CCDA - LAN Design Flashcards

Terms Definitions
What is the max round-trip propagation delay in a collision domain in regards to the design rules for Ethernet?
512-bit timesSo, on a 10mbps ethernet, the max round trip delay is 51.s microseconds (512 * .1)For 100mbps, its only 5.12 (512 * .01)
1. What is the maximum diameter for 100mbps ethernet? 10mbps?2. What is the limit for repeaters with 100mbps?
1. 205 meters. 10baseT=500m 10base5=2500m2. 2 repeaters
What are the specifications for 1000base-LX long wavelength ethernet?
- uses long wave- uses multimode or single-mode fiber- Max length of multimode fiber: - 62.5 micrometer fiber = 440m - 50 micrometer fiber = 550m- Max length for single mode fiber (9 micrometers) is 5km- Uses 8B10B encoding with simple NRZ
What are the specifications for 1000base-SX gigabit ethernet?
- Used short wave- Used on multimode fiber only- Max length: - 62.5 micrometers - 260m - 50 micrometers - 550m- Uses 8B10B encoding with simple NRZ
What are the specifications for 1000base-CX gigabit ethernet over coaxial cable?
- Uses a short run copper- Runs over a pair of 150 ohm balanced coaxial cable (twinax)- Max length is 25m- Mainly for server connections- Uses 8B10B encoding with simple NRZ
What are the specifications for 1000base -T gigabit ethernet of UTP?
- Cat5, 4-pair UTP- Max length = 100m- encoding defined is a 5 level coding scheme- 1 byte is sent over the 4 pairs at 125 MHz
What is the 5-4-3 rule in regards to using repeaters?
5 - Maximum path between 2 stations on a network4 - Repeaters between those segments3 - Max populated segments
Where is the preferred location for marking traffic?
As close to the source as possible
Describe the use of Cisco group management protocol (CGMP)
Its a Cisco-proprietary protocol implements to control multicast traffic at layer 2. The LAN switch can speak with the IGMP router to find out the MAC addresses of the hosts that want to receive the multicast packets.
Describe IGMP snooping
Switches listen to IGMP messages between the hosts and routers. If a host sends an IGMP query message to the router, the switch adds the host to the multicast group and permits that port to receive multicast traffic. the port is removed from the multicast traffic if an IGMP leave message is sent from the host to the router.
Describe the different application types in a LAN design.
- Peer-to-peer - IM, file sharing , IP phone calls, and video conferencing.- Client-local server - servers located in the same segment or close by.- Client/server farm - mail, file, and db servers. Access is reliable and controlled.- Client/enterprise edge servers - external services such as SMTP, web, public servers, and e-commerce.
What are 2 basic approaches in regards to WLAN security design?
- Use lightweight extensible authentication protocol (LEAP) to secure authentication- Use of VPN with IP security (IPsec) to secure traffic from the WLAN to the wired network.
What are the 5 elements of the Cisco unified wireless network (UWN) architecture?
- Client devices - laptops, workstations, IP phones, and PDAs- Access points - devices that provide access to the wireless network- Network unification - The WLAN should be able to support wireless applications by providing security policies, QoS, intrusion prevention, and radio frequency (RF) management.- Network management - The Cisco wireless control system (WCS) provides a central management tool that lets you design, control, and monitor wireless networks.- Mobility services - guess access and location and voice services.
What are some of the benefits of Cisco's UWN?
- Reduce TCO- Enhanced visibility control- Dynamic RF management- WLAN security- Unified wired and wireless network- Enterprise mobility- Enhanced productivity and collaboration
What is lightweight access point protocol (LWAPP)
LWAPP is a draft IETF standard for control messaging for setup, authentication, and operations between access points (AP) and the wireless LAN controllers (WLC)
How does Cisco's UWN split-MAC operation work?
LWAPs communicate with the WLC, using control messages over the wires network. LWAPP data messages are encapsulated and forwarded to and from the wireless clients.
What is the difference between layer 2 tunneling and layer 3 tunneling in regards to LWAPP?
With layer 2, control messages between AP and WLC did not require an IP address on the AP, so the WLC needed to be on every subnet on which the AP resides, making layer 3 the preferred solution.
Messages from the WLC use what ports?
UDP port 12223 for control and UDP port 12222 for data messages.
What are the 6 different modes that an LWAPP access point operate?
- Local mode - default mode of operation. Every 60 seconds/180 seconds, the AP preforms noise floor measurements, measures interference, and scans for IDS events.- Remote edge AP (REAP) mode - enables an LWAP to reside across a WAN link- Monitor mode - allows specified LWAPP-enabled APs to act as dedicated sensors for location-based services, rogue AP detection, and IDS, instead of handling data traffic.- Rogue detector mode - LWAPs that monitor rogue APs- Sniffer mode - An LWAPP that functions as a sniffer and captures and forwards all the packets on a particular channel to a remote machine that runs airopeak- Bridge mode - provides wireless bridging connectivity
