You are on page 1of 4

CCNA Discovery Designing and Supporting Computer Networks

3.1.4 Determining Network Strengths and Weaknesses

Objective
Identify and document the strengths and weaknesses of the existing network.

Background / Preparation
In the previous activity you created a modular block diagram of the Film Company network. The next step is to examine the physical layout of the devices in the network, the cabling plant and the device configurations to identify and document the strengths and weaknesses of the existing network. Packet Tracer provides a limited physical view of the network where devices are placed in wiring closets in various buildings in various cities. The physical view in this activity represents the building containing the Film Company and the building containing their ISP located in the same city. The Film Company building contains
All contents are Copyright 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 4

CCNA Discovery
Designing and Supporting Computer Networks

a wiring closet containing the MDF and POP that serves the general office functions and a wiring closet for the production area. Since all devices must be placed in wiring closets, wiring closets containing typical client devices used by the general office staff and the production staff have been placed in the approximate center of their respective areas. There is a conference room that is also used by visitors with wireless laptop computers that is represented by a wiring closet in its center. Assume all cabling in the Film Company building is category 5 UTP.

Step 1: Examine the physical location of devices.


a. Switch from the Logical Workspace to the Physical Workspace, enter the Home City and note the extent of the wireless coverage around the Film Company building. b. Enter the Film Company building and note the extent of the wireless coverage within the building and the location of the wiring closets and work areas. c. Enter each of the wiring closets and note where the various client devices and network devices are located.

Step 2: Examine the device configurations.


a. Switch from the Physical Workspace to the Logical Workspace. b. Access each of the network devices in the Film Company network. Examine each device using commands such as show running-config, show version, show interfaces and other commands. c. Look for information on the speed of various links, passwords, traffic filtering and any other information you can gather.

Step 3: Evaluate the network.


a. Based on your observations from Steps 1 and 2, rate the network in the areas listed in the table on the next page on a scale of 1 (lowest) to 5 (highest).

All contents are Copyright 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

Page 2 of 4

CCNA Discovery
Designing and Supporting Computer Networks

Network Ratings: Lowest 1 Hierarchical network design Firewall location Server location Bandwidth Quality of wiring Network equipment suitability Wireless security Suitability for advanced services like IP phones or video Redundancy and availability Failure domain size Physical security
Answers will vary.

Highest 2 3 4 5

All contents are Copyright 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

Page 3 of 4

CCNA Discovery
Designing and Supporting Computer Networks

Step 4: Reflection
a. List the strengths of the existing network. The use of VLANs, DHCP, NAT, default static route, VTP, and wireless access ____________________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________ b. List the weaknesses of the existing network. ____________________________________________________________________________ There is no enable or enable secret password, no console or vty password, no security, and wireless access is limited ____________________________________________________________________________ wireless access is limited ____________________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________

All contents are Copyright 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

Page 4 of 4

You might also like