+ All Categories
Home > Documents > CCDAand CCDP FlashCard

CCDAand CCDP FlashCard

Date post: 27-Feb-2018
Category:
Upload: neel
View: 217 times
Download: 0 times
Share this document with a friend
503
7/25/2019 CCDAand CCDP FlashCard http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 1/503 800 East 96th Street Indianapolis, IN 46240 USA Cisco Press CCDA/CCDP Self-Study CCDA/CCDP Flash Cards and Exam Practice Pack Anthony Sequeira Kevin Wallace, CCIE No. 7945
Transcript
Page 1: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 1/503

800 East 96th StreetIndianapolis, IN 46240 USA

Cisco Press

CCDA/CCDP Self-Study

CCDA/CCDP Flash Cardsand Exam Practice Pack

Anthony Sequeira

Kevin Wallace, CCIE No. 7945

Page 2: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 2/503

  ii

CCDA/CCDP Flash Cards and Exam Practice PackAnthony Sequeira

Kevin Wallace

Copyright© 2004 Cisco Systems, Inc.

Published by:Cisco Press800 East 96th StreetIndianapolis, IN 46240 USA

All rights reserved. No part of this book may be reproduced or transmitted in anyform or by any means, electronic or mechanical, including photocopying,recording, or by any information storage and retrieval system, without writtenpermission from the publisher, except for the inclusion of brief quotations in a

review.Printed in the United States of America 1 2 3 4 5 6 7 8 9 0

Library of Congress Cataloging-in-Publication Number: 2003116491

ISBN: 1-58720-117-8

First Printing February 2004

Trademark AcknowledgmentsAll terms mentioned in this book that are known to be trademarks or service

marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc.cannot attest to the accuracy of this information. Use of a term in this bookshould not be regarded as affecting the validity of any trademark or service mark.

Warning and DisclaimerThis book is designed to provide information about the CCDA and CCDPCertification Exams. Every effort has been made to make this book as completeand accurate as possible, but no warranty or fitness is implied.

The information is provided on an “as is” basis. The author, Cisco Press, andCisco Systems, Inc., shall have neither liability nor responsibility to any personor entity with respect to any loss or damages arising from the informationcontained in this book or from the use of the discs or programs that mayaccompany it.

The opinions expressed in this book belong to the author and are not necessarilythose of Cisco Systems, Inc.

Corporate and Government SalesCisco Press offers excellent discounts on this book when ordered in quantity forbulk purchases or special sales.

For more information, please contact: U.S. Corporate and Government Sales1-800-382-3419 [email protected]

For sales outside of the U.S. please contact: International Sales [email protected]

Page 3: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 3/503

iii

Feedback InformationAt Cisco Press, our goal is to create in-depth technical books of the highestquality and value. Each book is crafted with care and precision, undergoing

rigorous development that involves the unique expertise of members from theprofessional technical community.

Readers’ feedback is a natural continuation of this process. If you have anycomments regarding how we could improve the quality of this book, orotherwise alter it to better suit your needs, you can contact us through e-mail [email protected]. Please make sure to include the book title and ISBNin your message.

We greatly appreciate your assistance.

Publisher John WaitEditor-in-Chief John KaneExecutive Editor Brett BartowAcquisitions Editor Michelle GrandinCisco Representative Anthony WolfendenCisco Press Program Manager Nannette M. NobleProduction Manager Patrick KanouseSenior Editor Sheri CainCopy Editor Bridget CollinsTechnical Editors Andy Barkl, Matt Birkner, Jesse J. Herrera

Media Developers Brandon Penticuff, Boson SoftwareTeam Coordinator Tammi BarnettCover Designer Louisa AdairComposition Mark ShirarProofreader Angela Rosio

Page 4: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 4/503

Page 5: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 5/503

v

About the Technical ReviewersAndy Barkl has more than 19 years of experience in the IT field. He is the

owner of MCT & Associates, LLC, a technical training and consultingfirm in Phoenix, Arizona. He enjoys dividing his time between classroom,writing, and consulting on Cisco and Windows deployments. He is alsothe online editor for MCPMag.com, TCPMag.com, CertCities.com, anda contributing author and editor for Cisco Press and Sybex. He hostsseveral monthly exam-preparation chats on MCPMag.com, TCPMag.com,and CertCities.com. Andy holds the following certifications: CCNP,CCDP, CISSP, MCT, MCSE: Security, MCSA: Security, MCSA: Messaging,A+, CTT+, i-Net+, Network+, Security+, Server+, and CNA.

Matthew H. Birkner, CCIE, is a network-consulting engineer who worksfor Cisco Systems in the Network Supported Accounts (NSA) Program.He currently supports and designs enterprise networks. Matt has been anetwork design engineer, network operations center engineer, and technicalsupport specialist. He also holds the CCDP certification, and is a CertifiedNetware Engineer (CNE) and Bay Networks Certified Specialist (BNCS).

 Jesse J. Herrera is a senior systems analyst for a Fortune 100 Companylocated in Houston, Texas. Jesse holds a bachelor of science in computer

science from the University of Arizona and a master of science intelecommunications management from Southern Methodist University.His current Cisco certifications include CCNP and CCDP.

Page 6: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 6/503

  vi

DedicationsAnthony Sequeira:

I would like to dedicate this book to my beautiful daughter, Annabella Joy Sequeira. You are the most incredible gift a man could receive.

Kevin Wallace:

I dedicate this book to my daughters, Sabrina and Stacie, who constantlyremind me of the joy found in learning, and to my wife Vivian for herlove, encouragement, and support along our way to forever together.

Page 7: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 7/503

vii

AcknowledgmentsAnthony Sequeira:

As always, thanks to my wife Joette for her patience and understandingduring my frequent weekend-writing projects!

Thanks to Tom Warrick, Frank Gartland, and all the other incrediblytalented employees of KnowledgeNet. You have had such a profoundeffect on my career—it is amazing!

Thanks also to all the awesome people at Cisco Press—especially BrettBartow and Michelle Grandin.

Kevin Wallace:

Thanks to my family for their inspiration and support. Viv, you are anamazing wife, and I love you with all of my heart. Stacie, I am so proudto be your Dad. Your kind heart and brilliant mind will lead you tosuccess in whatever you do. Sabrina, I’m equally proud to be your Dad.Your infectious laughter, beautiful smile, and love for learning make youan all-around winner. Most of all, I thank my Heavenly Father, whodirects my steps.

Thanks to Tom Warrick, Frank Gartland, and the entire KnowledgeNetteam. You constantly encourage me to be the best I can be.

Another big thanks to my co-author, Anthony Sequeira. You gave me theopportunity to join you in this endeavor, and it has been an honor.Finally, thank you to Michelle Grandin at Cisco Press, who made thework on this book a pleasure.

Page 8: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 8/503

 viii

Table of Contents

Foreword xv

Introduction xvi

Part I: CCDA-DESGN 3

Section 1 Network Design Methodologies 4

Section 2 Evaluating Organizational Policies and Procedures 12

Section 3 Examining Customer Requirements 18

Section 4 Characterizing the Existing Network 30

Section 5 Implementing the Design Methodology 40

Section 6 Network Hierarchies 46

Section 7 Modular Network Designs 56

Section 8 Switching Design Considerations 66

Section 9 Campus Design Details 76

Section 10 Enterprise WAN Solutions 90

Section 11 IP Addressing 104Section 12 Routing Protocols 120

Section 13 Security 142

Section 14 Voice 156

Section 15 Network Management 176

CCDA-DESGN Quick Reference Sheets 190

Network Design Methodologies 190

PDIOO 190

Design Methodology 190

ROI 190

Top-Down Design Approach 190

Bottom-Up Design Approach 190

Decision Tables 190

Evaluating Organizational Policies and Procedures 191

Network Organization Models 191

Network Organizational Architecture Components 191

Organizational Policies 191

Organizational Procedures 191

Examining Customer Requirements 191

Scope 191

Design Data-Gathering Steps 191

Page 9: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 9/503

ix

Characterizing the Existing Network 191

Network Auditing 192

Network Auditing Recommendations 192Manual Network Auditing Tools 192

Automated Network Auditing Tools 192

Network Traffic Analysis 192

Summary Report 192

Implementing the Design Methodology 192

Pilot Versus Prototype 192

Documenting the Design 193

Network Hierarchies 193

Modular Network Designs 193

Enterprise Composite Network Model 193

Switching Design Considerations 195

Shared Versus Switched 195

Network Application Comparison Criteria 195

L2 and L3 Design Considerations 195

Spanning Tree Protocol 195

Campus Design Details 196

80/20 Rule 196

20/80 Rule 196

Multicast 196

QoS 196

Access Layer Considerations 196

Distribution Layer Considerations 197

Core Layer Considerations 197

Single L2 VLAN Core Design 197

Split L2 Core Design 197

L3 Core Design 197

Dual-Path L3 Core Design 197

Server Farm Module 197Edge Distribution Module 197

Enterprise WAN Solutions 197

Traditional WAN Technologies 197

Emerging Technologies 198

Application Drivers for WAN Selection 198

Bandwidth Optimization Techniques 198

Window Size 198

Queuing Services 198

WAN Backup Technologies 198MPLS 199

IP Addressing 199

Address Classes 199

Conversion Table 199

Defining Subnets 199

Page 10: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 10/503

x

Design Questions to Answer 199

Private IPv4 Addresses 199

Network Address Translation 199Route Summarization 199

Fixed Length Subnet Masking 199

Variable Length Subnet Masking 199

Classful Versus Classless Routing Protocols 199

Assigning Addresses 200

Name Resolution 200

IPv6 200

IPv6 Address Formats 200

IPv6 Header 200

IPv6 Address Types 200

IPv6 Routing Protocols 200

IPv6 Address Assignment 200

IPv4 to IPv6 Deployment 200

Routing Protocols 201

Static Versus Dynamic 201

Distance Vector Versus Link-State 201

Interior Versus Exterior 201

Hierarchical Versus Flat 201

ODR Routing 201

RIP v2 202

EIGRP 202

OSPF 202

Integrated IS-IS 202

BGP 202

Security 202

Denial of Service Attacks 202

Reconnaissance Attacks 202

Traffic Attacks 202Network Security Practices 202

Physical Security 202

AAA 202

SAFE Blueprint 203

SAFE Guidelines for Securing the Internet Connectivity Module 203

SAFE Guidelines for Securing the E-Commerce Module 203

SAFE Guidelines for Securing the Remote Access and VPN Module 203

SAFE Guidelines for Securing the WAN Module 203

SAFE Guidelines for Securing the Network Management Module 203SAFE Guidelines for Securing the Server Farm Module 203

Voice 203

PBX 203

PSTN Switch 204

Telephone Infrastructure 204

Page 11: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 11/503

Page 12: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 12/503

xii

Section 6 Quality of Service 308

Section 7 IP Multicasting 324

Section 8 VPNs 344

Section 9 Wireless LANs 366

Section 10 IP Telephony 386

Section 11 Content Networking 408

Section 12 Storage Networking 422

CCDP-ARCH Quick Reference Sheets 436

Network Architectures 436

AVVID 436

Network Deployment Concerns 436

Enterprise Composite Network Model 436

Enterprise Campus Components 436

Enterprise Edge Components 437

Service Provider Edge Components 438

Steps to Campus Design 438

Campus Design: Step 1 438

Campus Design: Step 2 438

Campus Design: Step 3 439

Campus Design: Step 4 440

Campus Design: Step 5 440

Campus Design: Step 6 440

Campus Design: Step 7 441

Server Farm Design 441

The Enterprise Edge 441

Steps to Enterprise Edge Design 441

Enterprise Edge Design: Step 1 441

Enterprise Edge Design: Step 2 441

Enterprise Edge Design: Step 3 442Enterprise Edge Design: Step 4 442

Enterprise Edge Design: Step 5 442

Enterprise Edge Design: Step 6 442

Enterprise Edge Design: Step 7 443

Enterprise Edge Design: Step 8 443

Remote Access and VPN Module 443

Internet Connectivity Module 444

Network Management 444

Network Management Goals 444Policies and Procedures 445

Functions of the Network Management Module 445

CiscoWorks 445

Network Management Infrastructure 446

Network Management Data Collection 447

Sizing Recommendations 447

Page 13: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 13/503

xiii

High Availability 447

High Availability Measurement 447

High Availability Design 447

Fault-Tolerant Campus Design 447Hardware Redundancy 448

Layer 3 Redundancy 448

Spanning Tree Protocol Redundancy 448

Design Considerations for High Availability Networks 449

High Availability Best Practices 449

Server Farm High Availability Design 449

Enterprise Edge High Availability Design 449

Network Security 449

Security Risks 449

Security Policy 449

Security Process 450

Security Keys 450

Security Attacks and Mitigations 450

Firewall Considerations 451

Intrusion Detection System Considerations 451

AAA 451

IPSec 451

Securing Network Components 452

SAFE 452

Quality of Service 452

QoS Design Requirements 452

IntServ and DiffServ 453

Classification and Marking 453

Congestion Avoidance 453

Congestion Management 454

Traffic Conditioning 454

Signaling 454

Link Efficiency Mechanisms 454

QoS Design 455

IP Multicasting 455

Importance of IP Multicast 455

Multicast Forwarding 456

Group Membership/Distribution Trees 456

PIM 457

Control Mechanisms 457

IP Multicast Networks 458

VPNs 458The Need for VPNs 458

VPN Tunneling 458

VPN Security 458

Site-to-Site Designs 459

Challenge of Fragmentation 460

Page 14: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 14/503

xiv

IPSec VPN Modes 460

Remote Access Designs 460

Remote Access Provisioning 461

Remote Access NAT Considerations 461

Split-Tunneling 461

Wireless LANs 461

Need for Wireless Networks 461

802.11 Standards 461

Cisco Wireless Products 461

WLAN Design and Planning 462

WLAN Redundancy 463

Mobility, Multicast, and QoS WLAN Support 463

Designing WLAN Security 463

Small Office WLAN Design 463

Enterprise WLAN Design 463

WLAN Design for SOHO Environments 463

WLAN Design for Enterprise Environments 464

IP Telephony 464

Components of an IP Telephony Network 464

Cisco CallManager Platform 464

CCM Scalability (for CCM Version 3.1) 464

CCM Design Models 464Gateway Selection 464

Transcoding, MTP, and Conferencing 465

Add-On Applications 465

CCM Clusters 465

CCM Design Guidelines 465

IP Telephony Infrastructure Design 467

Management, Availability, Security, and QoS Considerations 468

Content Networking 468

Components of Content Networking 468Content Caching 469

Content Switching 469

Content Routing 469

Content Distribution and Management 469

Services 469

Designing Content Networks 469

Designing Content Networking Solutions 470

Storage Networking 470

Need for Storage Networking 470

Network Storage Models 471

Underlying Technology 471

Storage Network Services 471

Designing Storage Networks 471

Page 15: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 15/503

xv

ForewordCCDA/CCDP Flash Cards and Exam Practice Pack is a late-stagepractice tool that provides you with a variety of proven exam-preparation methods, including physical and electronic flash cards,study- and practice-mode assessment tests, and review-oriented quickreference sheets. Together, these elements help you assess yourknowledge of CCDA and CCDP concepts and focus your practice onthose areas where you need the most help. This book was developed incooperation with the Cisco Internet Learning Solutions Group. CiscoPress books are the only self-study books authorized by Cisco Systemsfor CCDA and CCDP exam preparation.

Cisco and Cisco Press present this material in a text-based format toprovide another learning vehicle for our customers and the broader usercommunity, in general. Although a publication does not duplicate theinstructor-led or e-learning environment, we acknowledge that noteveryone responds to the same delivery mechanism in the same way. It isour intent that presenting this material through a Cisco Press publicationwill enhance the transfer of knowledge to a broad audience ofnetworking professionals.

Cisco Press presents existing and future practice test products throughthese Flash Cards and Exam Practice Packs to help achieve the CiscoInternet Learning Solutions Group principal objectives: to educate theCisco community of networking professionals and to enable thatcommunity to build and maintain reliable, scalable networks. The CiscoCareer Certifications and classes that support these certifications aredirected at meeting these objectives through a disciplined approach toprogressive learning. To succeed on the Cisco Career Certificationsexams and in your daily job as a Cisco certified professional, we

recommend a blended learning solution that combines instructor-led, e-learning, and self-study training with hands-on experience. Cisco Systemshas created an authorized Cisco Learning Partner program to provide youwith the most highly qualified instruction and invaluable hands-onexperience in lab and simulation environments. To learn more about CiscoLearning Partner programs that are available in your area, please visithttp://www.cisco.com/go/authorized/training.

The books Cisco Press creates, in partnership with Cisco Systems, meetthe same standards for content quality that are demanded of the courses

and certifications. We hope that you will find this and subsequent CiscoPress certification and training publications valuable as you build yournetworking knowledge base.

Thomas M. KellyVice President, Internet Learning Solutions GroupCisco Systems, Inc.December 2003

Page 16: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 16/503

xvi

IntroductionSince the Cisco Systems, Inc. career certification programs were

announced in 1998, they have been the most sought-after andprestigious certifications in the networking industry. Achieving one’sCCDA certification demonstrates a fundamental ability to designnetworks based on Cisco products and technologies. The CCDPcertification signifies advanced competency in network design.

Notorious for being some of the most difficult certifications in thenetworking industry, Cisco exams can cause the ill-prepared much stress.Unlike other certification exams, the Cisco exams require that students

truly understand the material rather than simply memorizing answers.This pack is designed to help you assess whether you are prepared to passthe CCDA (DESGN—Designing for Cisco Internetwork Solutions, exam640-861) and/or CCDP (ARCH—Designing Cisco Network Architec-tures, exam 642-871) exams. It contains flash cards that assist inmemorization, quick reference sheets that provide condensed examinformation, and a powerful exam engine to help you determine whetheryou are prepared for the actual exam.

The Purpose of Flash CardsFor years, flash cards have been recognized as a quick and effective studyaid. They have been used to complement classroom training andsignificantly boost memory retention.

The flash cards in this pack serve as a final preparation tool for theCCDA and CCDP exams. Note that content for the BSCI and BCMSNexams are also part of the CCDP certification track; material on theseexams is presented in the CCNP Flash Cards and Exam Practice Pack

(ISBN 1-58720-091-0), which is also available from Cisco Press.Therefore, this publication does not repeat BSCI and BCMSN content.

These flash cards work best when used in conjunction with official studyaids for the CCDA DESGN and CCDP ARCH exams. Table I-1 presentsthe required exams and recommended study for CCDA and CCDPcertification. Note that these cards and quick reference sheets can be usedin conjunction with any other CCDA and CCDP exam preparation bookor course of study. They might also be useful to you as a quick desk orfield reference guide. A composite exam, 642-891, which covers BSCIand BCMSN, can also be taken in place of the individual BSCI andBCMSN exams.

Page 17: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 17/503

xvii

*Note that a valid CCDA certification is required to obtain CCDP certification.

Whom These Flash Cards Are Intended ForThese flash cards are designed for network administrators, networkdesigners, and any professional or student looking to advance his careerby achieving Cisco CCDA and/or CCDP certifications.

How to Use These Flash CardsReview one section at a time, reading each flash card until you cananswer it correctly on your own. When you can correctly answer everycard in a given section, move on to the next section.

These flash cards are a condensed form of study and review. Do not rushthrough each section. The amount of time you spend reviewing the cardsdirectly affects how long you will be able to retain the information

needed to pass the test. Review each section as a final refresher a coupleof days before your exam.

Although these flash cards are designed as a final-stage study aid (30 daysbefore the exam), they can also be used in the following situations:

• Pre-study evaluation—Before charting out your course of study,read one or two questions at the beginning and end of eachsection to gauge your competence in the specific areas.

• Reinforcement of key topics—After you complete your study ofeach area, read through the answer cards (on the left side of thepages) to identify key topics and reinforce concepts.

• Identifying areas for last-minute review—In the days before anexam, review the study cards and carefully note your areas ofweakness. Concentrate your remaining study time on these areas.

Table I-1  Exams and Courses Required to Achieve CCDA/CCDP Certifications

Certification

Exam

Number Name

Course Most Closely Matching

Exam Requirements

CCDA #640-861 CCDAExam

Designing for Cisco InternetworkSolutions (DESGN)

CCDP* #642-801 BSCIExam

Building Scalable CiscoInternetworks (BSCI)

#642-811 BCMSNExam

Building Cisco Multilayer SwitchedNetworks (BCMSN)

#642-871 ARCH

Exam

Designing Cisco Network Service

Architectures (ARCH)

Page 18: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 18/503

xviii

• Post-study quiz—By flipping through this book at random andviewing the questions on the right side of the pages, you can

randomize your self-quiz to ensure that you are prepared in allareas.

• Desk reference or field guide to core concepts (quick referencesheets section only)—Networking professionals, salesrepresentatives, and help-desk technicians alike can benefit froma handy, simple-to-navigate book that outlines the major topicsaligned with networking principles and CCDA and CCDPcertifications.

Quick Reference SheetsAt the conclusion of each part of this book, you can find more than 55total pages of quick reference sheets. These sheets serve as both a studyguide for the CCDA and CCDP exams, and as a companion reference tothe text. For readers who seek CCDA and/or CCDP certifications, thesequick reference sheets are well suited to reinforce the concepts learned inthe text, rather than as a sole source of information. For readers whohave either already obtained CCDA and/or CCDP certification or simplyneed a basic overview, these sheets can serve as a standalone reference. Acomplete set of these sheets can also be printed from the enclosed CD-ROM.

What the CD-ROM IncludesThe CD-ROM includes copies of the 350+ flash cards and quickreference sheets presented in the physical book. It also includes anelectronic version of the flash cards that runs on most Windows andPalm platforms. The CD-ROM allows you to randomize your study byshuffling the flash cards. It also includes a powerful 550-questionpractice test engine that simulates each of the CCDA and CCDP exams.The practice test engine familiarizes you with the format of the examsand reinforces the knowledge you need to pass them.

Page 19: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 19/503

xix

Special FeaturesYou might notice that some flash cards on the CD-ROM provide

pointers to the quick reference sheets included on PDF to provide youwith an additional mode of reviewing. Additional CD-ROM featuresinclude the following:

• Palm OS format, which enables you to study for the CCDA andCCDP exams on your Palm.

• The ability to shuffle the flash cards and the option to reviewcustom sets that focus your study on difficult terms, basicconcepts, or a “final exam.”

Exam RegistrationThe CCDA DESGN and CCDP ARCH exams are computer-based exams,with multiple-choice, fill-in-the-blank, and list-in-order questions. Youcan take the exam at any Pearson VUE (http://www.pearsonvue.com) orPrometric (http://www.2test.com) testing center. Your testing center cantell you the exact length of the exam. Be aware that when you registerfor the exam, you might be told to allow a certain amount of time to take

the exam that is longer than the testing time indicated by the testingsoftware when you begin. This is because VUE and Prometric want youto allow for some time to get settled and take the tutorial about thetesting engine.

Page 20: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 20/503

   P  a

  r   t   I

Page 21: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 21/503

Part I: CCDA-DESGN 3

CCDA-DESGNSection 1

Network Design Methodologies

Section 2

Evaluating Organizational Policies and Procedures

Section 3

Examining Customer Requirements

Section 4

Characterizing the Existing NetworkSection 5

Implementing the Design Methodology

Section 6

Network Hierarchies

Section 7

Modular Network Designs

Section 8Switching Design Considerations

Section 9

Campus Design Details

Section 10

Enterprise WAN Solutions

Section 11

IP Addressing

Section 12

Routing Protocols

Section 13

Security

Section 14

Voice

Section 15

Network Management

CCDA-DESGN Quick Reference Sheets

Page 22: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 22/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 1Network DesignMethodologies

As the importance of networks has increased, so hastheir complexity and the demands placed on networkprofessionals. Network designers are certainly no

exception.When approaching a new design engagement,designers today must have solid and well-designednetwork design methodologies from which to choose.These methodologies not only simplify the task ofdesigning complex networks, but they can alsoimprove the overall end design and ensure that thedesign meets the client organization’s business andorganizational needs.

This section’s flash cards ensure that you are familiarwith the planning, design, implementation, operation,and optimization methodology that you can use toderive a design methodology. They also expose you todecision tables and review the value of these tools whendesigning networks.

Page 23: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 23/503

CCDA-DESGN Section 1: Network Design Methodologies 5

Question

Question

   N  e   t  w  o  r   k

   D  e  s   i  g  n

   M  e   t   h  o   d  o

   l  o  g   i  e  s

   N  e   t  w  o  r   k   D  e  s   i  g  n

   M  e   t   h  o   d  o   l  o  g   i  e  s

1

What does theP 

 stand for in the PDIOO lifecycle?

2

Cisco recommends that a particular design

methodology be used. This methodology

follows and is derived from PDIOO. What is the

first of the design methodology’s eight steps?

Page 24: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 24/503

  6 CCDA-DESGN Section 1: Network Design Methodologies

Question

Question

1 Answer

In the PDIOO life cycle, P stands for planning. D is design; I  isimplementation; O is operation; and O is optimization.

2 Answer

The first step in the design methodology is to identify thecustomer requirements.

Page 25: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 25/503

CCDA-DESGN Section 1: Network Design Methodologies 7

Question

Question

   N  e   t  w  o  r   k

   D  e  s   i  g  n

   M  e   t   h  o   d  o

   l  o  g   i  e  s

   N  e   t  w  o  r   k   D  e  s   i  g  n

   M  e   t   h  o   d  o   l  o  g   i  e  s

3

Cisco recommends that you follow a specificdesign methodology when designing a

network. This methodology consists of eight

steps. What is the last step in this

recommended design methodology?

4

What is an advantage to the use of the top-

down design approach?

Page 26: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 26/503

Page 27: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 27/503

CCDA-DESGN Section 1: Network Design Methodologies 9

Question

Question

   N  e   t  w  o  r   k

   D  e  s   i  g  n

   M  e   t   h  o   d  o

   l  o  g   i  e  s

   N  e   t  w  o  r   k   D  e  s   i  g  n

   M  e   t   h  o   d  o   l  o  g   i  e  s

5

What is the purpose of a decision table?

6

Give a specific example of when a decision table

might prove useful in a design engagement.

Page 28: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 28/503

  10 CCDA-DESGN Section 1: Network Design Methodologies

Question

Question

5 Answer

A decision table allows you to make a systematic decision whenmultiple potential solutions exist for a given problem.

6 Answer

You might use a decision table when deciding on the following:

• Routing protocol

Type of security• Physical topology

• WAN technology

• Switching technology

• Redundancy methods

Page 29: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 29/503

Page 30: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 30/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 2Evaluating OrganizationalPolicies and Procedures

Many network designers forget to analyze theorganizational policies and procedures that help definea business. These factors can often be as critical as

purely technical factors. This section reviews the keyaspects a network designer should be familiar with,including organizational models, policies, andprocedures.

Page 31: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 31/503

CCDA-DESGN Section 2: Evaluating Organizational Policies and Procedures 13

Question

Question

   E  v

  a   l  u  a   t   i  n  g

   O  r  g  a  n   i  z  a   t   i  o  n  a   l

   P  o   l   i  c   i  e  s

   E  v  a   l  u  a   t   i  n  g

   O  r  g  a  n   i  z  a   t   i  o  n  a   l

   P  o   l   i  c   i  e  s

1

Why is a network organizational model basedon vertical integration often less beneficial than

a horizontal integration model?

2

Name at least two of the network

organizational architecture components.

Page 32: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 32/503

  14 CCDA-DESGN Section 2: Evaluating Organizational Policies and Procedures

Question

Question

1 Answer

In an organizational model that is based on vertical integration,almost all of the production comes from within the organization.Based upon the horizontal integration model, modern internet-working leverages partnerships with entities outside theorganization. These partnerships can dramatically increasecompetitive advantage.

2 Answer

The network organizational architectures components include

• Applications

Enabling network solutions• Prerequisite systems

• Network infrastructure including intelligent networkservices (content networking, storage networking, Voiceover IP)

Page 33: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 33/503

CCDA-DESGN Section 2: Evaluating Organizational Policies and Procedures 15

Question

Question

   E  v

  a   l  u  a   t   i  n  g

   O  r  g  a  n   i  z  a   t   i  o  n  a   l

   P  o   l   i  c   i  e  s

   E  v  a   l  u  a   t   i  n  g

   O  r  g  a  n   i  z  a   t   i  o  n  a   l

   P  o   l   i  c   i  e  s

3

Name an organizationally specific policy thatcould dramatically impact network design

decisions.

4

The network that a designer recommends

should help the organization achieve its

business goals. This is accomplished by

adhering to the network’s guidelines, such as

scalability, manageability, and efficiency. Name

at least two additional guidelines.

Page 34: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 34/503

  16 CCDA-DESGN Section 2: Evaluating Organizational Policies and Procedures

Question

Question

3 Answer

Examples of organizationally specific policies that could impactnetwork design decisions include vendor preferences, technologypreferences, and employment policies.

4 Answer

The network should contribute to all of the organizational goalsby adhering to the following:

• Functionality

• Scalability

• Availability

• Performance

• Manageability

• Efficiency

Page 35: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 35/503

Page 36: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 36/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 3Examining CustomerRequirements

Carefully extracting the customer requirements beforeengaging in a network design is critical for a customer.It is important to examine the project’s scope. Is it

going to be an entirely new network? Is the designengagement to simply replace one small portion of thenetwork? Is the goal to add new functionality to thenetwork? For example, perhaps Voice over IPfunctionality is required.

Examination of the organizational goals and thenetwork design goals is also critical. It is important toensure that the design helps the organization meetthese goals. You should not recommend technologies

simply for the sake of recommending newtechnologies.

You should also examine organizational constraints,including such factors as the budget, personnel, andscheduling issues.

Finally, you must carefully examine the organization’stechnical requirements and constraints. Technicalconstraints might include bandwidth availability and

application compatibility.

Page 37: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 37/503

CCDA-DESGN Section 3: Examining Customer Requirements 19

Question

Question

   E  x  a  m   i  n   i  n  g

   C  u  s   t  o  m  e  r

   R  e  q  u   i  r  e  m  e  n   t  s

   E  x  a  m   i  n   i  n  g

   C  u  s   t  o  m  e  r

   R  e  q  u   i  r  e  m  e  n   t  s

1

What is an example of a question that should beasked regarding the scope of a network design?

2

Which of the OSI model layers deals with the

design of routing and addressing issues?

