Sunteți pe pagina 1din 4

Name: Alejandro Osorio Herrera

CISCO Vocabulary 1
ENGLISH
1. Network

RED

SPANISH

EXAMPLE

2. Layer
3. Framework
4. Gathering

CAPA
MARCO
REUNION

5. Groupware

TRABAJO EN GRUPO

6. Constraints
7. Throughput

LIMITACIONES
RENDIMIENTO

8. Responsiveness

RESPUESTA ADEMAS

9. Bandwidth

ANCHO DE BANDA

10. Interface
11. Downstream
12. Upstream
13. Splitter
14. Coax

INTERFAZ
RIO ABAJO
RIO ARRIBA
DIVISOR
COAXIAL

15. Wireless
16. Frames

RADIO
MARCOS

17. Acknowledgment

RECONOCIMIENTO

Maximum number of frames (or amount of data) the sender can


transmit before it must wait for an acknowledgment.

18. Keystroke

GOLPE DE TECLADO

19. Host

ANFITRION

20. Multilink
21. Teleworker
22. Mask
23. Hierarchical

MULTILINEA
TRABAJADOR A
DISTANCIA
MASCARA
JERARQUICO

24. Routing

ENRUTAMIENTO

25. Protocol

PROTOCOLO

26. Bit

POCO

Time between a user request (such as the entry of a command or


keystroke) and the host systems command execution or response
delivery
Time between a user request (such as the entry of a command or
keystroke) and the host systems command execution or response
delivery
What is multilink PPP?
Which models of Cisco ISRs would be appropriate for a
teleworker?
What is the mask?
What are some advantages of a hierarchical IP addressing
scheme?
What is the difference between classless and classful routing
protocols?
What is the difference between classless and classful routing
protocols?
How many bits are used for the interface ID in an IPv6 unicast
address?

Match the PPDIOO network lifecycle phases with their correct


descriptions.
What are the layers in the three-layer hierarchical structure?
The SONA framework denes the following three layers
The steps involved in gathering network requirements include
identifying the following:
Corporation X is planning to introduce new systems for its
employees, including e-learning, groupware
List some common organizational constraints.
Throughput: Amount of data successfully moved from one place to
another in a given time period
Provides the desired responsiveness, throughput, and utilization
on a per- application basis through the network infrastructure and
services.
How might bandwidth be a technical constraint for a network
design?
Show ip interface
Dene downstream and upstream.
Dene downstream and upstream.
DISPONIBILIDAD DE PALABRA PERO SIN MAS DATOS
The CMTS enables the coax users to connect with either the PSTN
or the Internet.
For what purpose is bridged wireless used?
Maximum number of frames (or amount of data) the sender can
transmit before it must wait for an acknowledgment

Name: Alejandro Osorio Herrera


27. Forward

ADELANTE

28. Prefix
29. Multicast
30. Multihoming
31. Triggered
32. Flat
33. Deploy
34. Backbone
35. Filtering
36. Quantization
37. Companding
38. Switch

PREFIJO
MULTIASPECTO
MULTIPUERTO
PROVOCADO
PLANO
DESPLEGAR
COLUMNA
VERTEBRAL
FILTRADO
CUANTIZACION
DOMINANTE
INTERRUPTOR

39. Trunk

TRONCAL

40. Feature

CARACTERISTICAS

41. Gateway

PUERTA

42. Gatekeeper

MULTIFILTRO

43. Delay
44. Jitter

RETRASO

The ISP agrees to forward the companys trafc from the ISPs POP
to a company-run home gateway.
NO HAY DISPONIILIDAD DE PALABRA EN EL TEXTO.
One-to-many IPv6 addresses are called multicast.
What is BGP multihoming?
What are triggered updates?
NO HAY DISPONIILIDAD DE PALABRA EN EL TEXTO.
Deploy EIGRP in both directions
What is the difference between an Integrated IS-IS backbone and
an OSPF backbone?
Filtering: Filters out the signals nonspeech frequency components.
Quantization: Converting an analog sample to a digital code word
Companding: Compressing and expanding signals
Voice gateway, also called a voice-enabled router or voice-enabled
switch
Trunk signaling is between PSTN switches, between a PSTN
switch and a PBX, or between PBX switches.

NO HAY SIGNIFICADO

Some multilayer switch features that are useful to the access layer
include the following
A voice port is an interface on a voice gateway that carries voice
data.
The gatekeeper provides call control services to registered H.323
endpoints within its zone.
Variation in the delay of received packets
Jitter Variation in the delay of received packets

