Midterm 433

¡Supera tus tareas y exámenes ahora con Quizwiz!

Sum of all the data all network nodes have ready to send at a particular time capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time

Offered load

The network is monitored during this phase for performance problems Plan Design Implement Operate Optimize

Operate

Based on proactive network management that identifies and resolves problems before network disruptions arise. Plan Design Implement Operate Optimize

Optimize

Maximum average utilization before the network is considered saturated capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time

Optimum utilization

includes an analysis of areas where the network will be installed and an identification of users who will require network services. Plan Design Implement Operate Optimize

PLAN

defines a TCP option for filling in the sequence numbers for received blocks and another TCP option for informing the recipient during the three-way handshake that the host supports SACK. RFC 2475 RFC 2205 RFC 2018 RFC 2722

RFC 2018

the working group describes the Resource Reservation Protocol (RSVP) RFC 2475 RFC 2018 RFC 2722 RFC 2205

RFC 2205

Traffic Flow Measurement: Architecture.", describes an architecture for the measurement and reporting of network traffic flows and discusses how the architecture relates to an overall traffic flow architecture for intranets and the Internet. RFC 2205 RFC 2208 RFC 2722 RFC 2018

RFC 2722

__________________provides information about potential targets and their weaknesses and is usually carried out in preparation for a more focused attack against a particular target. Distributed Denial-of-service attacks Logic Bomb attacks Reconnaissance attack Denial-of-service attacks

Reconnaissance attack

The signal can interfere with itself in the air and affect the receiver's capability to discriminate between the signal and noise in the environment. caused by metal surfaces such as steel girders, scaffolding, shelving units, steel pillars, and metal doors Absorption Refraction Reflection Diffraction

Reflection

When an RF signal passes from a medium with one density into a medium with another density, the signal can be bent, much like light passing through a prism. Absorption Refraction Reflection Diffraction

Refraction

_______________________ specifies how much bandwidth is used by the protocol in comparison to the total bandwidth currently in use on the segment. Absolute usage Relative usage Optimum usage

Relative usage

_____________ refers to a variety of issues, including accuracy, error rates, stability, and the amount of time between failures. fill the blank

Reliability

The network design you propose to a customer should be able to adapt to network usage and _________. terminology workstations scope merit

Scope

A single network bounded by a switch or router and based on a particular Layer 1 and Layer 2 protocol. Remote Access Lan Segment Wan

Segment

TCP port 25 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)

Simple Mail Transfer Protocol (SMTP)

UDP port 161 and 162 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)

Simple Network Management Protocol (SNMP)

Long-range communication, Up to 100 km. single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared

Single-mode fiber

TCP port 23 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)

Telnet

In this phase, we build a prototype or pilot.

Test, optimize

For performance analysis and base lining purposes, use an interval of 10 to 15 minutes 1 to 5 minutes 20 to 25 minutes

1 to 5 minutes

For long-term load analysis, to determine peak hours, days, or months set the interval to: 30 minutes 45 minutes 10 minutes

10 minutes

The cabling from a telecommunications closet to a workstation is approximately 100 meters 50 meters 150 meters

100 meters

An access point typically sends a beacon frame every 10 milliseconds 100 milliseconds 50 milliseconds

100 milliseconds

An uptime of 99.70 percent means the network is down ________ per week 10 Minutes 15 Minutes 45 Minutes 30 Minutes

30 minutes

An uptime of 99.95 percent means the network is down ____________ per week, 5 Minutes 10 Minutes 15 Minutes 30 Minutes

5 minutes

Optimum average network utilization is about 60 percent 70 percent 50 percent 40 percent

70 percent

In the 1990s, networking books and training classes taught the 80/20 rule for capacity planning. Pick the two answers that apply. -20 percent of traffic stays local in departmental LANs -80 percent of traffic stays local in departmental LANs -20 percent of traffic is destined for other departments or external networks -80 percent of traffic is destined for other departments or external networks

80 percent of traffic stays local in departmental LANs 20 percent of traffic is destined for other departments or external networks

Many enterprise managers now report that the network must be available__________ percent of the time. 99.999 89.99 90.99 97.99

99.999

In this phase, the network designer interviews users and technical personnel to gain an understanding of the business and technical goals for a new enhanced system

Analyze requirement

_______________ can be expressed as a percent uptime per year, month, week, day, or hour, compared to the total time in that period. fill the blank

Availability

In other applications, the flow is bidirectional and asymmetric. Which means Clients send small queries and servers send large streams of data Both ends of the flow send traffic at about the same rate

Clients send small queries and servers send large streams of data

is a type of electrical cable that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared

Coaxial cable

____________ refers to adherence to regulations that protect against fraud and inadvertent disclosure of private customer data.

