Preview

Cisco 3 Chapter 1-4 Reviewer

Powerful Essays
Open Document
Open Document
1870 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cisco 3 Chapter 1-4 Reviewer
1. Access layer is to provide a means of connecting devices to the network and controlling which devices are allowed to communicate on the network. 2. The distribution layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs) defined at the access layer. 3. The core layer of the hierarchical design is the high-speed backbone of the internetwork. The core layer is critical for interconnectivity between distribution layer devices, so it is important for the core to be highly available and redundant. 4. Benefits of Hierarchical Network: * Scalability – can be expanded easily * Redundancy - Redundancy at the core and distribution level ensure path availability * Performance –Link aggregation between levels and high-performance core and distribution level switches allow for near wire-speed throughout the network. * Security – Port security at the access level and policies at the distribution level make the network more secure. * Manageability – Consistency between switches at each level makes management more simple * Maintainability – The modularity of hierarchical design allows network to scale without becoming overly complicated. 5. Network diameter is the number of devices that a packet has to cross before it reaches its destination. 6. Bandwidth aggregation is the practice of considering the specific bandwidth requirements of each part of the hierarchy. 7. Link aggregation allows multiple switch port links to be combined so as to achieve higher throughput between switches. 8. A Converged Network is one where voice and video communications have been combined on a single data network. 9. Traffic Flow Analysis is the process of measuring the bandwidth usage on a network and analyzing the data. 10. User community analysis is the process of identifying various groupings of users and their impact on network

You May Also Find These Documents Helpful

  • Powerful Essays

    Netw410 Week 3 Lab

    • 629 Words
    • 3 Pages

    5. Does this network require a distribution layer? What devices would operate at the distribution layer? What would these devices be responsible for? Could the access and distribution layer be combined into a single layer? Draw a diagram of these devices at the distribution layer. Label all of the devices.…

    • 629 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    INDP Kudler Fine Food

    • 1189 Words
    • 4 Pages

    A network is defined as computer components such as hardware, assorted cables, and fiber optics, networking equipment used to link a company’s computers so that they can assign files, printers, software, and additional computer-related assets across short and long distances.…

    • 1189 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NETW410 Week 3 Lab Report

    • 532 Words
    • 2 Pages

    5. Does this network require a distribution layer? What devices would operate at the distribution layer? What would these devices be responsible for? Could the access and distribution layer be combined into a single layer? Draw a diagram of these devices at the distribution layer. Label all of the devices. (10 points)…

    • 532 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    cis202 exam review

    • 613 Words
    • 3 Pages

    1- You are implementing a network. Using the Cisco hierarchal model, which layer would address the configuration of routers closest to the users?…

    • 613 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Some advantages of HP’s IRF Resiliency are higher efficiency with IRF’s loop-free, non-blocking architecture. This is designed to keep all links active, enabling highly efficient, high bandwidth connectivity throughout the switching plane. Scalable performance is achieved with IRF and Link Aggregation Control Protocol (LACP). When used together, they can boost performance by bundling several parallel links between switches and servers, allowing scalable “on-demand” performance and capacity to support critical business applications.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    4. Which of the following is not required when configuring port security without sticky learning?…

    • 920 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    - no at the access layer less expensive switches can be used and at the core and distribution layers speed is the necessity.…

    • 688 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 3: The network layer...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    a high speed central network that connects other networks in a distance from hundreds of feet to several miles.…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Computer network: A combination of many components that work together so that many different devices can communicate.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    A layered security strategy will encompass Rouge protocols such as Bit mining and P2P, Unauthorized network scanning and probing, and unauthorized access to the network.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT1210

    • 4443 Words
    • 28 Pages

    Defining a Network with User Applications Computer Networks: Cloud Representing Hidden Parts of the Network 6 Figure 2-1 An Informal General Definition of a Computer Network  Telecom: Short for telephone communications  Primarily focuses on role of traditional telephone companies.…

    • 4443 Words
    • 28 Pages
    Powerful Essays
  • Satisfactory Essays

    The following terms are examples of information technology infrastructure components and technologies used in business. Research definitions using the Internet. You will write a definition of each term and provide at least two examples of the component or technology. Provide citations and references for all resources.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    College Campus

    • 423 Words
    • 2 Pages

    Numbers of students are expected to be doubled every 4 years. There are 4 departments:…

    • 423 Words
    • 2 Pages
    Satisfactory Essays

Related Topics