Network Design
Network Design
Network Design
Short Questions
1. Which types of business constraints can occur during network design?
The business constraints related to the politics and religion, budgetary and staffing, and project
scheduling can occur and affect network design
2. What is router on a stick (ROAS)?
Router on a stick is a network configuration used to allow the routing of traffic between different
VLANs. That kind of a setup consists of a router and a switch connected through one Ethernet
link configured as an 802.1q trunk link. Such a configuration is typical in networks where no
layer-3 switch exists. But first, let’s find out why it is so.
3. What is frame tagging in VLANs?
When VLANs are implemented in a switched network, the switches need a method to make
sure intra-VLAN traffic goes to the correct interfaces. To benefit from the advantages of LANs,
the switches need to ensure that traffic destined for a particular VLAN goes to that VLAN and
not to any other VLAN. This can be accomplished by tagging frames with VLAN information
using the IEEE 802.1Q standard.
4. Define protocol analyzer with its working?
A network protocol analyzer is a tool used to monitor data traffic and analyze captured signals
as they travel across communication channels. Protocol analyzer tools capture data as it
moves across communication busses in embedded systems, along with traffic entering and
leaving LAN, PAN, and even wireless networks. Protocol scanners provide the ability to
constantly monitor and decode bus data, which can be leveraged to generate reports and
valuable insights for network admins when interpreted by network protocol analysis tools.
5. What is meant by mean time between failures and mean to repair. Also write formula of
availability.
MTBF, or Mean Time Between Failures, is a metric that concerns the average time elapsed
between a failure and the next time it occurs. These lapses of time can be calculated by using
a formula.
Whereas the MTTR, or Mean Time To Repair, is the time it takes to run a repair after the
occurrence of the failure. That is, it is the time spent during the intervention in a given process.
MTBF (Mean Time Between Failures) and MTTR (Mean Time To Repair) are two very
important indicators when it comes to availability of an application.
When specifying availability using MTBF and MTTR, the equation to use is as follows:
Availability = MTBF / (MTBF + MTTR)
6. How traffic flow of voice over IP is different from other types of data?
Voice transmission has different issues than data transmission because voice traffic cannot be
re-sent if it is lost. Three unique problems that affect call quality are latency, jitter, and packet
loss. In addition, voice traffic can have roaming issues because people are more apt to walk
around with phones.
7. What are types of access control lists? Why they are used in networks?
There are two types of ACLs:
• Standard ACLs (1 – 99 and 1300 - 1999)
• Extended ACLs (100 – 199 and 2000 - 2699)
Access Control Lists are the set of conditions grouped together by name or number. These
conditions are used in filtering the traffic passing from router. Through these conditions we can
filter the traffic; either when it enters in router or when it exits from router.
Usability: refers to the ease of use with which network users can access the network and
services. Usability focuses on making network users’ jobs easier. It is important to gain an
understanding of how important usability is to your network design customer, because some
network design components can have a negative effect on usability. For example, strict
security policies can have a negative effect on usability (which is a tradeoff that most
customers are willing to make, but not all customers). You can plan to maximize usability by
deploying user-friendly, host-naming schemes and easy-to-use configuration methods that
make use of dynamic protocols, such as the Dynamic Host Configuration Protocol (DHCP).
Adaptability: When designing a network, you should try to avoid incorporating any elements
that would make it hard to implement new technologies in the future. A good network design
can adapt to new technologies and changes. Changes can come in the form of new protocols,
new business practices, new fiscal goals, new legislation, and a myriad of other possibilities.
For example, some states have enacted environmental laws that require a reduction in the
number of employees driving to work. To meet the legal requirement to reduce automobile
emissions, companies need their remote-access designs to be flexible enough to adapt to
increasing numbers of employees working at home.
9. What is the purpose of designing virtual LANS?
VLANS are used to subdivide physical switch-based LANs into many logical LANs. VLANs
allow a large, flat, switch-based network to be divided into separate broadcast domains.
Instead of flooding all broadcasts out every port, a VLAN-enabled switch floods a broadcast out
only the ports that are part of the same VLAN as the sending station.
10. Differentiate between interior versus exterior protocols?
Routing protocols can also be characterized by where they are used. Interior routing protocols,
such as RIP, OSPF, and EIGRP, are used by routers within the same enterprise or
autonomous system (AS). Exterior routing protocols, such as BGP, perform routing
between multiple autonomous systems. BGP is used on the Internet by peer routers in
different autonomous systems to maintain a consistent view of the Internet’s topology.
