Cisco Systems, Inc., Empowering the Internet Generation (SM)
Home ] CCNA ] CCDA ] CCNP ] CCDP ] CCIE ] Books ] Links ]
 

Back ] Next ]

EXCELLENT
This sounds great!

RECOMMENDED
Great!

Up to 40% off!

~~~

You are visitor #### to PetraCom since November 1st, 1999.

SIGN | VIEW
GUESTBOOK

Thank You Line

   

CCDA [ Search ]

Design the Network Structure

  1. Describe the advantages, disadvantages, scalability issues, and applicability of standard internetwork topologies.
  2. Draw a topology map that meets the customer's needs and includes a high-level view of internetworking devices and interconnecting media.
  3. Recognize scalability constraints and issues for standard LAN technologies.
  4. Recommend Cisco products and LAN technologies that will meet a customer's requirements for performance, capacity, and scalability in small-to-medium-sized networks.
  5. Update the network topology drawing you created in the previous section to include hardware and media.
  6. Recognize scalability constraints and issues for standard WAN technologies.
  7. Recognize scalability constraints and performance budgets for major Cisco products.
  8. Recommend Cisco products and WAN technologies that will meet the customer's requirements for performance, capacity, and scalability in an enterprise network.
  9. Propose an addressing model for the customer's areas, networks, subnetworks, and end stations that meet scalability requirements.
  10. Propose a plan for configuring addresses.
  11. Propose a naming scheme for servers, routers, and user stations.
  12. Identify scalability constraints and issues for IGRP, Enhanced IGRP, IP RIP, IPX RIP/SAP, NLSP, AppleTalk RTMP and AURP, static routing, and bridging protocols.
  13. Recommend routing and bridging protocols that meet a customer's requirements for performance, security, and capacity.
  14. Recognize scalability issues for various Cisco IOS software features such as access lists, proxy services, encryption, compression, and queuing.
  15. Recommend Cisco IOS software features that meet a customer's requirements for performance, security, capacity, and scalability.
   
 

13. Describe the advantages, disadvantages, scalability issues, and applicability of standard internetwork topologies.

Thank You Line

   
  1. Request for Comments (RFC) 1918 defined internal private networks:
    10.0.0.0 – 10.255.255.255
    172.16.0.0 – 172.31.255.255
    192.168.0.0 – 192.168.255.255
Exam
   
 

14. Draw a topology map that meets the customer's needs and includes a high-level view of internetworking devices and interconnecting media.

Thank You Line

   

CDDI

A committee-defined standard that uses copper wiring. Officially, the CDDI standard is named the Twisted-Pair Physical Medium Dependent (TP-PMD).

FDDI

  • A committee-defined standard that uses fiber wiring.
  • Devices
    1. Concentrator, attaches directly to the two FDDI rings.
    2. DAS (Dual Attachment Station), attaches to both rings, as a servers commonly.
    3. SAS (Single Attachment Station), attaches to one ring, as a workstations commonly.

DDR

  • A dynamic connection is established and routers exchange updates on an as-needed basis.
  • Can be used with either ISDN or telephone lines. The router initiates and terminates a circuit-switched session on demand by the transmitting site.
  • Very small DDR networks are candidates for Dial-on-Demand Routing. Typically, this is because the site placing or receiving a call has no requirement to continuously send and receive traffic. Therefore, the additional expense of having a line always active would not be a justifiable expense. A good example of a site that would benefit from DDR would be a remote sales office that uses a small ISDN router to transmit orders and reports every 24 hours.
Exam
   
 

15. Recognize scalability constraints and issues for standard LAN technologies.

Thank You Line

   
  1. Request for Comments (RFC) 1918 defined internal private networks:
    10.0.0.0 – 10.255.255.255
    172.16.0.0 – 172.31.255.255
    192.168.0.0 – 192.168.255.255
Exam
   
 

16. Recommend Cisco products and LAN technologies that will meet a customer's requirements for performance, capacity, and scalability in small-to-medium-sized networks.

Thank You Line

   
  1. Request for Comments (RFC) 1918 defined internal private networks:
    10.0.0.0 – 10.255.255.255
    172.16.0.0 – 172.31.255.255
    192.168.0.0 – 192.168.255.255
Exam
   
 

17. Update the network topology drawing you created in the previous section to include hardware and media.

Thank You Line

   
  1. Request for Comments (RFC) 1918 defined internal private networks:
    10.0.0.0 – 10.255.255.255
    172.16.0.0 – 172.31.255.255
    192.168.0.0 – 192.168.255.255
Exam
   
 

18. Recognize scalability constraints and issues for standard WAN technologies.

Thank You Line

   
  1. Request for Comments (RFC) 1918 defined internal private networks:
    10.0.0.0 – 10.255.255.255
    172.16.0.0 – 172.31.255.255
    192.168.0.0 – 192.168.255.255

Exam

   
 

19. Recognize scalability constraints and performance budgets for major Cisco products.

Thank You Line

   
  1. Request for Comments (RFC) 1918 defined internal private networks:
    10.0.0.0 – 10.255.255.255
    172.16.0.0 – 172.31.255.255
    192.168.0.0 – 192.168.255.255
Exam
   
 

20. Recommend Cisco products and WAN technologies that will meet the customer's requirements for performance, capacity, and scalability in an enterprise network.

Thank You Line

   
