices associated with a
wireless access point?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 392/503
374 CCDP-ARCH Section 9: Wireless LANs
Question
Question
7 Answer
A wireless bridge can be used to interconnect remote networks (up toa mile apart), in different buildings, that have a line of sight path
between them.
8 Answer
Because all devices on a wireless access point share bandwidth, Cisco
recommends the maximum number of devices associated with a
wireless access point to be in the range of 10 to 30 devices.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 393/503
CCDP-ARCH Section 9: Wireless LANs 375
Question
Question
W i r e l e s s L A N s
W i r e l e s s L A N s
9
Identify the three non-overlapping 802.11bWLAN channels to use in an environment
where the coverage area of three wireless
access points overlap.
10
Explain how Layer 2 and Layer 3 mobility can be
achieved in a WLAN environment.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 394/503
376 CCDP-ARCH Section 9: Wireless LANs
Question
Question
9 Answer
WLAN channels 1, 6, and 11 are non-overlapping channels that canco-exist in the same area. Therefore, if the coverage areas of three
wireless access points overlap, each of the three wireless access
points should use one of the following channels: 1, 6, or 11.
10 Answer
Layer 2 mobility is built into the Cisco wireless access points and
allows you to move between wireless access points in the same
VLAN while maintaining connectivity. Layer 3 mobility is possible
through the use of an IOS feature known as Mobile IP. Mobile IPallows devices to retain their IP address, regardless of where in the
network they are physically located.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 395/503
CCDP-ARCH Section 9: Wireless LANs 377
Question
Question
W i r e l e s s L A N s
W i r e l e s s L A N s
11
Describe the challenge of sending multicasttraffic over a wireless LAN.
12
What is the maximum number of IP phones that
should be associated with a single WAP?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 396/503
378 CCDP-ARCH Section 9: Wireless LANs
Question
Question
11 Answer
All wireless clients associated with a WAP share the same bandwidth.Therefore, even if only one user on a WAP participated in a multicast
session, all users connected to that WAP are impacted.
12 Answer
Because VoIP traffic is latency-sensitive, and because bandwidth is
shared among all devices that are associated with a single wireless
access point (WAP), Cisco recommends that you associate no more
than seven IP phones with a single WAP.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 397/503
CCDP-ARCH Section 9: Wireless LANs 379
Question
Question
W i r e l e s s L A N s
W i r e l e s s L A N s
13
How does the EAP improve wireless LANsecurity?
14
How can IPSec be used to enhance wireless
LAN security?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 398/503
380 CCDP-ARCH Section 9: Wireless LANs
Question
Question
13 Answer
EAP allows a wireless client and a wireless access point to mutuallyauthenticate each other using a protocol such as 802.1x or RADIUS.
14 Answer
Just as it can be created in a wired network, an IPSec VPN tunnel can
be created in a WLAN environment to secure WLAN transmissions.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 399/503
CCDP-ARCH Section 9: Wireless LANs 381
Question
Question
W i r e l e s s L A N s
W i r e l e s s L A N s
15
Why are Static WEP keys considered a poorsecurity solution for enterprise WLANs?
16
What design would you recommend for an
802.11b WLAN that must support a large
conference room with up to 50 simultaneous
users?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 400/503
382 CCDP-ARCH Section 9: Wireless LANs
Question
Question
15 Answer
Static WEP uses a key that is manually configured on every wirelessclient and wireless access point. Static WEP keys are not considered
to be a viable solution for enterprise WLANs because, if a laptop
configured with the static WEP key is lost or stolen, all the wireless
clients and wireless access points must be manually reconfigured
with another static WEP key. Also, a static WEP key can be
intercepted and decrypted with tools that are freely available on the
Internet.
16 Answer
One possible design for a conference room that must support 50
simultaneous users is to place two or three wireless access points
(WAPs) in different corners of the conference room. Each of the
WAPs must operate on a unique, non-overlapping channel—channel1, 6, or 11.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 401/503
CCDP-ARCH Section 9: Wireless LANs 383
Question
Question
W i r e l e s s L A N s
W i r e l e s s L A N s
17
What wireless device would you recommendfor interconnecting the networks in two
buildings if there is a line of sight path between
the buildings and the buildings are half a mile
apart?
18
What WLAN security feature would you
recommend for a telecommuter with a single
wireless laptop device?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 402/503
384 CCDP-ARCH Section 9: Wireless LANs
Question
Question
17 Answer
A wireless bridge is an appropriate solution for interconnectingbuildings less than one mile apart that have a line of sight path
between them. A wireless bridge extends the range of 802.11b by
altering some of the timing constraints, thereby actually violating the
802.11 specifications.
18 Answer
For a single wireless client in a telecommuter environment, you could
use a 128-bit Static WEP key for authentication between a wireless
laptop and a wireless access point because you are not trying to
protect corporate resources at the telecommuter’s home. However, asthe telecommuter connects back to the corporate network, the
wireless laptop should communicate via an encrypted VPN
connection.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 403/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 404/503
C C D
P - A R C H
Section 10IP Telephony
The Cisco IP telephony technologies can replacetraditional corporate telephony systems, typicallyincluding PBX. The core of the Cisco IP telephonysolution is the Cisco CallManager (CCM); it isresponsible for call routing, similar to the legacy PBX.
Also, Cisco IP phones can replace analog phones.