Compliance

refers to a focus on consistent, cohesive decisions, policies and processes that protect an organization from mismanagement and illegal activities of users of IT services.

Governance

RFC 2212 describes the network node behavior required to deliver a service, provides a firm limit on end-to-end packet-queuing delays. Guaranteed Service Available bit rate (ABR) Controlled-load service Unspecified bit rate (UBR)

Guaranteed Service

Within a building, wiring that runs from telecommunications closets to wallplates in cubicles or offices work-area wiring vertical wiring horizontal wiring

Horizontal wiring

TCP port 80 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)

Hypertext transfer protocol (HTTP)

The network is built according to the design specifications. Implementation also serves to verify the design. Plan Design Implement Operate Optimize

Implement

A _____________________________ can be defined as protocol and application information transmitted between communicating entities during a single session Filling the blank

Individual network traffic flow

A set of switched segments based on a particular Layer 2 protocol such as Fast Ethernet and an inter-switch trunking protocol. WAN LAN MAN CAN

LAN

Widely used for point-to-point communications because their small wavelength allows conveniently-sized antennas to direct them in narrow beams, which can be pointed directly at the receiving antenna single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared

Microwave transmission

Fiber-optic cable that can transmit multiple signals at the same time. Used for short distances single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared

Multimode fiber

Quantity of error-free data successfully transferred between nodes per unit of time, usually seconds capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time

Throughput

With this approach, we are going to start with the requirements of the organization, the technology that is needed, and then design it. Upside-down Top-Down Bottom-Up

Top-down

UDP port 69 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)

Trivial File Transfer Protocol (TFTP)

A good rule of thumb is that fewer than 0.1 percent of frames should encounter collisions. True False

True

Auto-negotiation problems can result from hardware incompatibilities and old or defective Ethernet software drivers. True False

True

By developing an understanding of the existing network's structure, uses, and behavior, you can determine whether a customer's design goals are realistic. True False

True

Five nines availability is extremely hard to achieve. True False

True

In the current business environment, security and disaster recovery should be considered with ever network design choice. True False

True

One goal of the planning process should be to recognize which parts of the network are critical and must be backed up. True False

True

A ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs). There are five types -- identified with the prefix CAT, as in category -- each supporting a different amount of bandwidth. single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared r

Unshielded twisted-pair (UTP) copper

The percent of total available capacity in use capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time

Utilization

Where private networks make use of the Internet to reach remote locations or possibly other organizations. SLA CAL VPN DNS

VPN

Within a building, wires that extend from floor to floor horizontal wiring Work-area wiring vertical wiring

Vertical wiring

A geographically dispersed network including point-to-point, Frame Relay, ATM, and other long-distance connections. MAN WAN CAN LAN

WAN

is a frame that goes to all network stations on a LAN. At the data link layer, the destination address of a_________________ frame is FF:FF:FF:FF:FF:FF Unicast simulcast broadcast multicast

broadcast

The amount of time average delay varies capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time

delay variation

__________________ is sometimes used to describe an internal internetwork that is accessible by outside parties. VPN CAL intranet extranet

extranet

Having a wavelength just greater than that of the red end of the visible light spectrum but less than that of microwaves has a wavelength from about 800 mm to 1 mm single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared

infrared

is a frame that goes to a subset of stations. For example, a frame destined to 01:00:0C:CC:CC:CC goes to Cisco routers and switches that are running the Cisco Discovery Protocol (CDP) on a LAN. simulcast unicast multicast broadcast

multicast

_____________________________________ is a measurement of the amount of bandwidth that is in use during a specific time interval. fill the blank

network utilization

The amount of time between a request for some network service and a response to the request capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time

response time

_____________ refers to how much grow the a network design must support. fill the blank

scalability

It contains an extra foil wrapping or copper braid jacket to help shield the cable signals from interference. single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared

shielded twisted-pair (STP)

