Chapter 3

Card Set Information

Author:
kazmapapa
ID:
234603
Filename:
Chapter 3
Updated:
2013-09-12 23:28:03
Tags:
CCDP
Folders:

Description:
Developing an Optimum Design for Layer 3
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user kazmapapa on FreezingBlue Flashcards. What would you like to do?


  1. What are examples of ACL-friendly
    addressing practices?
    •Group server farms by functions or by criticality.

    •Create addressing patterns for easy wildcarding.
  2. What are common five reasons that
    additional subnets may need to be added to the existing network.
    1.Adding voice network (IP telephony)

    2.Adding videoconferencing (TelePresence)

    3.Extending L3 switching to access layer.

    4.Deploying NAC.

    5.Corporate requirements.
  3. Summarize 2001:DB8:0:A480::/64 to
    2001:DB8:0:A4BF::/64.

    Note that 0x80=128, 0xBF=191.
    2001:DB8:0:A480::/58
  4. Give an example of role-based addressing
    using network 10.
    10.<#_for_closet>.<VLAN>/24



    such as



    10.1.10/24 – Closet 1, VLAN 10

    10.1.20/24 – closet 1, VLAN 20

    etc. (No bit splitting here)
  5. You need to deploy role-based addressing
    using only the class B private address space 172.16/12. Assume that you have 50 closets in campus, and each closet needs to accommodate 250 users. How many VLANs can you allocate to each closet?
    • You need 6 bits for closets (2^6=64), 8
    • bits for users (2^8=256), so you get 6 bits -> 64 for VLANs.

What would you like to do?

Home > Flashcards > Print Preview