Vous êtes sur la page 1sur 9

Chapter 1 : Introducing Network Design Concepts I.

Characteristics of the Hierachical Model Core Layer Distribution Layer Provides Aggregates access redundancy & fast devices and convergence supports routing, between other access control & network layers or QoS modules

Access Layer Provides netwoek connectivity for hosts & end devices

Enterprise Layer Provides network support for all enterprise within a campus

Server Farm Protects server resources with reliable, highspeed connectivity

Enterprise Edge Extends enterprise services to remote sites & provides connectivity to external sites using QoS, policy enforcement, service level & security

II.

Requirements affects the entire network or only portion of the network Proposed Design Change Add server farm bandwidth Add IP telephony Provide Core Layer redundancy Add a wireless access point Add new security policies Upgrade WAN bandwidth Routing Protocol Change Centraliza servers and services Entire Network Portions of the Network

III.

ACL and Statement A Standard Access List that allow you to permit traffic from 172.16.3.xxx A Standard Access List that allow you to deny traffic from 172.16.5.2 A Standard Access List that allow you to permit traffic from any host A Standard Access List that allow you to permit traffic from 172.16.5.5 access list 1 deny 172.16.5.2 0.0.0.0 access list 10 permit 172.16.3.0 0.0.0.255 access list 10 permit any access list 10 permit 172.16.5.5 0.0.0.0

IV

Type of WAN or VPN connectivity for remote worker

Chapter 2 : Gathering Network Requirement Aspect of PPDIOO Network Lifecycle phases : a. b. c. What network Lifecyle phase includes a safe and operations assessment? What Network Lifecycle pahse supports development of the business case? What Network Lifecycle phase produces the installation plan? Plan Prepare Design...

Terms & Definitions Project Plan Request for Proposal (RFP) Business Case Netwrok Lifecysle Document outlining the taks, problem, responsibilities, timeline, and resources required to complete a project Document outlining a specific project, its requirement, and the purchasing and installation processes. Used to obtain bids from outside vendirs/companies to complete the work. Document outlining reasons for financial investment for a project and the resulting benefits. Six-phase approach to designing, installing and optimizing a network.

Action Of Network Lifecycle

Part of RFQ

Organizational Overview Background information on the company Type of business

Required Deliverables Description of the end product of the project The type of devices used in the implement

Assumptions/Agreements The project budget The support the company will provide to the contractor

Role Account Manager Pre-sales systems engineer Network designer Post-sales field engineer Budgets for projects and negotiate contracts Identifier current problems, assists the designer during surveys Plans, creates, and implements a design, anticipates effects of change Supports customers training, resolves technical problems

Chapter 3 : Characterizing of the existing Network

Connection to appropriate Technology/Media Fiber Gigabit NICs for servers 10/100 Mbps copper to 2950 switch 2960 switch with SFP module 1841 ISR ROUTER High-Speed serial interface 1814 ISR router with DSL interface for High-speed digital subscriber line DSL High bandwith connections in the data center End User connection to access Layer switch Connection between two Distribution Layer switches Connection between two WAN sites Connection to the internet

Scenarios wireless LAN coverage and ussage in the stadium . Can/Cant i. ii. iii. iv. i. ii. iii. Thick concrete pillars and walls between the luxury suited Microwave ovens in the concession areas and luxury boxes Sports and news journalists using wireless telephones and headsets Elevator machinery in shafts near the stadium restaurant and the luxury suites Rapidly changing video and digital addvertising billboards Spectators using the messaging features on their cellular mobile phones A large number of people simultaneously using their magnetic swipe cards to enter the stadium turnstiles

Can Reduce

Cant Reduce

Project scope for each network upgrade scenario Answer 1 : Company ABC wants to improve the physical security on the IT depastment Valid i. ii. i. ii. iii. iv. v. Review network physical security measures Install keypad locks on all wiring closet doors Upgrade and relocate the data center Upgrade the NIC s in all PCs to 10/100/100 Upgrade the WAN link to the branch offices Record the serial numbers of existing network devices Sales area desktop computers will require RAM upgrades

Not Valid

Answer 2 : Company XYZ wants to upgrade the existing LAN connections and two WAN locations i. ii. i. ii. iii. iv. v. Upgrade and relocate the data center Upgrade the WAN link to the branch offices Upgrade the NIC s in all PCs to 10/100/100 Record the serial numbers of existing network devices Review network physical security measures Install keypad locks on all wiring closet doors Sales area desktop computers will require RAM upgrades

