THE THREE LAYER NETWORK DESIGN

The three layer network design models are useful because they facilitate modularity such as? (page 12)
Devices at each layer have similar and well - defined functions.
This kind of flexibility and adaptability makes a hierarchical network design highly scalable.
The network administrator can dynamically assign routing protocols to make their job easier.
Simpler for the users to access.
In network services, the new network model provides remote services quickly and easily to all users. (page 13)
True
False
What are the three types of network services? (page 13)
Enterprise services, User services, VLAN services
Local services, Remote services, Enterprise services
Remote services, Admin services, Switching services
Local services.... (page 14)
Traffic sometimes crosses the backbone to gain resources.
Traffic never crosses the backbone.
Assigns a port cost to external users.
Which service is close to users but not on the same network or subnet as the users? (page 15)
Enterprise services
Remote services
Remote services might not have to cross the backbone. (page 15)
True
False
When servers that host enterprise services are placed close to the backbone, all users would be different distances from the servers, so most user data would have to cross the backbone to get to the services. (page 16)
True
False
Enterprise services are provided to..... (page 16)
Local users
All users on the internetwork
Local and neighbouring users
The Open Systems Interconnection (OSI) model has seven layers, each of which specifies functions that enable data to be transmitted from host to host on an internetwork. (page 17)
True
False
The presentation layer is responsible for dialogue control. (page 18)
True
False
The transport layer is responsible for end-to-end connection. (page 18)
True
False
In the OSI reference model, each layer encapsulates the layer immediately below it as the data flows up the protocol stack. (page 19)
True
False
The logical communication that happens at each layer of the OSI reference model doesn’t involve many physical connections because the information each protocol needs to send is encapsulated in the layer of protocol information beneath it. (page 19)
True
False
What are the upper layers of the OSI model? (page 20)
Session layer
Physical layer
Data link layer
Network layer
Transport layer
Presentation layer
Application layer
The upper layers are designed to move packets, and the lower layers deal with the types of applications. (page 20)
True
False
In the Application layer, the common functions are..... (page 21)
Opening, closing, reading and writing files, transferring files and e - mail messages, executing remote jobs and obtaining directory information about network resources.
Deleting files, reading files, writing files, publishing files, transferring data to neighbour device
When data is transmitted between different types of computer systems, the _________________ negotiates and manages the way data are represented and encoded. (page 22)
Session layer
Presentation layer
Application layer
The presentation layer is used for encryption and decryption. (page 22)
True
False
The Session layer provides coordination of the communications in an orderly manner. (page 23)
True
False
The Session layer marks significant parts of the transmitted data with checkpoints to allow for fast recovery in the event of a connection failure. (page 23)
True
False
Which layer is not often used or services within this layer are sometimes incorporated into the transport layer? (page 23)
Network layer
Presentation layer
Data link layer
Session layer
The Transport layer is responsible for overall node - to - node validity and integrity of the transmission. (page 24)
True
False
"OSI transport services" include layers 1 through 4 , collectively responsible for delivering a complete message or file from sending to receiving station without error. (page 24)
True
False
The ___________ is also the switching function of the dial - up telephone system. (page 26)
Network layer
Data link layer
Physical layer
In the Data Link layer, the transmitted bits are divided into frames. (page 27)
True
False
Layers 1 and 2 are not always required for every type of communications. (page 27)
True
False
The Physical layer has no understanding of the meaning of the bits, but deals with the electrical and mechanical characteristics of the signals and signaling methods. (page 28)
True
False
The Routing Information Protocol is a ____________routing protocol that is the routing protocol that is responsible for early Internet connectivity. (page 31)
Distance-vector
Path vector
Link-state
Easy transmission
RIP sends ______ data packets to exchange routing updates when the network topology changes and at regular timed intervals. (page 31)
TCP
UDP
BGP
RIP routing tables are updated with the best path selection. (page 31)
True
False
What are the several factors that provide routing stability on a RIP network? (page 32)
Hold-downs
Hop count limit
Reverse lookup
Poison reverse updates
DNS
Split horizons
DCHP
Poison reverse updates are used to stop larger routing loops in a RIP network. (page 32)
True
False
Split horizons are used as a process to not send information about a route from the direction from which it came. (page 32)
True
False
A router configured with RIP will send out periodic updates to the internetwork every 40 seconds. (page 33)
True
False
In addition, anytime a topology change occurs, all the RIP enabled routers won't send out routing table updates. (page 33)
True
False
What are the three types of timers that are used in a RIP network? (page 34)
Execute timer, update timer, invalid timer
Invalid timer, flush timer, update timer
Flush timer, exit timer, kill timer
Which timer is used when RIP routers send the entire routing table to its neighbouring routers? (page 34)
Invalid timer
Flush timer
Update timer
If a specific route is not heard from within a specified amount of time (default is 180 seconds), the routers assume that the route is no longer available. Which timer is used for this? (page 34)
Invalid timer
Flush timer
If a route has not been heard from for 90 seconds ( default value) after the Invalid timer has been sent, the router will inform its neighbouring routers, and then the route is flushed from the router's routing table. This is called the Flush timer. (page 34).