The flash cards in this section review the componentsof an IP telephony network, including hardware andsoftware options. Gateway control protocols arecontrasted. In addition to other design best practices,various CCM deployment models are examined. Thescalability limitations of the Cisco CallManager varybased on the CCM version and the underlying serverplatform (such as the Media Convergence Server).However, these flash cards reflect the specifications ofCisco CallManager version 3.1.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 405/503
CCDP-ARCH Section 10: IP Telephony 387
Question
Question
I P T e l e p
h o n y
I P T e l e p h o n y
1
Describe the Cisco CallManager’s role in an IPtelephony network.
2
What VoIP component converts voice calls
between the PSTN and the IP telephony
network?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 406/503
388 CCDP-ARCH Section 10: IP Telephony
Question
Question
1 Answer
The Cisco CallManager (CCM) replaces the legacy PBX’s callprocessing role. Also, IP phones register with a CCM.
2 Answer
A gateway converts between media types. For example, a gateway
might have analog or digital Public Switched Telephone Network
(PSTN) interfaces, in addition to an Ethernet interface that connects
to an IP telephony network.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 407/503
CCDP-ARCH Section 10: IP Telephony 389
Question
Question
I P T e l e p
h o n y
I P T e l e p h o n y
3
In an IP telephony network, what hardwarecomponent is used for transcoding, media
termination points, and hardware conference
bridges?
4
What is the maximum number of IP phones that
can register with a single Cisco CallManager
server running version 3.1 of the CallManager
software?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 408/503
390 CCDP-ARCH Section 10: IP Telephony
Question
Question
3 Answer
Digital Signal Processors (DSPs) add processing horsepower to an IPtelephony solution. For example, DSPs can perform transcoding
operations and act as media termination points (MTPs) or a hardware
conference bridge.
4 Answer
As of Cisco CallManager (CCM) version 3.1, a maximum of 2500 IP
phones could register with a single CCM server.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 409/503
CCDP-ARCH Section 10: IP Telephony 391
Question
Question
I P T e l e p
h o n y
I P T e l e p h o n y
5
What is the maximum number of IP phonesthat can register with a cluster of Cisco
CallManagers running version 3.1 of the
CallManager software?
6
List the four Cisco CallManager deployment
models.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 410/503
392 CCDP-ARCH Section 10: IP Telephony
Question
Question
5 Answer
As of Cisco CallManager (CCM) version 3.1, a maximum of 10,000IP phones could register with a CCM cluster.
6 Answer
A Cisco CallManager (CCM) network can be designed based on one
of the following four models:
1 Single-Site—IP phones and CCMs located at a single site.
2 Centralized call processing—IP phones at multiple sites and
all CCMs at a single site.
3 Distributed call processing—IP phones and CCMs at multiple
sites.
4 Clustering over the WAN—IP phones and CCMs at multiple
sites, with all CCMs logically assigned to the same cluster.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 411/503
CCDP-ARCH Section 10: IP Telephony 393
Question
Question
I P T e l e p
h o n y
I P T e l e p h o n y
7
Identify at least two VoIP gateway selectionconsiderations.
8
List at least three gateway-signaling protocols
that are commonly used in Cisco IP telephony
networks.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 412/503
394 CCDP-ARCH Section 10: IP Telephony
Question
Question
7 Answer
When selecting a VoIP gateway, consider the following:• Voice, fax, and modem support
• Appropriate interface types (such as analog, digital, orEthernet)
• Gateway signaling protocol support
8 Answer
The following are four of the most common gateway signaling
protocols used in Cisco IP telephony networks:
• Simple Gateway Control Protocol (SGCP)—Also known as
“non-IOS MGCP,” SGCP provides call control between aCisco CallManager (CCM) and a gateway, such as aCatalyst 6500 Series switch.
• Media Gateway Control Protocol (MGCP)—MGCP acts asa signaling protocol between a CCM and an analoggateway.
• H.323—H.323 supports signaling between an IOS routergateway, configured with dial-peers, and a CCM.
• Session Initiation Protocol (SIP)—SIP is an IETF standardthat uses an ASCII-based approach to exchanging callcontrol messages.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 413/503
CCDP-ARCH Section 10: IP Telephony 395
Question
Question
I P T e l e p
h o n y
I P T e l e p h o n y
9
How much bandwidth does the G.711 CODECuse for the voice payload?
10
Define the function of transcoding in an IP
telephony design.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 414/503
396 CCDP-ARCH Section 10: IP Telephony
Question
Question
9 Answer
64 kbps of bandwidth is required for the voice payload when using theG.711 CODEC. The G.711 does not compress voice. Therefore,
G.711 is not typically used across the WAN. The G.729 protocol,
which requires 8 kbps of bandwidth for the voice payload, is often
appropriate for use over the WAN.
10 Answer
Transcoding is the process of converting between low and high-
compression CODECs. For example, if voice traffic was entering
your network encoded with the G.729 CODEC, you could use
transcoding to convert the encoding to the G.711 CODEC, if required.Digital Signal Processors (DSPs) perform transcoding.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 415/503
CCDP-ARCH Section 10: IP Telephony 397
Question
Question
I P T e l e p
h o n y
I P T e l e p h o n y
11
What CODEC must all conference callparticipants use if the Cisco CallManager is
acting as a software conference bridge?
12
Identify the Cisco product that provides
converged messaging services (such as for
fax messages and voice mail).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 416/503
398 CCDP-ARCH Section 10: IP Telephony
Question
Question
11 Answer
All conference call participants must use the G.711 CODEC if theCisco CallManager (CCM) is acting as a software conference bridge.
This limitation results from the CCM’s inability to transcode between
low and high-compression CODECs.