  1. Request for Comments (RFC) 1918 defined internal private networks:
    10.0.0.0 – 10.255.255.255
    172.16.0.0 – 172.31.255.255
    192.168.0.0 – 192.168.255.255
Exam
   
 

21. Propose an addressing model for the customer's areas, networks, subnetworks, and end stations that meet scalability requirements.

Thank You Line

   

DHCP (Dynamic Host Configuration Protocol)

  • Provide subnet mask, default gateway, DNS server, WINS server, etc.
  • A DHCP server assigns addresses to hosts dynamically. At the time of assignment the host is given a lease for the address. The lease may be renewed later. If the lease is allowed to expire, such as when the host has not been heard from recently, the address becomes available for use by another host requesting an address.

Methods of IP address allocation

  1. Automatic, a DHCP server assigns a permanent address to a network client.
  2. Dynamic differs slightly in that the DHCP server assigns the address to the client for a temporary period.
  3. Manual involves a network administrator and a DHCP server. The administrator assigns the permanent address to the client, and the DHCP server acts as the delivery agent.
Exam
   
 

22. Propose a plan for configuring addresses.

Thank You Line

   
  1. Request for Comments (RFC) 1918 defined internal private networks:
    10.0.0.0 – 10.255.255.255
    172.16.0.0 – 172.31.255.255
    192.168.0.0 – 192.168.255.255
  2. An AppleTalk network address is composed of a Network number, Node Number, and Socket Number. The Network and Node numbers are 8-bit values, and the Socket Number is a 16-bit value.
Exam
   
 

23. Propose a naming scheme for servers, routers, and user stations.

Thank You Line

   

Naming Scheme

  • Meaningful.
  • Facilitate troubleshooting.
Exam
   
 

24. Identify scalability constraints and issues for IGRP, Enhanced IGRP, IP RIP, IPX RIP/SAP, NLSP, AppleTalk RTMP and AURP, static routing, and bridging protocols.

Thank You Line

   
  • Bridging
    • Source-Route Bridging. An explorer frame is sent by a given host in order to determine the path to a destination host. As it travels through the internetwork, route information is added to the explorer frame.
    • Transparent Bridging refers to the forwarding of frames by a bridge whose presence and operation is invisible to network hosts. A frame is received on a bridge interface, its destination is determined from an internal table, and the frame is forwarded accordingly.
Exam
   
 

25. Recommend routing and bridging protocols that meet a customer's requirements for performance, security, and capacity.

Thank You Line

   
  1. Request for Comments (RFC) 1918 defined internal private networks:
    10.0.0.0 – 10.255.255.255
    172.16.0.0 – 172.31.255.255
    192.168.0.0 – 192.168.255.255
Exam
   
 

26. Recognize scalability issues for various Cisco IOS software features such as access lists, proxy services, encryption, compression, and queuing.

Thank You Line

   

CiscoWorks

  • A software application that allows a consultant to characterize an existing internetwork.
  • Feature
    • Configuration maintenance.
    • Device monitoring.
    • Troubleshooting.

Wiring fault identification is not a feature of CiscoWorks. Hardware troubleshooting tools, such as a cable tester and time domain reflectometer may be used to locate cabling problems.

Exam
   
 

27. Recommend Cisco IOS software features that meet a customer's requirements for performance, security, capacity, and scalability.

Thank You Line

   

Access List

  1. Provide basic security mechanisms.
  2. Control propagation of service advertisements.
  3. Help select specific packets for encryption.
  4. A. Access lists are applied on a per interface basis.
  5. Lower bandwidth requirements at the expense of greater CPU utilization.
  6. The end of an access list can be said to contain an implicit 'deny' for all traffic.
  7. The order of an access control list is important.
  8. Defines the type of traffic that will be considered “interesting” in Cisco terminology. The list contains a series of statements, each of which uses the keyword “permit” or “deny”. By configuring a list of these statements the network engineer can selectively define which traffic will allow the router to dial out.
  9. Access Lists are pretty versatile. In addition to providing basic filtering for security, they can provide IPX SAP filtering and help select packets for encryption. They cannot, however, evaluate packets in reference to those that came before. They evaluate a packet and forget it.

Queueing Methods

  • Custom Queuing
    • Uses a series of configurable queues that are processed in round-robin order.
    • Provides some level of service to all traffic.
    • Enables the assignment of queue space to various types of traffic and then services them in round-robin fashion. This way, all types of traffic can be serviced.
  • Priority Queuing uses four queues, and processes traffic based on its assigned importance (high, medium, normal, or low).
  • Weighted Fair Queuing is enabled by default, and is suited for low-volume, interactive traffic.
    • To help prevent certain applications from monopolizing bandwidth, it queues packets based on the arrive time of the last (rather than the first) bit.
    • First implemented in IOS 11.0, WFQ is on by default. One example of its benefit is the way it keeps an application like FTP from dominating the bandwidth.
Exam
   

©2000 PetraCom—The book ranks are according to Amazon book store and will be updated periodically.

1