50% found this document useful (2 votes)
2K views5 pages

Short Questions: Past Papers Network Design & Management

The document contains questions and answers related to network design and management. Some key topics covered include: - Business constraints that can impact network design such as budget, staffing, and scheduling. - Router on a stick configuration which allows routing between VLANs using a single trunk link between a router and switch when no layer 3 switch exists. - Frame tagging in VLANs using IEEE 802.1Q to ensure intra-VLAN traffic goes to the correct interface. - Network protocol analyzers which monitor and decode data traffic to generate reports and insights for network administrators. - Metrics like MTBF and MTTR which are used to calculate availability, with MTBF being the average time between failures

Uploaded by

rumi noor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
2K views5 pages

Short Questions: Past Papers Network Design & Management

The document contains questions and answers related to network design and management. Some key topics covered include: - Business constraints that can impact network design such as budget, staffing, and scheduling. - Router on a stick configuration which allows routing between VLANs using a single trunk link between a router and switch when no layer 3 switch exists. - Frame tagging in VLANs using IEEE 802.1Q to ensure intra-VLAN traffic goes to the correct interface. - Network protocol analyzers which monitor and decode data traffic to generate reports and insights for network administrators. - Metrics like MTBF and MTTR which are used to calculate availability, with MTBF being the average time between failures

Uploaded by

rumi noor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Past Papers Network Design & Management

Short Questions
1. Which types of business constraints can occur during network design?
The business constraints related to the politics and religion, budgetary and staffing, and project
scheduling can occur and affect network design
2. What is router on a stick (ROAS)?
Router on a stick is a network configuration used to allow the routing of traffic between different
VLANs. That kind of a setup consists of a router and a switch connected through one Ethernet
link configured as an 802.1q trunk link. Such a configuration is typical in networks where no
layer-3 switch exists. But first, let’s find out why it is so.
3. What is frame tagging in VLANs?
When VLANs are implemented in a switched network, the switches need a method to make
sure intra-VLAN traffic goes to the correct interfaces. To benefit from the advantages of LANs,
the switches need to ensure that traffic destined for a particular VLAN goes to that VLAN and
not to any other VLAN. This can be accomplished by tagging frames with VLAN information
using the IEEE 802.1Q standard.
4. Define protocol analyzer with its working?
A network protocol analyzer is a tool used to monitor data traffic and analyze captured signals
as they travel across communication channels. Protocol analyzer tools capture data as it
moves across communication busses in embedded systems, along with traffic entering and
leaving LAN, PAN, and even wireless networks. Protocol scanners provide the ability to
constantly monitor and decode bus data, which can be leveraged to generate reports and
valuable insights for network admins when interpreted by network protocol analysis tools.
5. What is meant by mean time between failures and mean to repair. Also write formula of
availability.
MTBF, or Mean Time Between Failures, is a metric that concerns the average time elapsed
between a failure and the next time it occurs. These lapses of time can be calculated by using
a formula.
Whereas the MTTR, or Mean Time To Repair, is the time it takes to run a repair after the
occurrence of the failure. That is, it is the time spent during the intervention in a given process.
MTBF (Mean Time Between Failures) and MTTR (Mean Time To Repair) are two very
important indicators when it comes to availability of an application.
When specifying availability using MTBF and MTTR, the equation to use is as follows:
Availability = MTBF / (MTBF + MTTR)
6. How traffic flow of voice over IP is different from other types of data?
Voice transmission has different issues than data transmission because voice traffic cannot be
re-sent if it is lost. Three unique problems that affect call quality are latency, jitter, and packet
loss. In addition, voice traffic can have roaming issues because people are more apt to walk
around with phones.
7. What are types of access control lists? Why they are used in networks?
There are two types of ACLs:
 Standard ACLs (1 – 99 and 1300 - 1999)
 Extended ACLs (100 – 199 and 2000 - 2699)
Access Control Lists are the set of conditions grouped together by name or number. These
conditions are used in filtering the traffic passing from router. Through these conditions we can
filter the traffic; either when it enters in router or when it exits from router.
8. Define usability and adaptability with example?
Usability: refers to the ease of use with which network users can access the network and
services. Usability focuses on making network users’ jobs easier. It is important to gain an