12 Answer
The Cisco Unity product is a converged messaging system that
provides a single repository for multiple messaging types. For
example, a user can retrieve e-mail over the phone via text-to-speech
conversion.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 417/503
CCDP-ARCH Section 10: IP Telephony 399
Question
Question
I P T e l e p
h o n y
I P T e l e p h o n y
13
How many Cisco CallManager servers arerecommended to support up to 2500 IP phones?
14
How many Cisco CallManager servers are
recommended to support up to 10,000 IP
phones?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 418/503
400 CCDP-ARCH Section 10: IP Telephony
Question
Question
13 Answer
Two CCM servers are recommended to service up to 2500 IP phones.If one of the CCM servers fails, the other server can accommodate all
2500 IP phones. Note that these Cisco CallManagers belong to the
same cluster.
14 Answer
Eight CCM servers are recommended to service up to 10,000 IP
phones. Four of the servers act as primary CCM servers, with IP
phones registered with them. Two of the servers act as backup servers.
One server acts as a dedicated publisher, and one server acts as adedicated TFTP server. Note that these Cisco CallManagers belong to
the same cluster.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 419/503
CCDP-ARCH Section 10: IP Telephony 401
Question
Question
I P T e l e p
h o n y
I P T e l e p h o n y
15
You are clustering Cisco CallManagers over aWAN, and there are 10,000 BHCAs. How much
bandwidth is required for the WAN link to
support the intra-cluster communication?
16
When clustering Cisco CallManagers over the
WAN, which failover approach is appropriate
for up to six sites?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 420/503
402 CCDP-ARCH Section 10: IP Telephony
Question
Question
15 Answer
900 kbps of WAN bandwidth is required for every 10,000 busy hourcall attempts (BHCAs), when clustering Cisco CallManagers over a
WAN connection. Also, the round-trip time (RTT) between any two
CCMs in the cluster should be no more than 40 ms.
16 Answer
When clustering over the WAN, the Remote Failover option is most
appropriate for up to six sites, with a total of up to 10,000 IP phones
for all sites combined. With 2500 to 5000 IP phones per site, the Local
Failover option is more appropriate for two or three sites.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 421/503
CCDP-ARCH Section 10: IP Telephony 403
Question
Question
I P T e l e p
h o n y
I P T e l e p h o n y
17
What formula calculates the requiredbandwidth for voice traffic?
18
What CiscoWorks component can place
simulated IP phone calls (such as synthetic
transactions)?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 422/503
404 CCDP-ARCH Section 10: IP Telephony
Question
Question
17 Answer
The following formula can calculate required bandwidth for voicetraffic:
Voice Bearer Traffic (bps) = (Packet Payload + Header Size in
bits) * (Packet Rate per Second)
18 Answer
The CiscoWorks VoIP Health Monitor (VHM) monitors the status,
reachability, and environmental conditions of infrastructure hard-
ware. VHM can also simulate an IP phone call to proactively test
various configurations.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 423/503
CCDP-ARCH Section 10: IP Telephony 405
Question
Question
I P T e l e p
h o n y
I P T e l e p h o n y
19
Describe the purpose of SRST in an IP telephonydesign.
20
In an IP telephony design, what is an auxiliary
VLAN?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 424/503
406 CCDP-ARCH Section 10: IP Telephony
Question
Question
19 Answer
SRST allows a remote site that does not have a Cisco CallManager tomaintain a minimal level of call routing functionality in the event of
a WAN failure. The SRST feature runs on a router that is configured
as an H.323 gateway.
20 Answer
An auxiliary VLAN is a VLAN that is used to transport voice packets.
Specifically, an IEEE 802.1Q trunk is set up between a Cisco IP
phone and a Catalyst switch. Over that trunk, data (from an upstream
PC) is transported in one VLAN, and voice is transported in theauxiliary VLAN.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 425/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 426/503
C C D
P - A R C H
Section 11Content Networking
As a designer, content networking technologies allowsyou to intelligently distribute content throughoutthe network, thereby reducing WAN bandwidthrequirements. For example, a user could open a webbrowser and point to a particular site. A content
networking component, called a “cache engine,”might already have that site’s content stored locally.Therefore, the cache engine satisfies the user’s webrequest locally, without burdening the WAN.
The flash cards in this section challenge you to recallthe components of the Cisco content networkingsolution and the functions of these components. Thenetworking components all have an appropriate placeand use within a network. You are therefore requiredto identify where to deploy various content networkingcomponents. Finally, you must identify appropriatecontent networking components to use for specifictypes of content (such as web, e-commerce, orstreaming media).
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 427/503
CCDP-ARCH Section 11: Content Networking 409
Question
Question
C
o n t e n t
N e
t w o r k i n g
C o n t e n t
N e t w o r k i n g
1
List the five components of the Cisco contentnetworking solution.
2
Content caching is a component of the Cisco
content networking solution. Define the
function of content caching.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 428/503
410 CCDP-ARCH Section 11: Content Networking
Question
Question
1 Answer
The Cisco content networking solution contains the followingcomponents:
1 Content caching
2 Content switching
3 Content routing
4 Content distribution and management
5 Intelligent network services
2 Answer
Content caching stores content (such as graphics from a web page) in
a cache engine. When a user requests content, rather than retrieving
the content over the WAN, the content engine services the request
locally if the content engine has the content. If the content enginedoes not have the content stored locally, it retrieves the content over
the WAN and stores it locally so it can service future requests for that
content.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 429/503
CCDP-ARCH Section 11: Content Networking 411
Question
Question
C
o n t e n t
N e
t w o r k i n g
C o n t e n t
N e t w o r k i n g
3
Describe the benefit of content switching in acontent networking design.
