Chapter 1 Reading Organizer

bugqueenNetworking and Communications

Oct 26, 2013 (4 years and 14 days ago)

283 views

CCNA Discovery 4.0



Semester 3


Luse

Introducing Routing and Switching in the Enterprise


HGTC Summer 2009


1

Name
:

Sarah Patrick









Date
: January 10, 2012


Chapter
1

Reading Organizer


After completion of this chapter, you should be able to:




Describe an enterprise.



Identify traffic flows through an enterprise and describe the importance of an intranet and
e
xtranet.



Describe the different types and handling of traffic in the enterprise.



Define the role and importance of a telecommuter.



Describe the function and importance of VPNs.


1.
List several common examples of enterprise environments.

a.
Manufacturers


b.

Large retail stores



c.
Restaurant and service franchises


d.
Utilities and government agencies


e.
Hospitals


f.
School systems



2. Businesses rely on their network infrastructure to provide mission critical services. Explain what this
means.


Typ
e of network or computing process that is vital to an organization. Mission
-
critical applications that
are halted often or for too long may have negative consequences.











CCNA Discovery 4.0



Semester 3


Luse

Introducing Routing and Switching in the Enterprise


HGTC Summer 2009


2

3.

What are two features commonly found in enterprise class equipment?


a.

One
objective of good network design is to prevent any single point of failure


b.

This is accomplished by building redundancy into the network.


4. List the functions of the Access Layer.


a.
Provides a connection point for end
-
user devices to the network



b.
Allows multiple hosts to connect to other hosts through a network device such as a switch


c.
Exists on the same logical network


d.
Forwards traffic to other hosts on the same logical network


e.
Passes traffic to the Distribution Layer for delivery

if the message is destined for a host on
another network



5. List the functions of the Distribution Layer.


a.
Provides a connection point for separate local networks


b.
Controls the flow of information between local networks


c.
Ensures that traffic be
tween hosts on the same local network stays local


d.
Passes on traffic that is destined for other networks


e.
Filters incoming and outgoing traffic for security and traffic management purposes


f.
Contains more powerful switches and routers than the Acc
ess Layer


g.
Passes data to the Core Layer for delivery to a remote network if the local network is not
directly connected



6. List the functions of the Core Layer.


a.
Provides a high
-
speed backbone layer with redundant (backup) connections


b.
Transpo
rts large amounts of data between multiple end networks


c.
Includes very powerful, high
-
speed switches and routers

CCNA Discovery 4.0



Semester 3


Luse

Introducing Routing and Switching in the Enterprise


HGTC Summer 2009


3


7. Explain the following terms:


a.

Enterprise Campus:

Consists of the campus infrastructure with server farms and network
management





b.

Ente
rprise Edge:

Consists of the Internet, VPN, and WAN modules connecting the enterprise
with the service provider's network





c.

Service Provider Edge:

Provides Internet, Public Switched Telephone Network (PSTN), and
WAN services







8. All data that enters

or exits the ECNM passes through an edge device. Explain in detail what is taking
place here.


All data that enters or exits the Enterprise Composite Network Model (ECNM) passes through an edge
device. This is the point that all packets can be examined a
nd a decision made if the packet should be
allowed on the enterprise network. Intrusion detection systems (IDS) and intrusion prevention systems
(IPS) can also be configured at the enterprise edge to prevent against malicious activity.





9.

Explain in d
etail what a failure domain is.


Area of a network that is affected when a networking device malfunctions or fails. A properly designed
network minimizes the size of failure domains.








CCNA Discovery 4.0



Semester 3


Luse

Introducing Routing and Switching in the Enterprise


HGTC Summer 2009


4





Complete
Packet Tracer Activity

1.1.2

Instructor Initials __
_____________


10. List the features of a LAN:


a.
The organization has the responsibility of installing and managing the infrastructure.


b.
Ethernet is the most common technology used.


c.
The focus of the network is in the Access and Distribution Layers
.


d.

The LAN connects users, provides support for localized applications and server farms.



e.
Connected devices are usually in the same local area, such as a building or a campus.




