• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/33

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

33 Cards in this Set

  • Front
  • Back
Channelized T1
A channelized T1 is a voice circuit that has 24 voice channels. Each channel contains its own signaling information, which is inserted into the data stream of the digitized voice.
PRI
A Primary Rate Interface is a voice circuit that has 24 channels, one of which is dedicated to signaling. Thus, the number of available voice channels is 23. The voice channels are called bearer channels,and the signaling channel is called the data channel. This type of signaling is called out-of-band signaling.
Clear-channel T1
A clear-channel T1 is one that is not framed in any way. There are no channels, and no organization of the bits flowing through the link. Clear-channel T1s are actually a rarity, as most data links are provisioned with ESF framing.
AMI
AMI is a method of encoding that inverts alternate marks. In T1 signaling, there are two possible states: mark and space. Simply put, a mark is a one, and a space is a zero. On a T1, a space is 0V, and a mark is either +5V or -5V. AMI encodes the signal such that the polarity of each mark is the opposite of the one preceding it. The risk of an all zeros signal exists, so AMI sets every eighth bit to a 1
B8ZS
B8ZS encoding was introduced to resolve the shortcomings of AMI. The idea behind B8ZS is that if eight zeros in a row are detected in a signal, those eight zeros are converted to a pattern including intentional BPVs. When the remote side sees this well-known pattern, it converts it back to all zeros.
Phone audio sample rate?
Phone audio is sampled 8,000 times per second (i.e., at 8 kHz). Each sample is converted to an 8-bit value, with one of the bits used for signaling.
NTF
Telecom engineers look for trouble in a line when they troubleshoot. This may sound pedantic, but when you listen to telecom engineers troubleshooting, they will use very specific terms like no trouble found (which is often abbreviated as NTF). Remember, there are more than 100 years of standards at work here.
Frame Relay
Frame-relay links are more flexible than point-to-point links because multiple links can be terminated at a single interface in a router. This leads to design possibilities allowing connectivity to multiple sites at a significant cost savings over point-to-point circuits.
ACL / ACE
The technical name for an access list is access-control list, or ACL. The individual entries in an access-control list are called access-control entries, or ACEs. The term access-control list isn't often used in practice; you'll typically hear these lists referred to simply as access lists or ACLs.
Reflective ACL
Reflexive access lists, covered later in this chapter, are applied in both directions.
VLAN maps
VLAN maps are similar in design to route maps. VLAN maps are assigned to VLANs, and can be configured to pass or drop packets based on a number of tests. VLAN maps control all traffic routed into, out of, or within a VLAN. VLAN maps have no direction.
Port ACLs
Port ACLs are applied to layer-2 interfaces on the switch. They cannot be applied to EtherChannels, SVIs, or any other virtual interfaces. Port ACLs can be applied to trunk interfaces, in which case they will filter every VLAN in the trunk. Standard IP, extended IP, or MAC ACLs can be assigned as port ACLs. Port ACLs can be applied only in the inbound direction.
Router ACLs
Router ACLs are applied to layer-3 interfaces on the switch. SVIs, layer-3 physical interfaces (configured with no switchport, for example), and layer-3 EtherChannels can have router ACLs applied to them. Standard IP and extended IP ACLs can be assigned as router ACLs, while MAC ACLs cannot. Router ACLs can be applied in both inbound and outbound directions.
How to configure ACL to an interface?
3750(config)#int g0/20
3750(config)# switchport
3750(config-if)# ip access-group 101 in
Port ACL vs. Router ACL vs. VLAN MAps
A port ACL only filters inbound packets on a single interface, and a router ACL only filters packets as they travel into or out of a layer-3 interface. A VLAN map, on the other hand, filters every packet within a VLAN, regardless of the port type involved. For example, if you created a filter that prevented MAC address 1111.1111.1111 from talking to 2222.2222.2222, and applied it to an interface, moving the device to another interface would bypass the filter. But with a VLAN map, the filter would be applied no matter what interface was involved (assuming it was in the configured VLAN).
Security is a _____ between ___ and ____ .
Security is a balance between convenience and paranoia.
Everything that's not yours...
Everything that's not yours belongs outside the firewall
Pain with One-time password key fobs
"We don't want that—the key fobs are a pain, and it takes too long to log in."
Pain with VPN
"We like the idea, but can you make it so we don't have to enter any passwords?"
Putting the email server inside the firewall
"Will we have to enter more than one password? Because if we do, forget it."
Pain with Password rotation
"No way—we don't want to ever have to change our passwords!"
sticky connection
a user who connects more than once may need to connect to the same real server. load balancing
Marking QoS
Marking refers to deciding what priority a packet should be and labeling it accordingly
Policing QoS
Policing refers to the actions the router takes based on how the packets are marked.
Weighted fair queuing (WFQ)
Weighted fair queuing is the default queuing mechanism on 2 Mbps and slower serial links. For most implementations, the default configuration works fine. WFQ can be configured very specifically, but it usually isn't configured at all. When VoIP is involved, low-latency queuing is typically used in place of WFQ.
Class-based weighted fair queuing (CBWFQ)
Class-based weighted fair queuing allows you to configure classes of traffic and assign them to priorities and queues. CBWFQ is the basis for low-latency queuing.
Priority queuing
Priority queuing works just how it sounds: queues are created, and each class of packet is assigned to an appropriate queue based on priorities you design.
Custom queuing
Custom queuing is one of those features that you probably won't see much. You'll see it on Cisco exams, and you may see it on networks that had specific problems to be solved where voice was not a concern at the time of the resolution. That's not to say that custom queuing is not suitable for voice, but again, low-latency queuing is the QoS method of choice for voice-enabled networks.
Low-latency queuing (LLQ)
Low-latency queuing is class-based weighted fair queuing with a strict priority queue. A strict priority queue is one in which hardware is used to send packets that need to be sent with the lowest latency possible. This is especially useful for voice and video, where any latency or delay causes problems. LLQ is the preferred method of QoS for voice networks, and is the QoS method I focus on in this book.
Traffic shaping
Traffic shaping is slightly different from queuing. Traffic shaping monitors traffic, and, when it reaches a threshold, instead of discarding packets, keeps them until a point where bandwidth has lowered and they can be sent. The benefits are a smoother use of bandwidth (Figure 29-7) and the fact that packets are buffered and not just dropped. The downside is that traffic shaping requires memory to function because it buffers packets. Also, if the configured buffer overflows, packets will be discarded.

Traffic shaping is not really suitable for voice, as voice packets must be delivered in order and with low latency. Queuing of packets for transmission at a later time is not a viable solution for VoIP protocols.

Traffic shaping can be used on data networks where TCP can assemble packets received out of order. However, in today's converged networks, traffic shaping is not often used.
txload 42/255, rxload 249/255
Looking at these numbers, you can see that the transmit load (txload) is only 42 out of 255, but the receive load (rxload) is 249 out of 255. If you use some simple math (249/255 * 100), you can see that the link is 97.65 percent utilized.
T1 Duplux? Kbps?
T1s, like most telecom links, are full duplex. They are rated at 1.54 Mbps, and can transmit this speed in both directions simultaneously.
how to keep Qos from dropping packets while keeping links efficient?
Try to keep the priority queue near the level of the expected traffic peaks.