Page 38: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 38/503

  20 CCDA-DESGN Section 3: Examining Customer Requirements

Question

Question

1 Answer

Following are possible questions that should be asked during ascope analysis:

• Is the design for a single network segment?

• Is the design for a single network module?

• Is the design for a subset of the overall network?

• Is the design for the entire network?

• Is the design’s purpose to add a single network function?

• Is the design’s purpose to add entire network functionality?

2 Answer

The Open System Interconnection (OSI) model’s network layerdesigns routing and addressing issues. The OSI model’sapplication layer includes the design of voice over IP, for

example. Physical and data link layer design decisions includefiber versus copper and ATM versus Frame Relay, for example.

Page 39: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 39/503

CCDA-DESGN Section 3: Examining Customer Requirements 21

Question

Question

   E  x  a  m   i  n   i  n  g

   C  u  s   t  o  m  e  r

   R  e  q  u   i  r  e  m  e  n   t  s

   E  x  a  m   i  n   i  n  g

   C  u  s   t  o  m  e  r

   R  e  q  u   i  r  e  m  e  n   t  s

3

After you determine the organizational goalsduring the design engagement, what should

you do next?

4

After you determine the technical goals during

the design engagement, what should you do

next?

Page 40: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 40/503

  22 CCDA-DESGN Section 3: Examining Customer Requirements

Question

Question

3 Answer

After determining the organizational goals, you shoulddetermine the organizational constraints.

4 Answer

After determining the technical goals, you should determine thetechnical constraints.

Page 41: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 41/503

CCDA-DESGN Section 3: Examining Customer Requirements 23

Question

Question

   E  x  a  m   i  n   i  n  g

   C  u  s   t  o  m  e  r

   R  e  q  u   i  r  e  m  e  n   t  s

   E  x  a  m   i  n   i  n  g

   C  u  s   t  o  m  e  r

   R  e  q  u   i  r  e  m  e  n   t  s

5

Provide an example of an organizational goalthat might be discovered during the design

engagement.

6

Provide an example of an organizational

constraint.

Page 42: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 42/503

  24 CCDA-DESGN Section 3: Examining Customer Requirements

Question

Question

5 Answer

The following are examples of organizational goals:• Increase revenue

• Increase profits

• Shorten development cycles

• Increase competitiveness

• Add new customers

Enhance productivity• Improve customer service

• Improve customer satisfaction

• Improve the sharing of data inside and outside of theorganization

6 Answer

The following are examples of organizational constraints:

• Budget

Personnel• Policies

• Scheduling

Page 43: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 43/503

CCDA-DESGN Section 3: Examining Customer Requirements 25

Question

Question

   E  x  a  m   i  n   i  n  g

   C  u  s   t  o  m  e  r

   R  e  q  u   i  r  e  m  e  n   t  s

   E  x  a  m   i  n   i  n  g

   C  u  s   t  o  m  e  r

   R  e  q  u   i  r  e  m  e  n   t  s

7

Provide an example of a planned application ina design engagement.

8

Provide an example of a planned network

service in a design engagement.

Page 44: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 44/503

  26 CCDA-DESGN Section 3: Examining Customer Requirements

Question

Question

7 Answer

Planned applications for an organization might include thefollowing:

• E-mail

• Groupware

• Voice networking

• WWW

• Video on Demand

• Database

8 Answer

Planned network services might include

• Security

Quality of service (QoS)• Network Management

• High Availability (Service Level Offerings)

• IP Multicast

Page 45: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 45/503

CCDA-DESGN Section 3: Examining Customer Requirements 27

Question

Question

   E  x  a  m   i  n   i  n  g

   C  u  s   t  o  m  e  r

   R  e  q  u   i  r  e  m  e  n   t  s

   E  x  a  m   i  n   i  n  g

   C  u  s   t  o  m  e  r

   R  e  q  u   i  r  e  m  e  n   t  s

9

Provide several examples of technical goalsthat an organization might possess.

10

Provide an example of a technical constraint

that might be discovered during a design

engagement.

Page 46: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 46/503

  28 CCDA-DESGN Section 3: Examining Customer Requirements

Question

Question

9 Answer

Following are examples of technical goals that an organizationmight possess:

• Simplify network management

• Improve scalability

• Replace legacy equipment

• Improve availability

• Increase security

• Improve performance

• Improve reliability

10 Answer

The following are examples of technical constraints that mightbe discovered:

• Legacy equipment

• Bandwidth availability

• Application compatibility

• Personnel qualifications

Page 47: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 47/503

Page 48: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 48/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 4Characterizing theExisting Network

Yet another critical task early in the design engagementis for the network designer to carefully analyze andcharacterize the existing network. This is, of course,

provided that there is an existing network!Careful analysis of the existing network culminates inthe creation of a summary report, which includesinformation about the current health of the networkand recommendations for new equipment andtechnologies to meet the organization’s business andtechnical goals.

Page 49: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 49/503

CCDA-DESGN Section 4: Characterizing the Existing Network 31

Question

Question

   C   h  a  r  a  c   t  e  r   i

  z   i  n  g   t   h  e

   E  x   i  s   t   i  n  g   N

  e   t  w  o  r   k

   C   h  a  r  a  c   t  e  r   i  z   i  n  g   t   h  e

   E  x   i  s   t   i  n  g   N  e   t  w  o  r   k

1

Name at least one step in which a designershould engage when characterizing the existing

customer network.

2

List four components a network designer

should collect during the network audit of an

existing network.

Page 50: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 50/503

  32 CCDA-DESGN Section 4: Characterizing the Existing Network

Question

Question

1 Answer

The following are the three general steps a designer shouldengage in when characterizing the existing network:

• Collect customer input

• Perform a network audit

• Perform traffic analysis

2 Answer

The network audit of the existing network might include thefollowing components:

• Detailed list of devices in the network

• Hardware specifications of devices in the network

• Software specifications of devices in the network

• Device configurations

• Output from various auditing tools

• Expandability information for devices

• Utilization statistics for devices

Page 51: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 51/503

CCDA-DESGN Section 4: Characterizing the Existing Network 33

Question

Question

   C   h  a  r  a  c   t  e  r   i

  z   i  n  g   t   h  e

   E  x   i  s   t   i  n  g   N

  e   t  w  o  r   k

   C   h  a  r  a  c   t  e  r   i  z   i  n  g   t   h  e

   E  x   i  s   t   i  n  g   N  e   t  w  o  r   k

3

Name at least one network auditingrecommendation.

4

You are interested in using a Cisco network-

auditing tool that can provide topology

information and details about hardware and

software configurations in an automated

fashion. What tool should you use?

Page 52: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 52/503

  34 CCDA-DESGN Section 4: Characterizing the Existing Network

Question

Question

3 Answer

Network auditing recommendations include• Leverage existing auditing tools, if such tools exist.

• Introduce additional tools as needed.

• Minor changes to the network might be necessary forcollecting the required data; when complete, log thesechanges and reverse.

• Automated auditing approaches should be employed in

large networks.• Create summary reports based on detailed information.

4 Answer

CiscoWorks provides dynamic topology information for Ciscodevices through use of the Campus Manager application.Campus Manager can work in conjunction with Resource

Manager Essentials, which provides details about hardware andsoftware configurations.

Page 53: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 53/503

CCDA-DESGN Section 4: Characterizing the Existing Network 35

Question

Question

   C   h  a  r  a  c   t  e  r   i

  z   i  n  g   t   h  e

   E  x   i  s   t   i  n  g   N

  e   t  w  o  r   k

   C   h  a  r  a  c   t  e  r   i  z   i  n  g   t   h  e

   E  x   i  s   t   i  n  g   N  e   t  w  o  r   k

5

You are performing a manual network audit ofan existing customer network. What command

should you use on a Cisco router to determine

the exact version of IOS that is in place and the

hardware modules that are installed?

6

You are performing a manual network audit of

an existing customer network. What command

should you use on a Cisco router to determine

the extent of CPU utilization?

Page 54: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 54/503

  36 CCDA-DESGN Section 4: Characterizing the Existing Network

Question

Question

5 Answer

You should use the show version command to determine theexact version of software and the network modules in use. Theshow version command also provides the amount of uptime forthe device.

6 Answer

You should use the show processes cpu command to gainvaluable information about device CPU utilization. To increasethe effectiveness of this command, consider examining the

output over a period of samples. Also, to view non-zeroprocesses, use show processes cpu | exclude 0.0.

Page 55: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 55/503

CCDA-DESGN Section 4: Characterizing the Existing Network 37

Question

Question

   C   h  a  r  a  c   t  e  r   i

  z   i  n  g   t   h  e

   E  x   i  s   t   i  n  g   N

  e   t  w  o  r   k

   C   h  a  r  a  c   t  e  r   i  z   i  n  g   t   h  e

   E  x   i  s   t   i  n  g   N  e   t  w  o  r   k

7

You are engaged in a manual analysis ofnetwork traffic in an existing customer

network. You would like to rely on IOS-based

tools and, specifically, you would like to display

statistics for all interfaces that are broken down

by protocol and an average 30-second bit rate.

What tool should you use?

8

Based on a characterization of the existing

customer network, name at least two

components that should be included in the

summary report.

Page 56: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 56/503

  38 CCDA-DESGN Section 4: Characterizing the Existing Network

Question

Question

7 Answer

Thanks to the NBAR Protocol Discovery feature, the Cisco IOSNBAR tool provides such statistics.

8 Answer

The summary report document should summarize the results ofcharacterizing the existing network. It should do the following:

• Describe the required software features

• Describe possible problems

• Identify actions needed to modify the network

• Influence the customer in terms of requirements and changes

Page 57: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 57/503

Page 58: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 58/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 5Implementing the DesignMethodology

It is important to follow a structured approach whenyou are ready to implement the design you haveworked so hard on. If the design is very complex,

consisting of many steps, you should implement thesteps separately and carefully. There should also bedetailed implementation documentation.

You should consider a pilot or prototype to prove thatyour design works. You should also possess a detaileddesign document.

Page 59: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 59/503

CCDA-DESGN Section 5: Implementing the Design Methodology 41

Question

Question

   I  m  p   l  e  m  e  n   t   i  n  g   t   h  e

   D  e  s   i  g  n

   M  e   t   h  o   d  o   l  o  g  y

   I  m  p   l  e  m  e  n   t   i  n  g   t   h  e

   D  e  s   i  g  n

   M  e   t   h  o   d  o   l  o  g  y

1

Why is it beneficial to implement each step ofthe design separately if the steps are complex?

2

A network design implementation should

consist of several phases, each of which should

consist of separate steps. Name at least two

components that each step should contain.

Page 60: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 60/503

  42 CCDA-DESGN Section 5: Implementing the Design Methodology

Question

Question

1 Answer

It is beneficial to implement each complex step of the designseparately for two main reasons:

• To reduce troubleshooting in the event of failures

• To reduce the time to roll-back in the result of failure

2 Answer

Each step should contain the following elements:

• Description

Reference to appropriate design documents• Detailed implementation guidelines

• Detailed roll-back guidelines

• Estimated time required for implementation

Page 61: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 61/503

CCDA-DESGN Section 5: Implementing the Design Methodology 43

Question

Question

   I  m  p   l  e  m  e  n   t   i  n  g   t   h  e

   D  e  s   i  g  n

   M  e   t   h  o   d  o   l  o  g  y

   I  m  p   l  e  m  e  n   t   i  n  g   t   h  e

   D  e  s   i  g  n

   M  e   t   h  o   d  o   l  o  g  y

3

You are interested in proving your designconcept to the customer of your design

engagement. You plan on testing and verifying

the redesign in an isolated network at your

facility. What is this type of proof of concept

called?

4

Name at least four components you should

include in the final design document.

Page 62: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 62/503

  44 CCDA-DESGN Section 5: Implementing the Design Methodology

Question

Question

3 Answer

When you test and verify a redesign in an isolated network, youare engaging in what is called a prototype network.

A pilot network tests and verifies the design before it is launched.

4 Answer

The final design document should include the followingcomponents:

• Description

• Reference to appropriate design documents

• Detailed implementation guidelines

• Detailed roll-back guidelines

• Estimated time required for implementation

Page 63: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 63/503

Page 64: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 64/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 6Network Hierarchies

Today’s networks are complex and sophisticated. Toproperly design modern networks, designers cansimplify the process by using network models. Ciscoproposed an early model—the network hierarchicalmodel—that is still used today. This model allows for a

simplification of complex networks and more efficientdesign engagements.

Page 65: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 65/503

CCDA-DESGN Section 6: Network Hierarchies 47

Question

Question

   N  e   t  w  o  r   k

   H   i  e  r  a  r  c   h   i  e  s

   N  e   t  w  o  r   k

   H   i  e  r  a  r  c   h   i  e  s

1

What are the three layers of the Ciscohierarchical network model?

2

Which layer of the Cisco hierarchical network

model features speed as its biggest focus?

Page 66: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 66/503

  48 CCDA-DESGN Section 6: Network Hierarchies

Question

Question

1 Answer

This Cisco hierarchical network model consists of three layers,which include the following:

• Access layer

• Distribution layer

• Core layer

2 Answer

The core layer is most concerned with speed. In fact, security andother such measures are typically not employed in this layer toensure that packets move as quickly as possible.

Page 67: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 67/503

CCDA-DESGN Section 6: Network Hierarchies 49

Question

Question

   N  e   t  w  o  r   k

   H   i  e  r  a  r  c   h   i  e  s

   N  e   t  w  o  r   k

   H   i  e  r  a  r  c   h   i  e  s

3

Which layer of the Cisco hierarchical networkmodel is most likely to feature QoS controls?

4

Redundancy is most important at which layer of

the Cisco hierarchical network model?

Page 68: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 68/503

  50 CCDA-DESGN Section 6: Network Hierarchies

Question

Question

3 Answer

The distribution layer most often features QoS measures. Thisensures that certain types of traffic take precedence over othertypes of traffic.

4 Answer

Redundancy is critical at the core layer of the Cisco hierarchicalnetwork model. This ensures that failures do not have a majorimpact on network connectivity. While this is the correct

certification response, remember that redundancy can be criticalat all layers of the model—especially the distribution layer.

Page 69: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 69/503

CCDA-DESGN Section 6: Network Hierarchies 51

Question

Question

   N  e   t  w  o  r   k

   H   i  e  r  a  r  c   h   i  e  s

   N  e   t  w  o  r   k

   H   i  e  r  a  r  c   h   i  e  s

5

At which layer of the Cisco hierarchical networkmodel are you most likely to find authentication

to take place?

6

Which layer of the Cisco hierarchical network

model is most likely to feature Layer 2

switching?

Page 70: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 70/503

  52 CCDA-DESGN Section 6: Network Hierarchies

Question

Question

5 Answer

The access layer frequently features authentication to ensure thatnetwork users are actually permitted to use the network. Whilethis is the optimal certification response, understand thatauthentication also takes place in the distribution layer,especially in the case of VPNs.

6 Answer

The access layer of the Cisco network hierarchical model mostoften features Layer 2 switching. These low-cost switchesprovide full duplex network access to clients.

Page 71: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 71/503

CCDA-DESGN Section 6: Network Hierarchies 53

Question

   N  e   t  w  o  r   k

   H   i  e  r  a  r  c   h   i  e  s

7

Which layer of the Cisco hierarchical networkmodel is most likely to feature Layer 3

switching?

Page 72: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 72/503

  54 CCDA-DESGN Section 6: Network Hierarchies

Question

Question

7 Answer

The distribution layer of the Cisco hierarchical network modeloften features Layer 3 switching. This permits packets to berouted to other areas of the network or beyond.

Page 73: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 73/503

Page 74: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 74/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 7Modular Network Designs

The Cisco hierarchical network model is a powerfultool for network designers. However, as networks havegrown more complex and sophisticated, the model hashad its problems. Specifically, network designers whorely solely on this model find it too difficult to scale

networks based on the simple blueprint of access,distribution, and core.

Cisco has created a much more elaborate and modularnetwork design model to assist the modern Cisconetwork designer. It is called the Enterprise CompositeNetwork Model and it does not abandon the earlierhierarchical network model. The earlier hierarchicalnetwork model integrates nicely into the new model’snetwork, as needed.

Page 75: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 75/503

CCDA-DESGN Section 7: Modular Network Designs 57

Question

Question

   M  o   d  u   l  a  r   N

  e   t  w  o  r   k

   D  e  s   i  g

  n  s

   M  o   d  u   l  a  r   N  e   t  w  o  r   k

   D  e  s   i  g  n  s

1

What are the Enterprise Composite NetworkModel’s three main functional areas?

2

What are the four major modules that make up

the Enterprise Campus major functional area of

the Enterprise Composite Network Model?

Page 76: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 76/503

  58 CCDA-DESGN Section 7: Modular Network Designs

Question

Question

1 Answer

The three main functional areas of the Enterprise CompositeNetwork Model are

• Enterprise Campus

• Enterprise Edge

• Service Provider Edge

2 Answer

The Enterprise Campus major functional area consists of thefollowing modules:

• Campus infrastructure

• Network management

• Server farm

• Edge distribution

Page 77: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 77/503

CCDA-DESGN Section 7: Modular Network Designs 59

Question

Question

   M  o   d  u   l  a  r   N

  e   t  w  o  r   k

   D  e  s   i  g

  n  s

   M  o   d  u   l  a  r   N  e   t  w  o  r   k

   D  e  s   i  g  n  s

3

What are the three submodules of the CampusInfrastructure module of the Enterprise

Composite Network Model?

4

The Network Management module is a module

of the Enterprise Campus major functional area.

Name at least three functions that this module

performs.

Page 78: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 78/503

  60 CCDA-DESGN Section 7: Modular Network Designs

Question

Question

3 Answer

The Enterprise Composite Network Model’s CampusInfrastructure module consists of the following threesubmodules:

• Building access

• Building distribution

• Campus backbone

4 Answer

The Network Management module can perform the followingfunctions for an organization:

• Intrusion detection

• System logging

• Authentication

• Network monitoring

• Configuration management

• Terminal services (remote control)

Page 79: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 79/503

CCDA-DESGN Section 7: Modular Network Designs 61

Question

Question

   M  o   d  u   l  a  r   N

  e   t  w  o  r   k

   D  e  s   i  g

  n  s

   M  o   d  u   l  a  r   N  e   t  w  o  r   k

   D  e  s   i  g  n  s

5

Name at least three examples of servers thatmight be found in the Enterprise Campus major

functional area’s server farm module.

6

What is the purpose of the Enterprise Campus

major functional area’s Edge Distribution

module?

Page 80: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 80/503

  62 CCDA-DESGN Section 7: Modular Network Designs

Question

Question

5 Answer

Many types of servers can exist in the Server Farm module of theEnterprise Campus major functional area. Some of these serversinclude the following:

• E-mail

• Application

• File and Print

• DNS

• Database

• IP telephony

6 Answer

The Edge Distribution module of the Enterprise Campus majorfunctional area aggregates the connectivity from the EnterpriseEdge and routes the traffic into the campus backbone

submodule.

Page 81: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 81/503

CCDA-DESGN Section 7: Modular Network Designs 63

Question

Question

   M  o   d  u   l  a  r   N

  e   t  w  o  r   k

   D  e  s   i  g

  n  s

   M  o   d  u   l  a  r   N  e   t  w  o  r   k

   D  e  s   i  g  n  s

7

What are the four modules that comprise theEnterprise Edge functional area of the

Enterprise Composite Network module?

8

What three modules are commonly found in the

Service Provider Edge functional area?

Page 82: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 82/503

  64 CCDA-DESGN Section 7: Modular Network Designs

Question

Question

7 Answer

The four modules that comprise the Enterprise Edge functionalarea of the Enterprise Composite Network module are

• E-commerce

• Internet connectivity

• Remote access and VPN

• WAN

8 Answer

Three modules that are commonly found in the Service ProviderEdge functional area are

• Internet service provider

• PSTN (Public Switched Telephone Network)

• Frame Relay/Asynchronous Transfer Mode (ATM)

Page 83: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 83/503

Page 84: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 84/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 8Switching DesignConsiderations

After you design the perfect modular network, you arenot finished making important decisions—and thesedecisions are in the campus module alone. You must

decide on the appropriate physical layerimplementation and other such considerations.

This section reminds you of key factors you shouldconsider when designing the campus module.

Page 85: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 85/503

CCDA-DESGN Section 8: Switching Design Considerations 67

Question

Question

   S  w   i   t  c

   h   i  n  g   D  e  s   i  g  n

   C  o  n  s   i   d  e  r  a   t   i  o  n  s

   S  w   i   t  c   h   i  n  g   D  e  s   i  g  n

   C  o  n  s   i   d  e  r  a   t   i  o  n  s

1

Name at least three major campus designdecisions that are typical for a design

engagement.

2

Which is more expensive to install and

implement as a physical layer transmission

medium: copper or fiber?

Page 86: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 86/503

  68 CCDA-DESGN Section 8: Switching Design Considerations

Question

Question

1 Answer

You must meet several major decision areas when designing scalableand efficient campus networks. These design considerations might

include the following:

• Geography

• Applications

• Transmission media

• Switched or shared

• L2 or L3 switching

2 Answer

Fiber is more expensive to implement than copper. This isprimarily because strict optical cable coupling requirementsmust be met.

Page 87: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 87/503

CCDA-DESGN Section 8: Switching Design Considerations 69

Question

Question

   S  w   i   t  c

   h   i  n  g   D  e  s   i  g  n

   C  o  n  s   i   d  e  r  a   t   i  o  n  s

   S  w   i   t  c   h   i  n  g   D  e  s   i  g  n

   C  o  n  s   i   d  e  r  a   t   i  o  n  s

3

What is long reach Ethernet, and upon whatphysical medium does it rely?

4

If you should opt for a switched design (as

opposed to a shared design) in your campus

network, you achieve the benefit of larger

network diameters. Why?

Page 88: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 88/503

  70 CCDA-DESGN Section 8: Switching Design Considerations

Question

Question

3 Answer

Long Reach Ethernet (LRE) relies upon copper media. As itsname implies, it permits longer distances than traditionalEthernet. Specifically, it permits runs of up to 1.5 km. It istypically used as a distribution technology for broadbandbuilding access.

4 Answer

Larger network diameters are possible with switched designsbecause no collision detection algorithm is necessary.

Page 89: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 89/503

CCDA-DESGN Section 8: Switching Design Considerations 71

Question

Question

   S  w   i   t  c

   h   i  n  g   D  e  s   i  g  n

   C  o  n  s   i   d  e  r  a   t   i  o  n  s

   S  w   i   t  c   h   i  n  g   D  e  s   i  g  n

   C  o  n  s   i   d  e  r  a   t   i  o  n  s

5

You are interested in performing load sharing inyour campus network design. You are

specifically interested in engaging in IP load

sharing between specific ports based on IP

addresses. Should you engage in Layer 2 or

Layer 3 switching?

6

You are considering recommending the use of

PortFast in a campus network design. Where is

this Spanning Tree protocol enhancement

typically implemented? Why?

Page 90: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 90/503

  72 CCDA-DESGN Section 8: Switching Design Considerations

Question

Question

5 Answer

L3 switching permits load sharing based on IP addresses. Anyports can be used to implement this sharing behavior. L2switching permits limited load sharing based on VLANs acrossuplink ports only.

6 Answer

PortFast allows for a much faster transition from the blockingstate to the forwarding state for a switch port. Because PortFastshould be used to connect end systems to the network, it is

typically implemented in the campus network’s wiring closet (theaccess layer).

Page 91: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 91/503

CCDA-DESGN Section 8: Switching Design Considerations 73

Question

Question

   S  w   i   t  c

   h   i  n  g   D  e  s   i  g  n

   C  o  n  s   i   d  e  r  a   t   i  o  n  s

   S  w   i   t  c   h   i  n  g   D  e  s   i  g  n

   C  o  n  s   i   d  e  r  a   t   i  o  n  s

7

You are recommending the use of UplinkFast ina campus network design. Where is this

Spanning Tree protocol enhancement typically

implemented?

8

Where would you implement BackboneFast in a

campus design?

Page 92: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 92/503

  74 CCDA-DESGN Section 8: Switching Design Considerations

Question

Question

7 Answer

UplinkFast is a wiring closet switch (access layer) technologythat permits the quick failover to an alternate uplink when adirect link failure is detected.

8 Answer

BackboneFast allows for a faster convergence following thefailure of a remote link in the topology. BackboneFast must beimplemented on all switches in the campus.

Page 93: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 93/503

Page 94: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 94/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 9Campus Design Details

What specific considerations must you manage ascampus network designer? This section ensures thatyou know these and tests your knowledge of campusmodule by campus module, from the access layer to theserver farm.

Page 95: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 95/503

CCDA-DESGN Section 9: Campus Design Details 77

Question

Question

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

1

You are going to engage in a detailed design ofthe campus network for a business client. In

which campus modules would performance be

the biggest concern?

2

You are going to engage in a detailed design of

the campus network for a business client. In

which module of the campus would scalability

be the biggest concern?

Page 96: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 96/503

  78 CCDA-DESGN Section 9: Campus Design Details

Question

Question

1 Answer

Performance is the greatest concern in the server farm module or thebackbone (core) module.

2 Answer

Scalability is a large concern for the access module of the campus

network. This module must be able to easily grow to support

additional users who might require network connectivity.

Page 97: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 97/503

CCDA-DESGN Section 9: Campus Design Details 79

Question

Question

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

3

What is the 80/20 rule of network trafficpatterns?

4

What is the technology described by the

following statement:

This is a Cisco proprietary solutionimplemented in some Cisco switches that

permits the switch to learn multicast receiver

registration information from Cisco routers.

Page 98: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 98/503

  80 CCDA-DESGN Section 9: Campus Design Details

Question

Question

3 Answer

The 80/20 rule of network traffic flows states that 80 percent of thetraffic remains within the local workgroup. Only 20 percent is

destined for remote systems. This is now considered a legacy design

because modern networks feature much more remote resources. The

modern traffic pattern follows a 20/80 rule.

4 Answer

This is a description of the Cisco Group Management Protocol

(CGMP).

Page 99: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 99/503

CCDA-DESGN Section 9: Campus Design Details 81

Question

Question

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

5

You are interested in controlling traffic flows inyour Enterprise WAN, which consists of Frame

Relay connections between several campus

segments. You want to drop or lower the

priority of a frame that resides outside of a

traffic profile that you define. Is this a description

of traffic shaping or traffic policing?

6

Name at least two major considerations a

network designer should have when designing

the access layer of a campus network.

Page 100: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 100/503

  82 CCDA-DESGN Section 9: Campus Design Details

Question

Question

5 Answer

Traffic policing drops or lowers the priority of frames that fall outsidethe policy that you define. You should contrast this with traffic

shaping that controls transmission rates through the buffering of

traffic.

6 Answer

The designer should have the following considerations:

• Number of ports required

Physical layer cabling• Performance required

• Redundancy required

• Speeds required

• VLANs and STP configuration

• Additional features (QoS, multicast, etc.)

Page 101: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 101/503

CCDA-DESGN Section 9: Campus Design Details 83

Question

Question

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

7

Name at least two major considerations anetwork designer should have when designing

a campus network’s distribution layer.

8

Name at least two major considerations a

network designer should have when designing

a campus network’s core layer.

Page 102: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 102/503

  84 CCDA-DESGN Section 9: Campus Design Details

Question

Question

7 Answer

The following considerations should be the focus of the distributionlayer module:

• L2 or L3 switching

• Performance required

• Number of ports required

• Redundancy required

• Additional features

• Manageability required

8 Answer

The following considerations should be the focus of the core layer

module:

• L2 or L3 switching

• Performance required

• Number of ports required

• Redundancy required

Page 103: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 103/503

CCDA-DESGN Section 9: Campus Design Details 85

Question

Question

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

9

Name at least two options for connectingservers to the network in a server farm campus

module design.

10

Name at least two types of attacks a designer

should consider when designing the Edge

Distribution module.

Page 104: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 104/503

  86 CCDA-DESGN Section 9: Campus Design Details

Question

Question

9 Answer

Servers can connect to the network in several ways, including thefollowing:

• Single NIC

• Dual NIC

• Server load-balancing switch

10 Answer

Designers must be aware of the following types of attacks:

• Unauthorized access

IP spoofing• Network reconnaissance

• Packet sniffers

Page 105: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 105/503

CCDA-DESGN Section 9: Campus Design Details 87

Question

Question

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

   C  a  m  p  u  s   D  e  s   i  g  n

   D  e   t  a   i   l  s

11

Name a disadvantage found with the single L2VLAN core design.

12

Name at least one advantage of the dual-path

L3 core design.

Page 106: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 106/503

  88 CCDA-DESGN Section 9: Campus Design Details

Question

Question

11 Answer

Disadvantages to the single L2 VLAN core design include thefollowing:

• No broadcast/multicast controls

• L3 peering issues in the distribution layer

12 Answer

Advantages to this design model include the following:

• Two equal-cost paths to every network destination

Quick recovery from link failures• Double link capacity

Page 107: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 107/503

Page 108: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 108/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 10Enterprise WAN Solutions

Today, organizations can implement a variety of WANsolutions. WAN components are a key part of thedesign because they represent a huge portion of theexpense of designing and continuously running anetwork.

This section ensures that you are knowledgeable abouttraditional WAN design options and new and emergingtechnologies.

Page 109: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 109/503

CCDA-DESGN Section 10: Enterprise WAN Solutions 91

Question

Question

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

1

ISDN falls into which category of traditionalWAN technologies?

2

Which emerging WAN technology offers high-

speed data transfers for the SOHO WAN site

using traditional telephone copper lines?

Page 110: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 110/503

  92 CCDA-DESGN Section 10: Enterprise WAN Solutions

Question

Question

1 Answer

ISDN and asynchronous serial dialup connections are perfectexamples of circuit-switched traditional WAN technologies.

2 Answer

Digital subscriber line (DSL) permits high-speed transfers for SOHO

WAN sites. Typically, upload speeds do not equal download speeds,

however. This is true for the most common form of small business,

residential installations of a technology called Asynchronous DSL(ADSL).

Page 111: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 111/503

CCDA-DESGN Section 10: Enterprise WAN Solutions 93

Question

Question

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

3

Describe the concept known as jitter.

4

Which WAN technology is noted for trans-

mission speeds of 15 Mbps?