4
Identify an appropriate environment in which to
deploy content routing.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 430/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 431/503
CCDP-ARCH Section 11: Content Networking 413
Question
Question
C
o n t e n t
N e
t w o r k i n g
C o n t e n t
N e t w o r k i n g
5
What benefit does the Cisco ContentDistribution Manager (CDM) offer?
6
Where should you locate reverse proxy servers
in a content networking design?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 432/503
414 CCDP-ARCH Section 11: Content Networking
Question
Question
5 Answer
The Cisco Content Distribution Manager (CDM) intelligently pushescontent to geographically dispersed content engines. These content
engines then serve up the content to local clients, thus reducing
bandwidth demands on the WAN.
6 Answer
Reverse proxy servers should be located in a server farm. The purpose
of reverse proxy servers is to offload server content, thereby reducing
demands on individual servers.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 433/503
CCDP-ARCH Section 11: Content Networking 415
Question
Question
C
o n t e n t
N e
t w o r k i n g
C o n t e n t
N e t w o r k i n g
7
In the Cisco content networking solution, howdoes transparent caching differ from proxy
caching?
8
Content routing directs user requests for
content to an appropriate content engine. List
the two modes of content routing.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 434/503
416 CCDP-ARCH Section 11: Content Networking
Question
Question
7 Answer
Transparent caching dynamically intercepts requests directed outsideof the network and redirects those requests to a local content engine.
However, proxy caching requires that a user’s application (such as a
browser) point directly to the content engine.
8 Answer
The two modes of content routing are
1 Direct Mode—A user sends out a DNS request, which isforwarded to a local content router. The content router
forwards the DNS request to multiple content routingagents at different locations, and the first content routingagent to respond is deemed the “best” site. The user’s DNSrequest is then resolved to the IP address of the “best” site.
2 WCCP Mode—The Web Cache Communication Protocol(WCCP) allows a router to determine whether a requestshould be sent directly to the destination, or if it should beredirected to a content engine. If the content engine does not
have the requested content, it retrieves the content and hasit available for subsequent requests.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 435/503
CCDP-ARCH Section 11: Content Networking 417
Question
Question
C
o n t e n t
N e
t w o r k i n g
C o n t e n t
N e t w o r k i n g
9
What content networking component usesSelf-Organizing Distributed Architecture
(SODA)?
10
According to a Cisco best practice for content
network design, how much storage space
(measured in hours) is recommended for a
content engine to produce a significant
bandwidth savings?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 436/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 437/503
CCDP-ARCH Section 11: Content Networking 419
Question
Question
C
o n t e n t
N e
t w o r k i n g
C o n t e n t
N e t w o r k i n g
11
You are using content networking for web-caching purposes. Where should you place
content engines?
12
You are designing a content network to support
streaming media. Why might your design be a
good candidate for a Cisco CDM?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 438/503
420 CCDP-ARCH Section 11: Content Networking
Question
Question
11 Answer
Content engines should be strategically placed to prevent unnecessaryWAN access. For example, remote offices are often appropriate
locations for content engines because content engines allow much of
the content to be served up locally.
12 Answer
A CDM is often applicable for streaming media applications because
it can intelligently push the content to remote content engines. Those
content engines can then serve up the content to local users.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 439/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 440/503
C C D
P - A R C H
Section 12Storage Networking
The need for storage in today’s networks continues togrow. However, the approach of increasing storage byadding additional network servers does not scale well.Fortunately, the emergence of storage networkingtechnologies allows you, as a designer, to incorporate
dedicated storage devices into your design.
Two primary approaches to storage networkinginclude Network Attached Storage (NAS) devices andstorage area networks (SANs). Each approach has itsown set of applications for which it is best suited. Withthe high-speed transfer rates required by most storageapplications, bandwidth provisioning is a key designconsideration.
The flash cards in this section confirm your under-standing of the technologies surrounding storagenetworking and storage network design approaches,and when each approach is used. You must also recallquestions to ask during the storage network designprocess.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 441/503
CCDP-ARCH Section 12: Storage Networking 423
Question
Question
S t o r a g e
N e t w o r k i n g
S t o r a g e
N e t w o r k i n g
1
In the context of storage networking, what is aSAN?
2
What is the purpose of a NAS device in a
storage network?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 442/503
424 CCDP-ARCH Section 12: Storage Networking
Question
Question
1 Answer
A SAN is an independent network designed specifically forinterconnecting storage devices.
2 Answer
A NAS device supports file storage over an IP network. For example,
the NAS and a UNIX NFS volume might appear.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 443/503
CCDP-ARCH Section 12: Storage Networking 425
Question
Question
S t o r a g e
N e t w o r k i n g
S t o r a g e
N e t w o r k i n g
3
What type of physical connection is typicallyused in a SAN to interconnect storage devices?
4
You are considering using NAS devices in a
storage network design. List at least two
network applications that are appropriate for
NAS devices.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 444/503
426 CCDP-ARCH Section 12: Storage Networking
Question
Question
3 Answer
SANs typically use Fibre Channel to interconnect storage devices.
4 Answer
Because NAS devices support file storage over an IP network, they
are appropriate for applications such as file sharing, e-mail services,
and web services.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 445/503
CCDP-ARCH Section 12: Storage Networking 427
Question
Question
S t o r a g e
N e t w o r k i n g
S t o r a g e
N e t w o r k i n g
5
Identify the types of applications that benefitfrom a SAN, as opposed to benefiting from a
NAS device, in a storage network design.
6
How does Fibre Channel transfer data
differently than a LAN transfers data?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 446/503
428 CCDP-ARCH Section 12: Storage Networking
Question
Question
5 Answer
SANs are appropriate for high-volume, write-intensive applications,such as database applications.
