You are on page 1of 6

Module 3

Planning a Network Upgrade

Name _

3.1.1 1. When do most small businesses look for When the network starts to fail, most small businesses look for
help to redesign the network to meet the help to redesign the network to meet the new demands.
new demands?
2. Before a network upgrade can be An on-site technician is dispatched to perform a site survey to
properly designed, who is dispatched to document the existing network structure.
perform a site survey to document the
existing network structure?
3. List six important pieces of information  Number of hosts andusers
that can be gathered during a site survey.  internet service and equipment
 Existing network devices
 Security requirements
 Application requirements
 Wireless requirements
4. What is one other piece of information It is a good idea to obtain a floor plan, if possible.
that is helpful to obtain, if possible?
5. What is needed to provide a baseline of An inventory of existing network hardware and software is also
requirements? useful to provide a baseline of requirements for the upgrade.
6. What could be some obvious issues that There may be some obvious issues such as unlabeled cables,
should be noted on a technician’s report? poor physical security for network devices, lack of emergency
power, or lack of an uninterruptible power supply (UPS) for
critical devices.
3.1.2 7. What is included in a physical topology of In a wired network, the physical topology map consists of the
the network? wiring closet and the wiring to the individual end-user stations.

8. What is included in a logical topology of It indicates the location of routing, network address translation,
the network? and firewall filtering.

9. What does the physical topology consist In a wireless network, the physical topology consists of the
of in a wireless network? wiring closet and an access point. Because there are no wires,
the physical topology contains the wireless signal coverage
area.
10. What is generally included in a logical It indicates the location of routing, network address translation,
topology for both a wired and wireless and firewall filtering.
network?
11. In a star topology, how is each device The logical topology is generally the same for a wired and
connected? What type of device is typically wireless network. It includes the naming and Layer 3
used? addressing of end stations, router gateways, and other
network devices, regardless of the physical location.
12. How is an extended star topology An extended star is created when the central device in one
created? star is connected to a central device of another star, such as
when multiple switches are interconnected, or daisy-chained
together.
13. What is the difference between a full- In a full mesh topology, every device has a connection to
mesh versus a partial mesh topology? every other device. In a partial mesh topology, each device is
connected to at least two other devices.
14. Why is implementing redundant links Implementing redundant links through partial or full mesh
important in any mesh topology? topologies ensures that network devices can find alternate
paths to send data in the event of a failure.
3.1.3 15. What should be included on the Device name
inventory sheet of all the network installed Date of purchase
devices? Warranty information
Location
Brand and model
Operating system
Logical addressing information
Gateway
Method of connectivity
Virus Checker
Security information
Complete the Packet Tracer activity on
3.1.3 page 2.
3.2.1 16. What does the acronym SWOT mean? strengths, weaknesses, opportunities, or threats

17. What is done during Phase 1: After all of the information has been gathered from the
Requirements Gathering? customer and the site visit, it is analyzed to determine the
network requirements. This analysis is done by the design
team at the ISP, which creates an Analysis Report.
18. List three activities that occur during Multiple design options are created and regularly shared with
Phase 2: Selection and Design? other members on the project. It is during this step that any
weaknesses of the design can be identified and addressed.
Also during this phase, prototypes are created and tested.

19. During Phase 3: Implementation, how Creating an implementation schedule that allows time for
can disruptions of the customer's business unexpected events, keeps disruption for the customer to a
be kept to a minimum? minimum.

20. What happens to the network during The network is brought into service in what is called a
Phase 4: Operation? production environment.
21. What are three recommended steps Step 1: Compare the user experience with the goals in the
during Phase 5: Review and Evaluation? documentation, and evaluate if the design is right for the job.

Step 2: Compare the projected designs and costs with the


actual deployment. This evaluation ensures that future
projects will benefit from the lessons learned on this project.

Step 3: Monitor the operation and record changes. It is


important that the system is always fully documented and
accountable.
Complete the activity on 3.2.1 page 4.
3.2.2 22. What is an MDF? A telecommunications room, or wiring closet, in a small,
single-floor network is usually referred to as the Main
Distribution Facility (MDF).
23. What is contained in an MDF? The MDF typically contains many of the network devices,
including switches or hubs, routers, and access points. Many
times, the MDF also contains the Point of Presence (POP) of
CCNA Discovery 2 – Module 3 2
Cisco Networking Academy
the ISP.
24. What is the POP? where the network makes the connection to the Internet
through a telecommunications service provider.