Page 112: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 112/503

  94 CCDA-DESGN Section 10: Enterprise WAN Solutions

Question

Question

3 Answer

 Jitter is variable delay that the network experiences. This can bedamaging for clear voice transmissions. Voice calls are intolerantof variations in the delay within the network.

4 Answer

Long Reach Ethernet dramatically expands the maximum cable runs

that can be used for transmissions and features a transmission speed

of 15 Mbps.

Page 113: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 113/503

CCDA-DESGN Section 10: Enterprise WAN Solutions 95

Question

Question

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

5

Which queuing mechanism supported on Ciscorouters features 16 interface output queues and

guarantees some level of service to all traffic?

6

Name at least two issues that occur when a full

mesh Frame Relay topology is chosen.

Page 114: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 114/503

  96 CCDA-DESGN Section 10: Enterprise WAN Solutions

Question

Question

5 Answer

Custom queuing uses 16 interface output queues. This method ofsoftware queuing provides some level of service to all traffic and is

therefore often considered better than priority queuing, which can

starve some types of traffic.

6 Answer

Full mesh Frame Relay topologies do have advantages, but they also

have disadvantages, including the following:

• The large number of virtual circuits can be quite expensive.

• Several packets might have to be replicated in the topology.

• Configurations can be quite complex.

Page 115: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 115/503

CCDA-DESGN Section 10: Enterprise WAN Solutions 97

Question

Question

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

7

Describe a shadow PVC as it is used for WANbackup.

8

What is the main difference between ADSL and

SDSL?

Page 116: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 116/503

  98 CCDA-DESGN Section 10: Enterprise WAN Solutions

Question

Question

7 Answer

A shadow PVC is a secondary permanent virtual circuit that isimplemented from the provider to backup a primary WAN

connection. Typically, there is no charge for this second PVC. Often,

a charge for the second link is levied should usage exceed a certain

threshold.

8 Answer

ADSL often features dramatic differences in transmission speeds

upstream and downstream. SDSL features identical speeds upstream

and downstream.

Page 117: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 117/503

CCDA-DESGN Section 10: Enterprise WAN Solutions 99

Question

Question

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

9

Name two of the three different typical wirelessimplementations.

10

What are the two main methods of tunneling

private networks over the public Internet.

Page 118: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 118/503

 100 CCDA-DESGN Section 10: Enterprise WAN Solutions

Question

Question

9 Answer

Typical implementations of wireless technologies include thefollowing:

• Broadband fixed wireless

• Mobile wireless

• Wireless LAN

10 Answer

The two main methods are

• IPSec

GRE

Page 119: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 119/503

CCDA-DESGN Section 10: Enterprise WAN Solutions 101

Question

   E  n   t  e  r  p  r   i  s  e   W   A   N

   S  o   l  u   t   i  o  n  s

11

Describe MPLS.

Page 120: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 120/503

 102 CCDA-DESGN Section 10: Enterprise WAN Solutions

Question

Question

11 Answer

With MPLS, packets are labeled for quick and efficientforwarding through an MPLS network.

Page 121: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 121/503

Page 122: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 122/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 11IP Addressing

A large part of designing a TCP/IP based networkproperly involves ensuring that TCP/IP addressing isdone correctly. This not only includes planning the IPaddresses carefully, but also deciding how theaddresses are to actually be implemented on the

equipment.

The CCDA candidate must also have a firm grasp ofIPv6, since more and more networks are supportingthis next generation IP addressing technology. Thissection reviews these issues—including key pointsregarding IPv6.

Page 123: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 123/503

CCDA-DESGN Section 11: IP Addressing 105

Question

Question

   I   P   A

   d   d  r  e  s  s   i  n  g

   I   P   A   d   d  r  e  s  s   i  n  g

1

Provide an example of a flat address that is usedin modern computer networking.

2

What is the meaning of the following

statement:

IP addresses are hierarchical.

Page 124: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 124/503

 106 CCDA-DESGN Section 11: IP Addressing

Question

Question

1 Answer

A Media Access Control (MAC) address is an example of a flataddress that is used in modern computer networks. MAC addresses

are used for Layer 2 addressing in Ethernet networks. These address

uniquely identify a system on the network.

2 Answer

This means that IP addresses are composed of multiple parts, each

having a specific meaning. IP addresses are composed of a network

portion and a host portion.

Page 125: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 125/503

CCDA-DESGN Section 11: IP Addressing 107

Question

Question

   I   P   A

   d   d  r  e  s  s   i  n  g

   I   P   A   d   d  r  e  s  s   i  n  g

3

How many bits does an IP address contain, andhow is it typically presented?

4

The following IP address and subnet mask are

used on a workstation in a subnet of the

network.

IP Address: 172.16.2.100

Subnet Mast: 255.255.255.240

How many total host addresses are available in

the subnet?

Page 126: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 126/503

 108 CCDA-DESGN Section 11: IP Addressing

Question

Question

3 Answer

An IP address consists of 32 bits. It is typically presented in dotteddecimal form. For example: 10.24.65.128.

4 Answer

Given the subnet mask of 255.255.255.240, 28 bits are used for the

network identification. This leaves four bits for host addressing. 2

raised to the 4th power is 16, minus 2 equals 14. Therefore, there are

14 total available host addresses in the subnet.

Page 127: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 127/503

CCDA-DESGN Section 11: IP Addressing 109

Question

Question

   I   P   A

   d   d  r  e  s  s   i  n  g

   I   P   A   d   d  r  e  s  s   i  n  g

5

What is the range of possible values in the firstoctet for a Class B IP address?

6

List at least two questions that should be asked

before designing a network’s IP addressing.

Page 128: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 128/503

 110 CCDA-DESGN Section 11: IP Addressing

Question

Question

5 Answer

128–191Class A—first octet starts with 0; 0 to 127

Class B—first octet starts with 10; 128–191

Class C—first octet starts with 110; 192–233

Class D—first octet starts with 1110; 224–239

Class E—first octet starts with 1111; 240–255

6 Answer

It is important to ask all the following questions:

• How large is the network?

How many locations exist?• What are the IP addressing requirements for locations?

• What class and how many networks can be obtained fromthe public number authority?

Page 129: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 129/503

CCDA-DESGN Section 11: IP Addressing 111

Question

Question

   I   P   A

   d   d  r  e  s  s   i  n  g

   I   P   A   d   d  r  e  s  s   i  n  g

7

Name at least two private address ranges.

8

What technology allows multiple internal

addresses to be converted at a router into

addresses that are usable on the public

Internet?

Page 130: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 130/503

 112 CCDA-DESGN Section 11: IP Addressing

Question

Question

7 Answer

The private IP address ranges are• 10.0.0.0/8

• 172.16.0.0/12

• 192.168.0.0/16

8 Answer

Network Address Translation allows internal network addresses to be

translated into global Internet addresses. Port address translation

allows multiple internal addresses to be mapped to a single external

address.

Page 131: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 131/503

CCDA-DESGN Section 11: IP Addressing 113

Question

Question

   I   P   A

   d   d  r  e  s  s   i  n  g

   I   P   A   d   d  r  e  s  s   i  n  g

9

A popular characterization of dynamic routingprotocols examines whether a routing update

contains subnet mask information. What is this

characterization called, and which type of

routing includes the subnet mask information?

10

How many bits does an IPv6 address contain,

and how is it typically presented?

Page 132: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 132/503

 114 CCDA-DESGN Section 11: IP Addressing

Question

Question

9 Answer

The characterization is classless versus classful. Classless routingprotocols include the subnet mask information in routing updates.

These protocols are considered second generation and can use

VLSM.

10 Answer

An IPv6 IP address contains 128 bits. They are typically presented as

hexadecimal numbers separated by colons.

Page 133: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 133/503

CCDA-DESGN Section 11: IP Addressing 115

Question

Question

   I   P   A

   d   d  r  e  s  s   i  n  g

   I   P   A   d   d  r  e  s  s   i  n  g

11

What is the meaning of two colons (::) in an IPv6address?

12

What field is used in an IPv6 header to facilitate

special handling, such as QoS?

Page 134: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 134/503

 116 CCDA-DESGN Section 11: IP Addressing

Question

Question

11 Answer

Two colons can be used to represent successive hexadecimal fields ofzeros. This can be done once within an IP address.

12 Answer

The Flow Label field is used to label packets for special handling.

Page 135: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 135/503

CCDA-DESGN Section 11: IP Addressing 117

Question

Question

   I   P   A

   d   d  r  e  s  s   i  n  g

   I   P   A   d   d  r  e  s  s   i  n  g

13

What IPv6 address scope type allows for astation to send data to the nearest interface

with the configured address type?

14

Name at least two transition strategies for IPv6.

Page 136: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 136/503

 118 CCDA-DESGN Section 11: IP Addressing

Question

Question

13 Answer

The new anycast address scope permits this behavior. It can beconsidered one to nearest behavior.

14 Answer

Following are the three major mechanisms that should assist with the

deployment and transition to IPv6:

• Dual Stack—System runs both IPv4 and IPv6.

• Tunneling—Encapsulates IPv6 packets into IPv4 packets, and

vice versa.

• Translation—One protocol is translated into another to facilitate

communications.

Page 137: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 137/503

Page 138: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 138/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 12Routing Protocols

A variety of routing solutions can be implemented inCisco equipment. Routing protocols can be categorizedby the following solutions, to name a few:

• Static versus dynamic

• Flat versus hierarchical

• Distance vector versus link state

• Classful versus classless

This variety in the world of routing protocols ensuresthat network designers must face tough decisions whenplanning for the deployment of a particular routingprotocol for a particular network. This section recallsthese issues and ensures that you understand thefundamental differences in routing protocols so youcan make these key decisions effectively.

Page 139: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 139/503

CCDA-DESGN Section 12: Routing Protocols 121

Question

Question

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

1

Name at least two cases where static routing isappropriate within a network design.

2

You are considering using static routes in a stub

area configuration with a network. What are

two advantages that exist through the use of a

static route in this design?

Page 140: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 140/503

 122 CCDA-DESGN Section 12: Routing Protocols

Question

Question

1 Answer

Static routing is appropriate in the following cases:• The network is small and not complex; the network also has

a very slow rate of expansion or change.

• The network consists of a main larger network with one ormore stub networks.

• The network should include special features, such as dial-on-demand routing.

2 Answer

By using a static route with a stub network, the following advantages

exist:

• Dynamic routing protocol control information is not used

on the link to the stub, or in the stub network; this reducesthe amount of routing protocol traffic the network mustcarry.

• Smaller routing tables are present in routers with the stuband central networks.

• Low end routers can be used in the stub network.

• Processor requirements for routers are lower.

Page 141: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 141/503

CCDA-DESGN Section 12: Routing Protocols 123

Question

Question

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

3

Which of the following routing protocols areconsidered distance vector?

• EIGRP

• OSPF

• IS-IS

• BGP

• RIP v1

• IGRP

• RIP v2

4

Because it is a routing protocol that features

the best of distance vector mechanisms and

the best of link state mechanisms, it is often

considered a hybrid routing protocol. Which is it?

Page 142: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 142/503

 124 CCDA-DESGN Section 12: Routing Protocols

Question

Question

3 Answer

BGP, RIP v1 and v2, and IGRP are all considered distance vectorrouting protocols. EIGRP is considered a hybrid routing protocol.

4 Answer

EIGRP offers the best features of both types of protocols and, as a

result, is often considered a hybrid routing protocol.

Page 143: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 143/503

CCDA-DESGN Section 12: Routing Protocols 125

Question

Question

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

5

What algorithm does link state routingprotocols use to select the best path to a

destination?

6

What is the most common Exterior Gateway

Protocol in use today, and what is its function?

Page 144: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 144/503

 126 CCDA-DESGN Section 12: Routing Protocols

Question

Question

5 Answer

The common shortest path first, or Dijkstra’s algorithm, is used.

6 Answer

BGP Version 4 powers the routing functions of the Internet as we

know it today. BGP+ takes over once IPv6 is fully deployed. BGP is

responsible for routing between separate autonomous systems.

Page 145: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 145/503

CCDA-DESGN Section 12: Routing Protocols 127

Question

Question

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

7

What default metrics does EIGRP use?

8

What is the default metric used by OSPF? From

what is this value derived, by default?

Page 146: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 146/503

 128 CCDA-DESGN Section 12: Routing Protocols

Question

Question

7 Answer

The default metrics used by EIGRP are bandwidth and delay.

8 Answer

The default metric used by OSPF is cost. By default, this metric is

derived from bandwidth.

Page 147: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 147/503

CCDA-DESGN Section 12: Routing Protocols 129

Question

Question

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

9

What default metric does RIP use?

10

Which type of routing protocol converges

faster: distance vector or link state? Why?

Page 148: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 148/503

 130 CCDA-DESGN Section 12: Routing Protocols

Question

Question

9 Answer

The default metric used by RIP is hop count.

10 Answer

Link state routing protocols converge faster than distance vector

protocols because they instantly propagate route updates, while

distance vector technologies rely on a periodic update. This statement

remains true when the distance vector routing protocols use theirdefault timers, of course.

Page 149: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 149/503

CCDA-DESGN Section 12: Routing Protocols 131

Question

Question

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

11

What is the main difference between a classfulrouting protocol and a classless routing

protocol?

12

Describe variable length subnet masking.

Page 150: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 150/503

 132 CCDA-DESGN Section 12: Routing Protocols

Question

Question

11 Answer

A classful routing protocol does not send the subnet maskinformation with routing updates. A classless routing protocol

includes this information.

12 Answer

Variable length subnet masking allows the administrator to assign

different subnet masks to different parts of the network. This allows

for more efficient use of available IP address space, and for more

hierarchical-based network designs. As a result, summarization canbe performed, and more efficient dynamic routing is achieved.

Page 151: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 151/503

CCDA-DESGN Section 12: Routing Protocols 133

Question

Question

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

13

Which type of routing supports VSLM: classfulor classless?

14

Which of the following routing protocols are

classless routing protocols?

• IGRP• EIGRP

• RIP v1

• RIP v2

• OSPF

BGP• IS-IS

Page 152: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 152/503

 134 CCDA-DESGN Section 12: Routing Protocols

Question

Question

13 Answer

Classless routing protocols support VLSM.

14 Answer

EIGRP, RIP v2, OSPF, BGP, and IS-IS are all classless routing

protocols.

Page 153: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 153/503

CCDA-DESGN Section 12: Routing Protocols 135

Question

Question

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

15

Name at least two aspects/advantages of on-demand routing.

16

What is the metric, and what is the metric limit

with RIP v2?

Page 154: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 154/503

 136 CCDA-DESGN Section 12: Routing Protocols

Question

Question

15 Answer

On-demand routing (ODR) has the following characteristics/advantages:

• Reduces dynamic routing traffic overhead

• Ideal for hub and spoke topologies

• No IP routing protocol on the stub networks is required

• ODR relies upon CDP

16 Answer

RIP v2 uses hop count as a metric. The hop count limit is 15.

Page 155: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 155/503

CCDA-DESGN Section 12: Routing Protocols 137

Question

Question

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

17

Name at least two advantages that RIP v2 hasover its RIP v1 counterpart.

18

Which dynamic routing protocol offers built-in

support for routing IP and OSI protocols?

Page 156: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 156/503

 138 CCDA-DESGN Section 12: Routing Protocols

Question

Question

17 Answer

The following advantages exist:• VLSM support

• Multicast, instead of broadcast

• Faster convergence

• Manual route summarization

• Authentication

18 Answer

The IS-IS protocol can do both. It is called Integrated IS-IS when it is

used for routing TCP/IP traffic.

Page 157: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 157/503

CCDA-DESGN Section 12: Routing Protocols 139

Question

   R  o  u   t   i  n  g

   P  r  o   t  o  c  o   l  s

19

When BGP is running between routers in asingle autonomous system, what is it called?

Page 158: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 158/503

 140 CCDA-DESGN Section 12: Routing Protocols

Question

Question

19 Answer

iBGP, or Interior BGP

Page 159: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 159/503

Page 160: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 160/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 13Security

More and more attacks against networks arise everyyear. Many of these attacks receive major publicitybecause they cause billions of dollars in damages tocorporations and even small businesses. As the leaderin networking equipment, Cisco Systems has

responded with a powerful SAFE blueprint for securingcorporate networks. This section ensures that you arefamiliar with this blueprint and that you have minimaldifficulty answering questions about security in theexam environment.

Page 161: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 161/503

CCDA-DESGN Section 13: Security 143

Question

Question

   S  e  c  u  r   i   t  y

   S  e  c  u  r   i   t  y

1

Network security aims to provide data integrity,data confidentiality, and system availability.

What is the meaning of data integrity?

2

Many types of attacks involve sending a host a

malformed message that is known to cause an

error, or overwhelming the host with massive

amounts of data. What are these types of

attacks typically called?

Page 162: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 162/503

 144 CCDA-DESGN Section 13: Security

Question

Question

1 Answer

Data integrity means that the network data is valid and has not beenchanged or tampered with in any way.

2 Answer

These types of attacks are typically called denial of service attacks.

Page 163: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 163/503

CCDA-DESGN Section 13: Security 145

Question

Question

   S  e  c  u  r   i   t  y

   S  e  c  u  r   i   t  y

3

Many attacks involve searching the network foraddresses, possible targets, and security gaps.

What are these types of attacks typically called?

4

Provide at least two reasons why it so

important to physically secure a router or

switch.

Page 164: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 164/503

 146 CCDA-DESGN Section 13: Security

Question

Question

3 Answer

These attacks are typically called reconnaissance attacks.

4 Answer

It is important to physically secure these devices for the following

reasons:

• Console access allows an administrator to override any

security that is placed on the device.

• Theft.

• Installation of software directly.

• Installation of new hardware directly.

Page 165: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 165/503

Page 166: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 166/503

 148 CCDA-DESGN Section 13: Security

Question

Question

5 Answer

Cisco recommends the following physical security guidelines:• Deploy adequate physical access controls.

• To the extent possible, ensure that physical access cannotcomprise other security measures.

• Ensure that you can recover easily in the event of devicetheft.

• Be sure to use cryptography for data that travels on

equipment or networks that are out of your control.

6 Answer

AAA stands for

• Authentication—Verifying a network user’s identity

Authorization—Verifying that the user is permitted to dowhat they are trying to do

• Accounting—Auditing access of recourses for security andbilling purposes

Page 167: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 167/503

CCDA-DESGN Section 13: Security 149

Question

Question

   S  e  c  u  r   i   t  y

   S  e  c  u  r   i   t  y

7

Name at least five ways a user can authenticatehimself on a computer network.

8

Name at least two authentication guidelines

that are recommended by Cisco.

Page 168: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 168/503

Page 169: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 169/503

CCDA-DESGN Section 13: Security 151

Question

Question

   S  e  c  u  r   i   t  y

   S  e  c  u  r   i   t  y

9

Name at least one Cisco recommendation whenit comes to network authorization.

10

Name at least one guideline that Cisco

recommends for the transmission of

confidential data.

Page 170: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 170/503

 152 CCDA-DESGN Section 13: Security

Question

Question

9 Answer

Cisco recommends the following when it comes to authorization onthe network:

• Use the principle of least privilege—Each user should use anaccount that gives him just enough privileges to accomplishwhat he needs, and no more.

• Use the principle of defense in depth for valuableresources—Each security mechanism should back up others.

• Never trust client-supplied settings.

10 Answer

These guidelines include the following:

• Carefully evaluate locations in which confidentiality isnecessary.

• Use strongest cryptography possible.

• Use well known and strong cryptography algorithms.

• Do not merely focus on confidentiality.

Page 171: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 171/503

CCDA-DESGN Section 13: Security 153

Question

Question

   S  e  c  u  r   i   t  y

   S  e  c  u  r   i   t  y

11

The Internet Connectivity Module oftenfeatures a DMZ. What is a DMZ?

12

What is spoofing in network security?

Page 172: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 172/503

 154 CCDA-DESGN Section 13: Security

Question

Question

11 Answer

A demilitarized zone (DMZ) network contains a host that has beencompromised. A DMZ is typically created using two firewalls, and it

permits public access for select services.

12 Answer

Spoofing means that the client is falsifying its true identity. IP address

spoofing is a common method for gaining access to secured networks.

Page 173: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 173/503

Page 174: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 174/503

   C

   C   D   A

  -   D   E   S

   G   N

Section 14Voice

An exciting area of networking technology involves thepacketizing of voice and the transmission of thesepackets across the data network. This allowsorganizations to save on toll charges for Telco andeliminate expenses related to traditional PBX

maintenance. This section ensures your readiness toanswer questions about voice technologies and basicvoice design concepts.

Page 175: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 175/503

Page 176: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 176/503

Page 177: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 177/503

Page 178: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 178/503

Page 179: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 179/503

Page 180: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 180/503

 162 CCDA-DESGN Section 14: Voice

Question

Question

5 Answer

The three layers of the model are as follows:• Packet Infrastructure layer

• Call Control layer

• Open Service Application layer

6 Answer

The H.323 protocol features the following benefits:

• Establishes standards for compression and decompression

Provides for interoperability• Provides network independence

• Permits platform and application independence

• Permits bandwidth management

• Supports multicast

• Enhanced flexibility

Page 181: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 181/503

Page 182: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 182/503

Page 183: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 183/503

CCDA-DESGN Section 14: Voice 165

Question

Question

   V  o   i  c  e

   V  o   i  c  e

9

What mechanism allows you to associatedestination phone numbers with IP addresses?

10

Variation in the delay of received packets is

referred to as what?

Page 184: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 184/503

Page 185: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 185/503

Page 186: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 186/503

 168 CCDA-DESGN Section 14: Voice

Question

Question

11 Answer

Mean Opinion Score (MOS), which is a common, subjectivebenchmark for quantifying the performance of the speech codec.

Sound quality, on the other hand, is called fidelity.

12 Answer

Voice Over ATM (VoATM)

Page 187: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 187/503

Page 188: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 188/503

 170 CCDA-DESGN Section 14: Voice

Question

Question

13 Answer

Sources of delay include• Propagation delay

• Serialization delay

• Processing delay

14 Answer

Voice Activity Detection suppresses packets of silence.

Page 189: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 189/503

Page 190: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 190/503

Page 191: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 191/503

CCDA-DESGN Section 14: Voice 173

Question

Question

   V  o   i  c  e

   V  o   i  c  e

17

What is a hardware component on a voicegateway that converts voice signal information

to packet-based protocols?

18

What mechanism helps to keep excess voice

traffic off of the data network?

Page 192: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 192/503

Page 193: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 193/503

Page 194: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 194/503

Page 195: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 195/503

Page 196: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 196/503

Page 197: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 197/503

Page 198: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 198/503

Page 199: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 199/503

CCDA-DESGN Section 15: Network Management 181

Question

Question

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

5

What major enhancement does RMON2present?

6

At what layer of the OSI model does CDP

operate?

Page 200: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 200/503

Page 201: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 201/503

Page 202: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 202/503

Page 203: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 203/503

Page 204: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 204/503

Page 205: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 205/503

Page 206: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 206/503

Page 207: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 207/503

Page 208: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 208/503

Page 209: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 209/503

Page 210: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 210/503

Page 211: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 211/503

Modular Network Designs 193

   D  o  c  u  m  e  n   t   i  n  g   t   h  e   D  e  s   i  g  n

   T   h  e   fi  n  a   l   d  e  s   i  g  n   d  o  c  u  m  e

  n  t  s   h  o  u   l   d  c  o  n  t  a   i  n  e   l  e  m  e  n  t  s  s  u  c   h  a  s  t   h  e   f  o   l   l  o  w   i  n  g  :

  •   I  n  t  r  o   d  u  c  t   i  o  n

  •   D  e  s   i  g  n  r  e  q  u   i  r  e  m  e  n  t

  s

  •   E  x   i  s  t   i  n  g  n  e  t  w  o  r   k   i  n

   f  r  a  s  t  r  u  c  t  u  r  e

  •   D  e  s   i  g  n

  •   P  r  o  o   f  o   f  c  o  n  c  e  p  t

  •   I  m  p   l  e  m  e  n  t  a  t   i  o  n  p   l  a

  n

  •   A  p  p  e  n   d   i  c  e  s

   N  e   t  w  o  r   k   H   i  e  r  a  r  c   h   i  e  s

   B  e  c  a  u  s  e  o   f  t   h  e  c  o  m  p   l  e  x   i  t  y  o   f  m  o   d  e  r  n  n  e  t  w  o  r   k  s  a  n   d  t   h  e  c  r   i  t   i  c  a   l  n  a  t  u  r  e  t   h  e  s  e  n  e  t  w  o  r   k  s

  p   l  a  y   i  n  t  o   d  a  y   ’  s  o  r  g  a  n   i  z  a  t   i  o  n  s   h   i  e  r  a  r  c   h   i  c  a   l   d  e  s   i  g  n  s  a  r  e  n  e  c  e  s  s  a  r  y .

   T   h  e   C   i  s  c  o  c   l  a  s  s   i  c   h   i  e  r  a  r  c

   h   i  c  a   l  n  e  t  w  o  r   k  m  o   d  e   l  c  o  n  s   i  s  t  s  o   f  t   h  e

   f  o   l   l  o  w   i  n  g  t   h  r  e  e   l  a  y  e  r  s  :

  •   A  c  c  e  s  s   l  a  y  e  r —   U  s  e   d

  t  o  p  r  o  v   i   d  e  a  c  c  e  s  s  t  o  t   h  e  n  e  t  w  o  r   k   f  o  r  n  e  t  w  o  r   k  u  s  e  r  s  ;  s  e  c  u  r   i  t  y

   (  e  s  p  e  c   i  a   l   l  y  a  u  t   h  e  n  t   i  c  a  t   i  o  n   )   i  s   i  m  p  o  r  t  a  n  t  a  t  t   h   i  s   l  a  y  e  r  t  o  v  e  r   i   f  y  t   h  a  t  t   h  e  u  s  e  r  s   h  o  u   l   d

  a  c  c  e  s  s  t   h  e  n  e  t  w  o  r   k  ;

   L   2  s  w   i  t  c   h   i  n  g   i  s  t  y  p   i  c  a   l   l  y  u  s  e   d   i  n  c  o  n

   j  u  n  c  t   i  o  n  w   i  t   h   V   L   A   N  s  ;   L   3

  s  w   i  t  c   h   i  n  g  c  a  n   b  e  u  s  e   d  t  o  c  o  n  n  e  c  t  r  e  m  o  t  e  o   f   fi  c  e  s .

  •   D   i  s   t  r   i   b  u   t   i  o  n   l  a  y  e  r —

   A   l   l  o  w  s  u  s  e  r  s  t  o  a  c  c  e  s  s  r  e  s  o  u  r  c  e  s  t   h  a  t  a  r  e  n  o  t   l  o  c  a   l  t  o  t   h  e  m  ;

  o   f  t  e  n  r  e   f  e  r  r  e   d  t  o  a  s

  p  o   l   i  c  y -   b  a  s  e   d  c  o  n  n  e  c  t   i  v   i  t  y   b  e  c  a  u  s  e  q  u  a   l   i  t  y  o   f  s  e  r  v   i  c  e   (   Q  o   S   )

  m  e  c   h  a  n   i  s  m  s  a  r  e  o   f  t  e  n  u  s  e   d  ;  m  e   d   i  a  t  r  a  n  s   l  a  t   i  o  n  s  a  r  e  o   f  t  e  n  p  e  r   f  o  r  m  e   d  a  t  t   h   i  s   l  a  y  e  r  ;

   L   3  s  w   i  t  c   h   i  n  g   i  s  p  e  r   f

  o  r  m  e   d   h  e  r  e .

  •   C  o  r  e   l  a  y  e  r —   H   i  g   h -  s  p  e  e   d  t  r  a  n  s   f  e  r  o   f   i  n   f  o  r  m  a  t   i  o  n  t   h  r  o  u  g   h  t   h  e  n  e  t  w  o  r   k  ;   f  a  u   l  t -  t  o   l  e  r -

  a  n  c  e   i  s  o   f  t  e  n  p  e  r   f  o  r  m  e   d   h  e  r  e  t  o  g  u  a  r  a  n  t  e  e  c  o  n  n  e  c  t   i  v   i  t  y  t   h  r  o  u  g   h  t   h  e  n  e  t  w  o  r   k  ;   L   2

  o  r   L   3  s  w   i  t  c   h   i  n  g   i  s   i  m  p   l  e  m  e  n  t  e   d   i  n  t   h  e  c  o  r  e .

   M

  o   d  u   l  a  r   N  e   t  w  o  r   k   D  e  s   i  g  n  s

   T

   h  e  t   h  r  e  e -   l  a  y  e  r  n  e  t  w  o  r   k   h   i  e  r  a  r  c   h   i  c  a   l

  n  e  t  w  o  r   k  m  o   d  e   l   i  s  t  o  o  s   i  m  p   l   i  s  t   i  c .   I  n  s

  t  e  a   d ,  a  n  e  w ,

  m

  o  r  e  s  o  p   h   i  s  t   i  c  a  t  e   d  m  o   d  e   l   i  s  n  e  e   d  e   d .

   E

  n   t  e  r  p  r   i  s  e   C  o  m  p  o  s   i   t  e   N  e   t  w  o  r   k   M  o   d  e   l

   T

   h  e  n  e  t  w  o  r   k   h   i  e  r  a  r  c   h   i  c  a   l  m  o   d  e   l  c  a  n  s  t   i   l   l   b  e  u  s  e   d  w   i  t   h   i  n  t   h  e   E  n  t  e  r  p  r   i  s  e   C  o  m  p  o  s   i  t  e

   N

  e  t  w  o  r   k  m  o   d  e   l  ;   i  t  c  a  n  e  x   i  s  t   i  n  a  n  y  o   f  t   h  e  m  o   d  u   l  e  s ,  a  s  n  e  e   d  e   d .

   T

   h  e   E  n  t  e  r  p  r   i  s  e   C  o  m  p  o  s   i  t  e   N  e  t  w  o  r   k  m

  o   d  e   l  c  o  n  s   i  s  t  s  o   f  t   h  e   f  o   l   l  o  w   i  n  g  t   h  r  e  e  m  a   i  n   f  u  n  c -

  t   i  o  n  a   l  a  r  e  a  s  :

  •   E  n   t  e  r  p  r   i  s  e  c  a  m  p  u  s —   C  o  n  t  a   i  n  s  m  o   d  u   l  e  s  t   h  a  t   b  u   i   l   d  a  r  o   b  u  s  t  c  a  m  p  u  s  n

  e  t  w  o  r   k .