6 Answer
Fibre Channel transfers data in large blocks, without breaking it up
into packets like a LAN does.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 447/503
CCDP-ARCH Section 12: Storage Networking 429
Question
Question
S t o r a g e
N e t w o r k i n g
S t o r a g e
N e t w o r k i n g
7
Describe the purpose of Fiber Channel over IP(FCIP) in a storage network design.
8
A storage network can use the Internet Small
Computer System Interface (iSCSI) protocol to
interconnect SCSI devices over an IP network.
What is contained in an iSCSI packet?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 448/503
430 CCDP-ARCH Section 12: Storage Networking
Question
Question
7 Answer
FCIP allows you to interconnect SAN islands over an IP network byencapsulating Fibre Channel communication in IP packets.
8 Answer
iSCSI encapsulates SCSI data and command frames into IP packets.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 449/503
CCDP-ARCH Section 12: Storage Networking 431
Question
Question
S t o r a g e
N e t w o r k i n g
S t o r a g e
N e t w o r k i n g
9
List at least two approaches for securingstorage network transactions.
10
Your storage network needs 400 Mbps of
bandwidth between two switches; however,
each switch only contains 100 Mbps interfaces.
Without upgrading the switches’ hardware,
how can you meet the bandwidth demands of
the storage network?
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 450/503
432 CCDP-ARCH Section 12: Storage Networking
Question
Question
9 Answer
To secure storage network transactions, consider isolating storage ina separate VLAN and using access control lists (ACLs) to limit access
to storage resources. RADIUS or TACACS+ can be used to authen-
ticate iSCSI connections, and IP Security (IPSec) can protect FCIP
traffic as it tunnels across the network.
10 Answer
In the situation presented, multiple 100-Mbps interfaces (four or
eight, depending on the switch type) can be logically combined
together in an EtherChannel. For example, four 100-Mbps interfaces
could be combined to create a 400-Mbps EtherChannel interface. Ifthe interfaces in the EtherChannel were configured for full duplex,
then the maximum theoretical throughput would approach 800 Mbps.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 451/503
CCDP-ARCH Section 12: Storage Networking 433
Question
Question
S t o r a g e
N e t w o r k i n g
S t o r a g e
N e t w o r k i n g
11
List at least two questions one should ask whendesigning a storage network solution.
12
Identify an application that could benefit from a
storage network that spans a WAN or a MAN.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 452/503
434 CCDP-ARCH Section 12: Storage Networking
Question
Question
11 Answer
When designing a storage network solution, ask the followingquestions:
• Do applications require backup capabilities or realtimeaccess?
• What are the traffic patterns for each application?
• How much bandwidth is required for each application?
• What special needs do the applications have for availability,
security, and quality of service?
12 Answer
Examples of WAN or MAN storage network applications include
using a storage network for an off-site backup or for consolidating
storage to support applications such as data mining. These
applications are made possible with storage networking becausetechnologies such as iSCSI or FCIP run over an IP network. Of
course, sufficient bandwidth must be provisioned to accommodate
application demands.
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 453/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 454/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 455/503
Network Architectures 437
• N e t w o r k M a n a g e m
e n t M o d u l e — R e s p o n s i b l e f o r c a m p u s - w i d e m a n a g e m e n t
f u n c t i o n s , s u c h a s t h e f o l l o w i n g :
— I n t r u s i o n D e t e c t i o n S y s t e m s ( I D S )
— L o g g i n g
— A u t h e n t i c a t i o n
• S e r v e r f a r m m o d u l e
— C o n t a i n s c a m p u s s e r v e r s t h a t p r o
v i d e c a m p u s - w i d e
s e r v i c e s :
— A p p l i c a t i o n s e r v e
r s
— F i l e s e r v e r s
— E - m a i l s e r v e r s
— D o m a i n N a m e S y s t e m ( D N S ) s e r v e r s
• E d g e D i s t r i b u t i o n M o d u l e — R e s p o n s i b l e f o r r o u t i n g t r a f fi c b e t w e e n E n t e r p r i s e
C a m p u s a n d t h e E n t e r p r i s e E d g e
E
n t e r p r i s e E d g e C o m p o n e n t s
T
h e E n t e r p r i s e E d g e , w h i c h i s r e s p o n s i b l e f o r “ f u n n e l i n g ” t r a f fi c b e t w e e n
t h e E n t e r -
p r i s e C a m p u s a n d t h e S e r v i c e P r o v i d e r E d g e , h a s f o u r m o d u l e s t h a t t h e e n t e r p r i s e
n e t w o r k d e s i g n e r m u s t a d d r e s s :
• E - c o m m e r c e — C o n t a i n s t h e s e r v e r s t h a t a r e u s e d t o p r o v i d e a n e - c o m
m e r c e
p r e s e n c e f o r a c o m p a n y , i n c l u d i n
g t h e f o l l o w i n g :
— W e b s e r v e r s
— A p p l i c a t i o n s e r v e r s
— D a t a b a s e s e r v e r s
— S e c u r i t y s e r v e r s
C a m p u s B a c k b o n
e
B u i l d i n g D i s t r i b u t i o n
B u i l d i n g A c c e s s
C a m p u s I n f r a s t r u c t u r e M o d u l e
S e r v e r D i s t r i b u t i o n
S e r v e r A c c e s s
S e r v
e r
S e r v e r
C a m p u s B a c k b o n e
S e r v e r F a r m M o d u l e
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 456/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 457/503
Network Architectures 439
C a m p u s D e s i g n : S
t e p 3
T h e t h i r d s t e p o f t h e c a m
p u s d e s i g n m e t h o d o l o g y i s d e s i g n i n
g t h e p h y s i c a l n e t w o r k
t o p o l o g y . T h i s s t e p i n v o l v e s s e l e c t i n g t r a n s m i s s i o n m e d i a a n d d a t a - l i n k p r o t o c o l s , a n d
i d e n t i f y i n g w h e r e i n t h e
n e t w o r k t o d e p l o y L a y e r 2 a n d / o r L
a y e r 3 s w i t c h i n g .
