Midterm 433
Sum of all the data all network nodes have ready to send at a particular time capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time
Offered load
The network is monitored during this phase for performance problems Plan Design Implement Operate Optimize
Operate
Based on proactive network management that identifies and resolves problems before network disruptions arise. Plan Design Implement Operate Optimize
Optimize
Maximum average utilization before the network is considered saturated capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time
Optimum utilization
includes an analysis of areas where the network will be installed and an identification of users who will require network services. Plan Design Implement Operate Optimize
PLAN
defines a TCP option for filling in the sequence numbers for received blocks and another TCP option for informing the recipient during the three-way handshake that the host supports SACK. RFC 2475 RFC 2205 RFC 2018 RFC 2722
RFC 2018
the working group describes the Resource Reservation Protocol (RSVP) RFC 2475 RFC 2018 RFC 2722 RFC 2205
RFC 2205
Traffic Flow Measurement: Architecture.", describes an architecture for the measurement and reporting of network traffic flows and discusses how the architecture relates to an overall traffic flow architecture for intranets and the Internet. RFC 2205 RFC 2208 RFC 2722 RFC 2018
RFC 2722
__________________provides information about potential targets and their weaknesses and is usually carried out in preparation for a more focused attack against a particular target. Distributed Denial-of-service attacks Logic Bomb attacks Reconnaissance attack Denial-of-service attacks
Reconnaissance attack
The signal can interfere with itself in the air and affect the receiver's capability to discriminate between the signal and noise in the environment. caused by metal surfaces such as steel girders, scaffolding, shelving units, steel pillars, and metal doors Absorption Refraction Reflection Diffraction
Reflection
When an RF signal passes from a medium with one density into a medium with another density, the signal can be bent, much like light passing through a prism. Absorption Refraction Reflection Diffraction
Refraction
_______________________ specifies how much bandwidth is used by the protocol in comparison to the total bandwidth currently in use on the segment. Absolute usage Relative usage Optimum usage
Relative usage
_____________ refers to a variety of issues, including accuracy, error rates, stability, and the amount of time between failures. fill the blank
Reliability
The network design you propose to a customer should be able to adapt to network usage and _________. terminology workstations scope merit
Scope
A single network bounded by a switch or router and based on a particular Layer 1 and Layer 2 protocol. Remote Access Lan Segment Wan
Segment
TCP port 25 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)
Simple Mail Transfer Protocol (SMTP)
UDP port 161 and 162 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)
Simple Network Management Protocol (SNMP)
Long-range communication, Up to 100 km. single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared
Single-mode fiber
TCP port 23 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)
Telnet
In this phase, we build a prototype or pilot.
Test, optimize
For performance analysis and base lining purposes, use an interval of 10 to 15 minutes 1 to 5 minutes 20 to 25 minutes
1 to 5 minutes
For long-term load analysis, to determine peak hours, days, or months set the interval to: 30 minutes 45 minutes 10 minutes
10 minutes
The cabling from a telecommunications closet to a workstation is approximately 100 meters 50 meters 150 meters
100 meters
An access point typically sends a beacon frame every 10 milliseconds 100 milliseconds 50 milliseconds
100 milliseconds
An uptime of 99.70 percent means the network is down ________ per week 10 Minutes 15 Minutes 45 Minutes 30 Minutes
30 minutes
An uptime of 99.95 percent means the network is down ____________ per week, 5 Minutes 10 Minutes 15 Minutes 30 Minutes
5 minutes
Optimum average network utilization is about 60 percent 70 percent 50 percent 40 percent
70 percent
In the 1990s, networking books and training classes taught the 80/20 rule for capacity planning. Pick the two answers that apply. -20 percent of traffic stays local in departmental LANs -80 percent of traffic stays local in departmental LANs -20 percent of traffic is destined for other departments or external networks -80 percent of traffic is destined for other departments or external networks
80 percent of traffic stays local in departmental LANs 20 percent of traffic is destined for other departments or external networks
Many enterprise managers now report that the network must be available__________ percent of the time. 99.999 89.99 90.99 97.99
99.999
In this phase, the network designer interviews users and technical personnel to gain an understanding of the business and technical goals for a new enhanced system
Analyze requirement
_______________ can be expressed as a percent uptime per year, month, week, day, or hour, compared to the total time in that period. fill the blank
Availability
In other applications, the flow is bidirectional and asymmetric. Which means Clients send small queries and servers send large streams of data Both ends of the flow send traffic at about the same rate
Clients send small queries and servers send large streams of data
is a type of electrical cable that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared
Coaxial cable
____________ refers to adherence to regulations that protect against fraud and inadvertent disclosure of private customer data.