  •   E  n   t  e  r  p  r   i  s  e   E   d  g  e —   C  o  n  t  a   i  n  s  e   l  e  m  e  n  t  s  t   h  a  t  a  r  e  r  e  q  u   i  r  e   d  t  o  s  e  c  u  r  e  c  o  m  m  u  n   i  c  a  t   i  o  n  s

   f  r  o  m  t   h  e   C  a  m  p  u  s  t  o  r  e  m  o  t  e  p  a  r  t  n  e  r  s ,  m  o   b   i   l  e  u  s  e  r  s ,  a  n   d  t   h  e   I  n  t  e  r  n  e  t .

  •   S  e  r  v   i  c  e   P  r  o  v   i   d  e  r   E   d  g  e —   T   h  e  s  e  m  o   d  u   l  e  s  e  n  a   b   l  e  c  o  m  m  u  n   i  c  a  t   i  o  n  w   i  t   h   W   A   N  t  e  c   h -

  n  o   l  o  g   i  e  s  a  n   d   I   S   P  s .

   A  c  c  e  s  s   L  a  y  e  r

   D   i  s   t  r   i   b  u   t   i  o  n   L  a  y  e  r

   C  o  r  e   L  a  y  e  r

   T   h  r  e  e

   L  a  y  e  r

   H   i  e  r  a  r  c

   h   i  c  a

   l   N  e

   t  w  o  r   k

   M  o

   d  e

   l

   E  n   t  e  r  p  r   i  s  e   C  a  m  p  u  s

   E  n   t  e  r  p  r   i  s  e   E   d  g  e

   S  e  r  v   i  c  e   P  r  o  v   i   d  e  r   E   d  g  e

   E  n

   t  e  r  p  r   i  s  e

   C  o  m

  p  o  s

   i   t  e   N  e

   t  w  o  r   k

   M  o

   d  e

   l

   M  a  n  a  g  e  m  e  n   t   M  o   d  u   l  e

   B  u   i   l   d   i  n  g   A  c  c  e  s  s

   M  o   d  u   l  e

   B  u   i   l   d   i  n  g   D   i  s   t  r   i   b  u   t   i  o  n

   M  o   d  u   l  e

   C  a  m  p  u  s   B  a  c   k   b  o  n  e

   M  o   d  u   l  e

   S  e  r  v  e  r   F  a  r  m   M  o   d  u   l  e

   E   d  g  e   D   i  s   t  r   i   b  u   t   i  o  n

   M  o   d  u   l  e

   E  -   C  o  m  m  e  r  c  e   M  o   d  u   l  e

   I  n   t  e  r  n  e   t   C  o  n  n  e  c   t   i  v   i   t  y

   M  o   d  u   l  e

   R  e  m

  o   t  e   A  c  c  e  s  s   /   V   P   N

   M  o   d  u   l  e

   W   A   N   M  o   d  u   l  e

   I   S   P   M  o   d  u   l  e  s

   P  u   b   l   i  c   S  w   i   t  c   h  e   d

   T  e   l  e  p   h  o  n  e   N  e   t  w  o

  r   k

   (   P   S   T   N   )   M  o   d  u   l  e

   F  r  a  m  e

   R  e   l  a  y   /   A   T   M   /   P   P   P

   M  o   d  u   l  e

Page 212: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 212/503

Page 213: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 213/503

Page 214: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 214/503

Page 215: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 215/503

Page 216: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 216/503

 198 CCDA-DESGN Quick Reference Sheets

  •   P  a  c   k  e   t  s  w   i   t  c   h  e   d —   F  r  a  m  e   R  e   l  a  y ,   S   M   D   S ,   P   V   C  s ,  o  r   S   V   C  s

  u  s  e   d  t  o   d  e   l   i  v  e  r   d  a  t  a

   b  e  t  w  e  e  n  e  n   d  p  o   i  n  t  s

 —   S  t  a  r  t  o  p  o   l  o  g  y

 —   F  u   l   l  y  m  e  s   h  e   d

 —   P  a  r  t   i  a   l  m  e  s   h

  •   C  e   l   l  s  w   i   t  c   h  e   d —   A   T   M

  ;   fi  x  e   d  s   i  z  e   d  c  e   l   l  s  t  r  a  n  s  m   i  t  t  e   d  q  u   i  c   k   l  y  t   h  r  o  u  g   h  t   h  e   W   A   N

   E  m  e  r  g   i  n  g   T  e  c   h  n  o   l  o  g   i  e  s

  •   D   S   L —   H   i  g   h   b  a  n   d  w   i   d  t   h  o  v  e  r  e  x   i  s  t   i  n  g  c  o  p  p  e  r  t  e   l  e  p   h  o  n  e   l   i  n  e  s

  •   L  o  n  g   R  e  a  c   h   E   t   h  e  r  n  e   t   (   L   R   E   ) —   O   f   f  e  r  s   1   5   M   b  p  s  a  c  r  o  s  s   i  n  c  r  e  a  s  e   d   d   i  s  t  a  n  c  e  s  ;  r  e   l   i  e  s  o  n

  t  e  c   h  n  o   l  o  g   i  e  s   f  r  o  m   D

   S   L

  •   C  a   b   l  e —   H   i  g   h -  s  p  e  e   d

  c  o  n  n  e  c  t   i  o  n  s  t   h  a  t  u  s  e  a   h  y   b  r   i   d  o   f  c  o  a  x   i  a   l  c  a   b   l  e  a  n   d   fi   b  e  r  o  p  t   i  c

  m  e   d   i  a

  •   W   i  r  e   l  e  s  s —   E   l  e  c  t  r  o  m

  a  g  n  e  t   i  c  w  a  v  e  s   f  o  r  m  t   h  e  p   h  y  s   i  c  a   l  m  e   d   i  a

   A  p  p   l   i  c  a   t   i  o  n   D  r   i  v  e  r

  s   f  o  r   W   A   N   S  e   l  e  c   t   i  o  n

  •   R  e  s  p  o  n  s  e   T   i  m  e

  •   T   h  r  o  u  g   h  p  u  t

  •   P  a  c   k  e  t   L  o  s  s

  •   R  e   l   i  a   b   i   l   i  t  y

   T  a   b   l  e   3

   B  a  n   d  w   i   d   t   h

   B

  a  n   d  w   i   d   t   h   O  p   t   i  m   i  z  a   t   i  o  n   T  e  c   h  n   i  q  u  e  s

   B  a  n   d  w   i   d  t   h  o  p  t   i  m   i  z  a  t   i  o  n  t  e  c   h  n   i  q  u  e  s  s  u  p  p  o  r  t  t   h  e   f  o   l   l  o  w   i  n  g  c  o  m  p  r  e  s  s   i  o  n  o

  p  t   i  o  n  s  :

  •   F   R   F .   9   F  r  a  m  e   R  e   l  a  y   P  a  y   l  o  a   d   C  o  m

  p  r  e  s  s   i  o  n

  •   S   T   A   C  o  r   P  r  e   d   i  c  t  o  r

  •   H   D   L   C

  •   X .   2   5

  •   P   P   P  u  s   i  n  g   P  r  e   d   i  c  t  o  r

  •   V  a  n   J  a  c  o   b  s  o  n   T   C   P   /   I   P   H  e  a   d  e  r   C  o

  m  p  r  e  s  s   i  o  n

  •   M   P   C   C

   I  t

   i  s  m  o  r  e  e   f   fi  c   i  e  n  t  t  o   h  a  v  e  s  p  e  c   i  a   l   h  a  r

   d  w  a  r  e   h  a  n   d   l  e  c  o  m  p  r  e  s  s   i  o  n  v  e  r  s  u  s   h  a  v   i  n  g

  s  o   f  t  w  a  r  e  e  n  a   b   l  e  c  o  m  p  r  e  s  s   i  o  n .

   W

   i  n   d  o  w   S   i  z  e

   W

   i  n   d  o  w  s   i  z  e  r  e   f  e  r  s  t  o  t   h  e  m  a  x   i  m  u  m  a  m  o  u  n  t  o   f   d  a  t  a  t   h  a  t  c  a  n   b  e  t  r  a  n  s  m   i  t  t  e   d   b  e   f  o  r  e  a  n

  a  c   k  n  o  w   l  e   d  g  m  e  n  t   i  s  r  e  q  u   i  r  e   d .

   Q

  u  e  u   i  n  g   S  e  r  v   i  c  e  s

   T

   h  e   h  a  r   d  w  a  r  e  q  u  e  u  e  u  s  e  s   fi  r  s  t -   i  n ,   fi  r  s  t -  o  u  t   (   F   I   F   O   ) .

   T

   h  e  s  o   f  t  w  a  r  e  q  u  e  u  e  c  a  n  u  s  e  o  t   h  e  r  m  e

  t   h  o   d  s  :

  •   W   F   Q —   W  e   i  g   h  t  e   d   f  a   i  r  q  u  e  u   i  n  g

  •   P   Q —   P  r   i  o  r   i  t  y  q  u  e  u   i  n  g

  •   C   Q —   C  u  s  t  o  m  q  u  e  u   i  n  g

   N

  o   t  e

   F  o  r   d  e  t  a   i   l  s  o  n  t  r  a   f   fi  c  s   h  a  p   i  n  g

  v  e  r  s  u  s  p  o   l   i  c   i  n  g ,  r  e   f  e  r  t  o  t   h  e   Q  o   S   i  n  t   h  e  s  e  c  t   i  o  n ,

   “   C  a  m  p  u  s   D  e  s   i  g  n   D  e  t  a   i   l  s .   ”

   W

   A   N   B  a  c   k  u  p   T  e  c   h  n  o   l  o  g   i  e  s

  •   D   i  a   l   b  a  c   k  u  p  r  o  u  t   i  n  g

  •   P  e  r  m  a  n  e  n  t  s  e  c  o  n   d  a  r  y   W   A   N   l   i  n   k

  •   S   h  a   d  o  w   P   V   C

  •   D   i  a   l   b  a  c   k  u  p

  •   I  n  t  e  r  n  e  t

 —   G  e  n  e  r   i  c  r  o  u  t   i  n  g  e  n  c  a  p  s  u   l  a  t   i  o  n

   (   G   R   E   )

 —   I   P   S  e  c

   T  e  c   h  n  o   l  o  g  y

   A  p  p  r  o  x   i  m  a   t  e   B  a  n

   d  w   i   d   t   h

   A  s  y  n  c   h  r  o  n  o  u  s   d   i  a   l  u  p

   5   6   K   b  p  s

   I   S   D   N –   B   R   I

   1   2   8   K   b  p  s

   I   S   D   N –   P   R   I ,   F  r  a  m  e   R  e   l  a  y

   1 .   5   4   4   M   b  p  s

   A   D   S   L

   8   M   b  p  s

   L   R   E

   1   5   M   b  p  s

   C  a   b   l  e

   2   7   M   b  p  s

   W   i  r  e   l  e  s  s

   4   4   M   b  p  s

Page 217: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 217/503

Page 218: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 218/503

Page 219: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 219/503

Routing Protocols 201

   R  o  u   t   i  n  g   P  r  o   t  o  c  o   l  s

   S   t  a   t   i  c   V  e  r  s  u  s   D  y  n  a  m   i  c

   S  t  a  t   i  c   (  m  a  n  u  a   l   l  y   )  c  r  e  a  t  e   d

  r  o  u  t  e  s   d  o   h  a  v  e  t   h  e   i  r  p   l  a  c  e ,  a  s  s   h  o  w  n   b  y  t   h  e   f  o   l   l  o  w   i  n  g  e  x  a  m  p   l  e  s  :

  •   R  o  u  t   i  n  g  t  o  a  n   d   f  r  o  m

  a  s  t  u   b  n  e  t  w  o  r   k

  •   S  m  a   l   l  n  e  t  w  o  r   k  s

  •   S  p  e  c   i  a   l   f  e  a  t  u  r  e  s ,  s  u  c

   h  a  s   d   i  a   l -  o  n -   d  e  m  a  n   d  r  o  u  t   i  n  g   (   D   D   R   )

  •   S  p  e  c   i   f  y   i  n  g  r  o  u  t  e  s   f  o

  r   d   i  a   l   i  n  e  n  v   i  r  o  n  m  e  n  t  s

   D   i  s   t  a  n  c  e   V  e  c   t  o  r   V  e  r  s  u  s   L   i  n   k  -   S   t  a   t  e

   D   i  s   t  a  n  c  e   V  e  c   t  o  r

  •   E  x  a  m  p   l  e  s   i  n  c   l  u   d  e   R

   I   P  v   1 ,   R   I   P  v   2 ,  a  n   d   I   G   R   P   (   I  n  t  e  r   i  o  r   G

  a  t  e  w  a  y   R  o  u  t   i  n  g   P  r  o  t  o  c  o   l   ) .

  •   E  n  t   i  r  e  r  o  u  t   i  n  g  t  a   b   l  e

  s  a  r  e  t  r  a  n  s   f  e  r  r  e   d  p  e  r   i  o   d   i  c  a   l   l  y   b  e  t  w  e  e  n  s  y  s  t  e  m  s .

  •   T  e  n   d  t  o  c  o  n  v  e  r  g  e  s   l  o  w   l  y .

  •   O   f   f  e  r   l   i  m   i  t  e   d  s  c  a   l  a   b

   i   l   i  t  y .

  •   E  a  s  y  t  o   i  m  p   l  e  m  e  n  t  a  n   d  m  a   i  n  t  a   i  n .

   L   i  n   k  -   S   t  a   t  e

  •   E  x  a  m  p   l  e  s   i  n  c   l  u   d  e   O

   S   P   F  a  n   d   I   S -   I   S .

  •   E  a  c   h  r  o  u  t  e  r  m  a   k  e  s   i  n   d  e  p  e  n   d  e  n  t  r  o  u  t   i  n  g   d  e  c   i  s   i  o  n  s   b  a  s  e   d

  o  n   l  o  c  a   l   d  a  t  a   b  a  s  e  s .

  •   F  a  s  t  e  r  c  o  n  v  e  r  g  e  n  c  e .

  •   B  e  t  t  e  r  s  c  a   l  a   b   i   l   i  t  y .

  •   F  e  a  t  u  r  e   l  e  s  s  r  o  u  t   i  n  g

  t  r  a   f   fi  c  o  v  e  r   h  e  a   d .

  •   A   d  v  e  r  t   i  s  e  u  p   d  a  t  e  s  t   h  a  t  o  c  c  u  r   i  n  t   h  e  r  a  t   h  e  r  t   h  a  n   fl  o  o   d   i  n  g

  u  p   d  a  t  e  s ,   l   i   k  e   d   i  s  t  a  n  c  e

  v  e  c  t  o  r .

  •   R  e  q  u   i  r  e  s  m  o  r  e   k  n  o  w   l  e   d  g  e  a  n   d  e  x  p  e  r  t   i  s  e  t  o  c  o  n   fi  g  u  r  e .

   H  y   b  r   i   d

  •   A  n  e  x  a  m  p   l  e   i  s   E   I   G   R

   P .

  •   I  t   h  a  s   f  e  a  t  u  r  e  s  o   f   b  o

  t   h   d   i  s  t  a  n  c  e  v  e  c  t  o  r  a  n   d   l   i  n   k  s  t  a  t  e  p  r  o

  t  o  c  o   l  s .

   I  n   t  e  r   i  o  r   V  e  r  s  u  s   E  x   t  e  r   i  o  r

   I  n   t  e  r   i  o  r   G  a   t  e  w  a  y   P  r  o   t  o  c

  o   l  s   (   I   G   P  s   )

  •   E  x  a  m  p   l  e  s   i  n  c   l  u   d  e   O

   S   P   F ,   I   S -   I   S ,   E   I   G   R   P ,  a  n   d   R   I   P .

  •   T   h  e  s  e  r  o  u  t   i  n  g  p  r  o  t  o

  c  o   l  s   h  a  n   d   l  e  t   h  e   d  y  n  a  m   i  c  r  o  u  t   i  n  g  t   h  a  t  o  c  c  u  r  s  w   i  t   h   i  n  p  r   i  v  a  t  e

  c  o  m  p  a  n  y  n  e  t  w  o  r   k  s .

  •   T   h  e  y   f  e  a  t  u  r  e   f  a  s  t  c  o

  n  v  e  r  g  e  n  c  e  a  n   d  e  a  s   i  e  r  c  o  n   fi  g  u  r  a  t   i  o  n .

   E  x   t  e  r   i  o  r   G  a   t  e  w  a  y   P  r  o   t  o  c  o   l  s   (   E   G   P  s   )

  •   A  n  e  x  a  m  p   l  e   i  n  c   l  u   d  e  s   B   G   P .

  •   T   h  e  y   h  a  n   d   l  e  r  o  u  t   i  n  g   b  e  t  w  e  e  n  a  u  t  o  n  o  m  o  u  s  s  y  s  t  e  m  s .

  •   T   h  e  y   f  e  a  t  u  r  e  s   l  o  w  e  r  c  o  n  v  e  r  g  e  n  c  e

  a  n   d  r  e  q  u   i  r  e  m  o  r  e  c  o  m  p   l  e  x  c  o  n   fi  g  u  r  a  t   i  o  n  s .

   R

  o  u   t   i  n  g   P  r  o   t  o  c  o   l  s   M  e   t  r   i  c  s

  •   R   I   P —   H  o  p  c  o  u  n  t

  •   I   G   R   P —   B  a  n   d  w   i   d  t   h ,   d  e   l  a  y

  •   E   I   G   R   P —   B  a  n   d  w   i   d  t   h ,   d  e   l  a  y

  •   B   G   P —   A   S -   P   A   T   H

  •   O   S   P   F —   C  o  s  t   (   b  a  n   d  w   i   d  t   h   )

  •   I   S -   I   S —   L   i  n   k  m  e  t  r   i  c  s   (   d  e   f  a  u   l  t   )

   R

  o  u   t   i  n  g   P  r  o   t  o  c  o   l   C  o  n  v  e  r  g  e  n  c  e

  •   R   I   P —   H  o   l   d -   d  o  w  n  +   1  o  r   2  u  p   d  a  t  e   i  n  t  e  r  v  a   l  s

  •   I   G   R   P —   H  o   l   d -   d  o  w  n  +   1  o  r   2  u  p   d

  a  t  e   i  n  t  e  r  v  a   l  s

  •   E   I   G   R   P —   S  e  c  o  n   d  s

  •   O   S   P   F —   S  e  c  o  n   d  s

   H

   i  e  r  a  r  c   h   i  c  a   l   V  e  r  s  u  s   F   l  a   t

   F   l  a   t   R  o  u   t   i  n  g   P  r  o   t  o  c  o   l  s

  •   E  x  a  m  p   l  e  s  a  r  e  c   l  a  s  s   f  u   l  r  o  u  t   i  n  g  p  r  o  t  o  c  o   l  s .

  •   P  r  o  p  a  g  a  t  e  r  o  u  t   i  n  g   i  n   f  o  r  m  a  t   i  o  n  t   h  r  o  u  g   h  o  u  t  t   h  e  e  n  t   i  r  e  n  e  t  w  o  r   k .

  •   T   h  e  y  a  r  e  n  o  t  s  c  a   l  a   b   l  e .

   H

   i  e  r  a  r  c   h   i  c  a   l   R  o  u   t   i  n  g   P  r  o   t  o  c  o   l  s

  •   E  x  a  m  p   l  e  s  a  r  e  c   l  a  s  s   l  e  s  s .

  •   D   i  v   i   d  e  t   h  e  n  e  t  w  o  r   k   i  n  t  o  a  r  e  a  s  ;  t   h

  e  y   d  o  n  o  t  p  r  o  p  a  g  a  t  e   i  n   f  o  r  m  a  t   i  o  n  t   h

  r  o  u  g   h  o  u  t

  t   h  e  e  n  t   i  r  e  n  e  t  w  o  r   k —  a  r  e  a  s  a  r  e  u  s  e   d   i  n  s  t  e  a   d .

  •   T   h  e  y  a  r  e  s  c  a   l  a   b   l  e .

   O

   D   R   R  o  u   t   i  n  g

   H

  u   b  r  o  u  t  e  r  s  c  a  n   d  y  n  a  m   i  c  a   l   l  y  m  a   i  n  t  a   i  n  r  o  u  t  e  s  t  o  s  t  u   b  n  e  t  w  o  r   k  r  o  u  t  e  r  s .   T   h  a  n   k  s  t  o

   O

   D   R   (   C   i  s  c  o  p  r  o  p  r   i  e  t  a  r  y   ) ,  t   h  e  r  e   i  s  n  o  t  t

   h  e  o  v  e  r   h  e  a   d  w   i  t   h  a   f  u   l   l -   fl  e   d  g  e   d   d  y  n  a  m

   i  c  r  o  u  t   i  n  g

  p  r  o  t  o  c  o   l  ;  t   h   i  s   i  s   i   d  e  a   l   f  o  r   h  u   b  a  n   d  s  p  o   k  e  t  o  p  o   l  o  g   i  e  s .   O   D   R  r  e   l   i  e  s  u  p  o  n  t   h  e   C   i  s  c  o   D   i  s  c  o  v  e  r  y

   P  r  o  t  o  c  o   l   (   C   D   P   ) .

Page 220: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 220/503

Page 221: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 221/503

Page 222: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 222/503

Page 223: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 223/503

Page 224: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 224/503

Page 225: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 225/503

Page 226: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 226/503

Page 227: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 227/503

Page 228: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 228/503

Page 229: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 229/503

Part II: CCDP-ARCH 211

CCDP-ARCH

Section 1Network Architectures

Section 2

The Enterprise Edge

Section 3

Network Management

Section 4High Availability

Section 5

Network Security

Section 6

Quality of Service

Section 7

IP Multicasting

Section 8

VPNs

Section 9

Wireless LANs

Section 10

IP Telephony

Section 11

Content Networking

Section 12

Storage Networking

CCDP-ARCH Quick Reference Sheets

Page 230: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 230/503

   C   C   D

   P  -   A   R   C   H

Section 1Network Architectures

With the myriad of requirements for today’s networks,the design process requires a robust modular frame-work that network designers can leverage. For years,the Cisco three-layer hierarchical design model (i.e.,access, distribution, and core layers) was sufficient.

However, e-commerce, security, virtual private net-works (VPNs), and other emerging technologiesrequire a more modern approach. Fortunately, Ciscodeveloped a far more comprehensive model: theEnterprise Composite Network Model.

The flash cards in this section review the componentsof the Enterprise Composite Network Model andinclude step-by-step design processes for designing theEnterprise campus and the Server Farm modules. Theyalso require you to make appropriate design decisionsgiven a set of criteria. For example, you should be ableto identify where technologies such as FastEthernetand Gigabit Ethernet are most applicable in a design.

Page 231: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 231/503

CCDP-ARCH Section 1: Network Architectures 213

Question

Question

   N  e   t  w

  o  r   k

   A  r  c   h   i   t  e  c

   t  u  r  e  s

   N  e   t  w  o  r   k

   A  r  c   h   i   t  e  c   t  u  r  e  s

1

Identify the three primary key components ofthe Cisco AVVID framework.

2

List at least two benefits provided by the Cisco

AVVID framework.

Page 232: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 232/503

Page 233: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 233/503

Page 234: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 234/503

Page 235: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 235/503

Page 236: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 236/503

 218 CCDP-ARCH Section 1: Network Architectures

Question

Question

5 Answer

The Enterprise Network Composite Model includes three functionalareas: Enterprise campus, Enterprise Edge, and Service Provider

Edge. The Enterprise campus functional area is comprised of the

following modules, which are used for campus networks:

• Campus infrastructure

• Network management

• Server farm

Edge distribution

6 Answer

The Enterprise Edge functional area sits between the Enterprise

campus and the Service Provider Edge and contains the following

modules:

• E-commerce

• Internet connectivity

• Remote access and VPN

• WAN

Page 237: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 237/503

Page 238: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 238/503

Page 239: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 239/503

CCDP-ARCH Section 1: Network Architectures 221

Question

Question

   N  e   t  w

  o  r   k

   A  r  c   h   i   t  e  c

   t  u  r  e  s

   N  e   t  w  o  r   k

   A  r  c   h   i   t  e  c   t  u  r  e  s

9

In the Enterprise Composite Network Model,what is the purpose of the WAN module?

10

Identify the Enterprise Edge module that

contains dial-in access concentrators.

Page 240: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 240/503

 222 CCDP-ARCH Section 1: Network Architectures

Question

Question

9 Answer

The WAN module, which is one of the four Enterprise Edge modules,provides connectivity between a central site and remote sites. For

example, a company might have a headquarters site and three remote

sales office sites. If those remote sites connect back to the head-

quarters via WAN technologies (such as PPP, ATM, or Frame Relay),

they are connecting to the WAN module.

10 Answer

The remote access and VPN module of the Enterprise Edge module

allow remote users and remote sites to connect back to a central site.

One option for remote access is to allow users to dial directly into the

central site via a modem. Therefore, the dial-in access concentrator iscategorized as part of the remote access and VPN module.

Page 241: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 241/503

CCDP-ARCH Section 1: Network Architectures 223

Question

Question

   N  e   t  w

  o  r   k

   A  r  c   h   i   t  e  c

   t  u  r  e  s

   N  e   t  w  o  r   k

   A  r  c   h   i   t  e  c   t  u  r  e  s

11

Describe the Service Provider Edge functionalarea of the Enterprise Composite Network

Model.

12

Under which functional area of the Enterprise

Composite Network Model would the PSTN be

classified?

Page 242: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 242/503

Page 243: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 243/503

Page 244: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 244/503

 226 CCDP-ARCH Section 1: Network Architectures

Question

Question

13 Answer

The Enterprise campus network must meet the following designrequirements:

• Functionality

• Performance

• Scalability

• Availability

• Manageability

• Cost effectiveness

14 Answer

Designing the logical network topology is the second step in the

Enterprise campus design methodology. The following seven steps

are presented in the ARCH course for the Enterprise campus design

methodology:1 Identify requirements of existing enterprise applications and

data flows.

2 Design the logical network topology (for example, identify

VLANs).

3 Design the physical network topology (for example, identify

Layer 1 through 3 components and technologies).

4 Identify Cisco devices that meet the previous criteria and

diagram the network topology.5 Select an appropriate IP addressing scheme.

6 Choose routing protocols.

7 Design the Edge Distribution module, which connects the

Enterprise campus to the Enterprise Edge.

Page 245: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 245/503

Page 246: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 246/503

 228 CCDP-ARCH Section 1: Network Architectures

Question

Question

15 Answer

While characterizing applications, typical application characteristicsthat you could identify include the following:

• Location of application

• Name of application

• Type of application

• Number of users

• Number of servers

• Bandwidth/delay tolerance/loss characteristics

16 Answer

VLANs are broadcast domains that segment traffic. VLANs are often

defined based on departmental or organizational boundaries;

however, they can be defined based on geographical location. Another

common approach to defining VLANs is to create VLANs for specificapplications (such as voice, video, and data).

Page 247: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 247/503

CCDP-ARCH Section 1: Network Architectures 229

Question

Question

   N  e   t  w

  o  r   k

   A  r  c   h   i   t  e  c

   t  u  r  e  s

   N  e   t  w  o  r   k

   A  r  c   h   i   t  e  c   t  u  r  e  s

17

Describe why campus-wide VLANs should notbe used in a design.

18

Arrange the following transmission media

types from least expensive to most expensive:

multimode fiber, twisted pair, and single-mode

fiber.

Page 248: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 248/503

Page 249: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 249/503

Page 250: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 250/503

Page 251: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 251/503

CCDP-ARCH Section 1: Network Architectures 233

Question

Question

   N  e   t  w

  o  r   k

   A  r  c   h   i   t  e  c

   t  u  r  e  s

   N  e   t  w  o  r   k

   A  r  c   h   i   t  e  c   t  u  r  e  s

21

List two Ethernet trunking protocols.

22

You have a Layer 2 switch that contains ports

that belong to two different VLANs. Describe

how ports from one VLAN can communicate

with ports in the other VLAN.

Page 252: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 252/503

 234 CCDP-ARCH Section 1: Network Architectures

Question

Question

21 Answer

Trunking protocols allow traffic from multiple VLANs to be carriedover a single physical link. The Cisco proprietary trunking protocol is

Inter-Switch Link (ISL). The IEEE defined another trunking protocol:

IEEE 802.1Q. With its recent enhancements, the IEEE 802.1Q

standard is gaining popularity over ISL.

22 Answer

VLANs are broadcast domains. So, you can think of a VLAN as being

its own subnet. Routing must occur to transport traffic from one

subnet to another; therefore, you need a device that makes forwarding

decisions based on Layer 3 information (such as a router or a Layer 3switch). So, the Layer 2 switch described in this scenario needs an

external router or Layer 3 switch to transport traffic from one VLAN

to another.

Page 253: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 253/503

Page 254: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 254/503

Page 255: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 255/503

Page 256: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 256/503

Page 257: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 257/503

Page 258: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 258/503

 240 CCDP-ARCH Section 1: Network Architectures

Question

Question

27 Answer

EIGRP and OSPF are appropriate routing protocols to use on FrameRelay point-to-multipoint networks. RIP and IGRP are not

appropriate because of their periodic flooding of route information

and their slow time to converge. Also, IS-IS does not adapt well to

NBMA point-to-multipoint networks.

28 Answer

SLB allows multiple requests for the same content to be distributed

across multiple servers, each housing the same content. SLB

therefore contributes to a server farm module design’s scalability.

Page 259: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 259/503

CCDP-ARCH Section 1: Network Architectures 241

Question

Question

   N  e   t  w

  o  r   k

   A  r  c   h   i   t  e  c

   t  u  r  e  s

   N  e   t  w  o  r   k

   A  r  c   h   i   t  e  c   t  u  r  e  s

29

What are the characteristics of a serverdistribution switch (for example, low-end, mid-

range, high-end, Layer 2, or Layer 3) in the

server farm module?

30

Identify at least one technology that you could

add to a server farm module to increase per-

formance and scalability within that module.

Page 260: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 260/503

Page 261: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 261/503

Page 262: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 262/503

   C   C   D

   P  -   A   R   C   H

Section 2The Enterprise Edge

The Enterprise Edge provides connectivity between theEnterprise Campus and the outside world. Specifically,traffic flowing to and from the Internet must passthrough the Enterprise Edge. Remote users or sites thatconnect back to the Enterprise Campus connect

through the Enterprise Edge. Also, WAN connectionsfrom remote offices often terminate in the EnterpriseEdge.