C o m m o n T r a n s m i s s i o n M e d i a c h o i c e s i n c l u d e t h e f o l l o w i n g
:
• T w i s t e d P a i r
— 1 0 0 m d i s t a n c e l i
m i t
— 1 G b p s s p e e d l i m
i t
— L o w c o s t
— T y p i c a l l y u s e d f o r b u i l d i n g a c c e s s
• M u l t i m o d e F i b e r
— 2 k m d i s t a n c e l i m
i t ( F a s t E t h e r n e t ) o r 5 5 0 m d i s t a n c e
l i m i t ( G i g a b i t E t h e r n e t )
— 1 G b p s s p e e d l i m
i t
— M o d e r a t e c o s t
— T y p i c a l l y u s e d f o r b u i l d i n g d i s t r i b u t i o n a n d c a m p u s b a c k b o n e
• S i n g l e - M o d e F i b e r
— 4 0 k m d i s t a n c e l i
m i t ( F a s t E t h e r n e t ) o r 9 0 k m d i s t a n c
e l i m i t ( G i g a b i t E t h e r n e t )
— S p e e d l i m i t o f 1 0
G b p s o r g r e a t e r
— H i g h c o s t
— T y p i c a l l y u s e d f o r b u i l d i n g d i s t r i b u t i o n a n d c a m p u s b a c k b o n e
C
o m m o n D a t a - l i n k P r o t o c o l c h o i c e s
i n c l u d e t h e f o l l o w i n g :
• E t h e r n e t
— 1 0 M b p s
— V e r y l o w c o s t
— T y p i c a l l y u s e d f o r b u i l d i n g a c c e s s
• F a s t E t h e r n e t
— 1 0 0 M b p s
— L o w c o s t
— T y p i c a l l y u s e d f o r b u i l d i n g d i s
t r i b u t i o n a n d c a m p u s b a c k b o n e
• G i g a b i t E t h e r n e t
— 1 0 0 0 M b p s
— M o d e r a t e c o s t
— T y p i c a l l y u s e d f o r b u i l d i n g d i s
t r i b u t i o n a n d c a m p u s b a c k b o n e
• 1 0 G i g a b i t E t h e r n e t
— 1 0 , 0 0 0 M b p s
— H i g h c o s t
— T y p i c a l l y u s e d f o r c a m p u s b a c
k b o n e
M u
l t i m o
d e
F i b e r
C l a d d i n g
C o r e
P a t h s o f L i g h t
( i . e . , M o d e s )
T h e c o r e d i a m e t e r i n a m u l t i m o d e f i b e r i s l a r g e e n o u g h t o p
e r m i t m u l t i p l e
p a t h s ( i . e . , m o d e s ) f o r l i g h t t o t r a v e l . T h i s m i g h t c a u s e d i f f e r e n
t p h o t o n s ( i . e . ,
l i g h t p a r t i c l e s ) t o t a k e d i f f e r e n t a m o u n t s o f t i m e t o t r a v e l t h r o u
g h t h e f i b e r . A s
d i s t a n c e i n c r e a s e s , t h i s l e a d s t o m u l t i m o d e d e l a y d i s t o r t i o n . T h e r e f o r e ,
m u l t i m o d e f i b e r h a s a d i s t a n c e l i m i t a t i o n o n a p p r o x i m a t e l y 2 k m .
S i n g
l e - M o
d e
F i b e r
C l a d d i n g
C o r e
L i g h t P a t h
( i . e . , M o d e )
T h e c o r e d i a m e t e r i n a s i n g l e - m o d e f i b e r i s o n l y l a r g e e n o u g h t o p e r m i t o n e
p a t h ( i . e . , m o d e )
f o r l i g h t t o t r a v e l . T h i s a p p r o a c h e l i m i n a t e s m u l t i m o d e
d e l a y d i s t o r t i o n
, t h u s i n c r e a s i n g t h e m a x i m u m d i s t a n c e s u p p o r t e d .
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 458/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 459/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 460/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 461/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 462/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 463/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 464/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 465/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 466/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 467/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 468/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 469/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 470/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 471/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 472/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 473/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 474/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 475/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 476/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 477/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 478/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 479/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 480/503
462 CCDP-ARCH Quick Reference Sheets
A C i s c o w o r k g r o u p b r i d
g e i s a p p r o p r i a t e f o r a c l u s t e r o f d e v i c e s i n a n a r e a w i t h o u t
n e t w o r k c o n n e c t i v i t y . T h e d e v i c e s c o n n e c t v i a a n E t h e r n e t c a b l e t o t h e w o r k g r o u p
b r i d g e , w h i c h h a s w i r e l e
s s c o n n e c t i v i t y b a c k t o a w i r e l e s s a c
c e s s p o i n t .