Compliance
refers to a focus on consistent, cohesive decisions, policies and processes that protect an organization from mismanagement and illegal activities of users of IT services.
Governance
RFC 2212 describes the network node behavior required to deliver a service, provides a firm limit on end-to-end packet-queuing delays. Guaranteed Service Available bit rate (ABR) Controlled-load service Unspecified bit rate (UBR)
Guaranteed Service
Within a building, wiring that runs from telecommunications closets to wallplates in cubicles or offices work-area wiring vertical wiring horizontal wiring
Horizontal wiring
TCP port 80 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)
Hypertext transfer protocol (HTTP)
The network is built according to the design specifications. Implementation also serves to verify the design. Plan Design Implement Operate Optimize
Implement
A _____________________________ can be defined as protocol and application information transmitted between communicating entities during a single session Filling the blank
Individual network traffic flow
A set of switched segments based on a particular Layer 2 protocol such as Fast Ethernet and an inter-switch trunking protocol. WAN LAN MAN CAN
LAN
Widely used for point-to-point communications because their small wavelength allows conveniently-sized antennas to direct them in narrow beams, which can be pointed directly at the receiving antenna single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared
Microwave transmission
Fiber-optic cable that can transmit multiple signals at the same time. Used for short distances single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared
Multimode fiber
Quantity of error-free data successfully transferred between nodes per unit of time, usually seconds capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time
Throughput
With this approach, we are going to start with the requirements of the organization, the technology that is needed, and then design it. Upside-down Top-Down Bottom-Up
Top-down
UDP port 69 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)
Trivial File Transfer Protocol (TFTP)
A good rule of thumb is that fewer than 0.1 percent of frames should encounter collisions. True False
True
Auto-negotiation problems can result from hardware incompatibilities and old or defective Ethernet software drivers. True False
True
By developing an understanding of the existing network's structure, uses, and behavior, you can determine whether a customer's design goals are realistic. True False
True
Five nines availability is extremely hard to achieve. True False
True
In the current business environment, security and disaster recovery should be considered with ever network design choice. True False
True
One goal of the planning process should be to recognize which parts of the network are critical and must be backed up. True False
True
A ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs). There are five types -- identified with the prefix CAT, as in category -- each supporting a different amount of bandwidth. single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared r
Unshielded twisted-pair (UTP) copper
The percent of total available capacity in use capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time
Utilization
Where private networks make use of the Internet to reach remote locations or possibly other organizations. SLA CAL VPN DNS
VPN
Within a building, wires that extend from floor to floor horizontal wiring Work-area wiring vertical wiring
Vertical wiring
A geographically dispersed network including point-to-point, Frame Relay, ATM, and other long-distance connections. MAN WAN CAN LAN
WAN
is a frame that goes to all network stations on a LAN. At the data link layer, the destination address of a_________________ frame is FF:FF:FF:FF:FF:FF Unicast simulcast broadcast multicast
broadcast
The amount of time average delay varies capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time
delay variation
__________________ is sometimes used to describe an internal internetwork that is accessible by outside parties. VPN CAL intranet extranet
extranet
Having a wavelength just greater than that of the red end of the visible light spectrum but less than that of microwaves has a wavelength from about 800 mm to 1 mm single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared
infrared
is a frame that goes to a subset of stations. For example, a frame destined to 01:00:0C:CC:CC:CC goes to Cisco routers and switches that are running the Cisco Discovery Protocol (CDP) on a LAN. simulcast unicast multicast broadcast
multicast
_____________________________________ is a measurement of the amount of bandwidth that is in use during a specific time interval. fill the blank
network utilization
The amount of time between a request for some network service and a response to the request capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time
response time
_____________ refers to how much grow the a network design must support. fill the blank
scalability
It contains an extra foil wrapping or copper braid jacket to help shield the cable signals from interference. single-mode fiber Multimode fiber shielded twisted-pair (STP) Unshielded twisted-pair (UTP) copper Coaxial cable Microwave transmission infrared
shielded twisted-pair (STP)
Displays temperature, voltage, and blower information on the Cisco 7000 series, Cisco 7200 series, and Cisco 7500 series routers, and the Cisco 12000 series Gigabit Switch Router. show startup-config show running-config show processes show environment
show environment
Displays CPU utilization for the last 5 seconds, 1 minute, and 5 minutes show startup-config show running-config show processes show environment
show processes
Displays the router's configuration stored in memory and currently in use. show startup-config show running-config show processes show environment
show running-config
Displays the configuration the router will use upon the next reboot. show startup-config show running-config show processes show environment
show startup-config
__________________reduces routes in a routing table, routing-table update traffic, and overall router overhead. Most effective when address prefixes have been assigned in a consistent and contiguous manner. Filling the blank Route aggregation Route summarization Supernetting
supernetting
______________ is defined as the quantity of error-free data that are transmitted per unit of time. Throughput Bandwith capacity Scalability
throughput
Characterizing traffic flow involves identifying sources and destinations of network traffic and analyzing the direction and symmetry of data traveling between sources and destinations. True False
true
___________________________________ is often used to describe the process of analyzing a site to see if it will be appropriate for wireless transmission. filling the blank...