True
False
What are the advantages of RIP? (page 35)
Slow convergence compared with other routing protocols
Compatible with a wide variety of internetworking systems
Easy to configure
Not efficient routing on variable bandwidth paths
Proven protocol, widely used on Internet Stable
Max hop count of 15 limits practical use in large networks
Creates high bandwidth usage with full routing updates
No authentication method
RIP v2 was developed to expand the amount of information carried in an RIP message. (page 36)
True
False
RIP v2 doesn't contain any additional security features such as authentication. (page 36)
True
False
The default Cisco IOS is configured to receive RIP vl and RIP v2 packets, but only sends RIP v2 packets. (page 36)
True
False
What are the RIPv2 advantages? (page 37)
Classless interdomain routing
Classful IP addressing
Authentication
VLSM (variable length subject masking)
Broadcasting
Point-to-point
OSPF is a ___________ protocol that was originally developed to meet the needs of larger heterogeneous enterprise networks. (page 39)
Path-vector
Distance-vector
Link-state
Fast transmission
OSPF networks operate within an Autonomous System (AS ),which is a collection of networks that share a common routing strategy. (page 39)
True
False
OSPF Areas...... (page 40)
Control the traffic and reduce memory and CPU utilization on the routers
expand the amount of information carried in a message
Elect a designated router everytime the network times out
Areas are a group of routers that route from the same topology database and maintain the same routing algorithms. (page 40)
True
False
Area 1 is the backbone area required in an OSPF network. (page 40)
True
False
Stub areas are OSPF areas that have internal routes but no external routes other than a default route. (page 40)
True
False
What are the four types of OSPF routers that can be present in an OSPF network? (page 42)
Extensive Routers (ERs)
Area Border Routers (ABRs)
Autonomous System Border Routers (ASBRs)
Internal Routers (IRs)
Resource Routers (RRs)
Backbone Routers (BRs)
Virtual Routers (VRs)
OSPF propagates only updates to the internetwork, not full routing tables during a network update. (page 42)
True
False
OSPF routers use the SPF (Shortest Path First) algorithm to calculate the longest path to the destination. (page 43)
True
False
The SPF (shortest path first) algorithm is frequently called the Dijkstra algorithm in recognition of the creator of the algorithm. (page 43)
True
False
In OSPF, the calculations on least cost populate the link - state database that is resident on each router in the internetwork. (page 43)
True
False
What are the three important components to the OSPF protocol? (page 44)
Flooding protocol
Hello protocol
Goodbye protocol
Exchange protocol
Handshake protocol
Distribute protocol
The Hello protocol processes the election of Designated Routers (DRs). (page 45)
True
False
Hello packets are also used as keep - alive messages to maintain the neighbour relationship with other routers in the area. (page 45)
True
False
With OSPF, the DR is responsible for generating link - state advertisements (LSAs) for the entire internetwork. (page 45)
True
False
The Exchange protocol is used to synchronize the routing database for the internetwork. (page 46)
True
False
The Flooding protocol distributes the link - state database whenever a change occurs in the internetwork. (page 46)
True
False
In OSPF, a router that changes a link - state will send a flooding packet to inform the other routers of the change or changes, this is flooded out to all of the routers interfaces. (page 46)
True
False
OSPF advantages.... (page 47)
Not bandwidth - intensive
Floods network with resourceful data
Quick convergence
Sends multicast frames, not broadcast frames
Compatible with all network devices
Easy configuration
Is compatible with hierarchical designed networks
Open protocol, available for third - party implementations
Intermediate System to Intermediate System (IS - IS) is a ____________ interior gateway routing protocol. (48)
Link-state
Distance-vector
Path-vector
State-vector
With IS-IS, there are several concepts that are important and unique. (page 48)
End Systems
Local gateways
Intermediate Systems
Area
Domain
Level 1 Routing
Level 2 Routing
Level 3 Routing
Level 1 routers route all information to a Level 2 router in their area. (page 48)
