ITC 433 midterm
In the 1990s, networking books and training classes taught the 80/20 rule for capacity planning. Pick the two answers that apply.
-80 percent of traffic stays local in departmental LANs -20 percent of traffic is destined for other departments or external networks
For performance analysis and base lining purposes, use an interval of
1 to 5 minutes
For long-term load analysis, to determine peak hours, days, or months set the interval to
10 minutes
The cabling from a telecommunications closet to a workstation is approximately
100 meters
An access point typically sends a beacon frame every:
100 milliseconds
An uptime of 99.70 percent means the network is down ________ per week.
30 minutes per week
An uptime of 99.95 percent means the network is down ____________ per week
5 minutes per week
Optimum average network utilization is about.
70 percent
Many enterprise managers now report that the network must be available ------ percent of the time.
99.999
Some of the electromagnetic energy of the signal can be --- by the material in objects through which it passes, resulting in a reduced signal level. Water has significant ----properties, and objects such as trees or thick wooden structure can have a high water.
Absorption
Cisco recommends a modular approach with its three-layer hierarchical model. This model divides networks into core, distribution and -----------layer Filling the blank:
Access
The amount of useful traffic that is correctly transmitted, relative to total traffic
Accuracy
In this phase, the network analyst interviews users and technical personnel to gain an understanding of the business and technical goals for a new or enhanced system.
Analyze requirement
Systems Development Life Cycle
Analyze requirement Develop the logical design Develop the physical design Test, optimize, and documente the design
___________ can be expressed as a percent uptime per year, month, week, day, or hour, compared to the total time in that period. Filling the blank
Availability
In some applications, the flow is bidirectional and symmetric. Which is
Both ends of the flow send traffic at about the same rate.
This approach begins with the physical layer of the OSI model and works its way up. New, higher bandwidth link might be purchased, as well as new routers, switches, firewalls, etc.
Bottom-up
Is a frame that goes to a subset of stations. For example, a frame destined to 01:00:0C:CC:CC:CC goes to Cisco routers and switches that are running the Cisco Discovery Protocol (CDP) on a LAN
Broadcast
Multiple buildings within a local geographical are (within a view miles).
Campus Network
The data-carrying capability of a circuit or network, usually measured in bits per second (bps)
Capacity (bandwidth)
In other applications, the flow is bidirectional and asymmetric. Which means
Clients send small queries and servers send large streams of data
Is a type of electrical cable that has an inner conductor surrounded by a tubular insulating layer surrounded by a tubular conducting shield
Coaxial Cable
--------refers to adherence to regulations that protect against fraud and inadvertent disclosure of private customer data. Filling the blank:
Compliance
Defined in RFC 2211 and provides a client data flow with QoS closely approximating the QoS the same flow would receive on an unloaded network.
Controlled-load service
A______________ is an area in a network where application layer data resides. Filling the blank
Data store
Time between a frame being ready for transmission from a node and delivery of the frame elsewhere in the network
Delay (latency)
The amount of time average delay varies
Delay Variation
In this phase, the network designers accomplish the bulk of the logical and physical design, according to requirements gathered during the plan phase.
Design
includes security planning, network layer addressing, naming,and switching and routing protocol
Develop the Logical design
In this phase, specific technologies and products that realize the logical design are selected
Develop the Physical design
Results when a region through which the RF signal can pass easily is adjacent to a region in which reflective obstructions exist
Diffraction
An analysis of how much effort is required to produce a certain amount of data throughput
Efficiency
A large and diverse network, consisting of campuses, remote access services, and one or more WAN or long-range LANs.
Enterprise Network
____________ is sometimes used to describe an internal inter network that is accessible by outside parties.
Extranet
A Hierarchical Topology makes no effort to organize the network or its traffic.
False
A good rule-of-thumb threshold for considering errors unhealthy is that a network should have more than one bad frame per megabyte of data.
False
Flexible: A generic term to describe any application that has specific requirements for constant bandwidth, delay, delay variation, accuracy, and throughput.
False
For a network design to be affordable, it should carry the minimum amount of traffic for a given financial cost.
False
In a structural network design process, a physical model is developed before the logical model.
False
Inflexible: A generic term to describe any application that simply expects the network to make a best effort to meet requirements.
False
It is not important to include intermediate milestones in the project schedule.
False
Periodic practice is not a necessary part of achieving business continuity when a real disaster hits. The drills shouldn't be taken seriously
False
---------refers to focus on consistent, cohesive decisions, policies and processes that protect an organization from mismanagement and illegal activities of users of IT services. Filling the Blank:
Governance
RFC 2212 describes the network node behavior required to deliver a service, provides a firm limit on end-to-end packet-queuing delays.
Guaranteed Service
Within a building, wiring that runs from telecommunications closets to wall-plates in cubicles or offices.
Horizontal wring
The network is built according to the design specifications. Implementation also serves to verify the design.
Implementation
A _______________can be defined as protocol and application information transmitted between communicating entities during a single session Filling the blank
Individual network traffic flow
having a wavelength just greater than that of the red end of the visible light spectrum but less than that of microwaves, has wavelength from about 800 nm to 1 mm
Infrared
A set of switched segments based on a particular Layer 2 protocol such as Fast Ethernet and an inter-switch trunking protocol
LAN
widely used for point-to-point communications because their small wavelength allows conveniently-sized antennas to direct them in transmission narrow beams, which can be pointed directly at the receiving antenna
Microwave
Fiber-optic cable that can transmit multiple signals at the same time. Used for short distances
Multimode fiber
____________ is a measurement of the amount of bandwidth that is in use during a specific time interval. Filling the blank:
Network Utilization
Sum of all the data all network nodes have ready to send at a particular time
Offered Load
The network Is monitored during this phase for performance problems and any faults to provide input into the optimize phase of the network life cycle.