CISCO Vocabulary 2
ENGLISH

SPANISH

45. Echo

ECO

46. Endpoint
47. Header
48. Overhead
49. Payload

DE EXTREMO
TITULAR
ARRIBA
CARGA UTIL

50. Logger

REGISTRADOR

51. Erlangs
52. Scattering
53. Diffraction
54. Multipath
55. Autonomous

MANDADOS
DISPERSION
DISFRACCION
MULTIPLE
AUTONOMO

56. Lightweight

LIGERO

EXAMPLE
Echo Audible leak of the callers voice into the
receive (return) path
If an endpoint device is noncompliant
The IPv6 packet header is 40 octets, or 320 bits.
Dynamic name resolution reduces administrative overhead.
G.729 has the most compression of the payload, but the IP
header is a constant 40 bytes. Therefore, G.729 has more IP
overhead relative to its payload.
If your call logger says that 290 calls are made on a trunk group in
the busiest hour and the average call duration is 180 seconds,
what is the busy hour trafc (in Erlangs)?
How many centum call seconds (CCS) equals ve Erlangs?
DISPONIBILIDAD DE PALABRA PERO SIN MAS DATOS
DISPONIBILIDAD DE PALABRA PERO SIN MAS DATOS
DISPONIBILIDAD DE PALABRA PERO SIN MAS DATOS
What is the difference between an autonomous AP and a
lightweight AP?
What is the difference between an autonomous AP and a

Name: Alejandro Osorio Herrera

57. Authentication
58. Encryption
59. Port
60. Outbreak
61. Identification
62. Trust
63. Token
64. Proof
65. Firewall
66. Cryptography
67. Resource

AUTENTIFICACION
CIFRADO
PUERTO
BROTE
IDENTIFICACION
CONFIANZA
MUESTRA
PRUEBA
CORTAFUERGOS
CRIPTOGRAFIA
RECURSO

68. Pooled

COMUN

69. Leveraging

APROVECHAR

70. Scalability

ESCALABILIDAD

71. Performance

RENDIMIENTO

72. Manageability
73. Usability

CAPACIDAD DE
GESTION
USABILIDAD

74. Budget

PRESUPUESTO

75. Tightly

HERMETICAMENTE

76. Launched

LANZADO

77. Prototype

PROTOTIPO

78. Guidelines
79. Rollback
80. Entreprise

DIRECTRICES
REVERSION
EXPRESA

81. Branch

RAMA

82. Overlook

PASAR POR ALTO

83. Syslog

SISTEMA DE
REGISTRO
LA DEPURACION
MALLA

84. Debugging
85. Meshed

lightweight AP?
What is the difference between authentication and authorization?
Cryptography provides condentiality through encryption.
What is a voice port?
To minimize and mitigate outbreaks
NO HAY DISPONIILIDAD DE PALABRA EN EL TEXTO.
Trust and identity management
Token: A physical device or software application
What are the three proofs on which authentication is based?
Cisco IOS Firewall
Cryptography provides condentiality through encryption.
Integration of networked resources and information assets that
have been largely unlinked
When the network infrastructure is converged, IT resources can be
pooled and shared
The objective of this layer is to meet business requirements and
achieve efciencies by leveraging the Interactive Services layer.
Scalability: Supports growth and expansion of organizational tasks
by separating functions and products into layers.
Performance: Provides the desired responsiveness, throughput,
and utilization on a per- application basis through the network
infrastructure and services.
Manageability: Provides control, performance monitoring, and
fault detection.
Provides for an effective balance between usability and security
while protecting information assets and infrastructure from inside
and outside threats.
The associated costs of investment and usage should stay within
the budget limits.
The new network design is often driven by the introduction of new
network applications; the implementation time frames for new
applications are often tightly connected and therefore inuence
the available time for network design.
A pilot network tests and veries the design before the network is
launched.
A prototype network tests and veries a redesign in an isolated
network before it is applied to the existing network.
Detailed rollback guidelines in case of failure
Detailed rollback guidelines in case of failure
What are some features of EIGRP that make it an appropriate
choice for an enterprise routing protocol?
Vendors can obtain their own branch of the MIB subtree and create
custom managed objects under that branch
Enterprises often overlook the Server Farm module from a security
perspective.
Syslog denes the following severity levels
DISPONIBILIDAD DE PALABRA PERO SIN MAS DATOS
The key rationale for creating a fully meshed network is to provide a
high level of redundancy

Name: Alejandro Osorio Herrera


86. Issues
87. Packet
88. Copper

CUESTIONES
PAQUETE
COBRE

Key issues include the following:


What is Packet over SONET/SDH (POS)?
With SDSL, trafc in either direction travels at the same speed over
a single copper twisted pair.

CISCO Vocabulary 3
ENGLISH
89. Twisted

SPANISH
RETORCIDO

90. Links
91. Binary

ENLACES
BINARIO

92. Dispatch
93. Browse

ENVIO
VER

94. Flexibility
95. Availability

FLEXIBILIDAD
DISPONIBILIDAD

EXAMPLE
With SDSL, trafc in either direction travels at the same speed over
a single Twisted twisted pair.
If WAN links are never congested, queuing is unnecessary.
PCM takes the PAM process one step further by encoding each
analog sample using binary code words.
DHCP is used to dispatch.
A user wants to browse www.cisco.com The host queries the DNS
server because it does not know that sites IP address.
NO HAY DISPONIILIDAD DE PALABRA EN EL TEXTO.
Using RSVP, applications request a certain amount of bandwidth
for a voice call across a network and receive an indication of the
outcome of the reservation based on actual resource availability.

S-ar putea să vă placă și