Preview

Cisco 3 Chapter 1-4 Reviewer

Powerful Essays
Open Document
Open Document
1870 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cisco 3 Chapter 1-4 Reviewer
1. Access layer is to provide a means of connecting devices to the network and controlling which devices are allowed to communicate on the network. 2. The distribution layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs) defined at the access layer. 3. The core layer of the hierarchical design is the high-speed backbone of the internetwork. The core layer is critical for interconnectivity between distribution layer devices, so it is important for the core to be highly available and redundant. 4. Benefits of Hierarchical Network: * Scalability – can be expanded easily * Redundancy - Redundancy at the core and distribution level ensure path availability * Performance –Link aggregation between levels and high-performance core and distribution level switches allow for near wire-speed throughout the network. * Security – Port security at the access level and policies at the distribution level make the network more secure. * Manageability – Consistency between switches at each level makes management more simple * Maintainability – The modularity of hierarchical design allows network to scale without becoming overly complicated. 5. Network diameter is the number of devices that a packet has to cross before it reaches its destination. 6. Bandwidth aggregation is the practice of considering the specific bandwidth requirements of each part of the hierarchy. 7. Link aggregation allows multiple switch port links to be combined so as to achieve higher throughput between switches. 8. A Converged Network is one where voice and video communications have been combined on a single data network. 9. Traffic Flow Analysis is the process of measuring the bandwidth usage on a network and analyzing the data. 10. User community analysis is the process of identifying various groupings of users and their impact on network

You May Also Find These Documents Helpful

  • Better Essays

    INDP Kudler Fine Food

    • 1189 Words
    • 4 Pages

    A network is defined as computer components such as hardware, assorted cables, and fiber optics, networking equipment used to link a company’s computers so that they can assign files, printers, software, and additional computer-related assets across short and long distances.…

    • 1189 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NETW410 Week 3 Lab Report

    • 532 Words
    • 2 Pages

    4. Does this network require an access layer? What devices would operate at the access layer? Draw a diagram of these devices at the access layer. Label all of the devices. (10 points)…

    • 532 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To improve security, each segment will be separated from the rest of the network, allowing access to be regulated between the segments. Controlling access to the individual segments with user groups which are based on the same segments as the network is the most effective way of increasing security. This step will make sure that each group will have the access that they need while still allowing everyone to be able to access what they need as well.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In order to provide speed and reliability, large and enterprise-level networks today are typically constructed in multiple layers. They are the access layer, also called the network edge layer, the aggregation or distribution layer; and the network core layer. The access layer is usually a mesh of network switches, linked to other switches in the aggregation layer, which in turn is linked to the core.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Good Essays

    For each set of application performance requirements shown in Figure 3.33, classify the network as single-tier or multi-tier performance. Please explain your choice for each.…

    • 785 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    4. Which of the following is not required when configuring port security without sticky learning?…

    • 920 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 3: The network layer...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    a high speed central network that connects other networks in a distance from hundreds of feet to several miles.…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Ethernet Networks in Review Ethernet Cabling Data Encapsulation The Cisco Three-Layer Hierarchical Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 2.1 Answers to Written Lab 2.2 Answers to Written Lab…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Link: A generic term for any network cable or wireless communications path between two devices over which bits can be transmitted.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    A layered security strategy will encompass Rouge protocols such as Bit mining and P2P, Unauthorized network scanning and probing, and unauthorized access to the network.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT1210

    • 4443 Words
    • 28 Pages

     Identify the primary needs for computer networks and network applications.  Draw the four major physical network topologies: bus, star, ring, and mesh. 3 Computer Networking …

    • 4443 Words
    • 28 Pages
    Powerful Essays
  • Satisfactory Essays

    The following terms are examples of information technology infrastructure components and technologies used in business. Research definitions using the Internet. You will write a definition of each term and provide at least two examples of the component or technology. Provide citations and references for all resources.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    College Campus

    • 423 Words
    • 2 Pages

    Numbers of students are expected to be doubled every 4 years. There are 4 departments:…

    • 423 Words
    • 2 Pages
    Satisfactory Essays

Related Topics