11. List the features of a WAN:


a.
Connected sites are usually geogr
aphically dispersed.



b.
Connectivity to the WAN requires a device such as a modem or CSU/DSU to put the data in a
form acceptable to the network of the service provider.



c.
Services are provided by an ISP. WAN services include T1/T3, E1/E3, DSL, Cable,

Frame Relay,
and ATM.



d.
The ISP has the responsibility of installing and managing the infrastructure.



e.
The edge devices modify the Ethernet encapsulation to a serial WAN encapsulation.



12. Label the following terms as belonging to either a LAN or

WAN.


WAN


Frame Relay


LAN

100Mb UTP

WAN


T1/E1

WAN


Services provided by ISP

CCNA Discovery 4.0



Semester 3


Luse

Introducing Routing and Switching in the Enterprise


HGTC Summer 2009


5

LAN

Access Layer

WAN


POP

LAN


Services provided by enterprise

LAN


Ethernet

LAN


Distribution Layer switches

WAN


CSU/DSU

WAN


ATM


13. Explain what an intranet is and how is
it used?


Many companies use this private network or intranet to provide access for local and remote
employees using LAN and WAN technologies.




14. An intranet that allows external connections to suppliers and contractors is an extranet. Explain
what adv
antage this offers?


An extranet is a private network (intranet) that allows controlled access to individuals and companies
outside the organization. An extranet is not a public network. Network that provides access to
information or operations of an organ
ization to suppliers, vendors, partners, customers, or other
businesses. Extranet is a private network using Internet protocols and the public telecommunication
system to share internal resources. It may be considered an extension of an intranet.





15.

When determining how to design the network it is important to consider the amount of traffic
destined for a specific location and where that traffic most often originates.


What
traffic should
remain local to users on the network
?



a.
File sharing


b.
Pr
inting


c.
Internal backup and mirroring


d.
Intra
-
campus voice



16. Identify and label the flow pattern as either being LAN, WAN, or External traffic.


LAN


File Sharing

External


VPN

___
_____
_
_____ Printing

CCNA Discovery 4.0



Semester 3


Luse

Introducing Routing and Switching in the Enterprise


HGTC Summer 2009


6

____
_____
_
____ System Update

____
______
_
___

On
-
line Transaction Processing

____
_______
___ Inter
-
campus Voice

____
_
______
___

Internet Traffic

____
_
_____
___
_

Off
-
site Data Backup and Recovery

____
________
__ Internal Backup and Restore Operations

____
_____
_____ Company Email






17. Enterprise network
s must support the business enterprise by allowing traffic from a variety of
applications. From the list below circle the two options that offer secure access for intranet traffic?


Database transaction processing

Mainframe or data center access

File and
print sharing

Authentication

Web services

Email and other communications

VPN services

Voice calls and voicemail

Video and video conferencing


Complete Lab Activity
1.2.2


18. What protocol is data traffic most likely to use and why?









19.

What protoc
ol is Voice or video
traffic

most likely to use and why?









CCNA Discovery 4.0



Semester 3


Luse

Introducing Routing and Switching in the Enterprise


HGTC Summer 2009


7


20.

Explain in detail what causes latency.






21.
Explain the term

j
itter
?





22.
Telecommuters need various tools to work efficiently. Some available teleworker tools
are listed
below. E
xplain each term.


a.
Email

-




b.
Chat
-




c. A
pplication sharing
-




d.
FTP

-




e.
Telnet

-




f.
VoIP

-




g.
Video conferencing

-



23.

CCNA Discovery 4.0



Semester 3


Luse

Introducing Routing and Switching in the Enterprise


HGTC Summer 2009


8


24.
One obstacle that teleworkers must overcome is the fact that most of the tools available for working
remo
tely are not secure.

What is a secure alternative to Telnet?





25. What tool is used to encrypt all traffic moving between remote sites and the enterprise network?





26. One of the most common encapsulating protocols for VPNs is IPSec which is short
for IP Security. What
services does this suite of protocols provide?


a.


b.


c.


d.