Free Essay

Cisco Ospf

In: Computers and Technology

Submitted By adilbekes
Words 1093
Pages 5
Laborotory Work
OSPF MULTI AREA CONFIGURATION

In this laboratory work you will learn: * Use OSPF MultiArea protocol ; * Encrypted Ospf protocol;
Note: The routers used CCNA labs are Cisco 2911 Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as necessary. Configure PC hosts. Initialize and reload the routers and switches as necessary. Configure basic settings for each router. Configure routing.
Configure OSPF on the routers in area 1 with process ID of 100, in area 0 with process ID of 110, in area 2 with 200.

R6(config)#router ospf 100
R6(config-router)#network 8.0.0.0 0.255.255.255 area 1
R6(config-router)#network 192.168.1.0 0.0.0.255 area 1

R6(config)#router ospf 100
R6(config-router)#network 8.0.0.0 0.255.255.255 area 1
R6(config-router)#network 192.168.1.0 0.0.0.255 area 1

R2(config)#router ospf 110
R6(config-router)#network 8.0.0.0 0.255.255.255 area 1
R6(config-router)#network 9.0.0.0 0.255.255.255 area 1
R6(config-router)#network 30.0.0.0 0.255.255.255 area 0

R2(config)#router ospf 110
R6(config-router)#network 8.0.0.0 0.255.255.255 area 1
R6(config-router)#network 9.0.0.0 0.255.255.255 area 1
R6(config-router)#network 30.0.0.0 0.255.255.255 area 0

* On R1 use the following commands #show ip route
R1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

O IA 8.0.0.0/8 [110/128] via 30.0.0.2, 00:21:56, Serial0/0/1
O IA 9.0.0.0/8 [110/128] via 30.0.0.2, 00:21:56, Serial0/0/1
11.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 11.0.0.0/8 is directly connected, Serial0/0/0
L 11.0.0.1/32 is directly connected, Serial0/0/0
O IA 12.0.0.0/8 [110/128] via 11.0.0.2, 00:21:56, Serial0/0/0
O IA 13.0.0.0/8 [110/128] via 11.0.0.2, 00:21:56, Serial0/0/0
30.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 30.0.0.0/8 is directly connected, Serial0/0/1
L 30.0.0.1/32 is directly connected, Serial0/0/1
O IA 192.168.1.0/24 [110/129] via 30.0.0.2, 00:21:56, Serial0/0/1
O IA 192.168.2.0/24 [110/129] via 30.0.0.2, 00:21:56, Serial0/0/1
192.168.3.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.3.0/24 is directly connected, GigabitEthernet0/0
L 192.168.3.1/32 is directly connected, GigabitEthernet0/0
O IA 192.168.4.0/24 [110/129] via 11.0.0.2, 00:21:56, Serial0/0/0
O IA 192.168.5.0/24 [110/129] via 11.0.0.2, 00:21:56, Serial0/0/0 Verify connectivity. * From PC-0,PC-1 you should be able to ping every interface on R1, R2, R3, R4, R5, R6, R7 and PC-2, PC3,PC4. Were all pings successful? ______________

OSPF encrypted authentication

Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as necessary.

* Routing Table Name | interface | IP | MASK | DEFAULT-GATEWAY | R1 | Fa0/0 | 192.168.2.1 | 255.255.255.0 | | | Fa0/1 | 192.168.1.1 | 255.255.255.0 | | R2 | Fa0/0 | 192.168.2.2 | 255.255.255.0 | | | Fa0/1 | 192.168.3.1 | 255.255.255.0 | | PC1 | Fa0 | 192.168.1.100 | 255.255.255.0 | 192.168.1.1 | PC2 | Fa0 | 192.168.3.100 | 255.255.255.0 | 192.168.3.1 |

Configure PC hosts. Initialize and reload the routers and switches as necessary. Configure routing.
Configure OSPF on the routers in area 0 with process ID of 1 Verify connectivity.
From PC-0 you should be able to ping every interface on R1, R2, and PC-1. Were all pings successful? ______________
From PC-1, you should be able to ping every interface on R1, R2 and PC-0. Were all pings successful? ______________ * If the pings are not successful, troubleshoot the basic device configurations before continuing.