Describe the layer 3 LWAPP discovery process
1. the AP sends a layer 3 LWAPP discovery request2. All WLCs that receive the discovery request reply with a unicast LWAPP discovery response message.3. The AP compiles a list of WLCs4. The AP selects a WLC based on certain criteria5. The AP validated the selected WLC and sends an LWAPP join response. An encryption key is selected and future message are encrypted.
How does a LWAP choose a WLC during the discovery process?
- Previously configures primary, secondary, and/or tertiary WLCs- The WLC configured as the master controller- The WLC with the most capacity for AP associations
With wireless clients, what are the different authentication options?
- EAP-transport layer security (EAP-TLS)- Protected extensible authentication protocol (PEAP)- EAP-tunneled TLS (EAP-TTLS)- Cisco lightweight extensible authentication protocol (LEAP)- EAP-flexible authentication via secure tunneling (EAP-FAST)
What are the 3 major components of WLCs?
- Wireless LANs (SSID)- Interfaces- Ports
What are the 5 different interface types on a WLC?
- Management interface - used for in-band management, connectivity to AAA, and layer 2 discover and association- Service-port interface - used for out-of-band management- AP manage interface - used for layer 3 discover and association. Has the source IP of the AP that is statically configured.- Dynamic interface - analogous to VLANs and is designed for WLAN client data.- Virtual interface - used for layer 3 security authentication, DHCP rely support, and mobility management
What are the number of supported APs for each platform:1. Cisco 2000 serices WLC2. Cisco WLC for ISRs3. Catalyst 3750 integrated WLC4. Cisco 4400 series WLC 5. Cisco 6500 series WLC
1. Cisco 2000 serices WLC - 62. Cisco WLC for ISRs - 63. Catalyst 3750 integrated WLC - 504. Cisco 4400 series WLC - 1005. Cisco 6500 series WLC - 300
Describe the process of intracontroller roaming
Intracontroller roaming occurs when the client moves association from one AP to another AP that is joined to the same WLC. The WLC updates the client DB with the new associated AP and does not change the client's IP. The client remains on the same WLC
Describe the process for layer 2 intercontroller roaming
Intercontroller roaming occurs when a client moves association from one AP to another AP that is joined to a different WLC. Layer 2 roaming occurs when the client traffic is bridged to the same IP subnet. Traffic remains on the same IP subnet and no IP changes to the client occur. The client DB is moved from WLC1 to WLC2.
Describe the process of layer 3 intercontroller roaming
This is when a client moves association from one AP to another AP that is joined to a different WLC. Then the traffic is bridged onto a different IP subnet. WLC2 exchanges mobility messages with WLC1. WLC1 marks the client with an "anchor" entry in its DB. The DB entry is copied over to WLC2's DB and marked as a "foreign" entry. The wireless client maintains its original IP and is re authenticated.
Explain how client traffic is routed when using layer 3 intercontroller roaming
Traffic from the client is forwarded by the foreign WLC. But the traffic to the client arrives at the anchor WLC, which forwards it through an ethernet-in-IP (etherIP) tunnel to the foreign WLC. The foreign WLC forwards the data traffic to the client.
How do WLCs work when assigned to a mobility group?
The WLCs dynamically exchange mobility messages and tunnel data via etherIP. Mobility groups support up to 24 controllers. The WLCs exchange messages using UDP port 16666 for unencrypted messages or UDP port 16667 for encrypted messages.
What is Cisco's recommended latency between WLCs?
10 ms of round-trip time latency
Between layer 2 and layer 3 intercontroller roaming, which does Cisco find more efficient?
Layer 2 roaming because of the asymmetric communication of layer 3 roaming.
What are the 2 different types of controller redundancy designs?
- Deterministic design - The AP is configured with a primary, secondary, and tertiary controller. It requires more upfront planning but has a faster failover time. Also the recommended best practice.- Dynamic design - uses LWAPP to load balance APs across WLCs. LWAPP populates APs with a backup WLC. This solution works better when WLCs are in a centralized cluster. Solution is easier to deploy and allows APs to load balance, but with longer failover times ad unpredictable operation.
Explain a N+1 WLC redundancy design
A single WLC acts as a backup of multiple WLCs. One design constraint is that the backup WLC may become oversubscribed if there are too many failures of the primary controllers.
Explain an N+N WLC redundancy design
An equal number of controllers back up each other. So WLC1 is a backup for WLC2, and vise-versa.
Explain a N+N+1 WLC redundancy design
An equal number of controllers back up each other plus a backup WLC configured as the tertiary WLC for the APs.