11. Define the types of network management processes according to the ISO?
The International Organization for Standardization (ISO) defines five types of network
management processes, which are often referred to with the FCAPS acronym:
■ Fault management
■ Configuration management
■ Accounting management
■ Performance management
■ Security management
12. Name the different layers in point-to-point protocols.
Point-to-Point Protocol. Protocol that provides router-to-router and host-tonetwork connections
over synchronous and asynchronous circuits. PPP was designed to work with several network
layer protocols, such as IP, IPv6, IPX, and AppleTalk.
13. Differentiate between centralized and distributed cabling topologies with examples.
■ A centralized cabling scheme terminates most or all of the cable runs in one area of
the design environment. A star topology is an example of a centralized system.
■ A distributed cabling scheme terminates cable runs throughout the design environment.
Ring, bus, and mesh topologies are examples of distributed systems.
Efficiency refers to whether applications and protocols use bandwidth effectively. Efficiency is
affected by frame size, the interaction of protocols used by an application, windowing and flow
control, and error-recovery mechanisms.
21. Write two Architectural Constraints?
Within buildings, pay attention to architectural issues that could affect the feasibility of
implementing your network design. Make sure the following architectural elements are
sufficient to support your design:
■ Air conditioning
■ Heating
■ Ventilation
■ Power
■ Protection from electromagnetic interference
■ Doors that can lock
22. Write two major problems that are solved by RIPv2 which exist in RIPv1?
RIPv1 is a classful routing protocol, which means that it always considers the IP network class.
Address summarization is automatic by major network number. This means that discontiguous
subnets are not visible to each other, and VLSM is not supported. RIPv2, on the other hand, is
classless.
The Internet Engineering Task Force (IETF) developed RIPv2 to address some of the
scalability and performance problems with RIPv1. RIPv2 adds the following fields to route
entries within a routing table:
■ Route tag: Distinguishes internal routes that are within the RIP routing domain from external
routes that have been imported from another routing protocol or a different autonomous
system.
■ Subnet mask: Contains the subnet mask that is applied to the IP address to yield the nonhost
(prefix) portion of the address.
■ Next hop: Specifies the immediate next-hop IP address to which packets to the destination in
the route entry should be forwarded.
23. What do you know about Data Encryption?
Encryption is a process that scrambles data to protect it from being read by anyone but the
intended receiver. An encryption device encrypts data before placing it on a network. A
decryption device decrypts the data before passing it to an application. A router, server, end
system, or dedicated device can act as an encryption or decryption device. Data that is
encrypted is called ciphered data (or simply encrypted data). Data that is not encrypted is
called plain text or clear text.
24. Differentiate between IN-band and out-band monitoring?
With in-band monitoring, network management data travels across an internetwork using the
same paths as user traffic. This makes the network management architecture easy to develop
but results in the dilemma that network management data is impacted by problems on the
internetwork, making it harder to troubleshoot the problems. It is beneficial to use management
tools even when the internetwork is congested, failing, or under a security attack.
Out-of-band monitoring makes the network design more complex and expensive. To keep the
cost down, analog dialup lines are often used for backup, rather than ISDN or Frame Relay
circuits. Another tradeoff with out-of-band monitoring is that there are security risks associated
with adding extra links between NMSs and agents. To reduce the risks, the links should be
carefully controlled and added only if absolutely necessary. For analog modem links, the agent
should use a callback mechanism after the NMS calls the agent.
25. Difference between jitter and delay?
Delay:
1. Time between the initiation of a transaction by a sender and the first response received by
the sender.
2. Time required to move a frame from source to destination over a given path.
Jitter Communication line distortion caused by the variation of a signal from its reference
timing positions.
Delay variation: The amount of time average delay varies.
26. What is multicast in traffic behavior?
A broadcast frame is a frame that goes to all network stations on a LAN. At the data link layer,
the destination address of a broadcast frame is FF:FF:FF:FF:FF:FF (all 1s in binary).
A multicast frame is a frame that goes to a subset of stations. For example, a frame destined to
01:00:0C:CC:CC:CC goes to Cisco routers and switches that are running the Cisco Discovery
Protocol (CDP) on a LAN.