*

Configure OSPF encrypted authentication with MD5 On R1 and R2 use the following commands

R1(config)#router ospf 1
R1(config-router)#area 0 authentication message-digest
R1(config)#int fa0/0
R1(config-if)#ip ospf authentication message-digest
R1(config-if)#ip ospf message-digest-key 1 md5 cisco
R1(config)#router ospf 1
R1(config-router)#area 0 authentication message-digest
R1(config)#int fa0/0
R1(config-if)#ip ospf authentication message-digest
R1(config-if)#ip ospf message-digest-key 1 md5 cisco

R2(config)#router ospf 1
R2(config-router)#area 0 authentication message-digest
R2(config)#int fa0/0
R2(config-if)#ip ospf authentication message-digest
R2(config-if)#ip ospf message-digest-key 1 md5 cisco
R2(config)#router ospf 1
R2(config-router)#area 0 authentication message-digest
R2(config)#int fa0/0
R2(config-if)#ip ospf authentication message-digest
R2(config-if)#ip ospf message-digest-key 1 md5 cisco

* There is a password cisco * command show run on each router router ospf 1 log-adjacency-changes area 0 authentication message-digest network 192.168.1.0 0.0.0.255 area 0 network 192.168.2.0 0.0.0.255 area 0

From PC-0 you should be able to ping every interface on R1, R2, and PC-1. Were all pings successful? ______________
From PC-1, you should be able to ping every interface on R1, R2 and PC-0. Were all pings successful? ______________

Similar Documents

Free Essay

Ospf White Paper

...WHITE PAPER BIDIRECTIONAL FORWARDING DETECTION FOR OSPF Fast Failure Detection to Speed Network Convergence OVERVIEW In both Enterprise and Service Provider networks, the convergence of business-critical applications onto a common IP infrastructure is becoming more common. Given the criticality of the data, these networks are typically constructed with a high degree of redundancy. While such redundancy is desirable, its effectiveness is dependant upon the ability of individual network devices to quickly detect failures and reroute traffic to an alternate path. This detection is now typically accomplished via hardware detection mechanisms. However, the signals from these mechanisms are not always conveyed directly to the upper protocol layers. When the hardware mechanisms do not exist (eg: Ethernet) or when the signaling does not reach the upper protocol layers, the protocols must rely on their much slower strategies to detect failures. The detection times in existing protocols are typically greater than one second, and sometimes much longer. For some applications, this is too long to be useful. Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media. THE PROBLEM WITH CONVERGENCE The process of network convergence can be broken up into a set of discreet events*:...

Words: 6315 - Pages: 26

Premium Essay

Course Project

...Course Project Author Note This assignment is being submitted on September 5, 2013, for N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. Course Project Assuming that the router (R1) connecting the NOC to the outside world is configured with an IP address of 154.78.0.1 is directly linked to router (R2) with IP address 154.78.0.244 complete the following: Explain the steps required to configure router R1 and R2 to use Frame relay your explanation should include the commands used. Frame relay is fairly simple to configure. Remember that by default, Cisco uses High-level Data Link Control (HDLC) as a serial link encapsulation. This is a proprietary encapsulation and can only be used if you’re connecting two Cisco routers with a point-to-point link. Frame relay allows you to connect multiple vendors’ routers because of the frame relay standards created. The configuration of each router is very simple and looks something like this: R1 Router>enable Router#config t Router(config)#hostname R1 R1(config)# interface serial 0 R1(config-if)#ip address 154.78.0.1 255.255.0.0 R1(config-if)#no shutdown R1(config-if)#exit R1(config)#exit R1# R2 Router>enable Router#config t Router(config)#hostname R2 R2(config)#interface serial 0 R2(config-if)#ip address 154.78.0.244/255.255.0.0 R2(config-if)#no shutdown R2(config-if)#exit R2(config)#exit R2# The two routers can now communicate point to point. If a company had large streams...