Also consider e-commerce servers. You want Internetusers to securely enter your site and perform trans-actions. However, you do not want them to reach theEnterprise Campus network. Therefore, the EnterpriseEdge serves as an ideal location for e-commerceservers.

The flash cards in this section review the modules thatcomprise the Enterprise Edge. They also require you tomake appropriate design decisions given a set ofcriteria. For example, you should be able to selectappropriate Layer 1 and Layer 2 technologies based onparameters such as cost and speed.

Page 263: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 263/503

CCDP-ARCH Section 2: The Enterprise Edge 245

Question

Question

   T   h  e

   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

   T   h  e   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

1

Identify the final step in the Cisco eight-stepprocess for Enterprise Edge design.

2

List at least three design considerations for the

Enterprise Edge WAN module.

Page 264: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 264/503

Page 265: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 265/503

CCDP-ARCH Section 2: The Enterprise Edge 247

Question

Question

   T   h  e

   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

   T   h  e   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

3

In the Enterprise Edge, when should redundantlinks be used to connect a branch office WAN to

the Regional Edge?

4

Explain the need for redundant links between

the Branch Edge and the Central Site Edge in an

Enterprise Edge design.

Page 266: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 266/503

 248 CCDP-ARCH Section 2: The Enterprise Edge

Question

Question

3 Answer

Redundancy is not usually required between the branch office WANand the Regional Edge because the branch office does not act as an

aggregation point for other routers. However, redundant links might

be desirable if the branch office operation is mission-critical, or if

several users are impacted.

4 Answer

The Branch Edge is typically an aggregation point for other routers

(for example, branch office routers). Therefore, many users are

impacted if the Branch Edge cannot contact the central site.

Redundant links between the Branch Edge and the central site edgeincrease the availability of the network for these users. Additionally,

these redundant links can be leveraged by load-sharing traffic across

the primary and backup links.

Page 267: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 267/503

CCDP-ARCH Section 2: The Enterprise Edge 249

Question

Question

   T   h  e

   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

   T   h  e   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

5

Identify the topology that sites in the EnterpriseWAN backbone typically use.

6

List at least three criteria to consider when

selecting a service provider for your Enterprise

Edge design.

Page 268: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 268/503

 250 CCDP-ARCH Section 2: The Enterprise Edge

Question

Question

5 Answer

The Enterprise WAN backbone serves as the core of a company’sWAN. To maintain required levels of service between remote and

branch locations, availability and throughput between these backbone

sites is critical. Therefore, sites that comprise the Enterprise WAN

Backbone are typically interconnected in a full-mesh topology to

minimize delay, increase availability, and increase the network’s

overall throughput.

6 Answer

If your network spans multiple geographical regions, WAN services

that are available in one location might not be available in another.

Consequently, you might have to negotiate with multiple service

providers. Consider the following characteristics when selecting a

service provider:

• Price—Both one-time and recurring costs.

• Available speeds—Enough speed to support applicationdemands.

• Offered features—Features, such as traffic shaping, thatvary based on the Layer 2-specific technology chosen.

• Geographic availability—Locations that a specific serviceprovider offers a specific type of service.

• Service Level Agreements (SLAs) —A contract between thecustomer and the service provider that stipulates such termsas available bandwidth, network delay, availability ofnetwork services, and packet loss through the network.

Page 269: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 269/503

CCDP-ARCH Section 2: The Enterprise Edge 251

Question

Question

   T   h  e

   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

   T   h  e   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

7

Identify which of the following data link layertechnologies supports the lowest link quality:

PPP, Frame Relay, ATM, or X.25.

8

Some physical layer technologies are “always

on,” while others are “on-demand.” From the

following list, identify which physical layer

protocols are always on and which are on-

demand: leased line, DSL, dialup, ISDN, and

optical.

Page 270: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 270/503

 252 CCDP-ARCH Section 2: The Enterprise Edge

Question

Question

7 Answer

 X.25 supports the lowest link quality because it was developed at atime when the quality of transmission facilities was much less than is

commonplace today. As a result, X.25 incorporates more error

checking than do the other listed protocols. However, this increased

error checking increases overhead costs.

8 Answer

A leased line is always on.

DSL is always on.

Dialup is on-demand.ISDN’s control channel (or the D Channel) is always on. However,

ISDN’s data channels (or the B Channels) are on-demand.

Optical is always on.

Page 271: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 271/503

CCDP-ARCH Section 2: The Enterprise Edge 253

Question

Question

   T   h  e

   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

   T   h  e   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

9

What WAN technology offers “service classes”such as CBR, ABR, UBR, RT-VBR, and NRT-VBR?

10

When should static routes be used in a site-to-

site WAN design?

Page 272: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 272/503

 254 CCDP-ARCH Section 2: The Enterprise Edge

Question

Question

9 Answer

 Asynchronous Transfer Mode (ATM) uses one of five service classesto determine what priority level is given to various traffic types.

ATM’s service classes are described as follows:

• CBR—Guaranteed bandwidth for high priority traffic (forexample, video)

• RT-VBR—Useful for latency-sensitive traffic (for example,voice)

• NRT-VBR—Assigns a medium priority to traffic that is not

sensitive to latency

• ABR—Similar to VBR-NRT, ABR assigns a medium priorityto traffic

• UBR—Gives “best-effort” priority to low priority traffic

10 Answer

Static routing is appropriate for smaller environments that have few

WAN connections. For example, consider a single link between a

central site and a remote site. The central site could have a static route

that points to the remote site’s network, and the remote site’s routercould have a default static route that points back to the central site.

Page 273: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 273/503

CCDP-ARCH Section 2: The Enterprise Edge 255

Question

Question

   T   h  e

   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

   T   h  e   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

11

List at least three questions that you, as adesigner, should ask when selecting the IP

addressing scheme for the WAN module in the

Enterprise Edge.

12

List the two primary categories of remote

access networks.

Page 274: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 274/503

 256 CCDP-ARCH Section 2: The Enterprise Edge

Question

Question

11 Answer

Consider the following questions when selecting an IP addressingscheme for the WAN module:

• How many devices does the network contain? (Note that itis a best practice to add 20 percent to this number toaccommodate future growth.)

• How many sites does the network contain, and how manydevices reside at each site?

• How many network addresses are available from the public

numbering authority?

• What is the total number of addresses that are required forthe network?

• Are public and/or private address spaces required?

• How will the IP addressing hierarchy be completed?

12 Answer

Site-to-site and user-to-site are the two primary categories of remote

access networks. Site-to-site remote access networks are useful for

interconnecting geographically separated offices, while user-to-site

remote access networks allow mobile users to connect back to thecorporate network.

Page 275: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 275/503

CCDP-ARCH Section 2: The Enterprise Edge 257

Question

Question

   T   h  e

   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

   T   h  e   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

13

List at least two technologies that can be usedto provide remote dialup access to end users.

14

Identify two technologies that can be used to

provide remote broadband access to end users.

Page 276: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 276/503

 258 CCDP-ARCH Section 2: The Enterprise Edge

Question

Question

13 Answer

Remote dialup access options include the following:Modem—Slower speed with moderate cost

ISDN—Moderate speed with moderate cost

Cell phone—Low speed with high cost

14 Answer

Remote broadband access options include

Digital subscriber line (DSL)/cable—Low to high speed withmoderate cost

Satellite—Moderate to high speed with high cost

Page 277: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 277/503

CCDP-ARCH Section 2: The Enterprise Edge 259

Question

Question

   T   h  e

   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

   T   h  e   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

15

What formula should you use to determine thetotal required bandwidth when provisioning

bandwidth for the central site remote access

connection?

16

When designing the Internet connectivity

module, what extra design requirement do you

have for traffic flowing from the Internet into

your site, versus traffic flowing from your site

into the Internet?

Page 278: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 278/503

Page 279: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 279/503

CCDP-ARCH Section 2: The Enterprise Edge 261

Question

Question

   T   h  e

   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

   T   h  e   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

17

Describe the difference between NAToverloading and dynamic NAT.

18

What type of routing is used for a router

pointing to an ISP in a single-homed

configuration?

Page 280: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 280/503

 262 CCDP-ARCH Section 2: The Enterprise Edge

Question

Question

17 Answer

NAT overloading uses a single outside public IP address to servicerequests for multiple inside IP addresses by building a table that keeps

track of Layer 4 port numbers associated with each session. Note that

NAT overloading is sometimes called Port Address Translation

(PAT).

Dynamic NAT maps private inside IP addresses to a pool of public

outside IP addresses.

18 Answer

A default route pointing to the ISP is appropriate for an edge router

in a single-homed configuration because, if there is only one path to

the Internet, the router is not required to maintain a copy of the entire

Internet routing table.

Page 281: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 281/503

CCDP-ARCH Section 2: The Enterprise Edge 263

Question

Question

   T   h  e

   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

   T   h  e   E  n   t  e  r  p  r   i  s  e

   E   d  g  e

19

What routing protocol is appropriate for arouter that points to multiple ISPs in a

multihomed configuration?

20

Describe the purpose of the remote access and

VPN module, which is part of the Enterprise

Edge.

Page 282: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 282/503

 264 CCDP-ARCH Section 2: The Enterprise Edge

Question

Question

19 Answer

The Border Gateway Protocol (BGP) is appropriate for a router thatpoints to multiple ISPs in a multi homed configuration. BGP forwards

traffic based on autonomous system (AS) paths. By configuring your

AS for BGP, the Internet can see multiple paths through which your

AS can be reached (for example, a path via each of your ISPs).

In this configuration, your site can still reach the Internet, and Internet

users can still reach your site’s resources in the event of a single

failure between your AS and one of your ISPs. Additionally, a multi-

homed design adds load balancing.

20 Answer

The remote access and VPN module is the piece of the Enterprise

Composite Network Model that allows end users to access resources

remotely. Common components in this module include access servers

(for authentication and authorization), firewalls, and IntrusionDetection Systems (IDSs).

Page 283: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 283/503

Page 284: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 284/503

   C   C   D

   P  -   A   R   C   H

Section 3Network Management

Network management services help you proactivelymonitor, manage, configure, and even troubleshoot theenterprise network. CiscoWorks is the Cisco flagshipnetwork management product. However, CiscoWorksis not a single software package; it has multiple add-on

modules, such as the LAN Management Solution(LMS) and the Routed WAN (RWAN) ManagementSolution.

CiscoWorks functions as part of an overall networkmanagement strategy that you devise for yournetwork. This strategy identifies network managementgoals, policies, and procedures. For example, you mustdocument a series of response steps to perform in theevent of various “what if” scenarios.

The flash cards in this section review the componentsof a network management strategy. They also focus onthe components of the CiscoWorks network manage-ment solution and design guidelines.

Page 285: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 285/503

CCDP-ARCH Section 3: Network Management 267

Question

Question

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

1

The goals of network management can besummarized in the acronym FCAPS. Identify

what each letter in FCAPS represents.

2

List at least four services that might be found in

the Network Management module.

Page 286: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 286/503

 268 CCDP-ARCH Section 3: Network Management

Question

Question

1 Answer

The ISO defined a framework for network management that isreferred to as FCAPS. FCAPS is an acronym that represents the

following:

• Fault Management

• Configuration Management

• Accounting Management

• Performance Management

• Security Management

2 Answer

The following services are often found in a Network Management

module:

• Authentication server

• Access control server

• Network monitoring server

• IDS director

• Syslog server

• System administration server

Page 287: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 287/503

CCDP-ARCH Section 3: Network Management 269

Question

Question

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

3

What is the first CiscoWorks componentinstalled on a management server, and what

applications does it contain?

4

Identify the three components that are

packaged as part of the CiscoWorks LMS.

Page 288: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 288/503

 270 CCDP-ARCH Section 3: Network Management

Question

Question

3 Answer

The first CiscoWorks component installed on a management server isCD One, which includes the following applications:

• CiscoView

• CiscoWorks Management Server

• Integration Utility

4 Answer

The CiscoWorks LAN Management Solutions (LMS) includes the

following:

• Campus Manager

• nGenius Real-Time Monitor

• Device Fault Manager

Page 289: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 289/503

CCDP-ARCH Section 3: Network Management 271

Question

Question

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

5

Describe the purpose of the CiscoWorks ACLManager.

6

How many managed network devices does a

single instance of the CiscoWorks LMS

support?

Page 290: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 290/503

 272 CCDP-ARCH Section 3: Network Management

Question

Question

5 Answer

The ACL Manager is part of the CiscoWorks RWAN product bundle,and it provides a convenient way to create, edit, and distribute access

lists to multiple IOS devices.

6 Answer

A single instance of the CiscoWorks LAN Management Solution

(LMS) can support networks of up to 2000 managed devices or

40,000 end-user stations.

Page 291: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 291/503

CCDP-ARCH Section 3: Network Management 273

Question

Question

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

7

What is the Cisco recommendation for themaximum number of managed devices

supported on a single RME server?

8

What is the maximum number of devices that

a single CiscoWorks Central Resource

Management server should support?

Page 292: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 292/503

 274 CCDP-ARCH Section 3: Network Management

Question

Question

7 Answer

Cisco recommends a maximum of 500 managed devices per RMEserver. However, on higher-end systems, that number could grow to

as large as 1000 managed devices.

8 Answer

A single Central Resource Management server can support up to

5000 user devices. The Central Resource Management can, for

example, act as a repository for inventory, configurations, changes,

and software distribution.

Page 293: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 293/503

CCDP-ARCH Section 3: Network Management 275

Question

Question

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

   N  e   t  w  o  r   k

   M  a  n  a  g  e  m  e  n   t

9

What is the approximate maximum number ofdevices supported in a single CiscoWorks

management domain, running LMS or RWAN?

10

Describe how the CiscoWorks IPM determines

network conditions for multiple traffic types.

Page 294: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 294/503

 276 CCDP-ARCH Section 3: Network Management

Question

Question

9 Answer

A management domain divides management responsibilities (such asresource network management, campus network management, and

device fault management) across multiple servers. However, the

domain’s maximum capacity is not greater than that of a single

management server. Therefore, the approximate number of devices

supported in a single management domain, running LMS or RWAN,

is 2000.

10 Answer

The Internet Performance Monitor (IPM) sends Service Assurance

Agent (SAA) probes out into the network. These SAA probes can

emulate the appearance of various traffic types, such as HTTP or

VoIP. By discovering how the network treats these probes, you canmore effectively monitor and troubleshoot network conditions for

application-specific traffic.

Page 295: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 295/503

Page 296: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 296/503

   C   C   D

   P  -   A   R   C   H

Section 4High Availability

Previously, you considered the Common NetworkInfrastructure portion of the Cisco AVVID model.Next, consider AVVID’s Intelligent Network Servicesportion. These services build on top of the infrastruc-ture, ultimately providing a foundation for AVVID’s

network solutions. High availability is one of thoseintelligent network services.

The converged nature of today’s enterprise networksrequires you to support voice, video, and data over thesame network. Some applications are mission-critical,and as a designer, you must maximize network uptime.

The flash cards in this section identify high availabilitymeasurements, and they examine approaches to

achieving high availability at Layers 1, 2, and 3. Theyalso review design best practices.

Page 297: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 297/503

CCDP-ARCH Section 4: High Availability 279

Question

Question

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

1

How much downtime per year is represented bya high availability measurement of “five

nines?”

2

Describe how the Mean Time To Repair (MTTR)

measurement influences availability.

Page 298: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 298/503

 280 CCDP-ARCH Section 4: High Availability

Question

Question

1 Answer

The “five nines” refers to 99.999 percent uptime, which translates to5 minutes of downtime per year. The “six nines” (or 99.9999 percent

uptime) equates to only 30 seconds of yearly downtime.

2 Answer

Availability of a system increases as the Mean Time To Repair

(MTTR) decreases. In other words, if a device can be repaired

quickly, its uptime increases.

Page 299: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 299/503

CCDP-ARCH Section 4: High Availability 281

Question

Question

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

3

Discuss how the Mean Time Between Failure(MTBF) measurement influences availability.

4

Describe how a Standby Route Processor in a

Layer 3 switch increases the switch’s

availability.

Page 300: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 300/503

 282 CCDP-ARCH Section 4: High Availability

Question

Question

3 Answer

Availability of a system increases as the Mean Time Between Failure(MTBF) increases because less frequent downtime translates to

increased uptime.

4 Answer

A Layer 3 switch can have an Active Route Processor (RP) and a

Standby RP. If the Active RP fails, the Standby RP takes over switch

operation. However, the Standby RP does not process packets when

in standby mode.

Page 301: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 301/503

CCDP-ARCH Section 4: High Availability 283

Question

Question

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

5

Identify the pros and cons of the active-activeand active-standby models of NIC redundancy.

6

Identify a Cisco-proprietary and an industry

standard approach to providing first hop

redundancy (such as maintaining an IP address

for a device’s default gateway).

Page 302: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 302/503

 284 CCDP-ARCH Section 4: High Availability

Question

Question

5 Answer

For redundancy, a server or end-user station can have an additionalNetwork Interface Card (NIC). With the active-active implemen-

tation, both NICs are simultaneously active, thereby reducing

downtime in the event of an NIC failure. However, because each NIC

has its own Media Access Control (MAC) address and IP address,

troubleshooting becomes more difficult.

The active-standby implementation places one of the NICs on

standby. Therefore, the standby NIC does not forward packets until

the active NIC fails. This cutover process introduces a slight delay for

the active-standby implementation as compared to the active-activeimplementation. However, the active-standby approach maintains a

common IP and MAC address, regardless of which NIC is active; this

results in simplified troubleshooting.

6 Answer

First hop redundancy means that a different fault gateway can service

an end station that is pointing to a default gateway in the event of a

failure. A Cisco-proprietary approach to first hop redundancy is the

 Hot Standby Router Protocol (HSRP). An industry standard approachis the Virtual Router Redundancy Protocol (VRRP).

Page 303: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 303/503

CCDP-ARCH Section 4: High Availability 285

Question

Question

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

7

Describe the Cisco EtherChannel feature.

8

Describe the advantage of Multiple Spanning

Tree (IEEE 802.1s) over the Cisco Per-VLAN

Spanning Tree.

Page 304: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 304/503

 286 CCDP-ARCH Section 4: High Availability

Question

Question

7 Answer

The EtherChannel feature allows a switch to logically combinemultiple physical connections (up to eight) into a single logical

channel. Not only does EtherChannel improve throughput between

switches by load balancing across the physical links, but it also

improves redundancy. Specifically, if a link within the EtherChannel

fails, the remaining EtherChannel physical links carry all of the

traffic.

8 Answer

With the Cisco traditional Per-VLAN Spanning Tree approach, each

VLAN required its own instance of Spanning Tree, even if some of

those instances were identical. This increased the switch’s CPU

overhead. However, with Multiple Spanning Tree (MST), also knownas IEEE 802.1s, you define the number of Spanning Tree instances

you need and then assign VLANs to those instances. This approach

reduces the CPU overhead that is required to maintain extra instances

of Spanning Tree.

Page 305: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 305/503

CCDP-ARCH Section 4: High Availability 287

Question

Question

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

9

What Cisco proprietary enhancement to theIEEE 802.1D STP is appropriate for Building

Access switches and reduces STP convergence

time to approximately 1 to 5 seconds in the

event of an uplink failure?

10

The availability of a switched infrastructure can

be improved through the use of module

redundancy and/or chassis redundancy.

Contrast the characteristics of module

redundancy with those of chassis redundancy.

Page 306: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 306/503

 288 CCDP-ARCH Section 4: High Availability

Question

Question

9 Answer

UplinkFast  is a Cisco-proprietary feature that reduces the SpanningTree Protocol (STP) convergence time between Building Access

switches and Building Distribution switches to approximately 1 to 5

seconds. This reduced time is made possible because the Building

Access switch cuts over to a blocked port when its root port goes

down, and because the Building Access switch sends a series of

multicast frames, with the source MAC addresses being the MAC

addresses of the directly attached end-user stations. The flooding of

these multicast frames quickly trains the other switches in the

topology to reach the directly attached end-stations over the backuplink.

10 Answer

Module redundancy enhances high availability by having back-up

modules within a chassis take over in the event of a module failure.

For example, if a primary route processor fails, a standby route

processor takes over. The operating system within the chassisdetermines the cutover time. This approach is typically cost effective

because additional chassis do not have to be purchased.

Chassis redundancy enhances high availability by interconnecting

redundant chassis via multiple links. For example, if a single chassis

or a single link fails, there is still a path through the network.

However, having additional chassis and links can increase complexity

and expense.

Page 307: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 307/503

CCDP-ARCH Section 4: High Availability 289

Question

Question

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

   H   i  g   h   A  v  a   i   l  a   b   i   l   i   t  y

11

Identify the second step in the Cisco five-stephigh availability design process.

12

Identify at least one design best practice for

providing high availability in the server farm

module.

Page 308: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 308/503

 290 CCDP-ARCH Section 4: High Availability

Question

Question

11 Answer

The second step in the Cisco five-step high availability design processis: Identify the budget to fund high availability features.

The following five design steps contain the Cisco high availability

best practices:

1 Examine technical goals.

2 Identify the budget to fund high availability features.

3 Categorize business applications into profiles.

4 Establish performance standards for high availabilitysolutions.

5 Define how to manage and measure the high availability

solution.

12 Answer

Design best practices for the server farm include the following:

• Have redundant components in networking devices.

Provide redundant paths between devices.• Optionally, use multiple NICs in the servers (i.e., dual

homing).

Page 309: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 309/503

Page 310: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 310/503

   C   C   D

   P  -   A   R   C   H

Section 5Network Security

Securing network resources is considered one of theIntelligent Network Services of AVVID. The impor-tance of network security increased dramatically overthe past two decades because of the increased avail-ability of advanced hacking tools. Today, even an

unsophisticated hacker can download tools from theInternet, perform reconnaissance on your network,and attempt to breach your network security.

The flash cards in this section identify security risks andpossible mitigations against those threats. Cisco hasalso integrated the concept of network security into theEnterprise Composite Network Model by creating theSAFE blueprint, which identifies which devices residein which Enterprise Composite Network Modelmodule, the potential security threats for each module,and the mitigations that can be used within eachmodule.

Page 311: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 311/503

CCDP-ARCH Section 5: Network Security 293

Question

Question

   N

  e   t  w  o  r   k

   S

  e  c  u  r   i   t  y

   N  e   t  w  o  r   k

   S  e  c  u  r   i   t  y

1

Identify four common security threats toenterprise networks.

2

List at least three common components of a

documented security policy.

Page 312: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 312/503

 294 CCDP-ARCH Section 5: Network Security

Question

Question

1 Answer

Four common security threats to enterprise networks include thefollowing:

Loss of privacy—For example, obtaining another user’spassword via eavesdropping

Data theft—For example, making a copy of a private document

Impersonation—For example, gaining access to restrictedresources by pretending to be a different user

Loss of integrity—For example, manipulating data in transit

2 Answer

A security policy should contain the following components:

• Acceptable use policy—How the network is to be used

Identification and authentication policy—How a user’sidentity is verified

• Internet use policy—What actions are valid uses of theInternet

• Campus access policy—When a user is permitted to accesscampus resources from inside the campus

• Remote access policy—When a user is permitted to accesscampus resources from a remote location

Page 313: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 313/503

CCDP-ARCH Section 5: Network Security 295

Question

Question

   N

  e   t  w  o  r   k

   S

  e  c  u  r   i   t  y

   N  e   t  w  o  r   k

   S  e  c  u  r   i   t  y

3

Name the four components in the Ciscocontinuous security design process.

4

List the Cisco five broad categories of security

solutions.

Page 314: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 314/503

 296 CCDP-ARCH Section 5: Network Security

Question

Question

3 Answer

Security design is a continual process; changes are made based onnewly identified threats. The four steps in this continual process

include the following:

• Secure—Apply security solutions.

• Monitor—Observe the operation of the security solutions.

• Test—Verify the network’s integrity by testing variousmethods of compromising the network.

Improve—Repeat this process again based on the results ofthe testing.

4 Answer

Cisco categorizes security solutions into the following five

categories:

1 Secure connectivity—Protecting information from

eavesdropping

2 Perimeter security—Ensuring that only authorized usersaccess network resources

3 Intrusion protection—Uses technologies such asvulnerability scanners to test the network’s integrity

4 Identity—Uses access servers, such as the Cisco SecureAccess Control Server (ACS), to authenticate and authorize

users5 Security management—Uses tools to analyze and manage

security solutions on an enterprise-wide basis, perhaps via aGUI

Page 315: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 315/503

CCDP-ARCH Section 5: Network Security 297

Question

Question

   N

  e   t  w  o  r   k

   S

  e  c  u  r   i   t  y

   N  e   t  w  o  r   k

   S  e  c  u  r   i   t  y

5

List at least two ways to mitigate the securitythreat that is introduced by the presence of a

packet sniffer on the network.

6

What is the only security mitigation for a man-

in-the-middle attack?

Page 316: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 316/503

 298 CCDP-ARCH Section 5: Network Security

Question

Question

5 Answer

Packet sniffers can capture packets that flow across the network.The following are approaches to mitigate this threat:

• Use authentication

• Use switches instead of hubs

• Use anti-sniffer tools

• Use cryptography

6 Answer

Cryptography is the only mitigation for a man-in-the-middle attack

(for example, packets are intercepted as they flow through the

network).

Page 317: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 317/503

CCDP-ARCH Section 5: Network Security 299

Question

Question

   N

  e   t  w  o  r   k

   S

  e  c  u  r   i   t  y

   N  e   t  w  o  r   k

   S  e  c  u  r   i   t  y

7

Identify two types of Cisco firewalls from whichyou can select.

8

What are two types of Intrusion Detection

Systems?

Page 318: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 318/503

 300 CCDP-ARCH Section 5: Network Security

Question

Question

7 Answer

Cisco offers the PIX Firewall as a standalone firewall appliance.However, for a personal firewall or a small network’s firewall, you

might select the IOS Firewall, which is a Cisco router running a

version of the IOS that contains the Firewall feature set.

8 Answer

Cisco offers both host-based  and network-based  Intrusion Detection

Systems (IDSs). Host-based IDS is software that you install on a host

to protect that host from attack. Network-based IDSs use hardware

devices to compare packets against signatures of “well-known”attacks. After an attack has been identified, the IDS can send an alarm,

send a TCP Reset, or block traffic from the offending device. The

network-based IDS hardware can be a standalone appliance or a

module in a Catalyst switch.

Page 319: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 319/503

CCDP-ARCH Section 5: Network Security 301

Question

Question

   N

  e   t  w  o  r   k

   S

  e  c  u  r   i   t  y

   N  e   t  w  o  r   k

   S  e  c  u  r   i   t  y

9

In terms of security, what does AAA stand for?

10

Which of the following AAA protocols is the

most secure?

• RADIUS

• TACACS+

Page 320: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 320/503

 302 CCDP-ARCH Section 5: Network Security

Question

Question

9 Answer

AAA stands for Authentication, Authorization, and Accounting.Authentication validates that a user is who he says he is. Authori-

zation specifies what a particular user can do. Accounting keeps track

of what a user does.

10 Answer

TACACS+ is more secure than RADIUS because it encrypts all the

traffic sent between the Cisco device and the TACACS+ server.

RADIUS only encrypts the access-request packet from the client to

the server.

Page 321: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 321/503

CCDP-ARCH Section 5: Network Security 303

Question

Question

   N

  e   t  w  o  r   k

   S

  e  c  u  r   i   t  y

   N  e   t  w  o  r   k

   S  e  c  u  r   i   t  y

11

List at least two goals of IPSec.

12

How many secure tunnels does IPSec establish

between two peers?

Page 322: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 322/503

 304 CCDP-ARCH Section 5: Network Security

Question

Question

11 Answer

The four primary goals of IPSec are as follows:• Data confidentiality—Scrambles data so eavesdroppers

cannot interpret it

• Data integrity—Uses hashing algorithms to ensure the datawas not manipulated

• Data origin authentication—Verifies that the packet camefrom the person from whom you think it came

Anti-replay—Prevents packets that have been captured by anetwork sniffer from being replayed to spoof the entry ofvalid credentials

12 Answer

IPSec establishes two secure tunnels between two peers—

specifically, it creates an Internet Key Change (IKE) phase I tunnel

and an IKE phase II tunnel.

Page 323: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 323/503

CCDP-ARCH Section 5: Network Security 305

Question

Question

   N

  e   t  w  o  r   k

   S

  e  c  u  r   i   t  y

   N  e   t  w  o  r   k

   S  e  c  u  r   i   t  y

13

Explain the purpose of the AuthenticationHeader (AH) and Encapsulating Security

Payload (ESP) protocols.

14

Define SAFE in the context of security.

Page 324: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 324/503

 306 CCDP-ARCH Section 5: Network Security

Question

Question

13 Answer

Both the AH protocol and the ESP protocol can be used as part of IPSecurity (IPSec) to verify a packet’s integrity.

14 Answer

SAFE is the Cisco blueprint for designing secure networks. The

SAFE architecture categorizes devices and security threats into

modules of the Enterprise Composite Network Model. For a

comprehensive examination of the SAFE blueprint, examine thefollowing link: http://www.cisco.com/go/safe.

Page 325: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 325/503

Page 326: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 326/503

   C   C   D

   P  -   A   R   C   H

Section 6Quality of Service

Not all applications coursing through your networkneed the same priority level. VoIP traffic typically needsmuch higher priority than, FTP traffic for example.Also, different applications might require differentamounts of bandwidth. Fortunately, QoS mechanisms

allow you to customize the priority and bandwidthgiven to your various traffic types.

The flash cards in this section review the need for QoSand numerous categories of QoS tools, such asclassification and marking, congestion avoidance,congestion management, traffic conditioning,signaling, and link-efficiency mechanisms. Finally, youare challenged to recall QoS design best practices.

Page 327: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 327/503

CCDP-ARCH Section 6: Quality of Service 309

Question

Question

   Q  u  a   l   i   t  y  o   f

   S  e  r  v   i  c  e

   Q  u  a   l   i   t  y  o   f

   S  e  r  v   i  c  e

1

List three problems that might impact latency-sensitive applications in a network without

QoS enabled.

2

Name the two broad categories of QoS tools.