Y o u m i g h t h a v e t o d e s i g n c o n n e c t i v i t y b e t w e e n t w o b u i l d i n g s . R a t h e r t h a n s p e c i f y i n g
a l e a s e d l i n e , c o n s i d e r a w i r e l e s s b r i d g e i f t h e r e i s a “ l i n e o f s i g h t ” p a t h b e t w e e n t h e
b u i l d i n g s . A w i r e l e s s b r i d g e a c h i e v e s g r e a t e r d i s t a n c e t h a n i s
p o s s i b l e w i t h s t a n d a r d
8 0 2 . 1 1 b a c c e s s p o i n t s b y a l t e r i n g 8 0 2 . 1 1 t i m i n g c o n s t r a i n t s . D e p e n d i n g o n t h e a n t e n -
n a s u s e d , w i r e l e s s b r i d g e
s h a v e a r a n g e o f u p t o a m i l e .
W
L A N D e s i g n a n d P l a n n i n g
A
s a d e s i g n b e s t p r a c t i c e , t h e m a x i m u
m n u m b e r o f s i m u l t a n e o u s w i r e l e s s
c l i e n t s a s s o -
c i a t e d w i t h a s i n g l e a c c e s s p o i n t s h o u
l d b e i n t h e 1 0 t o 3 0 r a n g e b e c a u s e a l l w i r e l e s s
c l i e n t s a r e u s i n g s h a r e d b a n d w i d t h . Y
o u a l s o w a n t t o t a k e p r e c a u t i o n s f r o m h a v i n g
y o u r a c c e s s p o i n t s e n d a s i g n a l i n t o a n a r e a t h a t s h o u l d n o t r e c e i v e t h e s i g n a l . O b v i -
o u s l y , f o r s e c u r i t y p u r p o s e s , y o u w o u
l d n o t p l a c e a n E t h e r n e t p o r t i n a p a r k i n g l o t ;
h o w e v e r , t h a t i s e s s e n t i a l l y w h a t y o u
a r e d o i n g b y h a v i n g a n a c c e s s p o i n t ’ s s i g n a l
e x t e n d i n t o t h e p a r k i n g l o t .
H
a v i n g m u l t i p l e a c c e s s p o i n t s s e r v i c i n g t h e s a m e a r e a i s a n o p t i o n f o r s u p p o r t i n g a
h i g h e r u s e r d e n s i t y . H o w e v e r , i f m u l t i p l e a c c e s s p o i n t s ’ s i g n a l s o v e r l a p , t h
e a c c e s s
p o i n t s m u s t u s e s e p a r a t e c h a n n e l s . I n
a n I E E E 8 0 2 . 1 1 b e n v i r o n m e n t s p e c
i fi c a l l y , t h e
t h
r e e n o n - o v e r l a p p i n g c h a n n e l s t h a t a r e d e fi n e d f o r u s e i n t h e s a m e a r e a a r e c h a n n e l s
1 , 6 , a n d 1 1 .
O
t h e r W L A N d e s i g n c o n s i d e r a t i o n s i n c l u d e t h e f o l l o w i n g :
• T h e r e q u i r e m e n t s f o r i n l i n e p o w e r , t o p o w e r w i r e l e s s a c c e s s p o i n t s
• O n e o r m o r e V L A N s d e d i c a t e d t
o W L A N t r a f fi c
• U s i n g a s e p a r a t e a d d r e s s s p a c e f o r W L A N c l i e n t s
• S e c u r i n g w i r e l e s s c o m m u n i c a t i o n
s w i t h E A P , W L A N L A N E x t e n s i o n
v i a I P S e c , o r
W L A N S t a t i c W E P .
W o r k g r o u p B r i d g e
W i r e d N e t w o r k
W i r e l e s s A c c e s s
P o i n t ( W A P )
W o r k g r o u p B r i d g e
A
w o r k g r o u p b r i d g e c o n t a i n s a h u b f o r i n t e r c o n n e c t i n g w i r e d
d e v i c e s , a n d a n a n t e n n a f o r i n t e r c o n n e c t i n g w i t h a W A P .
W i r e l e s s B r i d g e
R e m o t e o f f i c e s . l e s s t h a
n o n e m i l e a p a r t a n d w i t h a l i n e - o f - s i t e
p a t h b e t w e e n t h e m , c a n i n t e r c o n n e c t v i a w i r e l e s s b r i d g e s .
O f f i c e A
L e s s t h a n 1 M i l e
W i r e l e s s
B r i d g e
O f f i c e B
W i r e l e s s
B r i d g e
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 481/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 482/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 483/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 484/503
466 CCDP-ARCH Quick Reference Sheets
• C e n t r a l i z e d C a l l P r o c e s s i n g M o d e l
— C o n t a i n s n o m o r e t h a n 1 0 , 0 0 0 p h o n e s p e r c l u s t e r
— C C M c l u s t e r l o c a
t e d a t a c e n t r a l s i t e
— I P p h o n e s l o c a t e d
a t m u l t i p l e s i t e s
— U s e s D S P s f o r M T P , c o n f e r e n c i n g , a n d t r a n s c o d i n g
— L o w e r m a i n t e n a n
c e c o s t s t h a n D i s t r i b u t e d C a l l P r o c e s s i n g M o d e l
— U s e s S u r v i v a b l e R
e m o t e S i t e T e l e p h o n y ( S R S T ) f o r r e
m o t e s i t e r e d u n d a n c y
— U s e s W A N b a n d w
i d t h f o r c a l l s e t u p
— U s e s M G C P o r H
. 3 2 3 a t t h e c e n t r a l l o c a t i o n , a n d H . 3 2 3 a t r e m o t e l o c a t i o n s
• D i s t r i b u t e d C a l l P r o c e s s i n g M o d
e l
— C a n s c a l e t o h u n d r e d s o f s i t e s .
— C o n t a i n s m u l t i p l e s i t e s , e a c h w
i t h t h e i r o w n C C M c l u s t e r .