Words: 935 - Pages: 4

Premium Essay

Router Ospf

...cef ip ssh version 1 no ip domain-lookup spanning-tree mode pvst interface Loopback0 ip address 10.1.1.1 255.255.255.255 ! interface FastEthernet0/0 ip address 172.16.1.17 255.255.255.240 duplex auto speed auto ! interface FastEthernet0/1 no ip address duplex auto speed auto shutdown ! interface Serial0/0/0 ip address 192.168.10.1 255.255.255.252 clock rate 64000 ! interface Serial0/0/1 ip address 192.168.10.5 255.255.255.252 ! interface Serial0/1/0 no ip address clock rate 2000000 shutdown ! interface Vlan1 no ip address shutdown ! ip classless ! ip flow-export version 9 ! ! ! ! ! ! ! line con 0 password cisco login ! line aux 0 ! line vty 0 4 password cisco login ! ! ! end R1#conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#router ospf 10 R1(config-router)#network 192.168.10.0\ ^ % Invalid input detected at '^' marker. R1(config-router)#network 192.168.10.1 % Incomplete command. R1(config-router)#network 192.168.10.0.0.0.3 area 0 ^ % Invalid input detected at '^' marker. R1(config-router)#network 192.168.10.0.0.0.0.3 area 0 ^ % Invalid input detected at '^' marker. R1(config-router)#network 192.168.10 0.0.0.0.3 area...

Words: 2242 - Pages: 9

Free Essay

Network & Security

...Class, Sub netting, VLSM Routing Technology : RIP, RIPV2, IGRP, EIGRP, OSPF, TCP/IP, Static and Dynamic Routing. Network Products : CISCO Routers 1700, 1800, 2500, 2600, 2800. CISCO High End Routers 3600, 3800, 7200. CISCO Switches 1900, 2950, 2950, 2960G. CISCO Campus Switches 3550XL, 4948 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507, Motorola Vanguard Router 342 & 6435, 3Com Core 4007/Access Switch 3300, D-Link Layer 2/3 switches 3326SR, Nortel Baystack Switches, CISCO - CSS 11500 Switch. Voice & Video : CISCO IP Phone 7900, Polycom Video Conferencing Device, Smart Call Voice Recorder. Wireless & Wi-Fi : Canopy Wireless Device (p-p/pMp), DLink Wireless (point to point), DLink Access Point, CISCO 500, 1242 AGK9 series Access Point, and CISCO Linksys Wireless/Wi-Fi Router. WAN Optimizer : Steelhead - Riverbed WAN Optimizer Security & VPN : Cisco PIX 535 & ASA Firewall, FWSM, Fortigate Firewall, Gajshield Securegate Firewall, Sonicwall Firewall NSA2400, Cisco NAC, Watchguard Firewall, ACL-Access Control List, Portwise VPN Software, NAT, PAT, VPN Client, Bluecoat Proxy SG, Bluecoat Reporter, Bluecoat AV, Juniper SSG-550M, McAfee IPS M2950, Forefront Threat Management Gateway (TMG) 2010. Ticketing System : E- Helpline, HP Open View, and Optive Live - Call Logging, Helpdesk. Monitoring Tools : Op Manager, What's UP Gold, Ethereal, PRTG Packet Sniffer, Cisco Network Assistant, Fluke OptiView XG, Network Time Machine. . Operating Systems...

Words: 274 - Pages: 2

Free Essay

Windows 2008 Server

...Chapter 2: Introduction to Routers Check your Understanding Styron, Quinton Pgs. 77-80 1. Which statement best describes CLI? A. It is a graphical user interface allowing easy “point-and-click” configuration. B. It is an access point for ROM Monitor configuration. C. IT is a text-based interface using a keyboard. D. IT is required for remote management of routers. 2. When scrolling through output from a terminal session, the –More—prompt indicates which of the following? (Choose two.) A. Press the Enter or Return key for the next page. B. Press the Spacebar for the next page. C. Press the Spacebar for the next line. D. Press the Enter or Return key for the next line. 3. Which of the following statement are true about the different EXEC levels of access to a router? (Choose three.) A. User EXEC mode allows configuration changes to the router. B. Privileged EXEC mode permits commands that can change the router’s operation. C. Central Office# is an example of privileged mode prompt. D. Central Office(config)# is an example of privileged mode prompt. E. Central Office> is an example of a user mode prompt. F. User EXEC mode is also known as enable mode. 4. Which two commands ask the router to display a list of valid syntax to follow the word “show”? A. Show? B. Show help C. Sh? D. Sh ? 5. What is the likely reason for the following output from a router? Central Office# config...