Page 328: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 328/503

 310 CCDP-ARCH Section 6: Quality of Service

Question

Question

1 Answer

In the absence of QoS, applications can suffer from one or more of thefollowing:

• Delay (latency)—Excessive time required for a packet totraverse the network

• Delay variation (jitter)—The uneven arrival of packets,which the listener can interpret as dropped voice packets inthe case of VoIP

• Packet loss—Dropping packets, especially problematic for

UDP traffic (such as VoIP), which does not retransmitdropped packets

2 Answer

The two broad categories of QoS tools are

• Integrated Services (IntServ)

Differentiated Services (DiffServ)However, more specific categories include the following:

• Classification and marking

• Congestion avoidance

• Congestion management

• Traffic conditioning

Signaling• Link-efficiency mechanisms

Page 329: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 329/503

Page 330: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 330/503

 312 CCDP-ARCH Section 6: Quality of Service

Question

Question

3 Answer

The DSCP uses the six left-most bits in an IPv4 header’s type ofservice (ToS) byte. These six bits have 64 possible binary

combinations. Therefore, DSCP can specify up to 64 levels of priority

(0-63).

4 Answer

A trust boundary is placed as close to the source as possible, at a

device you trust to make marking decisions. For example, you might

not trust a user’s PC, but you might trust a Cisco IP phone on that

user’s desktop to make appropriate marking decisions. In thatinstance, you place the trust boundary at the Cisco IP phone.

Page 331: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 331/503

CCDP-ARCH Section 6: Quality of Service 313

Question

Question

   Q  u  a   l   i   t  y  o   f

   S  e  r  v   i  c  e

   Q  u  a   l   i   t  y  o   f

   S  e  r  v   i  c  e

5

In terms of QoS, what primary congestionavoidance does Cisco use?

6

What is the preferred congestion management

tool for VoIP traffic?

Page 332: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 332/503

 314 CCDP-ARCH Section 6: Quality of Service

Question

Question

5 Answer

Weighted Random Early Detection (WRED) is the primaryCongestion Avoidance tool used by Cisco. WRED prevents an

interface’s queue from filling to capacity by discarding packets more

aggressively as the queue depth increases, based on priority

markings.

6 Answer

 Low latency queuing (LLQ) is the Cisco preferred queuing (or

congestion management) approach for VoIP traffic. With LLQ, you

can define up to 64 classes of traffic (including a default class) and

specify bandwidth guarantees for each class. With LLQ, you can alsoconfigure one or more of the traffic classes as a priority class.

Page 333: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 333/503

CCDP-ARCH Section 6: Quality of Service 315

Question

Question

   Q  u  a   l   i   t  y  o   f

   S  e  r  v   i  c  e

   Q  u  a   l   i   t  y  o   f

   S  e  r  v   i  c  e

7

The traffic-conditioning category of QoS toolslimits bandwidth for specified traffic types. List

two categories of traffic conditioning tools.

8

Is RSVP considered an IntServ tool or a DiffServ

tool?

Page 334: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 334/503

 316 CCDP-ARCH Section 6: Quality of Service

Question

Question

7 Answer

Policing and shaping are both traffic conditioning tools that limitbandwidth usage. Examples of policing tools include class-based

policing and committed access rate (CAR). Shaping tools include, for

example, Frame Relay Traffic Shaping (FRTS), class-based traffic

shaping, and generic traffic shaping.

8 Answer

The RSVP, which uses signaling, is considered an Integrated Services

(IntServ) tool.

Page 335: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 335/503

Page 336: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 336/503

 318 CCDP-ARCH Section 6: Quality of Service

Question

Question

9 Answer

LFI fragments large payloads on low-speed links (for example, lessthan 768 kbps) and interleaves smaller packets among the fragments.

This decreases the serialization delay that latency-sensitive traffic

might experience.

10 Answer

cRTP compresses the combined IP, UDP, and RTP header

(approximately 40 bytes in size) down to approximately 2 to 4 bytes.

Page 337: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 337/503

CCDP-ARCH Section 6: Quality of Service 319

Question

Question

   Q  u  a   l   i   t  y  o   f

   S  e  r  v   i  c  e

   Q  u  a   l   i   t  y  o   f

   S  e  r  v   i  c  e

11

List at least two questions to ask as you designa QoS solution.

12

Identify at least two QoS functions recom-

mended for building access module switches.

Page 338: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 338/503

 320 CCDP-ARCH Section 6: Quality of Service

Question

Question

11 Answer

When designing a QoS solution, ask the following questions:• What problems do the QoS tools need to solve?

• Will the IntServ or DiffServ model be used?

• How should the problem be solved?

• How do different solutions compare in terms ofperformance and cost?

12 Answer

QoS functions recommended for a building access module switch

include a switch’s ability to do the following:

• Support multiple VLANs

• Manipulate markings provided by end-user systems

• Create a trust boundary close to the source

Page 339: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 339/503

CCDP-ARCH Section 6: Quality of Service 321

Question

Question

   Q  u  a   l   i   t  y  o   f

   S  e  r  v   i  c  e

   Q  u  a   l   i   t  y  o   f

   S  e  r  v   i  c  e

13

Identify at least two QoS functions recom-mended for a building distribution module

switch.

14

Identify two QoS tools that are appropriate for

use in campus backbone switches.

Page 340: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 340/503

Page 341: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 341/503

Page 342: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 342/503

   C   C   D

   P  -   A   R   C   H

Section 7IP Multicasting

IP multicast technologies allow a source to send trafficto a large number of receivers efficiently. Examples ofIP multicast applications include a company’s CEOsending a corporate-wide video to thousands ofreceivers, or a Cisco CallManager sending music on

hold to multiple IP phones.

The flash cards in this section review the need for andchallenges of IP multicast technologies. It examines theprotocols required to support IP multicast, andchallenges you with IP multicast design guidelines.

Page 343: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 343/503

CCDP-ARCH Section 7: IP Multicasting 325

Question

Question

   I   P   M  u   l   t   i  c

  a  s   t   i  n  g

   I   P   M  u   l   t   i  c  a  s   t   i  n  g

1

Describe the potential benefit of multicastversus unicast or broadcast.

2

What range of IP addresses is reserved for IP

multicast addresses?

Page 344: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 344/503

 326 CCDP-ARCH Section 7: IP Multicasting

Question

Question

1 Answer

A video feed being sent to multiple users in your organization couldconsume a tremendous amount of bandwidth if the video to each

receiver were unicast. A broadcast sends the packets to devices that

do not want the packets. Fortunately, multicast can send a single copy

of each packet from the source to only those devices that want to

receive the packet.

2 Answer

IP multicast uses Class D IP address, which are in the range of

224.0.0.0 through 239.255.255.255.

Page 345: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 345/503

CCDP-ARCH Section 7: IP Multicasting 327

Question

Question

   I   P   M  u   l   t   i  c

  a  s   t   i  n  g

   I   P   M  u   l   t   i  c  a  s   t   i  n  g

3

Name at least two drawbacks of IP multicasttechnologies.

4

Describe the purpose and operation of a

multicast RPF check.

Page 346: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 346/503

 328 CCDP-ARCH Section 7: IP Multicasting

Question

Question

3 Answer

IP multicast uses UDP, which is “unreliable.” Therefore, WRED,which works with the TCP slow start mechanism, cannot be used as

a congestion avoidance mechanism for IP multicast. With redundant

pathing in the network, there is the potential that multiple copies of

an IP multicast packet will be received, and the potential for IP

multicast packets to arrive out of order.

4 Answer

A Reverse Path Forwarding (RPF) check combats the issue of

receiving duplicate packets in an IP multicast network. Cisco routers

use the RPF check mechanism to determine whether a multicast

packet is entering a router on the appropriate interface. An RPF checkexamines the source address of an incoming packet and checks it

against the router’s unicast routing table to see what interface should

be used to return to the source network. If the incoming multicast

packet is using that interface, the RPF check passes, and the packet is

forwarded. If the multicast packet is coming in on a different inter-

face, the RPF check fails, and the packet is discarded.

Page 347: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 347/503

CCDP-ARCH Section 7: IP Multicasting 329

Question

Question

   I   P   M  u   l   t   i  c

  a  s   t   i  n  g

   I   P   M  u   l   t   i  c  a  s   t   i  n  g

5

Discuss the characteristics of a multicast sourcedistribution tree.

6

Describe the concept of a multicast shared

distribution tree.

Page 348: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 348/503

 330 CCDP-ARCH Section 7: IP Multicasting

Question

Question

5 Answer

A source distribution tree creates a loop-free path from each IPmulticast source router to the last-hop router (or the router attached to

the receiver). If multiple sources contain the same content, multiple

trees are created, one from each source router to the last-hop router.

As a result, routers have increased memory utilization. However, the

source distribution tree does create an optimal path between each

source router and the last-hop router.

6 Answer

A shared distribution tree uses the concept of a rendezvous point

(RP). Source routers (or the routers that are attached to the source)

create a source distribution tree to the RP, which then forwards the

multicast traffic down a shared tree to all of the last-hop routers (orthe routers that are attached to receivers). Because the last-hop routers

do not have a multicast routing entry for each server, and because they

are using a wildcard entry to represent all sources for a multicast

group, there is less memory overhead on the routers. However,

because IP multicast packets all flow through the RP, a shared

distribution tree might suffer from a sub-optimal path.

Page 349: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 349/503

CCDP-ARCH Section 7: IP Multicasting 331

Question

Question

   I   P   M  u   l   t   i  c

  a  s   t   i  n  g

   I   P   M  u   l   t   i  c  a  s   t   i  n  g

7

Identify where you would use PIM-DM andPIM-SM in a multicast network design.

8

Routers and Layer 2 switches can run what

Cisco proprietary protocol to inform the Layer 2

switch that some of its interfaces are connected

to multicast receivers?

Page 350: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 350/503

Page 351: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 351/503

CCDP-ARCH Section 7: IP Multicasting 333

Question

Question

   I   P   M  u   l   t   i  c

  a  s   t   i  n  g

   I   P   M  u   l   t   i  c  a  s   t   i  n  g

9

In terms of multicast networks, describe thepurpose and operation of IGMP snooping.

10

List and describe at least two interdomain

multicast routing protocols.

Page 352: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 352/503

 334 CCDP-ARCH Section 7: IP Multicasting

Question

Question

9 Answer

IGMP snooping is a method of training a switch about which of itsinterfaces are connected to multicast receivers. However, IGMP

snooping acts independently of router operations and is therefore

even compatible with non-Cisco routers.

The switch enabled for IGMP snooping eavesdrops in on the IGMP

messages that are being exchanged between receivers and a router. By

watching those IGMP packets, the switch can determine which of its

interfaces are connected to receivers for particular multicast groups.

10 Answer

You need an interdomain multicast routing protocol for efficient

multicast operations between BGP (Border Gateway Protocol)

autonomous systems. Following are three interdomain multicast

routing protocols, one of which is still in development, and two thatcan be used today:

• Border Gateway Multicast Protocol (BGMP)—With thegoal of becoming a multicast routing protocol that can scaleto the global Internet, BGMP is still in development.

• Multicast BGP (MBGP)—MBGP is an extension of BGPthat allows autonomous systems to exchange multicast RPFinformation as MBGP multicast NLRI (Network Layer

Reachability Information).• Multicast Source Discovery Protocol (MSDP)—MSDP

works with PIM-SM to allow rendezvous points (RPs) inone domain to announce their sources to another domain.

Page 353: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 353/503

CCDP-ARCH Section 7: IP Multicasting 335

Question

Question

   I   P   M  u   l   t   i  c

  a  s   t   i  n  g

   I   P   M  u   l   t   i  c  a  s   t   i  n  g

11

In a multicast network design, what version ofIGMP is required to support SSM?

12

In a multicast network, IGMP is used between

multicast receivers and multicast routers. With

IGMP Version 1 configured with default

settings, what is the maximum amount of time

that can elapse before a router realizes that a

receiver has left the multicast group?

Page 354: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 354/503

 336 CCDP-ARCH Section 7: IP Multicasting

Question

Question

11 Answer

Source-Specific Multicast (SSM) requires IGMP Version 3. SSMallows a receiver to specify that it wants to receive content for a

multicast group from a specific source. As a result, servers with

different content can simultaneously transmit to the same multicast

group address.

12 Answer

Nearly three minutes can elapse before an IGMP Version 1 router

realizes that a receiver left. By default, the router sends IGMP queries

every 60 seconds. If two queries are sent and not responded to, the

router concludes that a receiver left the group.Consider a receiver that receives an IGMP query from the router to

see whether the receiver still wants to belong to a group. If the

receiver responds that it still wishes to belong, but shuts down its

multicast application a split-second later, the router does not even

recheck that device until nearly a minute later. After nearly 60

seconds elapse, the router again sends an IGMP query, and the

receiver does not respond, which constitutes the first missed query.

After another 60 seconds elapse, the router sends another IGMP

query, to which the receiver does not respond. Finally, 60 secondsafter the second IGMP query was sent, the router sees that there have

been two missed queries and prunes the interface.

Page 355: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 355/503

CCDP-ARCH Section 7: IP Multicasting 337

Question

Question

   I   P   M  u   l   t   i  c

  a  s   t   i  n  g

   I   P   M  u   l   t   i  c  a  s   t   i  n  g

13

Three different versions of the IGMP can beused in multicast networks. List an enhance-

ment of IGMP Version 2 over IGMP Version 1.

14

List at least three steps for designing an IP

Multicast network solution.

Page 356: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 356/503

 338 CCDP-ARCH Section 7: IP Multicasting

Question

Question

13 Answer

IGMP Version 2 sends group-specific queries and supports thesending of “leave” messages to inform the router of a receiver’s

departure from the multicast group.

14 Answer

The following are six steps for designing an IP Multicast network

solution:

1 Identify the multicast traffic’s source.

2 Identify which receivers can receive traffic for the group.

3 Specify how receivers join the group.

4 Select PIM Dense Mode (PIM-DM) or PIM Sparse Mode

(PIM-SM) as the router-to-router multicast protocol.

5 If PIM-SM is used, identify one or more rendezvous points

(RPs).

6 Provision bandwidth on links to support multicast traffic.

Page 357: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 357/503

CCDP-ARCH Section 7: IP Multicasting 339

Question

Question

   I   P   M  u   l   t   i  c

  a  s   t   i  n  g

   I   P   M  u   l   t   i  c  a  s   t   i  n  g

15

Where should RPs be placed in a small campusmulticast network design?

16

Where should RPs be placed in a large campus

multicast network design?

Page 358: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 358/503

 340 CCDP-ARCH Section 7: IP Multicasting

Question

Question

15 Answer

In a small campus design, any single RP could simultaneouslysupport all IP multicast sessions. The RP or RPs should be placed in

the building distribution module. However, in some small campus

designs, you might have a collapsed core, in which the building

distribution module and the campus backbone module are one in the

same. In such a scenario, RP can be placed in the campus backbone.

16 Answer

In a large campus design, distribute the load on your RPs by placing

RPs throughout the network, giving different RPs responsibility for

different ranges of IP multicast addresses.

Page 359: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 359/503

CCDP-ARCH Section 7: IP Multicasting 341

Question

Question

   I   P   M  u   l   t   i  c

  a  s   t   i  n  g

   I   P   M  u   l   t   i  c  a  s   t   i  n  g

17

Where should RPs be placed in a design for amulticast network that spans a WAN?

18

Identify a security concern with RPs in a

multicast network design.

Page 360: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 360/503

 342 CCDP-ARCH Section 7: IP Multicasting

Question

Question

17 Answer

In a WAN design, you do not want traffic from the source router (orthe router that is attached to the source) to the RP flowing over the

WAN. Such an approach is a very inefficient use of WAN bandwidth.

Therefore, when designing an IP multicast solution for the WAN,

place the RP as close to the source router as possible.

18 Answer

Two security concerns with RPs include the following:

• An inappropriate source can send traffic to a multicastgroup.

• A rogue RP can be introduced into the network.

Access control lists (ACLs) are used to address both of these issues.

Page 361: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 361/503

Page 362: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 362/503

   C   C   D

   P  -   A   R   C   H

Section 8VPNs

Traditionally, geographically separated corporate sitesinterconnected via a private WAN. Remote users (ortelecommuters) used technologies such as dialup toaccess a modem bank that was located at the corporateheadquarters. However, with the advent of VPNs, sites

can securely connect with other sites, and users cansecurely connect with the corporate network over thepublic Internet. VPNs are far more scalable and lessexpensive than the legacy approaches mentionedpreviously.

The flash cards in this section identify the componentsof a VPN and review VPN design considerations. Thedesign process for a VPN depends on the type of VPNbeing constructed—either a site-to-site or remoteaccess VPN. These flash cards challenge you to identifyspecific issues for each VPN type.

Page 363: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 363/503

CCDP-ARCH Section 8: VPNs 345

Question

Question

   V   P   N  s

   V   P   N  s

1

List and describe the two primary categories ofVPNs that Cisco identifies.

2

A GRE tunnel supports what types of traffic that

are not supported by an IPSec tunnel?

Page 364: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 364/503

 346 CCDP-ARCH Section 8: VPNs

Question

Question

1 Answer

The two primary categories of VPNs are• Site-to-site—Interconnects two sites as an alternative to a

leased line at a reduced cost

• Remote access—Interconnects a remote user with a site asan alternative to dialup or ISDN connectivity at a reducedcost

2 Answer

IP Security (IPSec) tunnels only support IP unicast traffic. Generic

Router Encapsulation (GRE) tunnels add support for multicast ,

broadcast , and non-IP traffic.

Page 365: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 365/503

CCDP-ARCH Section 8: VPNs 347

Question

Question

   V   P   N  s

   V   P   N  s

3

What is the purpose of 3DES in a VPN design?

4

As a design best practice, how many site-to-site

tunnels require the use of a dedicated VPN

concentrator versus an IOS router for

termination?

Page 366: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 366/503

 348 CCDP-ARCH Section 8: VPNs

Question

Question

3 Answer

Triple Data Encryption Standard (3DES) is an encryption standardthat can be used to encrypt traffic that flows over a VPN. If packets

are encrypted via 3DES, they are rendered virtually unusable to

anyone who might intercept and capture the packets.

4 Answer

An IOS router can be used to support up to 70 site-to-site tunnels.

However, as a best practice, a dedicated VPN concentrator should be

used for 70 or more site-to-site VPN tunnels.

Page 367: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 367/503

CCDP-ARCH Section 8: VPNs 349

Question

Question

   V   P   N  s

   V   P   N  s

5

What CiscoWorks module is designed for VPNand security management?

6

List at least two components of the CiscoWorks

VPN/Security Management Solution.

Page 368: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 368/503

 350 CCDP-ARCH Section 8: VPNs

Question

Question

5 Answer

In addition to other security services the CiscoWorks VPN/Security Management Solution module supports configuration, monitoring,

and troubleshooting of VPNs.

6 Answer

The CiscoWorks VPN/Security Management solution includes the

following components:

• VPN Monitor—Monitors IPSec sessions on routers and

concentrators

• Cisco IDS Host Sensor—Monitors security threats to criticalservers

• Cisco Secure Policy Manager (CSPM)—Manages IDS, IOS,and PIX devices and can report intrusion alerts

• Resource Manager Essentials (RME)—Supports softwaredistribution

• CiscoView—Graphically displays status information andallows you to configure a network element

Page 369: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 369/503

CCDP-ARCH Section 8: VPNs 351

Question

Question

   V   P   N  s

   V   P   N  s

7

List at least two of the four key componentsthat can comprise a site-to-site VPN.

8

Name two advantages of using a site-to-site

VPN versus a private WAN to interconnect

multiple corporate sites.

Page 370: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 370/503

 352 CCDP-ARCH Section 8: VPNs

Question

Question

7 Answer

The four key components of a site-to-site VPN include the following:1 Cisco head-end VPN routers

2 Cisco VPN access routers

3 IPSec and generic routing encapsulation (GRE) tunnels

4 Internet access

8 Answer

A site-to-site VPN is more scalable and less expensive than a private

WAN. However, a private WAN does have the advantage of being

privately managed and is considered more secure.

Page 371: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 371/503

CCDP-ARCH Section 8: VPNs 353

Question

Question

   V   P   N  s

   V   P   N  s

9

List at least two of the four primary steps fordesigning a site-to-site VPN.

10

Describe a design scenario that is appropriate

for a hub-and-spoke VPN topology.

Page 372: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 372/503

 354 CCDP-ARCH Section 8: VPNs

Question

Question

9 Answer

The four primary steps to site-to-site VPN design are1 Characterize the application demands for the VPN.

2 Select a VPN topology between sites.

3 Add redundant connections.

4 Select a router for the head-end, based on anticipated VPNusage.

10 Answer

A hub-and-spoke VPN topology is appropriate for a network with

multiple remote sites that connect back to a central site, with little if

any traffic traveling between remote sites.

Page 373: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 373/503

CCDP-ARCH Section 8: VPNs 355

Question

Question

   V   P   N  s

   V   P   N  s

11

What is the main drawback of a full-mesh VPNdesign?

12

Explain the recommendation of hard coding a

VPN client’s MTU to 1400 bytes.

Page 374: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 374/503

 356 CCDP-ARCH Section 8: VPNs

Question

Question

11 Answer

A full-mesh VPN design minimizes delay between remote sites andprovides redundancy. However, a full-mesh VPN design is not  

scalable.

12 Answer

Configuring a VPN client’s Maximum Transmission Unit (MTU) size

to 1400 bytes prevents the fragmentation that could occur after IPSec

or GRE headers increase the packet size beyond 1500 bytes.

Page 375: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 375/503

CCDP-ARCH Section 8: VPNs 357

Question

Question

   V   P   N  s

   V   P   N  s

13

List the two modes of IPSec over a VPN.

14

List three common tunneling protocols used by

remote access VPN clients.

Page 376: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 376/503

 358 CCDP-ARCH Section 8: VPNs

Question

Question

13 Answer

The two modes of IPSec over a VPN are• Tunnel Mode—Encrypts each packet’s header and payload

• Transport Mode—Only encrypts data

14 Answer

VPN clients use the following three common tunneling protocols:

• IP Security (IPSec)

Generic Router Encapsulation (GRE)• Layer 2 Tunneling Protocol (L2TP)

Page 377: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 377/503

CCDP-ARCH Section 8: VPNs 359

Question

Question

   V   P   N  s

   V   P   N  s

15

In a VPN design, why should a VPN concen-trator be placed behind a router?

16

List at least three questions to ask when

designing a remote access VPN.

Page 378: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 378/503

 360 CCDP-ARCH Section 8: VPNs

Question

Question

15 Answer

A VPN concentrator should be placed behind a router to protect itfrom direct exposure to the public Internet.

16 Answer

When designing a remote access VPN, answer the following

questions:

• Is the primary goal remote access?

• What operating systems can be running on client devices?

• What VPN tunneling protocol is appropriate?

• What routing approach (such as static routes or a specificdynamic routing protocol) is appropriate for the VPNconcentrator?

• How should user authentication be performed?

Should the connection be a persistent connection (as in upall the time), or should it have a timeout?

Page 379: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 379/503

CCDP-ARCH Section 8: VPNs 361

Question

Question

   V   P   N  s

   V   P   N  s

17

Identify at least two questions to ask whenselecting a firewall for a remote access VPN

design.

18

What is the first step in capacity planning for a

remote access VPN?

Page 380: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 380/503

 362 CCDP-ARCH Section 8: VPNs

Question

Question

17 Answer

Ask the following questions when selecting a firewall for a remoteaccess VPN design:

• Does a firewall already exist in the topology?

• Is there an existing security policy specifying traffic that ispermitted to pass through the firewall?

• Are firewall interfaces available to protect the VPNconcentrator?

Are two firewall interfaces available to protect both thepublic and private VPN interfaces?

• If only one firewall interface is available, which VPNinterface should it protect?

18 Answer

The first step in capacity planning for a remote access VPN is to

approximate the total number of users.

Following is a complete list of capacity planning steps:

1 Determine the approximate number of total users.

2 Determine the approximate number of simultaneous users.

3 Identify the bandwidth of the existing ISP connection.

4 Determine the approximate bandwidth to be required forthe ISP connection.

5 Specify how a user connects to the VPN.

6 Estimate future growth of the VPN.

Page 381: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 381/503

CCDP-ARCH Section 8: VPNs 363

Question

Question

   V   P   N  s

   V   P   N  s

19

Explain how to enable an IPSec connectionthrough a router configured for PAT.

20

Define “split-tunneling” in the context of VPN

design.

Page 382: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 382/503

 364 CCDP-ARCH Section 8: VPNs

Question

Question

19 Answer

IPSec runs directly on IP. Therefore, in a PAT configuration, NATcannot examine port information, thus preventing the creation of

IPSec connections. One way to fix this issue is called NAT Traversal,

where IPSec peers negotiate an IPSec connection, determine whether

NAT is in use, and use a UDP wrapper if NAT is in use. This UDP

wrapper uses port 4500. This fix—sometimes called “packet

stuffing”—allows only one IPSec connection through a NAT router

running PAT.

20 Answer

With split tunneling, only traffic that needs to flow over the VPN is

sent over the VPN. Other traffic (such as web-browsing traffic) is sent

unencrypted over the local default gateway, typically your ISP’s next-

hop router. Be aware that split tunneling introduces a potentialsecurity vulnerability. If a split-tunneling system were compromised

from an attacker on the Internet, the attacker might have access (via

the split-tunnel) to corporate resources that are available over the

VPN.

Page 383: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 383/503

Page 384: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 384/503

   C   C   D

   P  -   A   R   C   H

Section 9Wireless LANs

Wireless LANs (WLANs) lend themselves to thefluctuating demands for office space. WLANs cansupport network expansion into an unwired area of abuilding or interconnect two nearby buildings.However, because WLAN network traffic flows

through the air, security is an important designconsideration.

The flash cards in this section review the componentsand options of WLANs. You are challenged withdesign best practices. Also, because security isespecially critical, you must distinguish betweenvarious WLAN security solutions and identify anappropriate use of each one.

Page 385: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 385/503

CCDP-ARCH Section 9: Wireless LANs 367

Question

Question

   W   i  r  e   l  e  s  s   L   A   N  s

   W   i  r  e   l  e  s  s   L   A   N  s

1

What is the purpose of an access point in WLANdesign?

2

Identify at least two factors that can affect the

coverage area of a wireless access point.

Page 386: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 386/503

 368 CCDP-ARCH Section 9: Wireless LANs

Question

Question

1 Answer

A wireless access point physically connects to the wired LANnetwork, and it has an antenna that allows communication with

wireless clients. Therefore, an access point is the device that wireless

clients pass through as they connect back to the wired LAN.

2 Answer

The coverage area of a wireless access point varies depending on the

following:

• Type and positioning of the WLAN antenna

• Power levels

• Structural barriers

• Required connection speed

Because of all the variables involved, a site survey is required to

achieve an optimal coverage area.

Page 387: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 387/503

CCDP-ARCH Section 9: Wireless LANs 369

Question

Question

   W   i  r  e   l  e  s  s   L   A   N  s

   W   i  r  e   l  e  s  s   L   A   N  s

3

What is the maximum data rate of the 802.11bwireless standard?

4

What is the maximum data rate of the 802.11a

and 802.11g wireless standards?

Page 388: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 388/503

 370 CCDP-ARCH Section 9: Wireless LANs

Question

Question

3 Answer

802.11b has a maximum data rate of 11 Mbps.

4 Answer

802.11a and 802.11g both have a maximum data rate of 54 Mbps.

Page 389: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 389/503

CCDP-ARCH Section 9: Wireless LANs 371

Question

Question

   W   i  r  e   l  e  s  s   L   A   N  s

   W   i  r  e   l  e  s  s   L   A   N  s

5

Identify the 802.11 standard with which the802.11g standard is backward compatible.

6

Describe the purpose of a workgroup bridge in

a WLAN design.

Page 390: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 390/503

 372 CCDP-ARCH Section 9: Wireless LANs

Question

Question

5 Answer

Both 802.11b and 802.11g use a frequency band of 2.4 GHz, therebyenabling 802.11g to be backward compatible with 802.11b.

6 Answer

A workgroup bridge typically contains a hub that provides connec-

tivity to a few wired clients in a common location and provides access

back to a wireless access point. With a workgroup bridge, a grouping

of commonly located devices does not have to be converted towireless clients. Rather, these devices can connect directly into the

workgroup bridge.

Page 391: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 391/503

CCDP-ARCH Section 9: Wireless LANs 373

Question

Question

   W   i  r  e   l  e  s  s   L   A   N  s

   W   i  r  e   l  e  s  s   L   A   N  s

7

Describe the purpose of a wireless bridge in awireless network design.

8

What is the Cisco recommendation for the

maximum number of devices associated with a

wireless access point?

Page 392: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 392/503

 374 CCDP-ARCH Section 9: Wireless LANs

Question

Question

7 Answer

A wireless bridge can be used to interconnect remote networks (up toa mile apart), in different buildings, that have a line of sight path

between them.

8 Answer

Because all devices on a wireless access point share bandwidth, Cisco

recommends the maximum number of devices associated with a

wireless access point to be in the range of  10 to 30 devices.

Page 393: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 393/503

CCDP-ARCH Section 9: Wireless LANs 375

Question

Question

   W   i  r  e   l  e  s  s   L   A   N  s

   W   i  r  e   l  e  s  s   L   A   N  s

9

Identify the three non-overlapping 802.11bWLAN channels to use in an environment

where the coverage area of three wireless

access points overlap.

10

Explain how Layer 2 and Layer 3 mobility can be

achieved in a WLAN environment.

Page 394: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 394/503

 376 CCDP-ARCH Section 9: Wireless LANs

Question

Question

9 Answer

WLAN channels 1, 6, and 11 are non-overlapping channels that canco-exist in the same area. Therefore, if the coverage areas of three

wireless access points overlap, each of the three wireless access

points should use one of the following channels: 1, 6, or 11.

10 Answer

Layer 2 mobility is built into the Cisco wireless access points and

allows you to move between wireless access points in the same

VLAN while maintaining connectivity. Layer 3 mobility is possible

through the use of an IOS feature known as Mobile IP. Mobile IPallows devices to retain their IP address, regardless of where in the

network they are physically located.

Page 395: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 395/503

CCDP-ARCH Section 9: Wireless LANs 377

Question

Question

   W   i  r  e   l  e  s  s   L   A   N  s

   W   i  r  e   l  e  s  s   L   A   N  s

11

Describe the challenge of sending multicasttraffic over a wireless LAN.