Valid

Not Valid

Stated business goals to the technical requirements i. ii. iii. iv. v. Provides QoS on WAN links Increase secure wireless LAN coverage Centralize servers and network access management Implement converged network services and insfracstructure Implement high bandwith path to servers and restrict unwanted traffic Provide voice and video services to remote sites Meet growing demand for wireless connectivity Improve security and manage user access to network resources Reduce costs by consilidating the separate networks Improve customer servers and restricts unwanted traffic

Network Weaknesses with possible improvement strategies Data Center serves Directly accessible from internet Different users have different accounts and logins for different networks services Centralizes servers and user account management Wireless LAN can be accessed b anyone within range Provide wireless security and encryption There are no baseline network performance data and details Provide network reporting and management tools Switches are not linked together Network has only VLAN and all useable addresses have been exhausted

Improve security with the addition of filtering, firewalls and IDS

Provide redundant links between switches and implement Spanning Tree Protocol

Implement a structured classless IP addressing scheme and corresponding VLAN structure

Chapter 4 : Identifying Application on Network Design

Internal Traffic File transfer to a Local Server Local System Backup Internal E-mail

External Traffic Email to Remote Office Emergency Servies (Fire/Police) Web Sports News

Main types of Application communications Client-to-client Client-to-server farm Client-to-enterprise edge

Not Main type of Application communications Client-to-Access Point Client-to-switch

Possible causes to the network administrators list Story : The network administrator receives a call from the help desk. None of the network users at the stadium can currently login to the local Microsoft Domain nor access information on their shared network drives. The network administrator makes a list of possible causes for this problem. List of possible causes : The firewall is denying UDP port 53 traffic to the server farm DHCPis not giving the correct Microsoft DNS server address to the users. No Microsoft DNS server is configured for the users.

Features of Traditional Telephone Systems, VOIP System and IP telephony Traditional Phone System Uses a PBX for call control Depends on physical cable insfracstructure for phone addressing Connects to the PSTN VOIP System Uses a PBX for call control Converts voice signals to IP traffic at voice-enables routers Depends on physical cable insfracstructure for phone addressing Voice traffic uses the corporate WAN Intergrates voice and data over the IP network Connects to the PSTN IP Telephone System Converts voice signals to IP traffic at the phone Users a server such as Cisco and Unfied Communications Manager for call control and signalling Voice traffic users the corporate WAN Intergrates voice and data over the IP network Connects to the PSTN

Scenarios of Video-Live and On-Demand (VoD) and Streaming video VoD :

The video data packets are unicast to the user The video can be stored for later viewing by the user

Streaming Video : The video data packets are multicast to the user The video can be stored for later viewing by the user The live stream of video data packets are prioritized by the network

Chapter 5 : C reating the network design

Based on the prioritized business goals

Which option should be implemented first?

Differences between standalone Aps and wireless controllers with LWAPs What is advantage of having a wireless controller design as compared to a standalone access point design? Easier to upgrade larger installation using What is advantage of having a standalone access point design as compared to a wireless controller design? Least expensive wireless solution for a few What is advantage of having a wireless controller design as compared to a standalone access point design? Offers easier support of QoS and security

Security Checklist : Turn off unnecessary services Shut down any unused ports and interfaces Configure logging Enable SSH and disable Telnet Enable HTTPS for web administration Set timeouts and ACLs VTY, console and AUX ports Use strong passwords and password encryption.

Routing Protocol EIGRP : Classless routing Small routing updates Updates only when necessary Fast convergence Easy to implement

Chapter 6 : Using IP Addressing in the network design

Chapter 7 : Prototyping the campus Network

Network Test : Pilot Test the VLAN routing strategy at the Distribution Layer. Compare how redundant switched links react to a failure with how redundant routed links react to the same failure. Test the route summarization when using auto-summary instead of manual summary. Test the implementation of a new link between a WAN site and the stadium. Test wireless Access Point placement.

Protype

Port State and their Role : Root Forwarding port elected for the entire spanning tree topology Alternate Different path to the root bridge than the path the root port takes Disabled Has no role in the operation of the spanning tree Designated Forwarding port elected for every individual switched LAN segement Backup Less desirable connection to the same shared network segement

Chapter 8 : Prototyping the WAN

Definition Frame Relay term :

Chapter 9 : Preparing the proposal Network Upgrade :

Aspects of an implementation plan : In the PPDIOO process, when is the implementation in the design phase, after the network design is What item is not a rewuired part od=f task references to business goals When would a customer typically sign off that work after completion of each task

Successful Interviewing Tips Learn About the company Practise Speaking Bring Resumeand portfolio Be truthful about your skills and Experiences Dress for success Arrive Early Keep Good Posture and smile

Vous aimerez peut-être aussi