Words: 871 - Pages: 4

Free Essay

Student Ccna Syllabus

...Semester Two Journal and Study Guide CISCO SYSTEMS NETWORKING Academy CCNA 2 Chapter 1 WANs and Routers One major characteristic of a wide-area network (WAN) is that the network operates beyond the local LAN's geographic scope. It uses the services of carriers, such as regional Bell operating companies (RBOCs), Sprint, and MCI. WANs use serial connections of various types to access bandwidth over wide-area geographies. By definition, the WAN connects devices that are separated by wide areas. WAN devices include the following: • • • • • • Routers, which offer many services, including internetworking and WAN interface ports Switches, which connect to WAN bandwidth for voice, data, and video communication Modems, which interface voice-grade services and channel service units/digital service units Channel service units/data service units (CSUs/DSUs) that interface T1/E1 services and Terminal Adapters/Network Termination 1 (TA/NT1s) TA/NT1s that interface Integrated Services Digital Network (ISDN) services Communication servers, which concentrate on dial-in and dial-out user communication Concept Questions 1. A WAN is used to interconnect local-area networks (LANs) that are typically separated by a large geographic area. A WAN operates at the OSI reference model physical and data link layers. The WAN provides for the exchange of data packets/frames between routers/bridges and the LANs that they support. Draw a WAN that includes three LANs. 1 of 116 CCNA 2 Chapter 1 WANs and...

Words: 23437 - Pages: 94

Free Essay

Cisco

...ii Cisco TelePresence Fundamentals Cisco TelePresence Fundamentals Tim Szigeti, Kevin McMenamy, Roland Saville, Alan Glowacki Copyright©2009 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing May 2009 Library of Congress Cataloging-in-Publication Data Cisco TelePresence fundamentals / Tim Szigeti ... [et al.]. p. cm. ISBN-13: 978-1-58705-593-5 (pbk.) ISBN-10: 1-58705-593-7 (pbk.) 1. Multimedia communications. 2. Computer conferencing. I. Szigeti, Tim. II. Title. [DNLM: 1. Cisco Systems, Inc. ] TK5105.15.C57 2009 006.7--dc22 2009013062 ISBN-13: 978-1-58705-593-5 ISBN-10: 1-58705-593-7 Warning and Disclaimer This book is designed to provide information about Cisco TelePresence. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or...

Words: 17200 - Pages: 69

Free Essay

Cisco Systems

...Story Cisco Systems Inc. is a worldwide computer networking company based out of San Jose, California. From Cisco’s beginning they as a company aimed to connect all members of the supply chain. Cisco’s initial product was the router, which contained an operating software called Internet Operating System (IOS). This product launched Cisco as a company and led to their future goal of a completely integrated supply chain. The first integration, a customer support site, came a year after the router was launched and it allowed customers to download and upgrade software as well as technical support through e-mail. This support center continued to grow through the early nineties and was eventually replaced by a customer support system on their website. The customer support system was continually added to and by 1995 it included; company and product information, technical and customer support, and most importantly it introduced the ability to sell products and services online. Cisco’s main desire behind this system was to streamline the process of customer support and allow the information to more easily utilized. In 1996, Cisco implemented another Internet application called “Networked Strategy,” this introduced online order entry and allowed the information to flow through Cisco’s supply chain. The order information was sent to Cisco’s ERP system which in turn sent it out to the various suppliers and manufacturers, allowing for a very efficient process. Cisco continued...

Words: 277 - Pages: 2

Free Essay

Netw 206 Assignment 1

...operations at hand is key to the function of the change in the university. The main purpose of the case study presented is to present the task of implementing a high definition security video surveillance system solution that can replace and magnify what already exists at DeVry University today. As mentioned, DeVry requests a high definition security system that is to require the following features: 1. PoE (Power over Ethernet), avoid any additional wiring, the mounting of power bricks or using power injectors. Conserve and confine; 2. Segment camera IP traffic from the existing network for security purposes; 3. Provide sufficient bandwidth for full HD support; 4. Support a minimum of 150 cameras; 5. Comply with the cisco hierarchical design model; 6. Integrate 1Gb uplinks; and 7. Minimize rack space. During this process, DeVry has not yet purposed a budget for this action taken for this project but as any company would, DeVry would like the most cost efficient method possible. With such a request as this, it seems almost impossible to find such a camera that can withstand everything. Almost as if it was an indestructible camera seeming almost impossible until there was some research conducted. The discovery of the D-Link DCS-7513 Full HD Day & Night WDR Outdoor Bullet Camera is a high-definition professional surveillance camera developed to be versatile to any small, medium or large establishment. This camera uses a high sensitivity 2 megapixel...

