Sie sind auf Seite 1von 11

1.2.1 3 What Happens at the Core Layer? Activity - Packet Tracer - pka 1.2.

3 2 Network Convergence Activity - Packet Tracer - pka 1.3.1 3 What Happens at the Distribution Layer? Activity - Packet Tracer - pka 1.3.2 2 Limiting the Scope of Network Failure Activity - Packet Tracer - pka 1.3.4 3 Traffic Filtering at the Distribution Layer Activity - Packet Tracer - pka 1.4.1 4 What Happens at the Access Layer? Activity - Packet Tracer - pka 1.4.2 2 Network Topologies at the Access Layer Activity - Packet Tracer - pka 1.5.1 2 What is a Server Farm? Activity - Packet Tracer - pka 1.5.3 2 High Availability Activity - Packet Tracer - pka 3.1.1 5 Creating a Network Diagram Activity - Packet Tracer - pka 3.1.3 2 Developing a Modular Diagram Activity - Packet Tracer - pka 3.1.4 3 Strengths and Weaknesses of the Existing Network Activity - Packet Tracer - pka 3.2.4 4 Download and Install Cisco IOS Software Activity - Packet Tracer - pka 3.3.3 2 Installing a New Hardware Option Activity - Packet Tracer - pka 3.4.3 3 Wireless Site Survey and Planning Activity - Packet Tracer - pka 5.2.2 3 Designing Distribution Layer Topology

Activity - Packet Tracer - pka 5.3.2 2 Defining Traffic Patterns and Application Support Activity - Packet Tracer - pka 5.3.4 2 Creating the Logical Network Design for the WAN Activity - Packet Tracer - pka 5.5.3 2 Updating the Logical Network Design Documentation Activity - Packet Tracer - pka 6.1.1 4 Using Hierarchical Routing and Addressing Schemes Activity - Packet Tracer - pka 6.1.2 2 Classful Subnets and Summarization Activity - Packet Tracer - pka 6.1.3 2 Using VLSM when Designing IP Addressing Activity - Packet Tracer - pka 6.2.3 4 Designating the Routing Strategy Activity - Packet Tracer - pka 6.2.5 3 Designing the Addressing Scheme Activity - Packet Tracer - pka 7.1.4 3 Validating LAN Technologies and Devices Activity - Packet Tracer - pka 7.2.2 3 Creating the Test Plan Activity - Packet Tracer - pka 7.2.3 2 Validating the Choice of Devices and Topologies Activity - Packet Tracer - pka 7.2.4 2 Validating the Choice of Routing Protocol Activity - Packet Tracer - pka 7.2.5 2 Validating the IP Addressing Scheme Activity - Packet Tracer - pka 7.3.2 3 Creating the Test Plan Activity - Packet Tracer - pka 7.3.4 3 Validating the Security Plan Activity - Packet Tracer - pka 8.1.2

3 Testing WAN Connectivity with Simulation Software Activity - Packet Tracer - pka 8.2.5 4 Troubleshooting Frame Relay Operation Activity - Packet Tracer - pka

CCNA Discovery Designing and Supporting Computer Networks

1.2.1 Comparing Mesh Topologies


Objectives Compare the routing tables of a partial mesh topology with a full mesh topology Observe the convergence of the network when an interface is shut down and brought back up Examine the EIGRP packets in the Simulation Mode as the network converges Background / Preparation You have been provided with a partial mesh and a full mesh topology to examine in this exercise. The interfaces have been addressed and EIGRP has been configured as the routing protocol. All necessary configuration commands have been entered into the routers and the networks are fully functional. Required file: Comparing Mesh Topologies.pka

Step 1: Compare the routing tables of the partial mesh and full mesh topology
a. Use the Inspect tool to examine the routing table on HQP and HQF. b. Notice the difference in the number of routes in each table. c. Record the routes to 192.168.0.204 network on HQP and the routes to the 172.16.3.196 network on HQF. Routes to 192.168.0.204 _____________________________________________________________________________________ __ _____________________________________________________________________________________ __

Routes to 172.16.3.196 _____________________________________________________________________________________ __


All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2

CCNA Discovery Designing and Supporting Computer Networks

_____________________________________________________________________________________ __

Step 2: Examine the routing table and observe the convergence of a partial mesh topology
a. b. c. d. e. Shut down the interface S0/0/1 on BR2P and observe the routing table on HQP. Note that two routes to the 192.168.0.204 network were removed. Bring the interface S0/0/1 back up and observe the routing table on HQP. Observe the convergence of the network (it may take a minute for both routes to be re-installed). Examine the routing table on HQP again. Which interface is used to reach network 192.168.0.160?

