[ Pobierz całość w formacie PDF ]
.Duringstep 6, identify performance requirements, you would note this type ofinformation.6 The customer is concerned about the Token Ring traffic on his network and wants to provethat the Token Ring network must be upgraded.What is your recommendation based onfinding out that the Token Ring segment has more than 60 percent utilization?The threshold for a Token Ring network is that each segment does notexceed 70 percent.Therefore, you should recommend segmentation ofthe network.7 Which Cisco IOS command would you use to determine if there were any output queuedrops?show interface8 When helping to determine the network s health, would having 25 percent of multicastson one segment be considered healthy?This is unhealthy.It is recommended that none of the segments exceed20 percent broadcasts/multicasts. CH01.book Page 341 Friday, January 7, 2000 5:35 PMChapter 3: Application Considerations 3419 What is the saturation threshold for WAN links?No more than 70 percent utilization10 What tool would you use to help monitor the switching traffic?NetFlowChapter 3: Application Considerations Do I Know This Already? Quiz Answers1 In which bridging environment does the frame contain the routing information to thedestination?Source-route bridging (SRB).SRB frames contain a routinginformation field (RIF) that has routing descriptors to the destination.2 Which scheme provides a way to automatically assign IP addresses to devices on thenetwork?Dynamic Host Configuration Protocol (DHCP).With DHCP, clients areassigned an IP address, a subnet mask, and a default gateway by aDHCP server.3 Which session layer protocol is very common in Windows NT environments and can bebridged or routed over IP?NetBIOS4 With which Novell protocol do devices broadcast services to the segment, routers build atable and forward these broadcasts to all other segments, and clients use the informationto know what services are available in the network?Service Advertising Protocol (SAP)5 In what protocol environment do client devices automatically select a network layeraddress and broadcast a probe to ensure that it is unique?AppleTalk6 What are route descriptors?Route descriptors are bridge/ring number fields in a routinginformation field.They are used to set the path that a frame shouldtake on a source-route bridged network.7 With what technology can you scale SRB networks over WAN links and reduce NetBIOSqueries where TCP is used between peers? CH01.book Page 342 Friday, January 7, 2000 5:35 PM342 Appendix A: Answers to Quiz QuestionsData-link switching (DLSw).DLSw is used to establish a TCP linkbetween remote routers to transport System Network Architecture(SNA) and NetBIOS traffic.8 What is the most scalable protocol used for file and print sharing in Windows NTnetworking?NetBIOS over TCP/IP is more scalable than NetBIOS over NetBUEI.9 What methods are used to assign an IP address to a workstation at bootup?DHCP and BOOTP10 What are the three components of a typical firewall system?The three components of a typical firewall system are an outsidefiltering router, an isolation LAN with bastion hosts, and an insidefiltering router.Q&A Answers1 What session layer protocol is common in Windows NT environments when layered overTCP it can be routed?NetBIOS2 You can find WWW and FTP servers in what network that the Internet community canaccess?Isolation LAN3 What is a method to reduce Novell SAP broadcast traffic on the network?Use Enhanced IGRP, SAP filters, and NLSP.4 HTTP is an example of what type of traffic flow?Client/server5 What access list would you use on an outside filtering router to permit access to theisolation LAN? Assume the isolation LAN is 201.201.201.0/24.access-list 101 ip permit 0.0 255.255.255.255 201.201.201.0 0.2556 What Token Ring field consists of route descriptors?Routing information field (RIF)7 What should you use to overcome the limitations of SRB in large networks?Data-link switching over an IP network. CH01.book Page 343 Friday, January 7, 2000 5:35 PMChapter 3: Application Considerations 3438 The Cisco PIX Firewall may be used to do what?Perform Network Address Translation.Protect the internal network.Provide additional security.9 What service is used to resolve NetBIOS names to IP addresses?WINS10 What access list would you use on an internal filtering router to permit traffic between theisolation LAN and the internal network? Assume the isolation LAN is 201.201.201.64/26.access-list 101 ip permit 201.201.201.64 0.63 any11 What technique is used to reduce the amount of repetitive unicast traffic?Multicast routing12 What type of traffic flow is how small-bandwidth keyboard character streams are sent tothe host?Terminal/host13 What is a logical grouping of nodes in AppleTalk to control broadcasts?AppleTalk zone14 What are examples of client/server traffic flow applications?Windows NT networking, Novell, HTTP, and AppleShare are allexamples of client/server traffic flow.15 With this technology a user may connect a laptop to the network and automatically havean IP address, subnet mask, default gateway, DNS server, and WINS server assigned.DHCP16 DHCP stands for what?Dynamic Host Configuration Protocol17 What are route descriptors?Route descriptors are bridge ring number fields in a routinginformation field; they are used to set the path that a frame should takeon a source-route bridged network. CH01 [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • szamanka888.keep.pl