True
False
Only Level 2 routers can communicate with external routers outside of the routing domain. (page 48)
True
False
What are three main protocols in the ISO suite? (page 49)
Intermediate System to Intermediate System (IS - IS)
End System to End System ( ES - ES )
Interdomain Routing Protocol (IDRP)
External system to External system (ES - ES)
What are the IS-IS protocol advantages? (page 50)
Very quick convergence on large networks
Supports user encryption
Compatible with CNLP (Connectionless Network Layer Protocol )
Supports authentication
In charge of the entire network
Scalable
Netware Link Services Protocol is a _________ routing protocol developed for Novell NetWare internetworks. (page 51)
Path-vector
Distance-vector
Link-state
State-link
NLSP was developed by Novell to overcome some limitations of IPX RIP (IPX Routing Information Protocol) and SAP (Service Advertisement Protocol). (page 51)
True
False
NLSP advantages..... (page 51)
Able to reduce data packet size due to support of IPX header compression
Able to support 125 hops as opposed to 15 hops for RIP
Reduces routing update traffic by sending routing information only to NLSP routers
Support for load balancing
Able to support 127 hops as opposed to 15 hops for RIP
Increases bandwidth for larger data
The several key concepts concerning NLSP routing include: (page 52)
Area
Routing Domain
Global Internetwork
Local Internetwork
What are the NLSP routing levels? (page 53)
Level 1 routing - Data transfer between routers within the same area
Level 4 routing - Data transfer between networks
Level 2 routing - Routing between areas
Level 3 routing - Routing between Routing Domains
Level 1 routing - Routing between Autonomous systems
NLSP routers exchange Hello packets to determine neighbour reachability information (adjacency information). Adjacency information is stored in the adjacency database. (page 54)
True
False
In NLSP, LSPs are combined into one database, the link - state database. (page 54)
True
False
When an NLSP router detects a topology change, the router creates a new LSP and sends it to its neighbour router. (page 55)
True
False
What are the two types of NLSP receipt confirmations? (page 55)
On a LAN, the designated router (DR) sends out a complete sequence number packet (CSNP) containing all LSP sequence numbers
On a WAN, a router receives an updated LSP and sends an acknowledgement
On a WAN, a router receives an updated LSP and sends information to all adjacent routers
NLSP advantages..... (page 56)
Improved routing over IPX RIP
Improved routing over IPX OSPF
More efficient than IPX RIP
Scalable
NSLP routers store full topology map, not just next hop information
Routing updates contain only update information, not full routing table
Routing updates contain full routing update information
Border Gateway Protocol is a ________ exterior routing protocol that is in prominent use today on the Internet and was developed to replace the old exterior gateway protocol, Exterior Gateway Protocol (EGP). (page 57)
Path-vector
Link-state
State-link
Distance-vector
The main function of the BGP is to perform interdomain routing in an IP network , and it addresses the task of path determination. (page 57)
True
False
In a BGP network, certain routers act as BGP speakers to learn about all the multiple paths on the internetwork. (page 57)
True
False
What are the three types of routing that BGP performs? (page 58)
Interautonomous system routing
Pass - through autonomous system routing
Intra - autonomous system routing
Interactive system routing
BGP uses routing metrics to maintain the network topology routing tables. (page 59)
True
False
What are the four main message types in BGP? (page 60)
Notification Message
Open Message
Keep - Alive Message
Update Message
Session Message
Hello Message
BGP advantages...... (page 62)
Reliable
Compatible with hierarchically designed networks
Scalable
Multihome capability
Fast transmission
Supports CIDR (classless interdomain routing)
Supports route aggregation
Interior Gateway Routing Protocol is a Cisco - specific protocol that operates as a __________ routing protocol. (page 63)
Link-state
Path-vector
Distance-vector
Vector-path
What are the three types of routes advertised within an IGRP network? (page 63)
Interior - Routes between subnets in the network attached to an access server interface