12

What is the maximum number of IP phones that

should be associated with a single WAP?

Page 396: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 396/503

 378 CCDP-ARCH Section 9: Wireless LANs

Question

Question

11 Answer

All wireless clients associated with a WAP share the same bandwidth.Therefore, even if only one user on a WAP participated in a multicast

session, all users connected to that WAP are impacted.

12 Answer

Because VoIP traffic is latency-sensitive, and because bandwidth is

shared among all devices that are associated with a single wireless

access point (WAP), Cisco recommends that you associate no more

than seven IP phones with a single WAP.

Page 397: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 397/503

CCDP-ARCH Section 9: Wireless LANs 379

Question

Question

   W   i  r  e   l  e  s  s   L   A   N  s

   W   i  r  e   l  e  s  s   L   A   N  s

13

How does the EAP improve wireless LANsecurity?

14

How can IPSec be used to enhance wireless

LAN security?

Page 398: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 398/503

 380 CCDP-ARCH Section 9: Wireless LANs

Question

Question

13 Answer

EAP allows a wireless client and a wireless access point to mutuallyauthenticate each other using a protocol such as 802.1x or RADIUS.

14 Answer

Just as it can be created in a wired network, an IPSec VPN tunnel can

be created in a WLAN environment to secure WLAN transmissions.

Page 399: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 399/503

CCDP-ARCH Section 9: Wireless LANs 381

Question

Question

   W   i  r  e   l  e  s  s   L   A   N  s

   W   i  r  e   l  e  s  s   L   A   N  s

15

Why are Static WEP keys considered a poorsecurity solution for enterprise WLANs?

16

What design would you recommend for an

802.11b WLAN that must support a large

conference room with up to 50 simultaneous

users?

Page 400: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 400/503

 382 CCDP-ARCH Section 9: Wireless LANs

Question

Question

15 Answer

Static WEP uses a key that is manually configured on every wirelessclient and wireless access point. Static WEP keys are not considered

to be a viable solution for enterprise WLANs because, if a laptop

configured with the static WEP key is lost or stolen, all the wireless

clients and wireless access points must be manually reconfigured

with another static WEP key. Also, a static WEP key can be

intercepted and decrypted with tools that are freely available on the

Internet.

16 Answer

One possible design for a conference room that must support 50

simultaneous users is to place two or three wireless access points

(WAPs) in different corners of the conference room. Each of the

WAPs must operate on a unique, non-overlapping channel—channel1, 6, or 11.

Page 401: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 401/503

CCDP-ARCH Section 9: Wireless LANs 383

Question

Question

   W   i  r  e   l  e  s  s   L   A   N  s

   W   i  r  e   l  e  s  s   L   A   N  s

17

What wireless device would you recommendfor interconnecting the networks in two

buildings if there is a line of sight path between

the buildings and the buildings are half a mile

apart?

18

What WLAN security feature would you

recommend for a telecommuter with a single

wireless laptop device?

Page 402: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 402/503

 384 CCDP-ARCH Section 9: Wireless LANs

Question

Question

17 Answer

A wireless bridge is an appropriate solution for interconnectingbuildings less than one mile apart that have a line of sight path

between them. A wireless bridge extends the range of 802.11b by

altering some of the timing constraints, thereby actually violating the

802.11 specifications.

18 Answer

For a single wireless client in a telecommuter environment, you could

use a 128-bit Static WEP key for authentication between a wireless

laptop and a wireless access point because you are not trying to

protect corporate resources at the telecommuter’s home. However, asthe telecommuter connects back to the corporate network, the

wireless laptop should communicate via an encrypted VPN

connection.

Page 403: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 403/503

Page 404: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 404/503

   C   C   D

   P  -   A   R   C   H

Section 10IP Telephony

The Cisco IP telephony technologies can replacetraditional corporate telephony systems, typicallyincluding PBX. The core of the Cisco IP telephonysolution is the Cisco CallManager (CCM); it isresponsible for call routing, similar to the legacy PBX.

Also, Cisco IP phones can replace analog phones.

The flash cards in this section review the componentsof an IP telephony network, including hardware andsoftware options. Gateway control protocols arecontrasted. In addition to other design best practices,various CCM deployment models are examined. Thescalability limitations of the Cisco CallManager varybased on the CCM version and the underlying serverplatform (such as the Media Convergence Server).However, these flash cards reflect the specifications ofCisco CallManager version 3.1.

Page 405: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 405/503

CCDP-ARCH Section 10: IP Telephony 387

Question

Question

   I   P   T  e   l  e  p

   h  o  n  y

   I   P   T  e   l  e  p   h  o  n  y

1

Describe the Cisco CallManager’s role in an IPtelephony network.

2

What VoIP component converts voice calls

between the PSTN and the IP telephony

network?

Page 406: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 406/503

 388 CCDP-ARCH Section 10: IP Telephony

Question

Question

1 Answer

The Cisco CallManager (CCM) replaces the legacy PBX’s callprocessing role. Also, IP phones register with a CCM.

2 Answer

A gateway converts between media types. For example, a gateway

might have analog or digital Public Switched Telephone Network

(PSTN) interfaces, in addition to an Ethernet interface that connects

to an IP telephony network.

Page 407: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 407/503

CCDP-ARCH Section 10: IP Telephony 389

Question

Question

   I   P   T  e   l  e  p

   h  o  n  y

   I   P   T  e   l  e  p   h  o  n  y

3

In an IP telephony network, what hardwarecomponent is used for transcoding, media

termination points, and hardware conference

bridges?

4

What is the maximum number of IP phones that

can register with a single Cisco CallManager

server running version 3.1 of the CallManager

software?

Page 408: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 408/503

 390 CCDP-ARCH Section 10: IP Telephony

Question

Question

3 Answer

 Digital Signal Processors (DSPs) add processing horsepower to an IPtelephony solution. For example, DSPs can perform transcoding

operations and act as media termination points (MTPs) or a hardware

conference bridge.

4 Answer

As of Cisco CallManager (CCM) version 3.1, a maximum of 2500 IP

phones could register with a single CCM server.

Page 409: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 409/503

CCDP-ARCH Section 10: IP Telephony 391

Question

Question

   I   P   T  e   l  e  p

   h  o  n  y

   I   P   T  e   l  e  p   h  o  n  y

5

What is the maximum number of IP phonesthat can register with a cluster of Cisco

CallManagers running version 3.1 of the

CallManager software?

6

List the four Cisco CallManager deployment

models.

Page 410: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 410/503

 392 CCDP-ARCH Section 10: IP Telephony

Question

Question

5 Answer

As of Cisco CallManager (CCM) version 3.1, a maximum of 10,000IP phones could register with a CCM cluster.

6 Answer

A Cisco CallManager (CCM) network can be designed based on one

of the following four models:

1 Single-Site—IP phones and CCMs located at a single site.

2 Centralized call processing—IP phones at multiple sites and

all CCMs at a single site.

3 Distributed call processing—IP phones and CCMs at multiple

sites.

4 Clustering over the WAN—IP phones and CCMs at multiple

sites, with all CCMs logically assigned to the same cluster.

Page 411: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 411/503

CCDP-ARCH Section 10: IP Telephony 393

Question

Question

   I   P   T  e   l  e  p

   h  o  n  y

   I   P   T  e   l  e  p   h  o  n  y

7

Identify at least two VoIP gateway selectionconsiderations.

8

List at least three gateway-signaling protocols

that are commonly used in Cisco IP telephony

networks.

Page 412: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 412/503

 394 CCDP-ARCH Section 10: IP Telephony

Question

Question

7 Answer

When selecting a VoIP gateway, consider the following:• Voice, fax, and modem support

• Appropriate interface types (such as analog, digital, orEthernet)

• Gateway signaling protocol support

8 Answer

The following are four of the most common gateway signaling

protocols used in Cisco IP telephony networks:

• Simple Gateway Control Protocol (SGCP)—Also known as

“non-IOS MGCP,” SGCP provides call control between aCisco CallManager (CCM) and a gateway, such as aCatalyst 6500 Series switch.

• Media Gateway Control Protocol (MGCP)—MGCP acts asa signaling protocol between a CCM and an analoggateway.

• H.323—H.323 supports signaling between an IOS routergateway, configured with dial-peers, and a CCM.

• Session Initiation Protocol (SIP)—SIP is an IETF standardthat uses an ASCII-based approach to exchanging callcontrol messages.

Page 413: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 413/503

CCDP-ARCH Section 10: IP Telephony 395

Question

Question

   I   P   T  e   l  e  p

   h  o  n  y

   I   P   T  e   l  e  p   h  o  n  y

9

How much bandwidth does the G.711 CODECuse for the voice payload?

10

Define the function of transcoding in an IP

telephony design.

Page 414: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 414/503

 396 CCDP-ARCH Section 10: IP Telephony

Question

Question

9 Answer

64 kbps of bandwidth is required for the voice payload when using theG.711 CODEC. The G.711 does not compress voice. Therefore,

G.711 is not typically used across the WAN. The G.729 protocol,

which requires 8 kbps of bandwidth for the voice payload, is often

appropriate for use over the WAN.

10 Answer

Transcoding is the process of converting between low and high-

compression CODECs. For example, if voice traffic was entering

your network encoded with the G.729 CODEC, you could use

transcoding to convert the encoding to the G.711 CODEC, if required.Digital Signal Processors (DSPs) perform transcoding.

Page 415: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 415/503

CCDP-ARCH Section 10: IP Telephony 397

Question

Question

   I   P   T  e   l  e  p

   h  o  n  y

   I   P   T  e   l  e  p   h  o  n  y

11

What CODEC must all conference callparticipants use if the Cisco CallManager is

acting as a software conference bridge?

12

Identify the Cisco product that provides

converged messaging services (such as for

fax messages and voice mail).

Page 416: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 416/503

 398 CCDP-ARCH Section 10: IP Telephony

Question

Question

11 Answer

All conference call participants must use the G.711 CODEC if theCisco CallManager (CCM) is acting as a software conference bridge.

This limitation results from the CCM’s inability to transcode between

low and high-compression CODECs.

12 Answer

The Cisco Unity product is a converged messaging system that

provides a single repository for multiple messaging types. For

example, a user can retrieve e-mail over the phone via text-to-speech

conversion.

Page 417: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 417/503

CCDP-ARCH Section 10: IP Telephony 399

Question

Question

   I   P   T  e   l  e  p

   h  o  n  y

   I   P   T  e   l  e  p   h  o  n  y

13

How many Cisco CallManager servers arerecommended to support up to 2500 IP phones?

14

How many Cisco CallManager servers are

recommended to support up to 10,000 IP

phones?

Page 418: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 418/503

 400 CCDP-ARCH Section 10: IP Telephony

Question

Question

13 Answer

Two CCM servers are recommended to service up to 2500 IP phones.If one of the CCM servers fails, the other server can accommodate all

2500 IP phones. Note that these Cisco CallManagers belong to the

same cluster.

14 Answer

 Eight  CCM servers are recommended to service up to 10,000 IP

phones. Four of the servers act as primary CCM servers, with IP

phones registered with them. Two of the servers act as backup servers.

One server acts as a dedicated publisher, and one server acts as adedicated TFTP server. Note that these Cisco CallManagers belong to

the same cluster.

Page 419: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 419/503

CCDP-ARCH Section 10: IP Telephony 401

Question

Question

   I   P   T  e   l  e  p

   h  o  n  y

   I   P   T  e   l  e  p   h  o  n  y

15

You are clustering Cisco CallManagers over aWAN, and there are 10,000 BHCAs. How much

bandwidth is required for the WAN link to

support the intra-cluster communication?

16

When clustering Cisco CallManagers over the

WAN, which failover approach is appropriate

for up to six sites?

Page 420: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 420/503

 402 CCDP-ARCH Section 10: IP Telephony

Question

Question

15 Answer

900 kbps of WAN bandwidth is required for every 10,000 busy hourcall attempts (BHCAs), when clustering Cisco CallManagers over a

WAN connection. Also, the round-trip time (RTT) between any two

CCMs in the cluster should be no more than 40 ms.

16 Answer

When clustering over the WAN, the Remote Failover  option is most

appropriate for up to six sites, with a total of up to 10,000 IP phones

for all sites combined. With 2500 to 5000 IP phones per site, the Local

Failover option is more appropriate for two or three sites.

Page 421: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 421/503

CCDP-ARCH Section 10: IP Telephony 403

Question

Question

   I   P   T  e   l  e  p

   h  o  n  y

   I   P   T  e   l  e  p   h  o  n  y

17

What formula calculates the requiredbandwidth for voice traffic?

18

What CiscoWorks component can place

simulated IP phone calls (such as synthetic

transactions)?

Page 422: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 422/503

 404 CCDP-ARCH Section 10: IP Telephony

Question

Question

17 Answer

The following formula can calculate required bandwidth for voicetraffic:

Voice Bearer Traffic (bps) = (Packet Payload + Header Size in

bits) * (Packet Rate per Second)

18 Answer

The CiscoWorks VoIP Health Monitor (VHM) monitors the status,

reachability, and environmental conditions of infrastructure hard-

ware. VHM can also simulate an IP phone call to proactively test

various configurations.

Page 423: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 423/503

CCDP-ARCH Section 10: IP Telephony 405

Question

Question

   I   P   T  e   l  e  p

   h  o  n  y

   I   P   T  e   l  e  p   h  o  n  y

19

Describe the purpose of SRST in an IP telephonydesign.

20

In an IP telephony design, what is an auxiliary

VLAN?

Page 424: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 424/503

 406 CCDP-ARCH Section 10: IP Telephony

Question

Question

19 Answer

SRST allows a remote site that does not have a Cisco CallManager tomaintain a minimal level of call routing functionality in the event of

a WAN failure. The SRST feature runs on a router that is configured

as an H.323 gateway.

20 Answer

An auxiliary VLAN is a VLAN that is used to transport voice packets.

Specifically, an IEEE 802.1Q trunk is set up between a Cisco IP

phone and a Catalyst switch. Over that trunk, data (from an upstream

PC) is transported in one VLAN, and voice is transported in theauxiliary VLAN.

Page 425: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 425/503

Page 426: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 426/503

   C   C   D

   P  -   A   R   C   H

Section 11Content Networking

As a designer, content networking technologies allowsyou to intelligently distribute content throughoutthe network, thereby reducing WAN bandwidthrequirements. For example, a user could open a webbrowser and point to a particular site. A content

networking component, called a “cache engine,”might already have that site’s content stored locally.Therefore, the cache engine satisfies the user’s webrequest locally, without burdening the WAN.

The flash cards in this section challenge you to recallthe components of the Cisco content networkingsolution and the functions of these components. Thenetworking components all have an appropriate placeand use within a network. You are therefore requiredto identify where to deploy various content networkingcomponents. Finally, you must identify appropriatecontent networking components to use for specifictypes of content (such as web, e-commerce, orstreaming media).

Page 427: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 427/503

CCDP-ARCH Section 11: Content Networking 409

Question

Question

   C

  o  n   t  e  n   t

   N  e

   t  w  o  r   k   i  n  g

   C  o  n   t  e  n   t

   N  e   t  w  o  r   k   i  n  g

1

List the five components of the Cisco contentnetworking solution.

2

Content caching is a component of the Cisco

content networking solution. Define the

function of content caching.

Page 428: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 428/503

 410 CCDP-ARCH Section 11: Content Networking

Question

Question

1 Answer

The Cisco content networking solution contains the followingcomponents:

1 Content caching

2 Content switching

3 Content routing

4 Content distribution and management

5 Intelligent network services

2 Answer

Content caching stores content (such as graphics from a web page) in

a cache engine. When a user requests content, rather than retrieving

the content over the WAN, the content engine services the request

locally if the content engine has the content. If the content enginedoes not have the content stored locally, it retrieves the content over

the WAN and stores it locally so it can service future requests for that

content.

Page 429: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 429/503

CCDP-ARCH Section 11: Content Networking 411

Question

Question

   C

  o  n   t  e  n   t

   N  e

   t  w  o  r   k   i  n  g

   C  o  n   t  e  n   t

   N  e   t  w  o  r   k   i  n  g

3

Describe the benefit of content switching in acontent networking design.

4

Identify an appropriate environment in which to

deploy content routing.

Page 430: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 430/503

Page 431: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 431/503

CCDP-ARCH Section 11: Content Networking 413

Question

Question

   C

  o  n   t  e  n   t

   N  e

   t  w  o  r   k   i  n  g

   C  o  n   t  e  n   t

   N  e   t  w  o  r   k   i  n  g

5

What benefit does the Cisco ContentDistribution Manager (CDM) offer?

6

Where should you locate reverse proxy servers

in a content networking design?

Page 432: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 432/503

 414 CCDP-ARCH Section 11: Content Networking

Question

Question

5 Answer

The Cisco Content Distribution Manager (CDM) intelligently pushescontent to geographically dispersed content engines. These content

engines then serve up the content to local clients, thus reducing

bandwidth demands on the WAN.

6 Answer

Reverse proxy servers should be located in a server farm. The purpose

of reverse proxy servers is to offload server content, thereby reducing

demands on individual servers.

Page 433: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 433/503

CCDP-ARCH Section 11: Content Networking 415

Question

Question

   C

  o  n   t  e  n   t

   N  e

   t  w  o  r   k   i  n  g

   C  o  n   t  e  n   t

   N  e   t  w  o  r   k   i  n  g

7

In the Cisco content networking solution, howdoes transparent caching differ from proxy

caching?

8

Content routing directs user requests for

content to an appropriate content engine. List

the two modes of content routing.

Page 434: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 434/503

 416 CCDP-ARCH Section 11: Content Networking

Question

Question

7 Answer

Transparent caching dynamically intercepts requests directed outsideof the network and redirects those requests to a local content engine.

However, proxy caching requires that a user’s application (such as a

browser) point directly to the content engine.

8 Answer

The two modes of content routing are

1 Direct Mode—A user sends out a DNS request, which isforwarded to a local content router. The content router

forwards the DNS request to multiple content routingagents at different locations, and the first content routingagent to respond is deemed the “best” site. The user’s DNSrequest is then resolved to the IP address of the “best” site.

2 WCCP Mode—The Web Cache Communication Protocol(WCCP) allows a router to determine whether a requestshould be sent directly to the destination, or if it should beredirected to a content engine. If the content engine does not

have the requested content, it retrieves the content and hasit available for subsequent requests.

Page 435: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 435/503

CCDP-ARCH Section 11: Content Networking 417

Question

Question

   C

  o  n   t  e  n   t

   N  e

   t  w  o  r   k   i  n  g

   C  o  n   t  e  n   t

   N  e   t  w  o  r   k   i  n  g

9

What content networking component usesSelf-Organizing Distributed Architecture

(SODA)?

10

According to a Cisco best practice for content

network design, how much storage space

(measured in hours) is recommended for a

content engine to produce a significant

bandwidth savings?

Page 436: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 436/503

Page 437: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 437/503

CCDP-ARCH Section 11: Content Networking 419

Question

Question

   C

  o  n   t  e  n   t

   N  e

   t  w  o  r   k   i  n  g

   C  o  n   t  e  n   t

   N  e   t  w  o  r   k   i  n  g

11

You are using content networking for web-caching purposes. Where should you place

content engines?

12

You are designing a content network to support

streaming media. Why might your design be a

good candidate for a Cisco CDM?

Page 438: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 438/503

 420 CCDP-ARCH Section 11: Content Networking

Question

Question

11 Answer

Content engines should be strategically placed to prevent unnecessaryWAN access. For example, remote offices are often appropriate

locations for content engines because content engines allow much of

the content to be served up locally.

12 Answer

A CDM is often applicable for streaming media applications because

it can intelligently push the content to remote content engines. Those

content engines can then serve up the content to local users.

Page 439: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 439/503

Page 440: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 440/503

   C   C   D

   P  -   A   R   C   H

Section 12Storage Networking

The need for storage in today’s networks continues togrow. However, the approach of increasing storage byadding additional network servers does not scale well.Fortunately, the emergence of storage networkingtechnologies allows you, as a designer, to incorporate

dedicated storage devices into your design.

Two primary approaches to storage networkinginclude Network Attached Storage (NAS) devices andstorage area networks (SANs). Each approach has itsown set of applications for which it is best suited. Withthe high-speed transfer rates required by most storageapplications, bandwidth provisioning is a key designconsideration.

The flash cards in this section confirm your under-standing of the technologies surrounding storagenetworking and storage network design approaches,and when each approach is used. You must also recallquestions to ask during the storage network designprocess.

Page 441: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 441/503

CCDP-ARCH Section 12: Storage Networking 423

Question

Question

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

1

In the context of storage networking, what is aSAN?

2

What is the purpose of a NAS device in a

storage network?

Page 442: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 442/503

 424 CCDP-ARCH Section 12: Storage Networking

Question

Question

1 Answer

A SAN is an independent network designed specifically forinterconnecting storage devices.

2 Answer

A NAS device supports file storage over an IP network. For example,

the NAS and a UNIX NFS volume might appear.

Page 443: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 443/503

CCDP-ARCH Section 12: Storage Networking 425

Question

Question

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

3

What type of physical connection is typicallyused in a SAN to interconnect storage devices?

4

You are considering using NAS devices in a

storage network design. List at least two

network applications that are appropriate for

NAS devices.

Page 444: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 444/503

 426 CCDP-ARCH Section 12: Storage Networking

Question

Question

3 Answer

SANs typically use Fibre Channel to interconnect storage devices.

4 Answer

Because NAS devices support file storage over an IP network, they

are appropriate for applications such as file sharing, e-mail services,

and web services.

Page 445: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 445/503

CCDP-ARCH Section 12: Storage Networking 427

Question

Question

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

5

Identify the types of applications that benefitfrom a SAN, as opposed to benefiting from a

NAS device, in a storage network design.

6

How does Fibre Channel transfer data

differently than a LAN transfers data?

Page 446: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 446/503

 428 CCDP-ARCH Section 12: Storage Networking

Question

Question

5 Answer

SANs are appropriate for high-volume, write-intensive applications,such as database applications.

6 Answer

Fibre Channel transfers data in large blocks, without breaking it up

into packets like a LAN does.

Page 447: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 447/503

CCDP-ARCH Section 12: Storage Networking 429

Question

Question

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

7

Describe the purpose of Fiber Channel over IP(FCIP) in a storage network design.

8

A storage network can use the Internet Small

Computer System Interface (iSCSI) protocol to

interconnect SCSI devices over an IP network.

What is contained in an iSCSI packet?

Page 448: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 448/503

 430 CCDP-ARCH Section 12: Storage Networking

Question

Question

7 Answer

FCIP allows you to interconnect SAN islands over an IP network byencapsulating Fibre Channel communication in IP packets.

8 Answer

iSCSI encapsulates SCSI data and command frames into IP packets.

Page 449: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 449/503

CCDP-ARCH Section 12: Storage Networking 431

Question

Question

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

9

List at least two approaches for securingstorage network transactions.

10

Your storage network needs 400 Mbps of

bandwidth between two switches; however,

each switch only contains 100 Mbps interfaces.

Without upgrading the switches’ hardware,

how can you meet the bandwidth demands of

the storage network?

Page 450: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 450/503

 432 CCDP-ARCH Section 12: Storage Networking

Question

Question

9 Answer

To secure storage network transactions, consider isolating storage ina separate VLAN and using access control lists (ACLs) to limit access

to storage resources. RADIUS or TACACS+ can be used to authen-

ticate iSCSI connections, and IP Security (IPSec) can protect FCIP

traffic as it tunnels across the network.

10 Answer

In the situation presented, multiple 100-Mbps interfaces (four or

eight, depending on the switch type) can be logically combined

together in an EtherChannel. For example, four 100-Mbps interfaces

could be combined to create a 400-Mbps EtherChannel interface. Ifthe interfaces in the EtherChannel were configured for full duplex,

then the maximum theoretical throughput would approach 800 Mbps.

Page 451: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 451/503

CCDP-ARCH Section 12: Storage Networking 433

Question

Question

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

   S   t  o  r  a  g  e

   N  e   t  w  o  r   k   i  n  g

11

List at least two questions one should ask whendesigning a storage network solution.

12

Identify an application that could benefit from a

storage network that spans a WAN or a MAN.

Page 452: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 452/503

 434 CCDP-ARCH Section 12: Storage Networking

Question

Question

11 Answer

When designing a storage network solution, ask the followingquestions:

• Do applications require backup capabilities or realtimeaccess?

• What are the traffic patterns for each application?

• How much bandwidth is required for each application?

• What special needs do the applications have for availability,

security, and quality of service?

12 Answer

Examples of WAN or MAN storage network applications include

using a storage network for an off-site backup or for consolidating

storage to support applications such as data mining. These

applications are made possible with storage networking becausetechnologies such as iSCSI or FCIP run over an IP network. Of

course, sufficient bandwidth must be provisioned to accommodate

application demands.

Page 453: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 453/503

Page 454: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 454/503

Page 455: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 455/503

Network Architectures 437

  •   N  e   t  w  o  r   k   M  a  n  a  g  e  m

  e  n   t   M  o   d  u   l  e —   R  e  s  p  o  n  s   i   b   l  e   f  o  r  c  a  m  p  u  s -  w   i   d  e  m  a  n  a  g  e  m  e  n  t

   f  u  n  c  t   i  o  n  s ,  s  u  c   h  a  s  t   h  e   f  o   l   l  o  w   i  n  g  :

 —   I  n  t  r  u  s   i  o  n   D  e  t  e  c  t   i  o  n   S  y  s  t  e  m  s   (   I   D   S   )

 —   L  o  g  g   i  n  g

 —   A  u  t   h  e  n  t   i  c  a  t   i  o  n

  •   S  e  r  v  e  r   f  a  r  m  m  o   d  u   l  e

 —   C  o  n  t  a   i  n  s  c  a  m  p  u  s  s  e  r  v  e  r  s  t   h  a  t  p  r  o

  v   i   d  e  c  a  m  p  u  s -  w   i   d  e

  s  e  r  v   i  c  e  s  :

 —   A  p  p   l   i  c  a  t   i  o  n  s  e  r  v  e

  r  s

 —   F   i   l  e  s  e  r  v  e  r  s

 —   E -  m  a   i   l  s  e  r  v  e  r  s

 —   D  o  m  a   i  n   N  a  m  e   S  y  s  t  e  m   (   D   N   S   )  s  e  r  v  e  r  s

  •   E   d  g  e   D   i  s   t  r   i   b  u   t   i  o  n   M  o   d  u   l  e —   R  e  s  p  o  n  s   i   b   l  e   f  o  r  r  o  u  t   i  n  g  t  r  a   f   fi  c   b  e  t  w  e  e  n   E  n  t  e  r  p  r   i  s  e

   C  a  m  p  u  s  a  n   d  t   h  e   E  n  t  e  r  p  r   i  s  e   E   d  g  e

   E

  n   t  e  r  p  r   i  s  e   E   d  g  e   C  o  m  p  o  n  e  n   t  s

   T

   h  e   E  n  t  e  r  p  r   i  s  e   E   d  g  e ,  w   h   i  c   h   i  s  r  e  s  p  o  n  s   i   b   l  e   f  o  r   “   f  u  n  n  e   l   i  n  g   ”  t  r  a   f   fi  c   b  e  t  w  e  e  n

  t   h  e   E  n  t  e  r -

  p  r   i  s  e   C  a  m  p  u  s  a  n   d  t   h  e   S  e  r  v   i  c  e   P  r  o  v   i   d  e  r   E   d  g  e ,   h  a  s   f  o  u  r  m  o   d  u   l  e  s  t   h  a  t  t   h  e  e  n  t  e  r  p  r   i  s  e

  n  e  t  w  o  r   k   d  e  s   i  g  n  e  r  m  u  s  t  a   d   d  r  e  s  s  :

  •   E  -  c  o  m  m  e  r  c  e —   C  o  n  t  a   i  n  s  t   h  e  s  e  r  v  e  r  s  t   h  a  t  a  r  e  u  s  e   d  t  o  p  r  o  v   i   d  e  a  n  e -  c  o  m

  m  e  r  c  e

  p  r  e  s  e  n  c  e   f  o  r  a  c  o  m  p  a  n  y ,   i  n  c   l  u   d   i  n

  g  t   h  e   f  o   l   l  o  w   i  n  g  :

 —   W  e   b  s  e  r  v  e  r  s

 —   A  p  p   l   i  c  a  t   i  o  n  s  e  r  v  e  r  s

 —   D  a  t  a   b  a  s  e  s  e  r  v  e  r  s

 —   S  e  c  u  r   i  t  y  s  e  r  v  e  r  s

   C  a  m  p  u  s   B  a  c   k   b  o  n

  e

   B  u   i   l   d   i  n  g   D   i  s   t  r   i   b  u   t   i  o  n

   B  u   i   l   d   i  n  g   A  c  c  e  s  s

   C  a  m  p  u  s   I  n   f  r  a  s   t  r  u  c   t  u  r  e   M  o   d  u   l  e

   S  e  r  v  e  r   D   i  s   t  r   i   b  u   t   i  o  n

   S  e  r  v  e  r   A  c  c  e  s  s

   S  e  r  v

  e  r

   S  e  r  v  e  r

   C  a  m  p  u  s   B  a  c   k   b  o  n  e

   S  e  r  v  e  r   F  a  r  m   M  o   d  u   l  e

Page 456: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 456/503

Page 457: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 457/503

Network Architectures 439

   C  a  m  p  u  s   D  e  s   i  g  n  :   S

   t  e  p   3

   T   h  e  t   h   i  r   d  s  t  e  p  o   f  t   h  e  c  a  m

  p  u  s   d  e  s   i  g  n  m  e  t   h  o   d  o   l  o  g  y   i  s   d  e  s   i  g  n   i  n

  g  t   h  e  p   h  y  s   i  c  a   l  n  e  t  w  o  r   k

  t  o  p  o   l  o  g  y .   T   h   i  s  s  t  e  p   i  n  v  o   l  v  e  s  s  e   l  e  c  t   i  n  g  t  r  a  n  s  m   i  s  s   i  o  n  m  e   d   i  a  a  n   d   d  a  t  a -   l   i  n   k  p  r  o  t  o  c  o   l  s ,  a  n   d

   i   d  e  n  t   i   f  y   i  n  g  w   h  e  r  e   i  n  t   h  e

  n  e  t  w  o  r   k  t  o   d  e  p   l  o  y   L  a  y  e  r   2  a  n   d   /  o  r   L

  a  y  e  r   3  s  w   i  t  c   h   i  n  g .