wireless site survey
Within a building, wiring that runs from the wallplate to a workstation in a cubicle or office. work-area wiring vertical wiring horizontal wiring
work-are wiring
______________________specifies how much bandwidth is used by the protocol in comparison to the total capacity of the segment (for example, in comparison to 100 Mbps on Fast Ethernet). Absolute usage Relative usage Optimum usage
Absolute usage
Some of the electromagnetic energy of the signal can be___________________ by the material in objects through which it passes, resulting in a reduced signal level.Water has significant _______________ properties, and objects such as trees or thick wooden structures can have a high water. Absorption Refraction Reflection Diffraction
Absorption
Cisco recommends a modular approach with its three-layer hierarchical model. This model divides networks into core, distribution and _________layers
Access
The amount of useful traffic that is correctly transmitted, relative to total traffic capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time
Accuracy
Multiple buildings within a local geographical area (within a few miles). Campus network Wireless Network Enterprise network Segment
Campus network
The data-carrying capability of a circuit or network, usually measured in bits per second (bps). capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time
Capacity(bandwidth)
In some applications, the flow is bidirectional and symmetric. Which is Clients send small queries and servers send large streams of data Both ends of the flow send traffic at about the same rate.
Both ends of the flow send traffic at about the same rate.
This approach begins with the physical layer of the OSI model and works its way up. New, higher bandwidth links might be purchased, as well as new routers, switches, firewalls, etc. Upside- down Top-down Bottom-up
Bottom-up
A Hierarchical Topology makes no effort to organize the network or its traffic. True False
False
A good rule-of-thumb threshold for considering errors unhealthy is that a network should have more than one bad frame per megabyte of data. True False
False
Flexible: A generic term to describe any application that has specific requirements for constant bandwidth, delay, delay variation, accuracy, and throughput. True False
False
For a network design to be affordable, it should carry the minimum amount of traffic for a given financial cost. True False
False
In a structured network design process, a physical model is developed before the logical model. True False
False
It is not important to include intermediate milestones in the project schedule. True False
False
Periodic practice is not a necessary part of achieving business continuity when a real disaster hits. The drills shouldn't be taken seriously. True False
False
TCP port 20 (data) and TCP port 21 (control) File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)
File transfer protocol (FTP)
UDP port 67 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)
DHCP server
Time between a frame being ready for transmission from a node and delivery of the frame elsewhere in the network capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time
Delay (latency)
In this phase, the network designers accomplish the bulk of the logical and physical design, according to requirements. Plan Design Implement Operate Optimize
Design
Includes security planning, network layer addressing, naming, and switching and routing protocols.
Developing the logical design
In this phase, specific techonologies and products that realize the logical design are selected
Developing the physical design
results when a region through which the RF signal can pass easily is adjacent to a region in which reflective obstructions exist Absorption Refraction Reflection Diffraction
Diffraction
UDP port 53 File transfer protocol Telnet Simple Mail Transfer Protocol (SMTP) Hypertext transfer protocol (HTTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Trivial File Transfer Protocol (TFTP) DHCP server DHCP Client Remote Procedure Call (RPC)
Domain Name System (DNS)
An analysis of how much effort is required to produce a certain amount of data throughput capacity (bandwidth) throughput accuracy offered load efficiency utilization optimum utilization delay (latency) delay variation response time
Efficiency
A large and diverse network, consisting of campuses, remote access services, and one or more WANs or long-range LANs. Enterprise network Building Network Campus network Wireless network
Enterprise network