25. What are IDFs? If additional wiring closets are required, they are referred to as
Intermediate Distribution Facilities (IDFs). IDFs are typically
smaller than the MDF, and connect to the MDF.
3.2.3 26. What are four physical areas to User work areas
consider when planning the installation of Telecommunications room
network cabling? Backbone area
Distribution area
27. Describe STP cabling and list its Usually Category 5, 5e, or 6 cable that has a foil shielding to
distance limitation. protect from outside electromagnetic interference (EMI). In an
Ethernet environment, the distance limitation is approximately
328 feet (100 meters).
28. Describe UTP cabling and list its Usually Category 5, 5e, or 6 cable that does not provide extra
distance limitation. shielding from EMI, but it is inexpensive. Cable runs should
avoid electrically noisy areas. In an Ethernet environment, the
distance limitation is approximately 328 feet (100 meters).
29. Describe coaxial cable. Coaxial is not typically used in LANs, but it is widely used in
cable modem provider networks. Coaxial has a solid copper
core with several protective layers including polyvinyl chloride
(PVC), braided wire shielding, and a plastic covering. Distance
is several miles (kilometers). Limitations depend on the
purpose of the connection.
30. Describe fiber optic cabling. A medium that is not susceptible to EMI, and can transmit data
faster and farther than copper. Depending on the type of fiber
optics, distance limitations can be several miles (kilometers).
Fiber-optic can be used for backbone cabling and high-speed
connections.
31. What are straight-through cables used Connects dissimilar devices, such as a switch and a computer,
for? or a switch and a router.
32. What are cross-over cables used for? Connects similar devices, such as two switches or two
computers.
33. What are console or rollover cables Connects a computer to the console port of a router or switch
used for? to do initial configuration.

34. What is a serial cable used for? A serial cable is typically used to connect the router to an
Internet connection.

3.2.4 35. What is the first step when designing a he first step is to obtain an accurate floor plan.
structured cable project?
36. What does a floor plan show? The floor plan allows the technician to identify possible wiring
closet locations, cable runs, and which electrical areas to
avoid.
37. What do the following cables connect? Horizontal cable – Cable from the wall plate to the IDF in the
distribution area

Vertical cable – Cable from the IDF to the MDF in the


backbone area of the business

Backbone cable – Network part that handles the major traffic

Print and complete Lab 3.2.4 page 2.


3.3.1 38. Describe issues relating to purchasing The equipment is obtained from the ISP through a lease or
new equipment, as well as maintenance, some other agreement, and the ISP is responsible for
CCNA Discovery 2 – Module 3 3
Cisco Networking Academy
under a “managed service” agreement. updating and maintaining the equipment.
39. Describe issues relating to purchasing The customer purchases the equipment, and the customer is
new equipment, as well as maintenance, responsible for the updates, warranties, and maintenance of
under an “in-house” agreement. the equipment.
40. If the customer purchases the if the equipment is purchased outright, the customer should be
equipment outright, what should they be aware of the price of the equipment, warranty coverage,
aware of? compatibility with existing equipment, and update and
maintenance issues.
3.3.2 41. What does it mean that a higher-level What this means is that a higher level device can better
device is more intelligent? analyze the data traffic and forward it based on information not
available at lower layers.
42. What is one simple distinction between LAN switches provide connectivity within the local-area
LAN switches and routers? networks of the organization, while routers interconnect local
networks and are needed in a wide-area network environment.

43. What do wireless access points allow? Wireless access points allow computers and other devices,
such as handheld IP phones, to wirelessly connect to the
network or share broadband connectivity.
44. What do firewalls guard against? What Firewalls guard against network threats and provide security
do firewalls provide? and network control and containment.

45. What four functionalities do ISRs Integrated Service Routers (ISRs) are network devices that
provide? combine the functionality of switches, routers, access points,
and firewalls into the same device.
3.3.3 46. When is a hub generally chosen as a A hub is generally chosen as a networking device only within a
networking device? very small LAN, a LAN that requires little throughput
requirements, or when finances are limited.
47. What are four factors to consider when Speed and the types of ports and interfaces involved
deciding which switch to choose? Expandability
Manageability
Cost
48. What are two other criteria that are When selecting a switch, choosing the appropriate number
critical and should be carefully considered and type of ports is critical.
when selecting a switch?

49. What is a fixed configuration? Fixed configurations have a specific type and number of ports
or interfaces.
50. What is a modular configuration? Modular devices have expansion slots that provide the
flexibility to add new modules as requirements evolve.
51. What is a typical use of a modular slot? A typical use of an expansion slot is to add fiber-optic modules
to a device originally configured with a number of fixed TP
ports.
52. What are typical controls under a Controls include the ability to change the settings for a device,
managed switch? add port security, and monitor performance.