   C  o  m  m  o  n   T  r  a  n  s  m   i  s  s   i  o  n   M  e   d   i  a  c   h  o   i  c  e  s   i  n  c   l  u   d  e  t   h  e   f  o   l   l  o  w   i  n  g

  :

  •   T  w   i  s   t  e   d   P  a   i  r

 —   1   0   0  m   d   i  s  t  a  n  c  e   l   i

  m   i  t

 —   1   G   b  p  s  s  p  e  e   d   l   i  m

   i  t

 —   L  o  w  c  o  s  t

 —   T  y  p   i  c  a   l   l  y  u  s  e   d   f  o  r   b  u   i   l   d   i  n  g  a  c  c  e  s  s

  •   M  u   l   t   i  m  o   d  e   F   i   b  e  r

 —   2   k  m   d   i  s  t  a  n  c  e   l   i  m

   i  t   (   F  a  s  t   E  t   h  e  r  n  e  t   )  o  r   5   5   0  m   d   i  s  t  a  n  c  e

   l   i  m   i  t   (   G   i  g  a   b   i  t   E  t   h  e  r  n  e  t   )

 —   1   G   b  p  s  s  p  e  e   d   l   i  m

   i  t

 —   M  o   d  e  r  a  t  e  c  o  s  t

 —   T  y  p   i  c  a   l   l  y  u  s  e   d   f  o  r   b  u   i   l   d   i  n  g   d   i  s  t  r   i   b  u  t   i  o  n  a  n   d  c  a  m  p  u  s   b  a  c   k   b  o  n  e

  •   S   i  n  g   l  e  -   M  o   d  e   F   i   b  e  r

 —   4   0   k  m   d   i  s  t  a  n  c  e   l   i

  m   i  t   (   F  a  s  t   E  t   h  e  r  n  e  t   )  o  r   9   0   k  m   d   i  s  t  a  n  c

  e   l   i  m   i  t   (   G   i  g  a   b   i  t   E  t   h  e  r  n  e  t   )

 —   S  p  e  e   d   l   i  m   i  t  o   f   1   0

   G   b  p  s  o  r  g  r  e  a  t  e  r

 —   H   i  g   h  c  o  s  t

 —   T  y  p   i  c  a   l   l  y  u  s  e   d   f  o  r   b  u   i   l   d   i  n  g   d   i  s  t  r   i   b  u  t   i  o  n  a  n   d  c  a  m  p  u  s   b  a  c   k   b  o  n  e

   C

  o  m  m  o  n   D  a  t  a -   l   i  n   k   P  r  o  t  o  c  o   l  c   h  o   i  c  e  s

   i  n  c   l  u   d  e  t   h  e   f  o   l   l  o  w   i  n  g  :

  •   E   t   h  e  r  n  e   t

 —   1   0   M   b  p  s

 —   V  e  r  y   l  o  w  c  o  s  t

 —   T  y  p   i  c  a   l   l  y  u  s  e   d   f  o  r   b  u   i   l   d   i  n  g  a  c  c  e  s  s

  •   F  a  s   t   E   t   h  e  r  n  e   t

 —   1   0   0   M   b  p  s

 —   L  o  w  c  o  s  t

 —   T  y  p   i  c  a   l   l  y  u  s  e   d   f  o  r   b  u   i   l   d   i  n  g   d   i  s

  t  r   i   b  u  t   i  o  n  a  n   d  c  a  m  p  u  s   b  a  c   k   b  o  n  e

  •   G   i  g  a   b   i   t   E   t   h  e  r  n  e   t

 —   1   0   0   0   M   b  p  s

 —   M  o   d  e  r  a  t  e  c  o  s  t

 —   T  y  p   i  c  a   l   l  y  u  s  e   d   f  o  r   b  u   i   l   d   i  n  g   d   i  s

  t  r   i   b  u  t   i  o  n  a  n   d  c  a  m  p  u  s   b  a  c   k   b  o  n  e

  •   1   0   G   i  g  a   b   i   t   E   t   h  e  r  n  e   t

 —   1   0 ,   0   0   0   M   b  p  s

 —   H   i  g   h  c  o  s  t

 —   T  y  p   i  c  a   l   l  y  u  s  e   d   f  o  r  c  a  m  p  u  s   b  a  c

   k   b  o  n  e

   M  u

   l   t   i  m  o

   d  e

   F   i   b  e  r

   C   l  a   d   d   i  n  g

   C  o  r  e

   P  a   t   h  s  o   f   L   i  g   h   t

   (   i .  e . ,   M  o   d  e  s   )

   T   h  e  c  o  r  e   d   i  a  m  e   t  e  r   i  n  a  m  u   l   t   i  m  o   d  e   f   i   b  e  r   i  s   l  a  r  g  e  e  n  o  u  g   h   t  o  p

  e  r  m   i   t  m  u   l   t   i  p   l  e

  p  a   t   h  s   (   i .  e . ,  m  o   d  e  s   )   f  o  r   l   i  g   h   t   t  o   t  r  a  v  e   l .   T   h   i  s  m   i  g   h   t  c  a  u  s  e   d   i   f   f  e  r  e  n

   t  p   h  o   t  o  n  s   (   i .  e . ,

   l   i  g   h   t  p  a  r   t   i  c   l  e  s   )   t  o   t  a   k  e   d   i   f   f  e  r  e  n   t  a  m  o  u  n   t  s  o   f   t   i  m  e   t  o   t  r  a  v  e   l   t   h  r  o  u

  g   h   t   h  e   f   i   b  e  r .   A  s

   d   i  s   t  a  n  c  e   i  n  c  r  e  a  s  e  s ,   t   h   i  s   l  e  a   d  s   t  o  m  u   l   t   i  m  o   d  e   d  e   l  a  y   d   i  s   t  o  r   t   i  o  n .   T   h  e  r  e   f  o  r  e ,

  m  u   l   t   i  m  o   d  e   f   i   b  e  r   h  a  s  a   d   i  s   t  a  n  c  e   l   i  m   i   t  a   t   i  o  n  o  n  a  p  p  r  o  x   i  m  a   t  e   l  y   2   k  m .

   S   i  n  g

   l  e  -   M  o

   d  e

   F   i   b  e  r

   C   l  a   d   d   i  n  g

   C  o  r  e

   L   i  g   h   t   P  a   t   h

   (   i .  e . ,   M  o   d  e   )

   T   h  e  c  o  r  e   d   i  a  m  e   t  e  r   i  n  a  s   i  n  g   l  e  -  m  o   d  e   f   i   b  e  r   i  s  o  n   l  y   l  a  r  g  e  e  n  o  u  g   h   t  o  p  e  r  m   i   t  o  n  e

  p  a   t   h   (   i .  e . ,  m  o   d  e   )

   f  o  r   l   i  g   h   t   t  o   t  r  a  v  e   l .   T   h   i  s  a  p  p  r  o  a  c   h  e   l   i  m   i  n  a   t  e  s  m  u   l   t   i  m  o   d  e

   d  e   l  a  y   d   i  s   t  o  r   t   i  o  n

 ,   t   h  u  s   i  n  c  r  e  a  s   i  n  g   t   h  e  m  a  x   i  m  u  m   d   i  s   t  a  n  c  e  s  u  p  p  o  r   t  e   d .

Page 458: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 458/503

Page 459: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 459/503

Page 460: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 460/503

Page 461: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 461/503

Page 462: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 462/503

Page 463: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 463/503

Page 464: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 464/503

Page 465: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 465/503

Page 466: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 466/503

Page 467: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 467/503

Page 468: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 468/503

Page 469: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 469/503

Page 470: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 470/503

Page 471: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 471/503

Page 472: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 472/503

Page 473: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 473/503

Page 474: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 474/503

Page 475: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 475/503

Page 476: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 476/503

Page 477: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 477/503

Page 478: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 478/503

Page 479: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 479/503

Page 480: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 480/503

 462 CCDP-ARCH Quick Reference Sheets

   A   C   i  s  c  o  w  o  r   k  g  r  o  u  p   b  r   i   d

  g  e   i  s  a  p  p  r  o  p  r   i  a  t  e   f  o  r  a  c   l  u  s  t  e  r  o   f   d  e  v   i  c  e  s   i  n  a  n  a  r  e  a  w   i  t   h  o  u  t

  n  e  t  w  o  r   k  c  o  n  n  e  c  t   i  v   i  t  y .   T   h  e   d  e  v   i  c  e  s  c  o  n  n  e  c  t  v   i  a  a  n   E  t   h  e  r  n  e  t  c  a   b   l  e  t  o  t   h  e  w  o  r   k  g  r  o  u   p

   b  r   i   d  g  e ,  w   h   i  c   h   h  a  s  w   i  r  e   l  e

  s  s  c  o  n  n  e  c  t   i  v   i  t  y   b  a  c   k  t  o  a  w   i  r  e   l  e  s  s  a  c

  c  e  s  s  p  o   i  n  t .

   Y  o  u  m   i  g   h  t   h  a  v  e  t  o   d  e  s   i  g  n  c  o  n  n  e  c  t   i  v   i  t  y   b  e  t  w  e  e  n  t  w  o   b  u   i   l   d   i  n  g  s .   R  a  t   h  e  r  t   h  a  n  s  p  e  c   i   f  y   i  n  g

  a   l  e  a  s  e   d   l   i  n  e ,  c  o  n  s   i   d  e  r  a  w   i  r  e   l  e  s  s   b  r   i   d  g  e   i   f  t   h  e  r  e   i  s  a   “   l   i  n  e  o   f  s   i  g   h  t   ”  p  a  t   h   b  e  t  w  e  e  n  t   h  e

   b  u   i   l   d   i  n  g  s .   A  w   i  r  e   l  e  s  s   b  r   i   d  g  e  a  c   h   i  e  v  e  s  g  r  e  a  t  e  r   d   i  s  t  a  n  c  e  t   h  a  n   i  s

  p  o  s  s   i   b   l  e  w   i  t   h  s  t  a  n   d  a  r   d

   8   0   2 .   1   1   b  a  c  c  e  s  s  p  o   i  n  t  s   b  y  a   l  t  e  r   i  n  g   8   0   2 .   1   1  t   i  m   i  n  g  c  o  n  s  t  r  a   i  n  t  s .   D  e  p  e  n   d   i  n  g  o  n  t   h  e  a  n  t  e  n -

  n  a  s  u  s  e   d ,  w   i  r  e   l  e  s  s   b  r   i   d  g  e

  s   h  a  v  e  a  r  a  n  g  e  o   f  u  p  t  o  a  m   i   l  e .

   W

   L   A   N   D  e  s   i  g  n  a  n   d   P   l  a  n  n   i  n  g

   A

  s  a   d  e  s   i  g  n   b  e  s  t  p  r  a  c  t   i  c  e ,  t   h  e  m  a  x   i  m  u

  m  n  u  m   b  e  r  o   f  s   i  m  u   l  t  a  n  e  o  u  s  w   i  r  e   l  e  s  s

  c   l   i  e  n  t  s  a  s  s  o -

  c   i  a  t  e   d  w   i  t   h  a  s   i  n  g   l  e  a  c  c  e  s  s  p  o   i  n  t  s   h  o  u

   l   d   b  e   i  n  t   h  e   1   0  t  o   3   0  r  a  n  g  e   b  e  c  a  u  s  e  a   l   l  w   i  r  e   l  e  s  s

  c   l   i  e  n  t  s  a  r  e  u  s   i  n  g  s   h  a  r  e   d   b  a  n   d  w   i   d  t   h .   Y

  o  u  a   l  s  o  w  a  n  t  t  o  t  a   k  e  p  r  e  c  a  u  t   i  o  n  s   f  r  o  m   h  a  v   i  n  g

  y  o  u  r  a  c  c  e  s  s  p  o   i  n  t  s  e  n   d  a  s   i  g  n  a   l   i  n  t  o  a  n  a  r  e  a  t   h  a  t  s   h  o  u   l   d  n  o  t  r  e  c  e   i  v  e  t   h  e  s   i  g  n  a   l .   O   b  v   i -

  o  u  s   l  y ,   f  o  r  s  e  c  u  r   i  t  y  p  u  r  p  o  s  e  s ,  y  o  u  w  o  u

   l   d  n  o  t  p   l  a  c  e  a  n   E  t   h  e  r  n  e  t  p  o  r  t   i  n  a  p  a  r   k   i  n  g   l  o  t  ;

   h  o  w  e  v  e  r ,  t   h  a  t   i  s  e  s  s  e  n  t   i  a   l   l  y  w   h  a  t  y  o  u

  a  r  e   d  o   i  n  g   b  y   h  a  v   i  n  g  a  n  a  c  c  e  s  s  p  o   i  n  t   ’  s  s   i  g  n  a   l

  e  x  t  e  n   d   i  n  t  o  t   h  e  p  a  r   k   i  n  g   l  o  t .

   H

  a  v   i  n  g  m  u   l  t   i  p   l  e  a  c  c  e  s  s  p  o   i  n  t  s  s  e  r  v   i  c   i  n  g  t   h  e  s  a  m  e  a  r  e  a   i  s  a  n  o  p  t   i  o  n   f  o  r  s  u  p  p  o  r  t   i  n  g  a

   h   i  g   h  e  r  u  s  e  r   d  e  n  s   i  t  y .   H  o  w  e  v  e  r ,   i   f  m  u   l  t   i  p   l  e  a  c  c  e  s  s  p  o   i  n  t  s   ’  s   i  g  n  a   l  s  o  v  e  r   l  a  p ,  t   h

  e  a  c  c  e  s  s

  p  o   i  n  t  s  m  u  s  t  u  s  e  s  e  p  a  r  a  t  e  c   h  a  n  n  e   l  s .   I  n

  a  n   I   E   E   E   8   0   2 .   1   1   b  e  n  v   i  r  o  n  m  e  n  t  s  p  e  c

   i   fi  c  a   l   l  y ,  t   h  e

  t   h

  r  e  e  n  o  n -  o  v  e  r   l  a  p  p   i  n  g  c   h  a  n  n  e   l  s  t   h  a  t  a  r  e   d  e   fi  n  e   d   f  o  r  u  s  e   i  n  t   h  e  s  a  m  e  a  r  e  a  a  r  e  c   h  a  n  n  e   l  s

   1 ,   6 ,  a  n   d   1   1 .

   O

  t   h  e  r   W   L   A   N   d  e  s   i  g  n  c  o  n  s   i   d  e  r  a  t   i  o  n  s   i  n  c   l  u   d  e  t   h  e   f  o   l   l  o  w   i  n  g  :

  •   T   h  e  r  e  q  u   i  r  e  m  e  n  t  s   f  o  r   i  n   l   i  n  e  p  o  w  e  r ,  t  o  p  o  w  e  r  w   i  r  e   l  e  s  s  a  c  c  e  s  s  p  o   i  n  t  s

  •   O  n  e  o  r  m  o  r  e   V   L   A   N  s   d  e   d   i  c  a  t  e   d  t

  o   W   L   A   N  t  r  a   f   fi  c

  •   U  s   i  n  g  a  s  e  p  a  r  a  t  e  a   d   d  r  e  s  s  s  p  a  c  e   f  o  r   W   L   A   N  c   l   i  e  n  t  s

  •   S  e  c  u  r   i  n  g  w   i  r  e   l  e  s  s  c  o  m  m  u  n   i  c  a  t   i  o  n

  s  w   i  t   h   E   A   P ,   W   L   A   N   L   A   N   E  x  t  e  n  s   i  o  n

  v   i  a   I   P   S  e  c ,  o  r

   W   L   A   N   S  t  a  t   i  c   W   E   P .

   W  o  r   k  g  r  o  u  p   B  r   i   d  g  e

   W   i  r  e   d   N  e   t  w  o  r   k

   W   i  r  e   l  e  s  s   A  c  c  e  s  s

   P  o   i  n   t   (   W   A   P   )

   W  o  r   k  g  r  o  u  p   B  r   i   d  g  e

   A

  w  o  r   k  g  r  o  u  p   b  r   i   d  g  e  c  o  n   t  a   i  n  s  a   h  u   b   f  o  r   i  n   t  e  r  c  o  n  n  e  c   t   i  n  g  w   i  r  e   d

   d  e  v   i  c  e  s ,  a  n   d  a  n  a  n   t  e  n  n  a   f  o  r   i  n   t  e  r  c  o  n  n  e  c   t   i  n  g  w   i   t   h  a   W   A   P .

   W   i  r  e   l  e  s  s   B  r   i   d  g  e

   R  e  m  o   t  e  o   f   f   i  c  e  s .   l  e  s  s   t   h  a

  n  o  n  e  m   i   l  e  a  p  a  r   t  a  n   d  w   i   t   h  a   l   i  n  e  -  o   f  -  s   i   t  e

  p  a   t   h   b  e   t  w  e  e  n   t   h  e  m ,  c  a  n   i  n   t  e  r  c  o  n  n  e  c   t  v   i  a  w   i  r  e   l  e  s  s   b  r   i   d  g  e  s .

   O   f   f   i  c  e   A

   L  e  s  s   t   h  a  n   1   M   i   l  e

   W   i  r  e   l  e  s  s

   B  r   i   d  g  e

   O   f   f   i  c  e   B

   W   i  r  e   l  e  s  s

   B  r   i   d  g  e

Page 481: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 481/503

Page 482: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 482/503

Page 483: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 483/503

Page 484: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 484/503

 466 CCDP-ARCH Quick Reference Sheets

  •   C  e  n   t  r  a   l   i  z  e   d   C  a   l   l   P  r  o  c  e  s  s   i  n  g   M  o   d  e   l

 —   C  o  n  t  a   i  n  s  n  o  m  o  r  e  t   h  a  n   1   0 ,   0   0   0  p   h  o  n  e  s  p  e  r  c   l  u  s  t  e  r

 —   C   C   M  c   l  u  s  t  e  r   l  o  c  a

  t  e   d  a  t  a  c  e  n  t  r  a   l  s   i  t  e

 —   I   P  p   h  o  n  e  s   l  o  c  a  t  e   d

  a  t  m  u   l  t   i  p   l  e  s   i  t  e  s

 —   U  s  e  s   D   S   P  s   f  o  r   M   T   P ,  c  o  n   f  e  r  e  n  c   i  n  g ,  a  n   d  t  r  a  n  s  c  o   d   i  n  g

 —   L  o  w  e  r  m  a   i  n  t  e  n  a  n

  c  e  c  o  s  t  s  t   h  a  n   D   i  s  t  r   i   b  u  t  e   d   C  a   l   l   P  r  o  c  e  s  s   i  n  g   M  o   d  e   l

 —   U  s  e  s   S  u  r  v   i  v  a   b   l  e   R

  e  m  o  t  e   S   i  t  e   T  e   l  e  p   h  o  n  y   (   S   R   S   T   )   f  o  r  r  e

  m  o  t  e  s   i  t  e  r  e   d  u  n   d  a  n  c  y

 —   U  s  e  s   W   A   N   b  a  n   d  w

   i   d  t   h   f  o  r  c  a   l   l  s  e  t  u  p

 —   U  s  e  s   M   G   C   P  o  r   H

 .   3   2   3  a  t  t   h  e  c  e  n  t  r  a   l   l  o  c  a  t   i  o  n ,  a  n   d   H .   3   2   3  a  t  r  e  m  o  t  e   l  o  c  a  t   i  o  n  s

  •   D   i  s   t  r   i   b  u   t  e   d   C  a   l   l   P  r  o  c  e  s  s   i  n  g   M  o   d

  e   l

 —   C  a  n  s  c  a   l  e  t  o   h  u  n   d  r  e   d  s  o   f  s   i  t  e  s .

 —   C  o  n  t  a   i  n  s  m  u   l  t   i  p   l  e  s   i  t  e  s ,  e  a  c   h  w

   i  t   h  t   h  e   i  r  o  w  n   C   C   M   c   l  u  s  t  e  r .

 —   C  o  n  t  a   i  n  s  n  o  m  o  r  e  t   h  a  n   1   0 ,   0   0   0  p   h  o  n  e  s  p  e  r  c   l  u  s  t  e  r .

 —   W   A   N   f  a   i   l  u  r  e   d  o  e  s  n  o  t  a   f   f  e  c  t   l  o

  c  a   l  s   i  t  e   f  u  n  c  t   i  o  n  a   l   i  t  y .

 —   U  s  e  s  a  g  a  t  e   k  e  e  p  e  r  t  o  p  r  e  v  e  n  t   W

   A   N   b  a  n   d  w   i   d  t   h  o  v  e  r  s  u   b  s  c  r   i  p  t   i  o  n .

   S   i  n  g   l  e  -   S   i   t  e   C   C

   M   M  o   d  e   l

   W   i   t   h  s   i  n  g   l  e  -  s   i   t  e   C   C   M  m  o   d  e   l ,  a   l   l   C   C   M  s  a  n   d   I   P

  p   h  o  n  e  s  r  e  s   i   d  e  a   t  a  s   i  n  g   l  e   l  o  c

  a   t   i  o  n .   T   h  e   P   S   T   N   i  s

  u  s  e   d   f  o  r  a   l   l  c  a   l   l  s   b  e   t  w  e  e  n   t   h

  e  c  a  m  p  u  s  a  n   d   t   h  e

  o  u   t  s   i   d  e  w  o  r   l   d .

   C   C   M   C   l  u  s   t  e  r   I   P

   V

   P  u   b   l   i  c   S  w   i   t  c   h  e   d

   T  e   l  e  p   h  o  n  e

   N  e   t  w  o  r   k   (   P   S   T   N   )

   C  e  n   t  r  a   l   i  z  e   d   C  a

   l   l  -   P  r  o  c  e  s  s   i  n  g   C   C   M   M  o   d  e   l

   W   i   t   h  c  e  n   t  r  a   l   i  z  e   d  c  a   l   l  p  r  o  c  e  s  s   i  n  g ,  a   C   C   M  c   l  u  s   t  e  r   i  s

   l  o  c  a   t  e   d  a   t  a  c  e  n   t  r  a   l   l  o  c  a   t   i  o  n ,  a  n   d  r  e  m  o   t  e   I   P  p   h  o  n  e  s

  r  e  g   i  s   t  e  r  w   i   t   h   t   h  e  c  e  n   t  r  a   l   i  z  e   d   C   C

   M  c   l  u  s   t  e  r  o  v  e  r   t   h  e   I   P

   W   A   N .   S   R   S   T  a   l   l  o  w  s   I   P  p   h  o  n  e

  s  a   t  r  e  m  o   t  e  s   i   t  e  s   t  o

   f  u  n  c   t   i  o  n   i  n   t   h  e  e  v  e  n   t  o   f  a   W   A   N   f  a   i   l  u  r  e .

   C   C   M   C   l  u  s   t  e  r

   C   C   M   C   l  u  s   t  e

  r

   R  e  m  o   t  e   O   f   f   i  c  e   A

   R  e  m  o   t  e

   O   f   f   i  c  e   B

   S   R   S   T

   H  e  a   d  q  u  a  r   t  e  r  s

   I   P

   I   P

   V   S   R   S   T

   I   P

   V

   P

  u   b   l   i  c   S  w   i   t  c   h  e   d

   T  e   l  e  p   h  o  n  e

   N

  e   t  w  o  r   k   (   P   S   T   N   )

   I   P   W   A   N

Page 485: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 485/503

IP Telephony 467

  •   C   l  u  s   t  e  r   i  n  g  o  v  e  r   t   h  e

   W   A   N   C  a   l   l   P  r  o  c  e  s  s   i  n  g   M  o   d  e   l

 —   A  c   l  u  s  t  e  r  c  o  m  p  o  s

  e   d  o   f   C   C   M  s   l  o  c  a  t  e   d  a  t  m  u   l  t   i  p   l  e  s   i  t  e

  s .

 —   R  e  q  u   i  r  e  s   9   0   0   k   b  p

  s  o   f   W   A   N   b  a  n   d  w   i   d  t   h   f  o  r  e  v  e  r  y   1   0 ,   0   0   0   B  u  s  y   H  o  u  r   C  a   l   l

   A  t  t  e  m  p  t  s   (   B   H   C   A

  s   ) .

 —   R  e  q  u   i  r  e  s  a  m  a  x   i  m

  u  m  r  o  u  n   d -  t  r   i  p  t   i  m  e   (   R   T   T   )  o   f   4   0  m  s   b  e  t  w  e  e  n  a  n  y  t  w  o   C   C   M  s

   i  n  t   h  e  c   l  u  s  t  e  r .

   T  w  o  a  p  p  r  o  a  c   h  e  s  t  o  c   l  u  s  t  e  r   i  n  g  o   f  t   h  e   W

   A   N  a  r  e   L  o  c  a   l   F  a   i   l  o  v  e  r  a  n   d   R  e  m  o  t  e   F  a   i   l  o  v  e  r  :

  •   L  o  c  a   l   F  a   i   l  o  v  e  r

 —   R  e  q  u   i  r  e  s   C   C   M  s  u   b  s  c  r   i   b  e  r  a  n   d

   b  a  c   k  u  p  s  e  r  v  e  r  s  t  o   b  e   l  o  c  a  t  e   d  a  t  t   h  e

  s  a  m  e  s   i  t  e

 —   A  p  p  r  o  p  r   i  a  t  e   f  o  r  t  w  o  t  o  t   h  r  e  e  s

   i  t  e  s  w   i  t   h   2   5   0   0  t  o   5   0   0   0  p   h  o  n  e  s  p  e  r  s   i  t  e

  •   R  e  m  o   t  e   F  a   i   l  o  v  e  r

 —   B  a  c   k  u  p  s  e  r  v  e  r  s  n  o  t  r  e  q  u   i  r  e   d  t  o

   b  e  c  o   l  o  c  a  t  e   d  w   i  t   h  s  u   b  s  c  r   i   b  e  r  s

 —   A  p  p  r  o  p  r   i  a  t  e   f  o  r  u  p  t  o  s   i  x  s   i  t  e  s

 ,  w   i  t   h  u  p  t  o  a  t  o  t  a   l  o   f   1   0 ,   0   0   0  p   h  o  n  e  s

   I   P

   T  e   l  e  p   h  o  n  y   I  n   f  r  a  s   t  r  u  c   t  u  r  e   D  e  s   i  g  n

   A

  s   k  t   h  e   f  o   l   l  o  w   i  n  g  q  u  e  s  t   i  o  n  s  w   h  e  n  e  v  a   l  u  a  t   i  n  g  a  n   i  n   f  r  a  s  t  r  u  c  t  u  r  e   f  o  r   I   P  t  e   l  e  p   h  o

  n  y  s  u  p  p  o  r  t  :

  •   W   h  a  t   f  e  a  t  u  r  e  s  a  r  e  r  e  q  u   i  r  e   d   f  o  r  c  a  m  p  u  s   i  n   f  r  a  s  t  r  u  c  t  u  r  e   d  e  v   i  c  e  s   (   f  o  r  e  x  a  m  p   l  e ,   i  n   l   i  n  e

  p  o  w  e  r   )   ?

  •   D  o  e  s  t   h  e  e  x   i  s  t   i  n  g  c  a   b   l  e  p   l  a  n  t  r  e  q

  u   i  r  e  u  p  g  r  a   d   i  n  g   (   f  o  r  e  x  a  m  p   l  e ,  u  p  g  r  a   d   i  n  g   C  a  t   3  t  o

   C  a  t   5   )   ?

   D

   i  s   t  r   i   b  u   t  e   d   C  a   l   l  -   P  r  o  c  e  s  s   i  n  g   C   C   M   M  o   d  e   l

   W   i   t   h   d   i  s   t  r   i   b  u   t  e   d  c  a   l   l  p  r  o  c  e  s  s   i  n  g ,   C   C   M

  c   l  u  s   t  e  r  s  a  r  e   l  o  c  a   t  e   d  a   t  e  a  c   h   l  o  c  a   t   i  o  n  a  n   d

  c  o  m  m  u  n   i  c  a   t  e  o  v  e  r   t   h  e   I   P   W   A   N .

   C   C   M   C   l  u  s   t  e  r

   C   C   M   C   l  u  s   t  e  r

   C   C   M   C   l  u  s   t  e  r

   I   P

   V

   I   P

   V

   I   P

   V

   P  u   b   l   i  c   S  w   i   t  c   h  e   d

   T  e   l  e  p   h  o  n  e

   N  e   t  w  o  r   k   (   P   S   T   N   )

   I   P   W   A   N

   C   l  u  s   t  e  r   i  n  g  o  v  e  r   t   h  e   W   A   N   C   C   M   M  o   d  e   l

   I  n   t   h  e  c   l  u  s   t  e  r   i  n  g  o  v  e  r   t   h  e

   W   A   N   C   C   M

  m  o   d  e   l ,   C   C   M  s

  a  r  e   l  o  c  a   t  e   d  a   t  a   l   l   l  o  c  a   t   i  o  n  s ,

  a  n   d   t   h  e  y  a  r  e   l  o  g   i  c  a   l   l  y

  g  r  o  u  p  e   d   i  n   t   h  e  s  a  m  e   C   C   M

  c   l  u

  s   t  e  r .

   C   C   M   C   l  u  s   t  e  r

   I   P

   V

   I   P

   V

   I   P

   V

   P  u   b   l   i  c   S  w   i   t  c   h  e   d

   T  e   l  e  p   h  o  n  e

   N  e   t  w

  o  r   k   (   P   S   T   N   )

   I   P   W   A   N

Page 486: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 486/503

Page 487: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 487/503

Page 488: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 488/503

Page 489: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 489/503

Page 490: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 490/503

Notes

Page 491: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 491/503

Notes

Page 492: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 492/503

Notes

Page 493: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 493/503

Notes

Page 494: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 494/503

Notes

Page 495: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 495/503

Notes

Page 496: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 496/503

Notes

Page 497: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 497/503

Notes

Page 498: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 498/503

Notes

Page 499: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 499/503

Notes

Page 500: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 500/503

Notes

Page 501: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 501/503

Notes

Page 502: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 502/503

Notes

Page 503: CCDAand CCDP FlashCard

7/25/2019 CCDAand CCDP FlashCard

http://slidepdf.com/reader/full/ccdaand-ccdp-flashcard 503/503

Notes


Recommended