Displays temperature, voltage, and blower information on the Cisco 7000 series, Cisco 7200 series, and Cisco 7500 series routers, and the Cisco 12000 series Gigabit Switch Router. show startup-config show running-config show processes show environment

show environment

Displays CPU utilization for the last 5 seconds, 1 minute, and 5 minutes show startup-config show running-config show processes show environment

show processes

Displays the router's configuration stored in memory and currently in use. show startup-config show running-config show processes show environment

show running-config

Displays the configuration the router will use upon the next reboot. show startup-config show running-config show processes show environment

show startup-config

__________________reduces routes in a routing table, routing-table update traffic, and overall router overhead. Most effective when address prefixes have been assigned in a consistent and contiguous manner. Filling the blank Route aggregation Route summarization Supernetting

supernetting

______________ is defined as the quantity of error-free data that are transmitted per unit of time. Throughput Bandwith capacity Scalability

throughput

Characterizing traffic flow involves identifying sources and destinations of network traffic and analyzing the direction and symmetry of data traveling between sources and destinations. True False

true

___________________________________ is often used to describe the process of analyzing a site to see if it will be appropriate for wireless transmission. filling the blank...

wireless site survey

Within a building, wiring that runs from the wallplate to a workstation in a cubicle or office. work-area wiring vertical wiring horizontal wiring

work-are wiring

______________________specifies how much bandwidth is used by the protocol in comparison to the total capacity of the segment (for example, in comparison to 100 Mbps on Fast Ethernet). Absolute usage Relative usage Optimum usage

Absolute usage

Some of the electromagnetic energy of the signal can be___________________ by the material in objects through which it passes, resulting in a reduced signal level.Water has significant _______________ properties, and objects such as trees or thick wooden structures can have a high water. Absorption Refraction Reflection Diffraction

Absorption

Cisco recommends a modular approach with its three-layer hierarchical model. This model divides networks into core, distribution and _________layers

Access

The amount of useful traffic that is correctly transmitted, relative to total traffic capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time

Accuracy

Multiple buildings within a local geographical area (within a few miles). Campus network Wireless Network Enterprise network Segment

Campus network

The data-carrying capability of a circuit or network, usually measured in bits per second (bps). capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time

Capacity(bandwidth)

In some applications, the flow is bidirectional and symmetric. Which is Clients send small queries and servers send large streams of data Both ends of the flow send traffic at about the same rate.

Both ends of the flow send traffic at about the same rate.

This approach begins with the physical layer of the OSI model and works its way up. New, higher bandwidth links might be purchased, as well as new routers, switches, firewalls, etc. Upside- down Top-down Bottom-up

Bottom-up

A Hierarchical Topology makes no effort to organize the network or its traffic. True False

False

A good rule-of-thumb threshold for considering errors unhealthy is that a network should have more than one bad frame per megabyte of data. True False

False

Flexible: A generic term to describe any application that has specific requirements for constant bandwidth, delay, delay variation, accuracy, and throughput. True False

False

For a network design to be affordable, it should carry the minimum amount of traffic for a given financial cost. True False

False

In a structured network design process, a physical model is developed before the logical model. True False

False

It is not important to include intermediate milestones in the project schedule. True False

False

Periodic practice is not a necessary part of achieving business continuity when a real disaster hits. The drills shouldn't be taken seriously. True False

False

TCP port 20 (data) and TCP port 21 (control) File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)

File transfer protocol (FTP)

UDP port 67 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)

DHCP server

Time between a frame being ready for transmission from a node and delivery of the frame elsewhere in the network capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time

Delay (latency)

In this phase, the network designers accomplish the bulk of the logical and physical design, according to requirements. Plan Design Implement Operate Optimize

Design

Includes security planning, network layer addressing, naming, and switching and routing protocols.

Developing the logical design

In this phase, specific techonologies and products that realize the logical design are selected

Developing the physical design

results when a region through which the RF signal can pass easily is adjacent to a region in which reflective obstructions exist Absorption Refraction Reflection Diffraction

Diffraction

UDP port 53 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)

Domain Name System (DNS)

An analysis of how much effort is required to produce a certain amount of data throughput capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time

Efficiency

A large and diverse network, consisting of campuses, remote access services, and one or more WANs or long-range LANs. Enterprise network Building Network Campus network Wireless network

Enterprise network


Conjuntos de estudio relacionados

Accounting 2020 Chapter 11 Smartbook

View Set

CEN Randomized 150 Question Prep Quiz

View Set

Honors US Chapter 10, 11, and 12

View Set

Biology 1260 Chapter 12: Organization of Multicellular Organisms

View Set