Message that is sent to a subset of nodes on a network. Compare with broadcast and unicast
27. Describe ‘Resiliency’ factor count as business priorities?
Resiliency is the Capability of a network to withstand failures and still maintain network
operation.
Resiliency means how much stress a network can handle and how quickly the network can
rebound from problems including security breaches, natural and unnatural disasters, human
error, and catastrophic software or hardware failures. A network that has good resiliency
usually has good availability.
28. Write down four major guidelines for assigning names?
To maximize usability, names should be short, meaningful, unambiguous, and distinct.
29. Difference between Goodput and throughput?
The difference between goodput and throughput is that throughput is the measurement of all
data flowing through a link whether it is useful data or not, while goodput is focused on useful
data only.
30. What are virtual LAN’S?
A virtual LAN (VLAN) is an emulation of a standard LAN that allows data transfer to take place
without the traditional physical restraints placed on a network. A VLAN is a set of LAN devices
that belong to an administrative group. Group membership is based on configuration
parameters and administrative policies rather than physical location. Members of a VLAN
communicate with each other as if they were on the same wire or hub, when they might be
located on different physical LAN segments.
31. Write two characteristics of Distance-Vector?
A typical distance vector routing protocol uses a routing algorithm in which routers periodically
send routing updates to all neighbors by broadcasting their entire route tables.
Periodic updates
Neighbors
Broadcast updates
Entire routing table is included with routing update
32. What is multi cast and broadcast in traffic behavior?
A broadcast frame is a frame that goes to all network stations on a LAN. At the data link layer,
the destination address of a broadcast frame is FF:FF:FF:FF:FF:FF (all 1s in binary). A
multicast frame is a frame that goes to a subset of stations. For example, a frame destined to
01:00:0C:CC:CC:CC goes to Cisco routers and switches that are running the Cisco Discovery
Protocol (CDP) on a LAN.
33. How to select Root in STP?
Assigned to the one port on a nonroot bridge that provides the lowest-cost path to the root
bridge. If a bridge has two or more ports with the same cost, the port with the lowest port ID is
selected as the root port. A root port is a forwarding port.
34. What is controlled load service?
Provides a client data flow with a QoS closely approximating the QoS that the flow would
receive on an unloaded network. The controlled-load service is intended for applications that
are highly sensitive to overload conditions.
35. What is autonomous system? Which protocols are used in it?
Autonomous System refers to the collection of networks or areas under a common
administration sharing a common routing strategy.
Interior routing protocols, such as RIP, OSPF, and EIGRP, are used by routers within the same
enterprise or autonomous system (AS).
36. What does distribution layer do?
The distribution layer represents the connection point between the core and access layers.
Routing protocols used in the distribution layer include RIPv2, EIGRP, OSPF, and ISIS. The
distribution layer also sometimes uses ODR. The distribution layer often has the job of
redistributing between routing protocols used in the core layer and those used in the access
layer.
37. Which types of addresses we have to avoid during subnetting?
38. How we can identify a network design as good or bad?
39. How we can identify the traffic behavior using the destination address?
40. How you can characterize the existing network?
“Subjective Part”
1. Define network topology. Why we use a hierarchal model for network topology design.
Also explain the cisco hierarchical network design model with diagram.
Network Topology: Network topology is the Logical arrangement of network nodes and media
within a networking structure.
Hierarchical network design model:
A hierarchical design involves dividing the network into independent layers . Each layer (or
level) in the hierarchy provides specific functions that define its function within the general
network.
This helps the network designer and architect to optimize and select the appropriate network
features, hardware and software to perform the specific functions of that network layer.
Hierarchical models apply to LAN and WAN design.
A typical design of a corporate campus hierarchical LAN network includes the following three
layers:
Access layer: provides network access for workgroups and users.
Distribution layer: provides policy-based connectivity and controls the boundary between the
access and core layers.
Core layer: provides fast transport between distribution switches within the business campus.
Core Layer:
Core Layer consists of biggest, fastest, and most expensive routers with the highest model
numbers and Core Layer is considered as the back bone of networks. Core Layer routers are
used to merge geographically separated networks. The Core Layer routers move information
on the network as fast as possible. The switches operating at core layer switches packets as
fast as possible.
Distribution layer:
The Distribution Layer is located between the access and core layers. The purpose of this layer
is to provide boundary definition by implementing access lists and other filters. Therefore the
Distribution Layer defines policy for the network. Distribution Layer include high-end layer 3
switches. Distribution Layer ensures that packets are properly routed between subnets and
VLANs in your enterprise.