___________________________________________________________________________________ ___ f. On router BR2P, shut down the interface S0/0/0. How will HQP get to the 192.168.0.160 network now?

____________________________________________________________________________________ __ g. Bring interface S0/0/0 on BR2P back up and observe the convergence of the network (it may take a minute). h. What happens to the routes to the 192.168.0.160 network that were in the routing table?

___________________________________________________________________________________ ___ i. Repeat Step 2 process in the Simulation Mode with only the EIGRP filter active. Use the Capture / Forward button to examine the EIGRP packets and routing table as the network converges.

Step 3: Examine the routing table and observe the convergence of a full mesh topology
a. b. c. d. e. Shut down the interface S0/0/1 on BR2F and observe the routing table on HQF. Note that two routes to the 172.16.3.196 network were removed. Bring the interface S0/0/1 back up and observe the routing table on HQF. Observe the convergence of the network (it may take a minute for both routes to be re-installed). Examine the routing table on HQF again. Which interface is used to reach network 172.16.3.128?

____________________________________________________________________________________ _ f.

On router BR2F, shut down the interface S0/0/0. How will HQF get to the 172.16.3.128 network now?

___________________________________________________________________________________ __ g. Bring interface S0/0/0 on BR2F back up and observe the convergence of the network (it may take a minute). h. What happens to the routes to the 172.16.3.128 network that were in the routing table?

____________________________________________________________________________________ _ i. Repeat Step 3 process in the Simulation Mode with only the EIGRP filter active. Use the Capture / Forward button to examine the EIGRP packets and routing table as the network converges.

Reflection
1. On router BR2P, when you shut down the interface S0/0/0, why was the one original route to the 192.168.0.160 network replaced with two routes? ____________________________________________________________________________________ __

____________________________________________________________________________________ __ 2. What are the advantages and disadvantages of a full mesh topology? _____________________________________________________________________________________

_____________________________________________________________________________________

All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2

Document Outline
y y y y

Student Packet Tracer Manual StadiumCompany Story PT Mapping Chapter 1 o 1.2.1 Comparing Mesh Topologies o 1.2.3 Observing Network Convergence

1.3.1 Demonstrating Distribution Layer Functions 1.3.2 Investigating Failure Domains o 1.3.4 Placing ACLs o 1.4.1 Exploring Access Layer Functions o 1.4.2 Creating Topologies o 1.5.1 Observing and Recording Server Traffic o 1.5.3 Using Redundant Links on Server Farm Devices Chapter 3 o 3.1.1 Investigating Existing Network Devices o 3.1.3 Creating Modular Block Diagrams o 3.1.4 Determining Network Strengths and Weaknesses o 3.2.4 Installing Cisco IOS Software o 3.3.3 Installing Option Modules on a Router o 3.4.3 Placing Wireless Access Points Chapter 5 o 5.2.2 Connecting Access and Distribution Layer Switches o 5.3.2 Examining WAN Connections o 5.3.4 Observing Static and Dynamic Routing o 5.5.3 Implementing Access Control Lists Chapter 6 o 6.1.1 Designing and Addressing a Topology o 6.1.2 Resolving Discontiguous Network Problems o 6.1.3 Applying VLSM Addressing o 6.2.3 Configuring a Multirouter EIGRP Network o 6.2.5 Assigning IP Addresses Chapter 7 o 7.1.4 Using Commands to Test Network Functionality o 7.2.2. Basic Connectivity Test Plan o 7.2.2 Building the Prototype Network o 7.2.3 Testing Redundancy in the Network Design Test Plan o 7.2.3 Testing Redundancy in the Network Design o 7.2.4 Routing Protocol Test Plan o 7.2.4 Testing a Multi-Router Network with Redundant Links o 7.2.5 Validating the IP Addressing Scheme Test Plan o 7.2.5 Validating the IP Addressing Scheme o 7.3.2 Basic Connectivity Test Plan o 7.3.2 Building the Prototype Network o 7.3.4 Testing ACLs o 7.3.4 Testing ACLs Chapter 8 o 8.1.2 Configuring a WAN Connection Using PPP
o o

o o

8.2.5 Stadium Redundancy Test Plan 8.2.5 Testing Design Redundancy

Das könnte Ihnen auch gefallen