Académique Documents
Professionnel Documents
Culture Documents
Characteristics of the Hierachical Model Core Layer Distribution Layer Provides Aggregates access redundancy & fast devices and convergence supports routing, between other access control & network layers or QoS modules
Access Layer Provides netwoek connectivity for hosts & end devices
Enterprise Layer Provides network support for all enterprise within a campus
Enterprise Edge Extends enterprise services to remote sites & provides connectivity to external sites using QoS, policy enforcement, service level & security
II.
Requirements affects the entire network or only portion of the network Proposed Design Change Add server farm bandwidth Add IP telephony Provide Core Layer redundancy Add a wireless access point Add new security policies Upgrade WAN bandwidth Routing Protocol Change Centraliza servers and services Entire Network Portions of the Network
III.
ACL and Statement A Standard Access List that allow you to permit traffic from 172.16.3.xxx A Standard Access List that allow you to deny traffic from 172.16.5.2 A Standard Access List that allow you to permit traffic from any host A Standard Access List that allow you to permit traffic from 172.16.5.5 access list 1 deny 172.16.5.2 0.0.0.0 access list 10 permit 172.16.3.0 0.0.0.255 access list 10 permit any access list 10 permit 172.16.5.5 0.0.0.0
IV
Chapter 2 : Gathering Network Requirement Aspect of PPDIOO Network Lifecycle phases : a. b. c. What network Lifecyle phase includes a safe and operations assessment? What Network Lifecycle pahse supports development of the business case? What Network Lifecycle phase produces the installation plan? Plan Prepare Design...
Terms & Definitions Project Plan Request for Proposal (RFP) Business Case Netwrok Lifecysle Document outlining the taks, problem, responsibilities, timeline, and resources required to complete a project Document outlining a specific project, its requirement, and the purchasing and installation processes. Used to obtain bids from outside vendirs/companies to complete the work. Document outlining reasons for financial investment for a project and the resulting benefits. Six-phase approach to designing, installing and optimizing a network.
Part of RFQ
Required Deliverables Description of the end product of the project The type of devices used in the implement
Assumptions/Agreements The project budget The support the company will provide to the contractor
Role Account Manager Pre-sales systems engineer Network designer Post-sales field engineer Budgets for projects and negotiate contracts Identifier current problems, assists the designer during surveys Plans, creates, and implements a design, anticipates effects of change Supports customers training, resolves technical problems
Connection to appropriate Technology/Media Fiber Gigabit NICs for servers 10/100 Mbps copper to 2950 switch 2960 switch with SFP module 1841 ISR ROUTER High-Speed serial interface 1814 ISR router with DSL interface for High-speed digital subscriber line DSL High bandwith connections in the data center End User connection to access Layer switch Connection between two Distribution Layer switches Connection between two WAN sites Connection to the internet
Scenarios wireless LAN coverage and ussage in the stadium . Can/Cant i. ii. iii. iv. i. ii. iii. Thick concrete pillars and walls between the luxury suited Microwave ovens in the concession areas and luxury boxes Sports and news journalists using wireless telephones and headsets Elevator machinery in shafts near the stadium restaurant and the luxury suites Rapidly changing video and digital addvertising billboards Spectators using the messaging features on their cellular mobile phones A large number of people simultaneously using their magnetic swipe cards to enter the stadium turnstiles
Can Reduce
Cant Reduce
Project scope for each network upgrade scenario Answer 1 : Company ABC wants to improve the physical security on the IT depastment Valid i. ii. i. ii. iii. iv. v. Review network physical security measures Install keypad locks on all wiring closet doors Upgrade and relocate the data center Upgrade the NIC s in all PCs to 10/100/100 Upgrade the WAN link to the branch offices Record the serial numbers of existing network devices Sales area desktop computers will require RAM upgrades
Not Valid
Answer 2 : Company XYZ wants to upgrade the existing LAN connections and two WAN locations i. ii. i. ii. iii. iv. v. Upgrade and relocate the data center Upgrade the WAN link to the branch offices Upgrade the NIC s in all PCs to 10/100/100 Record the serial numbers of existing network devices Review network physical security measures Install keypad locks on all wiring closet doors Sales area desktop computers will require RAM upgrades
Valid
Not Valid