Words: 1080 - Pages: 5

Free Essay

Lan Switching

...roduct Description LAN Switching and Wireless CCNA Exploration Labs and Study Guide Allan Johnson LAN Switching and Wireless, CCNA Exploration Labs and Study Guide is designed to help you learn about and apply your knowledge of the LAN switching and wireless topics from Version 4 of the Cisco® Networking Academy® CCNA® Exploration curriculum. Each chapter contains a Study Guide section and a Labs and Activities section. Study Guide The dozens of exercises in this book help you learn the concepts and configurations crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes matching, multiple-choice, fill-in-the-blank, and open-ended questions designed to help you Review vocabulary Strengthen troubleshooting skills Boost configuration skills Reinforce concepts Research topics Packet Tracer Activities—This icon identifies exercises interspersed throughout the Study Guide section where you can practice or visualize a specific task using Packet Tracer, a powerful network simulation program developed by Cisco. Labs and Activities The Labs and Activities sections begin with a Command Reference table and include all the online curriculum labs to ensure that you have mastered the practical skills needed to succeed in this course. Hands-On Labs—This icon identifies the hands-on labs created for each chapter. Work through all the Basic, Challenge, and Troubleshooting labs as provided to gain a deep understanding...

Words: 339 - Pages: 2

Free Essay

Medium Network Design

...Universidad Interamericana, Recinto de Guayama | Diseño de una Red Mediana | | Luis Lugo 16 de enero de 2013 | Introducción En este trabajo estaré diseñando una red mediana para un colegio técnico el cual contiene pocos estudiantes. Este diseño usa conmutadores en las capas 2 y 3 proveyendo servicios a usuarios y a la misma vez seguridad para toda la red. La organización tiene alrededor de 700 usuarios y existen diferentes dominios dentro de esta red. Diseño Este diseño debe tener varios requerimientos específicos para poder completar lo que es una red mediana segura. Uno de estos requerimientos y el mayor de estos es que la red debe de proveer conectividad para tres servidores y alrededor de 700 clientes. De la misma manera, la red va a permitir que si en alguna ocasión alguno de estos equipos necesita separarse el otro, esto sea posible. En esta red otro de los requerimientos importantes es el de evitar ataques, ya que como la red va a estar comunicándose entre dos edificios, esta es más susceptible a ataques que provengan de afuera. El centro o “core” de esta red es un solo conmutador de capa 3 con interfaz de “Ethernet” este conmutador “core” le provee los servicios de índole de ambas capas (2 y 3) hacia los equipos necesarios. La red tiene 4 sub redes diferentes, una de estas es para los servidores, otra para los clientes, otra para el sistema de red inalámbrico y la última para la administración. Se diseñó un NDIS para monitorear...

Words: 1290 - Pages: 6

Premium Essay

Advantages of Cisco

...Running Head: ADVANTAGES OF CISCO Advantages of Cisco [Writer’s Name] [Institution’s Name] Advantages of Cisco Cisco ISN components are deployed at the edge of big organizationsr IP network, and enable big organizations to provide local IVR and queuing corporate services without consuming expensive bandwidth on the core IP backbone Alternatively, the ISN routes and transfers the call through the IP network, in effect turning the IP network into a giant user-controlled switch.More Efficient Call Routing and Transfers: When a call has finished receiving IVR/queuing treatment on the ISN, the call is routed to its destination without needing a bridge inside the ISN As a result a lesser number of ports are required on the ISN than on some other IVR systems As an Open, Future-Proof Architecture, the ISN performs in an open environment using common Internet technologies and methods. Scalability and Operational Simplicity: The Cisco ISN solution can be customized to solve big organizationsr communication requirements. ISN servers can easily be added to big organizationsr existing infrastructure if the communication needs of the business are growing. The ISN`s technology also simplifies operational management. It fits Big organizationsr Communication needs as the Cisco ISN has the ability to operate in a pure IP environment and it can also be integrated with big organizationsr existing telephony infrastructure through the use of voice-over-IP (VoIP) gateways. New Corporate...