Govt. Ambala Muslim College Sargodha Page 1 of 5


Past Papers Network Design & Management
understanding of how important usability is to your network design customer, because some
network design components can have a negative effect on usability. For example, strict
security policies can have a negative effect on usability (which is a tradeoff that most
customers are willing to make, but not all customers). You can plan to maximize usability by
deploying user-friendly, host-naming schemes and easy-to-use configuration methods that
make use of dynamic protocols, such as the Dynamic Host Configuration Protocol (DHCP).
Adaptability: When designing a network, you should try to avoid incorporating any elements
that would make it hard to implement new technologies in the future. A good network design
can adapt to new technologies and changes. Changes can come in the form of new protocols,
new business practices, new fiscal goals, new legislation, and a myriad of other possibilities.
For example, some states have enacted environmental laws that require a reduction in the
number of employees driving to work. To meet the legal requirement to reduce automobile
emissions, companies need their remote-access designs to be flexible enough to adapt to
increasing numbers of employees working at home.
9. What is the purpose of designing virtual LANS?
VLANS are used to subdivide physical switch-based LANs into many logical LANs. VLANs
allow a large, flat, switch-based network to be divided into separate broadcast domains.
Instead of flooding all broadcasts out every port, a VLAN-enabled switch floods a broadcast out
only the ports that are part of the same VLAN as the sending station.
10. Differentiate between interior versus exterior protocols?
Routing protocols can also be characterized by where they are used. Interior routing protocols,
such as RIP, OSPF, and EIGRP, are used by routers within the same enterprise or
autonomous system (AS). Exterior routing protocols, such as BGP, perform routing
between multiple autonomous systems. BGP is used on the Internet by peer routers in
different autonomous systems to maintain a consistent view of the Internet’s topology.
11. Define the types of network management processes according to the ISO?
The International Organization for Standardization (ISO) defines five types of network
management processes, which are often referred to with the FCAPS acronym:
■ Fault management
■ Configuration management
■ Accounting management
■ Performance management
■ Security management
12. Name the different layers in point-to-point protocols.
Point-to-Point Protocol. Protocol that provides router-to-router and host-tonetwork connections
over synchronous and asynchronous circuits. PPP was designed to work with several network
layer protocols, such as IP, IPv6, IPX, and AppleTalk.
13. Differentiate between centralized and distributed cabling topologies with examples.
■ A centralized cabling scheme terminates most or all of the cable runs in one area of
the design environment. A star topology is an example of a centralized system.
■ A distributed cabling scheme terminates cable runs throughout the design environment.
Ring, bus, and mesh topologies are examples of distributed systems.
14. Which types of addresses we have to avoid during subnetting?
15. How we can identify a network design as good or bad?
16. How we can identify the traffic behavior using the destination address?
17. How you can characterize the existing network?
18. When is it appropriate to use static versus dynamic addressing?
19. Why it is important to use a structured, systematic method for designing networks?
20. What is a DMZ?

Govt. Ambala Muslim College Sargodha Page 2 of 5


Past Papers Network Design & Management
21. Define Q o S?
22. Describe NAT and its functionality?
23. What is discontiguous network?
24. How can one improve network efficiency?
25. Write two Architectural Constraints?
26. Write two major problems that are solved by RIPv2 which exist in RIPv1?
27. What do you know about Data Encryption?
28. Differentiate between IN-band and out-band monitoring?
29. Difference between jitter and delay?
30. What is multi-cast in traffic behavior?
31. Describe ‘Resiliency’ factor count as business priorities?
32. Write down four major guidelines for assigning names?
33. Difference between Good put and throughput?
34. What are virtual LAN’S?
35. Write two characteristics of Distance-Vector?
36. What is multi cast and broadcast in traffic behavior?
37. How to Elect Root in STP?
38. What is controlled load service?
39. What is autonomous system? Which protocols are used in it?
40. What does distribution layer do?
“Subjective Part”
1. Define network topology. Why we use a hierarchal model for network topology design. Also
explain the cisco hierarchical network design model with diagram.
Network design experts have developed the hierarchical network Define network topology.
Why we use a hierarchal model for network topology design. Also explain design model to help
you develop a topology in discrete layers. Each layer can be focused on specific functions,
allowing you to choose the right systems and features for the layer. For example, in Figure 5-1,
high-speed WAN routers can carry traffic across the enterprise WAN backbone, medium-speed
routers can connect buildings at each campus, and switches can connect user devices and
servers within buildings.

A typical hierarchical topology is


■ A core layer of high-end routers and switches that are optimized for availability and
performance.