Stated business goals to the technical requirements i. ii. iii. iv. v. Provides QoS on WAN links Increase secure wireless LAN coverage Centralize servers and network access management Implement converged network services and insfracstructure Implement high bandwith path to servers and restrict unwanted traffic Provide voice and video services to remote sites Meet growing demand for wireless connectivity Improve security and manage user access to network resources Reduce costs by consilidating the separate networks Improve customer servers and restricts unwanted traffic
Network Weaknesses with possible improvement strategies Data Center serves Directly accessible from internet Different users have different accounts and logins for different networks services Centralizes servers and user account management Wireless LAN can be accessed b anyone within range Provide wireless security and encryption There are no baseline network performance data and details Provide network reporting and management tools Switches are not linked together Network has only VLAN and all useable addresses have been exhausted
Provide redundant links between switches and implement Spanning Tree Protocol
Internal Traffic File transfer to a Local Server Local System Backup Internal E-mail
External Traffic Email to Remote Office Emergency Servies (Fire/Police) Web Sports News
Possible causes to the network administrators list Story : The network administrator receives a call from the help desk. None of the network users at the stadium can currently login to the local Microsoft Domain nor access information on their shared network drives. The network administrator makes a list of possible causes for this problem. List of possible causes : The firewall is denying UDP port 53 traffic to the server farm DHCPis not giving the correct Microsoft DNS server address to the users. No Microsoft DNS server is configured for the users.
Features of Traditional Telephone Systems, VOIP System and IP telephony Traditional Phone System Uses a PBX for call control Depends on physical cable insfracstructure for phone addressing Connects to the PSTN VOIP System Uses a PBX for call control Converts voice signals to IP traffic at voice-enables routers Depends on physical cable insfracstructure for phone addressing Voice traffic uses the corporate WAN Intergrates voice and data over the IP network Connects to the PSTN IP Telephone System Converts voice signals to IP traffic at the phone Users a server such as Cisco and Unfied Communications Manager for call control and signalling Voice traffic users the corporate WAN Intergrates voice and data over the IP network Connects to the PSTN
The video data packets are unicast to the user The video can be stored for later viewing by the user
Streaming Video : The video data packets are multicast to the user The video can be stored for later viewing by the user The live stream of video data packets are prioritized by the network
Differences between standalone Aps and wireless controllers with LWAPs What is advantage of having a wireless controller design as compared to a standalone access point design? Easier to upgrade larger installation using What is advantage of having a standalone access point design as compared to a wireless controller design? Least expensive wireless solution for a few What is advantage of having a wireless controller design as compared to a standalone access point design? Offers easier support of QoS and security
Security Checklist : Turn off unnecessary services Shut down any unused ports and interfaces Configure logging Enable SSH and disable Telnet Enable HTTPS for web administration Set timeouts and ACLs VTY, console and AUX ports Use strong passwords and password encryption.
Routing Protocol EIGRP : Classless routing Small routing updates Updates only when necessary Fast convergence Easy to implement
Network Test : Pilot Test the VLAN routing strategy at the Distribution Layer. Compare how redundant switched links react to a failure with how redundant routed links react to the same failure. Test the route summarization when using auto-summary instead of manual summary. Test the implementation of a new link between a WAN site and the stadium. Test wireless Access Point placement.
Protype
Port State and their Role : Root Forwarding port elected for the entire spanning tree topology Alternate Different path to the root bridge than the path the root port takes Disabled Has no role in the operation of the spanning tree Designated Forwarding port elected for every individual switched LAN segement Backup Less desirable connection to the same shared network segement
Aspects of an implementation plan : In the PPDIOO process, when is the implementation in the design phase, after the network design is What item is not a rewuired part od=f task references to business goals When would a customer typically sign off that work after completion of each task
Successful Interviewing Tips Learn About the company Practise Speaking Bring Resumeand portfolio Be truthful about your skills and Experiences Dress for success Arrive Early Keep Good Posture and smile