System - Routes to networks within an autonomous system
Exterior - Routes to networks outside the autonomous system
System - Routes to networks within an area
The routing metric for IGRP is a combination of: (page 64)
Reliability - Reliability of the slowest link Load - Heaviest load on any link
Bandwidth - Bandwidth of the lowest bandwidth segment in the path
Delay - Sum of all the delays on outgoing interfaces
Bandwidth - Bandwidth of the highest bandwidth segment in the path
To reduce the possible occurrence of routing loops, IGRP uses split horizon, poison reverse, hold - down intervals, and flush updates. (page 64)
True
False
The Enhanced Interior Gateway Routing Protocol (EIGRP) is a ____________ interior gateway routing protocol that is used exclusively in Cisco networks. (page 65)
Distance-vector
Link-state
Path-vector
Improved-state
In EIGRP, DUAL is a specification for routers to store neighbouring information to allow quick routing updates and network convergence. (page 65)
True
False
What EIGRP features are similar and different to IGRP? (page 66)
Same load balancing
EIGRP can differentiate between internal and external routes
Same bandwidth
Reduced network overhead
Maximum hop count of 255 (100 default)
Improved convergence time
Similar metric
Uses the same cost mechanism
In EIGRP, hello messages are sent to neighbors every 5 seconds (60 seconds in most WANs). (page 67)
True
False
EIGRP can load balance across six unequal cost paths to a remote network (4 by default). (page 68)
True
False
What are the EIGRP key concepts? (page 69)
User table
Topology Table
Feasible Successors
Neighbour Table
A Successor route is used by EIGRP to forward traffic to a destination. (page 71)
True
False
In EIGRP, Successor routes may be backed up by a feasible successor route. (page 71)
True
False
In EIGRP, Successor routes are stored in both the topology table and the routing table. (page 71)
True
False
Packet Formats - There are five types of packets in an EIGRP network . These include: (page 72)
Replies - Sent in response to queries
Request - Gets specific neighbour information
Hello/ Ack - Multicast used for neighbour discovery
Queries - Active user request
Queries - Active state request
Updates - Conveys reachability information
Request - Gets entire neighbour information
In EIGRP, Routes are tagged with interior or exterior route information. (page 72)
True
False
In EIGRP, what are the new components implemented as an improvement over IGRP? (page 74)
Simple Transport Protocol
The Reliable Transport Protocol
Neighbour Discovery/Recovery
Neighbour Pranking Protocol
Protocol Dependent Modules
In EIGRP, If there is no feasible successor available, a new route is computed and a feasible successor is chosen. (page 75)
True
False
An EIGRP implementation can be done incrementally, with no adverse effect on existing routes. (page 78)
True
False
IGRP routes are treated as external routes by EIGRP and are easily configured with the new EIGRP networks. (page 78)
True
False
EIGRP is compatible and can redistribute routes for: (page 78)
OSPF
VLANS
Novell IPX SAP
IS - IS
RIP
HP FHR
BGP
AppleTalk RTMP
Novell IPX RIP
EIGRP advantages...... (page 79)
Scales well
Fully compatible with IGRP
Supports VLSM (Variable Length Subnet Mask)
Very quick convergence on large networks
Less bandwidth - intensive than IGRP
Scales only within the same AS
Supports AppleTalk, IP, and Novell NetWare through Protocol Dependent Modules
Max hop count of 224
Max hop count of 305
The RIP v2 extensions are listed in the following: (page 81)
Authentication for user updates
Provides high scalability
Queries answered in response to RIP v1 requests
Subnet Masks carried with each route entry (Allowing CIDR)
Authentication for routing updates
Next Hop addressing carried with each route entry
Route Tags for external use
The Subnet Mask field enables the use of variable - length subnet masks (VLSMs) and qualifies RIP v2 as a classless routing protocol. (page 81)
True
False
RIP v2 updates to other RIP v2 inter - routers by multicasting. (page 82)
True
False
What are the four features that are the most significant new features added to RIP v 2? (page 83)
Unlimited IP addresses
Multicasting RIP v 2 messages
Subnet Masks
Unicast RIP v 2 messages
Next Hop IP addresses
Authentication of the transmitting RIP v 2 node to other RIP v 2 nodes