53. What is cost of a switch determined by? The cost of a switch is determined by its capacity and
features.
54. What does switch capacity include? The switch capacity includes the number and types of ports
available and the overall throughput.
55. What are other factors that impact cost? Other factors that affect the cost are network management
capabilities, embedded security technologies, and advanced
switching technologies.
56. What is a benefit of deploying a large Deploying a number of smaller devices, instead of a single
number of small devices in a network? large device, also has the benefit of reducing the size of the
CCNA Discovery 2 – Module 3 4
Cisco Networking Academy
failure domain.
57. What is failure domain? A failure domain is the area of the network affected when a
piece of networking equipment malfunctions or fails.
Complete the Packet Tracer Activity on
3.3.3 page 4.
3.3.4 58. What layer does a router operate at? A router is a Layer 3 device.
What does a router select?

59. What does each port on a router Each port on a router connects to a different network and
connect to? routes packets between the networks. Routers have the ability
to break up broadcast domains and collision domains.
What abilities do routers have?

60. What are three factors that should be Type of connectivity required
considered when choosing a router? Features available
Cost
61. What type of interfaces are included in a The LAN interfaces of the router connect to the LAN media.
router? The media is typically UTP cabling, but modules can be added
for using fiber optics. Depending on the series or model of
router, there can be multiple interface types for connecting
LAN and WAN cabling.
62. What are five features that should be Security
considered in addition to basic routing? Quality of Service (QoS)
Voice over IP (VoIP)
Network Address Translation (NAT)
Dynamic Host Configuration Protocol (DHCP)
Virtual Private Network (VPN)
63. Which services are combined from With an ISR, an organization can quickly and easily enable
multiple devices into an ISR? end-to-end protection for users, applications, network
endpoints, and wireless LANs.

64. What types of businesses and offices The ISR was designed with multiple services to accommodate
was the ISR designed to accommodate? the demands of small- to medium-sized businesses and
branch offices of large organizations.
Complete the Packet Tracer Activity on
3.3.4 page 3.
3.3.5 65. What type of business was an These routers are designed to support small networks, usually
integrated services router initially designed consisting of a few wired hosts and possibly four or five
to support? wireless devices.
66. What are two examples of more Cisco 1841 ISR and Cisco 2960 Switch
capable networking devices in this course?
67. What are four features of the Catalyst >Entry-level, enterprise-class, fixed-configuration switching
2960 series of switches? that is optimized for Access Layer deployments
>Fast Ethernet and Gigabit Ethernet to desktop configurations
>Ideal for entry-level enterprise, mid-market, and branch-office
environments
>Compact size for deployments outside of the wiring closet

68. What can Catalyst 2960 switches These switches can provide the high speeds and high-density
provide that smaller ISRs cannot? switching capabilities that the smaller ISRs with integrated
switching cannot.
3.3.6 69. How is reliability achieved? Reliability can be achieved by adding redundant components
to the network, such as two routers instead of one.
CCNA Discovery 2 – Module 3 5
Cisco Networking Academy
70. What is the definition of fault tolerance? Ability of a computer, server, or network to continue operating
properly in the event of a failure of one or more of its
components.
71. How is fault tolerance achieved? Fault tolerance systems include devices such as a UPS,
multiple AC power supplies, hot-swappable devices, multiple
interface cards, and backup systems. Fault tolerance can also
include backup communication links.
72. What happens when one device fails? When one device fails, the redundant or backup system takes
over to ensure minimal loss of reliability.
73. When might the IP address scheme and If the structure of the network is going to be changed in the
network information need to be altered? upgrade, the IP address scheme and network information may
need to be altered.
74. Which hosts and network devices User computers
require an IP address? Administrator computers
Servers
Other end devices such as printers, IP phones, and IP
cameras
Router LAN interfaces
Router WAN (serial) interfaces
75. Which devices need an IP address in Standalone switches
order to access and manage them? Wireless Access Points

76. When will the proper IP address and For example, if a new router is introduced to the network, each
subnet mask need to be calculated or even interface on that router can be used to create additional
having to assign a totally new addressing networks, or subnets. These new subnets need to have the
scheme on the network? proper IP address and subnet mask calculated. Sometimes,
this means having to assign a totally new addressing scheme
to the network.
Read the Summary on 3.4.1
Take the Quiz on 3.5.1

CCNA Discovery 2 – Module 3 6


Cisco Networking Academy

You might also like