Operate
The optimize phase is based on proactive network management that identifies and resolves problems before network disruptions arise. The optimize phase may lead to a network redesign if too many problems arise because of design errors or as network performance degrades over time as actual use and capabilities diverge. redesign can also be required when requirements change significantly
Optimize
Maximum average utilization before the network is considered saturated.
Optimum utilization
This phase also includes an analysis of areas where the network will be installed and an identification of users who will require network services.
Plan
Cisco documentation refers to the Plan Design Implement Operate Optimize (PDIOO) set of phases for the life cycle of the network.
Plan, Design, Implement, Operate, Optimize
Defines a TCP option for filling in the sequence numbers for received blocks and another TCP option for informing the recipient during the three-way handshake that the host supports SACK
RFC 2018
The working group describes the Resource Reservation Protocol (RSVP)
RFC 2205
An Architecture for Differentiated Services," defines an architecture for implementing scalable service differentiation in an internetwork or the Internet.
RFC 2475
Traffic Flow Measurement: Architecture." , describes an architecture for the measurement and reporting of network traffic flows and discusses how the architecture relates to an overall traffic flow architecture for intranets and the Internet
RFC 2722
_________provides information about potential targets and their weaknesses and is usually carried out in preparation for a more focused attack against a particular target
Reconnaissance attack
The signal can interfere with itself in the air and affect the receivers capability to discriminate between the signal and noise in the environment, caused by metal surfaces such as still girders, scaffolding, shelving units, steel pillars, and metal doors.
Reflection
When RF signal passes from a medium with one density into a medium with another density, the signal can bent, much like light passing through a prism.
Reflection
___________ specifies how much bandwidth is used by the protocol in comparison to the total bandwidth currently in use on the segment
Relative usage
___________ refers to a variety of issues, including accuracy, error rates, stability, and the amount of time between failures. Filling the blank
Reliability
The amount of time between a request for some network service and a response to the request
Response time
_________ refers to how much growth a network design must support Filling the blank:
Scalability
The network design you propose to a customer should be able to adapt to network usage and--------
Scope
A single network bounded by a switch or router and based on a particular Layer 1 and Layer 2 protocol
Segment
Contains an extra foil wrapping or copper braid jacket to help shield the cable signals from interference.
Shielded twisted-pair (STP)
Long-range communication, Up to 100 km
Single- mode fiber
In this phase we build a prototype or pilot
Tes, optimize, and document the design.
Quantity of error-free data successfully transferred between nodes per unit of time, usually seconds
Throughput
__________ is defined as the quantity of error-free data that are transmitted per unit of time.
Throughput
The rate specifies the continually sustainable data rate, and the size specifies the extent to which the data rate can exceed the sustainable level for short periods of time.
Token bucket
With this approach, we are going to start with the requirements of the organization, the technology that is need, and then design it
Top-Down
A good rule of thumb is that fewer than 0.1 percent of frames should encounter collisions
True
Auto negotiation problems can result from hardware incompatibilities and old or defective Ethernet software drivers
True
By developing an understanding of the existing network's structure, uses, and behavior, you can determine whether a customer's design goals are realistic.
True
Characterizing traffic flow involves identifying sources and destinations of network traffic and analyzing the direction and symmetry of data traveling between sources and destinations.
True
Efficiency is affected by frame size, the interaction of protocols used by an application, windowing, and flow control, and error-recovery mechanisms.
True
Five nines availability is extremely hard to achieve.
True
Good network design must recognize that a customer's requirements embody many business and technical goals.
True
In the current business environment, security and disaster recovery should be considered with ever network design choice.
True
One goal of the planning process should be to recognize which parts of the network are critical and must be backed up.
True
A ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs). There are five types identified with the prefix CAT, as in category - each supporting a different Amount of bandwidth.
Unshielded twisted
The percent of total available capacity in use
Utilization
Where private network makes use of the internet to reach remote locations or possibly other organizations.
VPN
A geographically dispersed network including point-to-point, Frame Relay, ATM, and other long-distance connections
WAN
__________________ is often used to describe the process of analyzing a site to see if it will be appropriate for wireless transmission. Filling the blank:
Wireless site server
___________specifies how much bandwidth is used by the protocol in comparison to the total capacity of the segment (for example, in comparison to 100 Mbps on Fast Ethernet).
absolute usage
Display temperature, voltage and blower information on cisco 700 series,cisco 7200 series....
show environment
Display CPU utilization for the last 5 seconds, 1 minute and 5 minutes
show processes
Displays the routers configuration stored in memory and currently in use.
show running-config
Display the configuration of the router will use upon the next reboot.
show startup-config
________reduces routes in a routing table, routing-table update traffic, and overall router overhead. Most effective when address prefixes have been assigned in a consistent and contiguous manner. Filling the blank:
supernetting
Within a building, wires that extend from floor to floor.
vertical wiring
Within a building, wiring that runs from the wallplates to a workstation in a cubicle or office
work-are wiring