Govt. Ambala Muslim College Sargodha Page 3 of 5


Past Papers Network Design & Management
■ A distribution layer of routers and switches that implement policies. In small and medium-
sized organizations, the core and distribution layers can be combined.
■ An access layer that connects users via lower-end switches and wireless access points.
Why Use a Hierarchical Network Design Model?
Networks that grow unheeded without any plan in place tend to develop in an unstructured
format. Dr. Peter Welcher, the author of network design and technology articles for Cisco
World and other publications, refers to unplanned networks as fur-ball networks. Welcher
explains the disadvantages of a fur-ball topology by pointing out the problems that too many
CPU adjacencies cause. When network devices communicate with many other devices, the
workload required of the CPUs on the devices can be burdensome. For example, in a large flat
(switched) network, broadcast packets are burdensome. A broadcast packet interrupts the
CPU on each device within the broadcast domain and demands processing time on every
device (including routers, workstations, and servers) for which a protocol understanding for that
broadcast is installed. Using a hierarchical model can help you minimize costs. You can
purchase the appropriate internetworking devices for each layer of the hierarchy, thus avoiding
spending money on unnecessary features for a layer. Also, the modular nature of the
hierarchical design model enables accurate capacity planning within each layer of the
hierarchy, thus reducing wasted bandwidth. Network management responsibility and network
management systems can be distributed to the different layers of a modular network
architecture to control management costs. Testing a network design is made easy because
there is clear functionality at each layer. Fault isolation is improved because network
technicians can easily recognize the transition points in the network to help them isolate
possible failure points.
Hierarchical design facilitates changes. As elements in a network require change, the cost of
making an upgrade is contained to a small subset of the overall network. In large flat or
meshed network architectures, changes tend to impact a large number of systems. Replacing
one device can affect numerous networks because of the complex interconnections. When
scalability is a major goal, a hierarchical topology is recommended because modularity in a
design enables creating design elements that can be replicated as the network grows.
Because each instance of a module is consistent, expansion is easy to plan and implement.
For example, planning a campus network for a new site might simply be a matter of replicating
an existing campus network design. To control routing CPU overhead and bandwidth
consumption, modular hierarchical topologies should be used with such protocols as Open
Shortest Path First (OSPF), Intermediate System-toIntermediate System (IS-IS), Border
Gateway Protocol (BGP), and Enhanced Interior Gateway Routing Protocol (Enhanced IGRP).

2. Define and explain broadcast domain and collision domain with the help of network diagram.
3. Differentiate between switching and routing protocols. What is the selection criteria for
switching and routing protocols? Enlist and explain the working of dynamic routing protocols
with diagram.
4. Why the testing of a network is preferred. Explain the components and types of test in details.
5. For a corporate level network what security tools can be implemented in the network for
ensuring secure working of network? What point must be kept in mind while designing a secure
network?
6. Why we need IPV6? What are the approaches to upgrading to IPV6 elaborate in detail?
7. Compare and contrast distance-vector and link-state routing. If you were designing a new
routing protocol, which would you use and why?(chp7 review q 1)
8. How can a network manager secure a wireless network discuss in detail?

Govt. Ambala Muslim College Sargodha Page 4 of 5


Past Papers Network Design & Management
9. Why is network management design important? Define the types of network management
processes according to ISO?
10. A). what factor will help you decide whether distance-vector or link-state routing is best for your
design customer?
b). Elaborate the following:
 Reconnaissance attacks(chp 2)
 Denial-of-service attacks
11. What are the main phases of network design per the PDIOO approach?(chp1)
b). When considering network behavior, what is the difference between relative and absolute
network utilization?
c). how does a security plan differ from security policy? (chp 8)
12. Why are hierarchy and modularity important for network design?
(b. What is traffic behavior? Discuss its types with examples?
13. A) What architectural and environment factor should you consider for a new wireless
installation?
b) What are some options for enhancing the spanning Tree protocol?
14. Case study:
You are a network consultant who has been asked to attend an initial meeting with executive
management team of ElectroMyCycle, LLC. ElectroMyCycle manufacturer’s motorcycles. Its
new motorcycle was just picked up by a large retail chain. ElectroMyCycle is upgrading its
manufacturing capacity and hiring new employees. (chp 8 maybe)
15. (a). Discuss the term “Scalability”. What does it mean? What are some challenges designers
face when designing for Scalability?(chp2 review exe q 1)
(b). Why is network management design important? What are some advantages and
disadvantages of using centralized network management versus distributed network
management?

Govt. Ambala Muslim College Sargodha Page 5 of 5

You might also like