Access layer:
Access layer includes acces switches which are connected to the end devices (Computers,
Printers, Servers etc). Access layer switches ensures that packets are delivered to the end
devices.
Benefits of Cisco Three-Layer hierarchical model:
The main benefits of Cisco Three-Layer hierarchical model is that it helps to design, deploy
and maintain a scalable, trustworthy, cost effective hierarchical internetwork.
Better Performance: Cisco Three Layer Network Model allows in creating high performance
networks
Better management & troubleshooting: Cisco Three Layer Network Model allows better
network management and isolate causes of network trouble.
Better Filter/Policy creation and application: Cisco Three Layer Network Model allows
better filter/policy creation application.
Better Scalability: Cisco Three Layer Network Model allows us to efficiently accomodate
future growth.
Better Redundancy: Cisco Three Layer Network Model provides better redundancy. Multiple
links across multiple devices provides better redundancy. If one switch is down, we have
another alternate path to reach the destination.
2. Define and explain broadcast domain and collision domain with the help of network
diagram.
Broadcast Domain:
The set of all devices that receives broadcast frames originating from any device within the set.
Broadcast domains are bounded by routers (which do not forward broadcast frames). A switch
or hub does not bound a broadcast domain.
A broadcast domain is the domain in which a broadcast is forwarded. A broadcast domain
contains all devices that can reach each other at the data link layer (OSI layer 2) by using
broadcast. All ports on a hub or a switch are by default in the same broadcast domain. All ports
on a router are in the different broadcast domains and routers don’t forward broadcasts from
one broadcast domain to another.
The following example clarifies the concept:
Collision Domain:
In Ethernet, the network area within which frames that have collided are propagated.
Repeaters and hubs propagate collisions; LAN switches, bridges, and routers do not.
A collision domain is, as the name implies, the part of a network where packet collisions can
occur. A collision occurs when two devices send a packet at the same time on the shared
network segment. The packets collide and both devices must send the packets again, which
reduces network efficiency.
Collisions are often in a hub
environment, because each port on a
hub is in the same collision domain.
By contrast, each port on a bridge, a
switch or a router is in a separate
collision domain.
Below given image is an example of a
collision domain.
In the above example, you can see
"Computer A" send a data signal to
"Computer C." In the same way,
"Computer B" sends a data signal to
3. Differentiate between switching and routing protocols. What is the selection criteria for
switching and routing protocols? Enlist and explain the working of dynamic routing
protocols with diagram.
4. Why the testing of a network is preferred? Explain the components and types of test in
details.
5. For a corporate level network what security tools can be implemented in the network for
ensuring secure working of network? What point must be kept in mind while designing
a secure network?
6. Why we need IPV6? What are the approaches to upgrading to IPV6 elaborate in detail?
7. Compare and contrast distance-vector and link-state routing. If you were designing a
new routing protocol, which would you use and why? (chp7 review q 1)
8. How can a network manager secure a wireless network discuss in detail?
9. Why is network management design important? Define the types of network
management processes according to ISO?
10. A). what factor will help you decide whether distance-vector or link-state routing is best
for your design customer?
b). Elaborate the following:
• Reconnaissance attacks(chp 2)
• Denial-of-service attacks
11. What are the main phases of network design per the PDIOO approach?(chp1)
b). When considering network behavior, what is the difference between relative and
absolute network utilization?
c). how does a security plan differ from security policy? (chp 8)
12. Why are hierarchy and modularity important for network design?
(b. What is traffic behavior? Discuss its types with examples?
13. A) What architectural and environment factor should you consider for a new wireless
installation?
b) What are some options for enhancing the spanning Tree protocol?
14. Case study:
You are a network consultant who has been asked to attend an initial meeting with
executive management team of ElectroMyCycle, LLC. ElectroMyCycle manufacturer’s
motorcycles. Its new motorcycle was just picked up by a large retail chain.
ElectroMyCycle is upgrading its manufacturing capacity and hiring new employees.
(chp 8 maybe)
15. (a). Discuss the term “Scalability”. What does it mean? What are some challenges
designers face when designing for Scalability?(chp2 review exe q 1)
(b). Why is network management design important? What are some advantages
and disadvantages of using centralized network management versus distributed
network management?