— C o n t a i n s n o m o r e t h a n 1 0 , 0 0 0 p h o n e s p e r c l u s t e r .
— W A N f a i l u r e d o e s n o t a f f e c t l o
c a l s i t e f u n c t i o n a l i t y .
— U s e s a g a t e k e e p e r t o p r e v e n t W
A N b a n d w i d t h o v e r s u b s c r i p t i o n .
S i n g l e - S i t e C C
M M o d e l
W i t h s i n g l e - s i t e C C M m o d e l , a l l C C M s a n d I P
p h o n e s r e s i d e a t a s i n g l e l o c
a t i o n . T h e P S T N i s
u s e d f o r a l l c a l l s b e t w e e n t h
e c a m p u s a n d t h e
o u t s i d e w o r l d .
C C M C l u s t e r I P
V
P u b l i c S w i t c h e d
T e l e p h o n e
N e t w o r k ( P S T N )
C e n t r a l i z e d C a
l l - P r o c e s s i n g C C M M o d e l
W i t h c e n t r a l i z e d c a l l p r o c e s s i n g , a C C M c l u s t e r i s
l o c a t e d a t a c e n t r a l l o c a t i o n , a n d r e m o t e I P p h o n e s
r e g i s t e r w i t h t h e c e n t r a l i z e d C C
M c l u s t e r o v e r t h e I P
W A N . S R S T a l l o w s I P p h o n e
s a t r e m o t e s i t e s t o
f u n c t i o n i n t h e e v e n t o f a W A N f a i l u r e .
C C M C l u s t e r
C C M C l u s t e
r
R e m o t e O f f i c e A
R e m o t e
O f f i c e B
S R S T
H e a d q u a r t e r s
I P
I P
V S R S T
I P
V
P
u b l i c S w i t c h e d
T e l e p h o n e
N
e t w o r k ( P S T N )
I P W A N
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 485/503
IP Telephony 467
• C l u s t e r i n g o v e r t h e
W A N C a l l P r o c e s s i n g M o d e l
— A c l u s t e r c o m p o s
e d o f C C M s l o c a t e d a t m u l t i p l e s i t e
s .
— R e q u i r e s 9 0 0 k b p
s o f W A N b a n d w i d t h f o r e v e r y 1 0 , 0 0 0 B u s y H o u r C a l l
A t t e m p t s ( B H C A
s ) .
— R e q u i r e s a m a x i m
u m r o u n d - t r i p t i m e ( R T T ) o f 4 0 m s b e t w e e n a n y t w o C C M s
i n t h e c l u s t e r .
T w o a p p r o a c h e s t o c l u s t e r i n g o f t h e W
A N a r e L o c a l F a i l o v e r a n d R e m o t e F a i l o v e r :
• L o c a l F a i l o v e r
— R e q u i r e s C C M s u b s c r i b e r a n d
b a c k u p s e r v e r s t o b e l o c a t e d a t t h e
s a m e s i t e
— A p p r o p r i a t e f o r t w o t o t h r e e s
i t e s w i t h 2 5 0 0 t o 5 0 0 0 p h o n e s p e r s i t e
• R e m o t e F a i l o v e r
— B a c k u p s e r v e r s n o t r e q u i r e d t o
b e c o l o c a t e d w i t h s u b s c r i b e r s
— A p p r o p r i a t e f o r u p t o s i x s i t e s
, w i t h u p t o a t o t a l o f 1 0 , 0 0 0 p h o n e s
I P
T e l e p h o n y I n f r a s t r u c t u r e D e s i g n
A
s k t h e f o l l o w i n g q u e s t i o n s w h e n e v a l u a t i n g a n i n f r a s t r u c t u r e f o r I P t e l e p h o
n y s u p p o r t :
• W h a t f e a t u r e s a r e r e q u i r e d f o r c a m p u s i n f r a s t r u c t u r e d e v i c e s ( f o r e x a m p l e , i n l i n e
p o w e r ) ?
• D o e s t h e e x i s t i n g c a b l e p l a n t r e q
u i r e u p g r a d i n g ( f o r e x a m p l e , u p g r a d i n g C a t 3 t o
C a t 5 ) ?
D
i s t r i b u t e d C a l l - P r o c e s s i n g C C M M o d e l
W i t h d i s t r i b u t e d c a l l p r o c e s s i n g , C C M
c l u s t e r s a r e l o c a t e d a t e a c h l o c a t i o n a n d
c o m m u n i c a t e o v e r t h e I P W A N .
C C M C l u s t e r
C C M C l u s t e r
C C M C l u s t e r
I P
V
I P
V
I P
V
P u b l i c S w i t c h e d
T e l e p h o n e
N e t w o r k ( P S T N )
I P W A N
C l u s t e r i n g o v e r t h e W A N C C M M o d e l
I n t h e c l u s t e r i n g o v e r t h e
W A N C C M
m o d e l , C C M s
a r e l o c a t e d a t a l l l o c a t i o n s ,
a n d t h e y a r e l o g i c a l l y
g r o u p e d i n t h e s a m e C C M
c l u
s t e r .
C C M C l u s t e r
I P
V
I P
V
I P
V
P u b l i c S w i t c h e d
T e l e p h o n e
N e t w
o r k ( P S T N )
I P W A N
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 486/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 487/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 488/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 489/503
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 490/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 491/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 492/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 493/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 494/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 495/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 496/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 497/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 498/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 499/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 500/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 501/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 502/503
Notes
7/25/2019 CCDAand CCDP FlashCard
http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 503/503
Notes