Words: 674 - Pages: 3

Free Essay

Cisco Acquisition Integration

...Acquisition Integration A Cisco on Cisco Case Cisco_IT_Case_Study © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Overview Challenge Integrate the employees, operations, and department-level functions of newly acquired companies quickly and easily Solution Apply standard principles and processes for acquisition integration Results Easier integration that maximizes value of acquisition Next Steps Continue to build integration expertise throughout the company 2 Challenge Smoothly Integrate Acquired Companies 120+ companies acquired since 1993 Handle acquisitions as a normal part of business Create a consistent, repeatable, and adaptable approach to integration Develop integration expertise with consistent activities and teams Apply these standards across the company and within departments 3 Solution Standard Principles and Team Approach Standard principles Internal alignment through a consistent approach Cross-function cooperation Consistent, repeatable, and adaptable processes Continually refine practices with lessons learned Standard team approach Central integration team Cross-function teams Department teams 4 Solution Technologies for Team Collaboration Cisco MeetingPlace conference calls WebEx online meetings Cisco TelePresence E-mail Online document sharing Online project management tools 5 Results Maximized Acquisition Value Benefits for Cisco as a company: Shorter time to realize acquisition value Faster...

Words: 304 - Pages: 2

Free Essay

Computers

...Sergio Malone Chapter 1 Check Your Understanding Which of the following statements accurately describe differences between a LAN and a WAN? (Choose two) Companies can use a WAN to connect remote locations, and a LAN can make a local connection in a building D. Only WANs require a CSU/DSU to be used on the ends of the cable. Network professionals belong to organizations that plan and define standards used in networking. Which of the following are recognized industry organizations? (Choose two) A. IETF C. ISO D. EIA F. ITU Which of the following are true about a router? (Choose three) A. Routers enable different IP networks or IP subnets to communicate with each other. C. Path selection is one of the main functions of a router E. Routers have a central processing unit and memory. Which of the following are main components of a router? (Choose three) A. ROM B. Flash memory E. RAM Which of the following statements describe the function of RAM in a router? (Choose two) C. RAM stores the current configuration information. E. RAM stores routing tables for the router. Which of the following statements are true about DTE? (Choose two) C. DTE usually resides on the customer’s premises D. DTE is an acronym for data terminal equipment. Which of the following statements are true about DCE? (Choose two) B. DCE provides clocking to the DTE. C. DCE is an acronym for data circuit-terminating equipment. The term WAN refers...

Words: 2160 - Pages: 9

Premium Essay

Cisco It

...Cisco IT Case Study Organizational Change and Advanced Services for Operational Success How Cisco IT Implemented Organizational Change and Advanced Services for Operational Success New organizational framework greatly improves operations. Given today’s pressing need to optimize IT services and resources while reducing costs and improving organizationwide productivity, the Cisco lifecycle methodology offers the framework needed to make operations more efficient and responsive. Cisco IT Network and Data Center Services (NDCS) changed from using a traditional organizational model to Cisco’s own lifecycle model, with substantial operations improvements across five different metrics. This case study describes Cisco IT’s internal infrastructure, a leading-edge enterprise IT environment that is among the largest and most complex in the world. “By moving from a traditional technology, silo-based organizational structure to a lifecycle-based model, we were able to improve our operational metrics considerably. Our number of cases decreased by approximately 60 percent, and our time-to-repair to get clients back up and running has decreased by almost 70 percent.” John Manville, Vice President, IT Network and Data Center Services, Cisco BACKGROUND An enterprise with 300 locations in 90 countries, Cisco has 46 data centers and server rooms supporting the 65,000-plus employees. Fourteen of the data centers/server rooms are production or customer-facing and 32 are used for product...

Words: 3737 - Pages: 15