Preview

Ccna 3 Chapter 1 Study Guide

Good Essays
Open Document
Open Document
2849 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ccna 3 Chapter 1 Study Guide
CCNA3 Exploration Chapter 1. Study questions.

1.1
What are the three layers of the hierarchical network design model?
Access, distribution, core

Access, distribution and core.

What are the advantages of designing LANs using the hierarchical model?

Separates out different functions of a network. This would make it easier to manage, troubleshoot, and expand.
Seperates out different functions of a network.The hierarchical model separates out different functions of a network, giving a modular design. This should make the network easier to manage and troubleshoot. It should be easier to expand the network (scalability), and it should be easier to maximise What is the purpose of the access layer?

Allows end device to connect to network and controls which devices connect.
It allows end devices to connect to the network and controls which devices may connect.

What sort of devices are found at the access layer?

Computers, printers, routers, switches, hubs, ip phones

End devices, such as PCs, printers, and IP phones. Network devices such as routers, switches, bridges, hubs, and wireless access points.

What is the purpose of the distribution layer?

It controls the flow of the network traffic.
It controls the flow of network traffic. In particular, it controls traffic between different broadcast domains (subnetworks, VLANs). It aggregates traffic from the access layer that needs to be passed to the core layer for longer distance transmission.

What sort of devices are found at the distribution layer?

High performances switches.

High-performance switches. They should have high availability and redundancy to ensure reliability

What is the purpose of the core layer?

High speed backbone that forwards large amount of data quickly

It is the high speed backbone of the network. Its main task is to forward large amounts of data quickly.

What is a collapsed core model and where might it be used?

The distribution layer and

You May Also Find These Documents Helpful

  • Good Essays

    In order to provide speed and reliability, large and enterprise-level networks today are typically constructed in multiple layers. They are the access layer, also called the network edge layer, the aggregation or distribution layer; and the network core layer. The access layer is usually a mesh of network switches, linked to other switches in the aggregation layer, which in turn is linked to the core.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Specifies a list of IP addresses for routers on the client's subnet. Multihomed computers can have only one list per computer, not one per network adapter.…

    • 1103 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    To be able to see all the packets that come in and out on the Network…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    - access layer. It ensures that when you have all network devices have access to the network then you can work up.…

    • 688 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    At the destination this layer is responsible for combining the packets into their original state. This layer also checks to see if the layers are in the right order when received and not in duplicated form. If there is an error in one of the packets there is a request for that packet's retransmission. There are two protocols that sit at this layer. First, the TCP protocol connects the sender and the receiver using a socket which is determined by the IP address and port number. TCP keeps track of the packet delivery order and which ones need to be resent. UDP on the other hand is a connectionless communication and does not guarantee packet delivery between sender and receiver. Because it is connectionless the sender sends the data into the network with an IP address of the receiver and hopes it makes it to its destination. Since there is not a way of asking the sender to retransmit because of an error there is little error protection if…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 5050 Words
    • 21 Pages

    This method is a very effective way of creating and maintaining a functioning multi-user network. It’s cost effective, and in terms of labour and parts required very simple to set up (Apart from the cable management) Another advantage of this type of network is…

    • 5050 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    3.1: Networking models Review: The two networking models are TCP/IP which had 5 different layers and the OSI model which has 7 layers. They mainly incorporate the same layers and the only difference is that the TCP/IP layer combines layers 5, 6 and 7 all into layer 5. Both models are along the same line of information and both explain how a network moves data.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    | Access control allows the network to prevent outside access that is unauthorized and really watch what is happening on the network.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Bus 210 Week 8 Appendix E

    • 381 Words
    • 2 Pages

    | A type of “information highway” that allows for a huge amount of information to travel and pass through a network from the World Wide Web and Internet to a user requesting the information.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    Communication to run smoothly across the network there are devices that place intermediary roles in networking. These intermediary devices provide connectivity and work behind the scenes to ensure that data flows across the network. These devices connect the individual hosts (end devices) to the network and can connect multiple individual networks to form an internetwork.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 4 Study Guide

    • 2291 Words
    • 10 Pages

    Identifies the segment of data and provides for identification of the Transport Layer Protocol to use…

    • 2291 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Exercise 1

    • 617 Words
    • 2 Pages

    There are physical devices that connect the computer to the network of lines that you use to communicate over. It could be a modem, a network card, a radio transmitter, or a router.…

    • 617 Words
    • 2 Pages
    Satisfactory Essays

Related Topics