• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back
An enterprise (large) network must support the exchange of various types of network traffic, including:

data files, email, IP telephony, and video applications for multiple business units.

All enterprise networks must:

Support critical applications


Support converged network traffic


Support diverse business needs


Provide centralized administrative control

The access layer
provides connectivity for the users.
The distribution layer
is used to forward traffic from one local network to another.
The core layer represents
a high-speed backbone layer between dispersed networks.
In a two-tier hierarchical design, the core and distribution layers are
collapsed into one layer, reducing cost and complexity.

Enterprise Campus consists of the entire

consists of the entire campus infrastructure, to include the access, distribution, and core layers.

Enterprise Edge consists of the

Internet, VPN, and WAN modules connecting the enterprise with the service provider's network.

Service Provider Edge provides
Internet, Public Switched Telephone Network (PSTN), and WAN services.

A failure domain is the area of a network that is impacted when a

critical device or network service experiences problems.

It is easiest and usually least expensive to control the size of a failure domain in the

distribution layer.

Switch Block Deployment

routers, or multilayer switches, are usually deployed in pairs, with access layer switches evenly divided between them.

Planning for Redundancy:

Installing duplicate equipment


Installing duplicate paths (may cause loops)

STP is an open standard protocol, used in a

is an open standard protocol, used in a switched environment to create a loop-free logical topology.

There are five categories of switches for enterprise networks:

Campus LAN Switches, Cloud-Managed Switches, Data Center Switches, Service Provider SwitchesVirtual Networking

Switch Considerations:

Cost


Port Density


Power


Reliability


Port Speed


Frame Buffers


Scalability

The port density of a switch refers to

the number of ports available on a single switch.

Fixed configuration switches typically support up to

48 ports on a single device. Modular switches can support very high-port densities.

Data rates can be

100 Mb/s, 1 Gb/s, 10 Gb/s, or 100 Gb/s.

PoE allows the switch to

deliver power to a device over the existing Ethernet cabling.

Multilayer switches are typically deployed in the

core and distribution layers.

Multilayer switches are characterized by their ability to

build a routing table, support a few routing protocols, and forward IP packets.

ASICs

Application-specific integrated circuits

Routers beneficial functions:

Provide broadcast containment, Connect remote locations, Group users logically by application or department, Provide enhanced security

There are three categories of routers:

Branch Routers


Network Edge Routers


Service Provider Routers

Branch Routers optimize branch services on a

single platform while delivering an optimal application experience across branch.

Network Edge Routers enable the network edge to

deliver high-performance, highly secure, and reliable services.

Service Provider Routers deliver

deliver end-to-end scalable solutions and subscriber-aware services.

Routers come with a variety of different interfaces, such as

Fast Ethernet, Gigabit Ethernet, Serial, and Fiber-Optic.

IOS refers to the

package of routing, switching, security, and other internetworking technologies.

When a new device is shipped, it comes preinstalled with the

software image.

Out-of-band management is used for

initial configuration or when a network connection is unavailable.

Out-of-band management requires

Direct connection to console or AUX port


Terminal emulation client

In-band management is used to

monitor and make configuration changes to a network device over a network connection.

In-band management requires

At least one network interface on the device to be connected and operational.




Telnet, SSH, or HTTP to access a Cisco device.