What are the recommended best practices for APs?
- No more than 20 data devices per AP- No more than 7 voice over WLAN (VoWLAN) calls using G.711 or 8 VoWLAN calls over G.729
What is Cisco Radio Resource Management(RRM)?
Its a method to manage AP radio frequency channels and power configuration. Cisco WLCs use RRM algorithm to automatically configure, optimize, and self-heal.
Describe Cisco's RRM functions
- Radio resource monitoring - Cisco LWAPs monitor all channels. Collected packets are sent to the WLC, which can detect rogue APs, clients and interfering APs- Dynamic channel assignment - WLCs automatically assign channels to avoid interference- Interference and avoidance- Dynamic transmit power control - WLCs automatically adjust power levels- Coverage hole detection and correction - WLCs may adjust the power output of APs if clients report that a low received signal strength indication level is detected (RSSI).Client and network load balancing - Clients can be influenced to associate with certain APs to maintain network balance.
What are radio frequency groups?
An RF group is a cluster of WLC devices that coordinate their RRM calculations. The WLC elect a group leader to analyze the RF data. The RF group leader exchanges messages with the RF group members using UDP port 12114 for 802.11b/g and UDP port 12115 for 802.11a
What are the steps involved when preforming an RF site survey?
Step 1 - Define customer requirements, such as service levels and support for VoIPStep 2 - Identify coverage areas and user density, including peak use times, and conference room locations.Step 3 - Determine preliminary Ap locations, which need power, wired network access, mounting locations, and antennas.Step 4 - Preform the actual survey by using a AP to survey the location and received RF strength based on targeted AP placement.Step 5 - document the findings by recording the target AP locations, data rates, and signal readings.
How are Ethernet of IP (EoIP) tunnels used for guest services?
EoIP is used to logically segment and transport guest traffic from the edge AP to the anchor WLC.
What is Cisco's wireless mesh networking solution?
It eliminates the need to wire each AP to the network and allows users to roam from one area to another without having to reconnect.
What are all the wireless mesh components?
- Wireless control system (WCS) is the wireless mesh SNMP management system that allows network-wide configuration and management. - Wireless LAN controllers (WLC) link the mesh APs to the wired networks.- Rooftop APs (RAP) connects the mesh to the wired network and servers as the root (or gateway). Also communicates with e MAPS.- Mesh access points (MAPs) are remote APs. They communicate with the RAP to connect to the wired network
What are some mesh design recommendations?
- There is a 2-3 ms typical latency per hop- For outdoor deployment, 4 or fewer hops are recommended for best performance. Max of 8 hops is supported.- For indoor deployment, one hop is supported.- 20 MAP nodes per RAP are recommended for best performance. Up to 32 MAPS are supported
What is the purpose of LWAPP with support of local MAC?
Local MAC terminates the client traffic at the wired port of the AP versus at the WLC, providing MAC management support for association requests and actions. This allows direct local access to branch resources without requiring that data to travel to the WLC. This allows the wireless client to function even if a WAN link failure occurs.
What was REAP designed to support?
REAP is designed to support remote offices by extending LWAPP control timers. Its the referred solution for LWAPs to connect to the WLC over a WAN. REAP devices support only layer 2 security policies, don't support NAT, and require a routable IP.
What is hybrid REAP?
H-REAP is an enhancement to REAP that provides additional capabilities such as NAT, more security options, and the ability to control up to 3 APs remotely. H-REAP is more delay-sensitive than REAP. The RTT must not exceed 100ms between the AP and the WLC
What are the UDP ports used by the following WLAN protocols:1. LWAPP control2. LWAPP data3. WLC exchange messages (unencrypted)4. WLC exchange messages (encrypted)5. RF group IEEE 802.11b/g6. RF group IEEE 802.11a
1. 122232. 122223. 166664. 166675. 121146. 12115
What are 2 methods for mark frames to provide CoS?
Inter-Switch Link (ISL) and IEEE 802.1p/802.1Q
What standard does IEEE 802.11i use for confidentiality, integrity, and authentication?
Advanced Encryption Standard (AES)
What are the 3 non-overlapping channels of IEEE 802.11b/g?
Channels 1, 6, and 11
What words can be used to correlate the feature sets of IOS versions and the features they provide?
- Advanced - Firewall, IDS, and VPN- Enterprise - Appletalk, IPX, and IBM- Services - ATM and MPLS (also supports VoIP and VoFR, with IP Voice)
/ 53

Leave a Comment ({[ getComments().length ]})

Comments ({[ getComments().length ]})


{[ comment.comment ]}

View All {[ getComments().length ]} Comments
Ask a homework question - tutors are online