RIP v2 allocates a 4 - octet field to associate a subnet mask to a destination IP address. (page 85)
True
False
Multicasting is a technique for simultaneously advertising routing information to multiple RIP or RIP v 2 devices. (page 87)
True
False
RIP v2 handles updates in a flexible manner such as: (page 89)
If the Version Number field indicates version 1 and if any bits in the Unused field are set to zero, the update is discarded
Therefore, newer versions of the RIP protocol are backward compatible with previous RIP versions
If the RIP version is greater than one, then the fields defined as unused are ignored and the message is processed
If the Version Number field indicates version 1 and if any bits in the Unused field are set to one, the update is discarded
RFC 1723 defines a compatibility switch with four settings, which allows versions 1 and 2 to interoperate, such as: (page 89)
RIP v1 Compatibility, which causes RIP v2 to broadcast its messages instead of multicast them so that RIP v1 may receive them
RIP v2, in which RIP v2 messages are multicast to destination address 224.0.0.9
None, in which no updates are sent
All updates are sent to both RIPv1 and RIPv2
RIP v1, in which only RIP v1 messages are transmitted
The true defining characteristic of classless routing protocols is the capability to carry subnet masks in their route advertisements. (page 91)
True
False
Classful routing protocols can distinguish between an all - zeros subnet, for example 172.16.0.0, and the major network number 172.16.0.0. (page 91)
True
False
The authentication process for RIP v2 announcements uses the first route entry in the RIP message to store authentication information. (page 92)
True
False
To indicate authentication, the Family Identifier field is set to: (page 92)
0xFW - FF
0xFF - FF
0xCF - CC
In RIPv2 authentication, the first route entry must be used, leaving a maximum of _________ in a RIP v2 authenticated announcement. (page 92)
23 routes
26 routes
24 routes
In RIPv2 authentication, the Authentication Type field, normally used as the Route Tag field for a route, indicates the type of authentication being used. (page 92)
True
False
In RIPv2, simple password authentication uses the Authentication Type value of 0x00 - 01. (page 92)
True
False
In RIPv2 authentication, the _______ after the Authentication Type are used to store the authentication value. (page 92)
17 bytes
16 bytes
15 bytes
MD5 is a one - way message digest or secure hash function, produced by RSA Data Security, Incorporated. (page 93)
True
False
MD5 computes a ________ hash value from a plain text message of arbitrary length and a password. (page 93)
125-bit
127-bit
128-bit
RIP v2 can be used in networks that require either support for authentication and variable - length subnet masks. (page 94)
True
False
RIP v2 continues to maintain multiple routes to any given destination in its routing tables. (page 95)
True
False
In the event a route becomes invalid, the RIP v2 node does not know any other routes to the destination of the failed route. (page 95)
True
False
RIP v2 continues to rely on counting to infinity as a means of resolving certain error conditions within the network. (page 96)
True
False
RIP v2 doesn't depend on timers to generate updates. (page 96)
True
False
In RIPv2, after a route cost is incremented to 16, that route becomes invalid, and the destination is considered unreachable. (page 97)
True
False
RIP v2 remains unsuited for network environments that require routes to be selected in real - time based on either delay, traffic loads, or any other dynamic network performance metric. (page 98)
True
False
IS-IS is a very flexible protocol and has been extended to incorporate leading edge features such as Multiprotocol Label Switching Traffic Engineering (MPLS/TE). (page 101)
True
False
The IS-IS protocol is designed to operate in an OSI Connectionless Network Service (CLNS) environment. (page 102)
True
False
IS - IS selects routes based upon a __________ assigned to links in the IS - IS network. (page 102)
Timers
Cost metric
Best path
CLNP is the solution for “unreliable” (connectionless) delivery of data, similar to IP. (page 103)
True
False
IS - IS uses _______ addresses to identify the routers and to build the link - state database (LSDB). (page 103)
IP
MAC
CLNS
Integrated IS - IS supports IP routing as well as CLNS. (page 104)
True
False
CLNS addresses are required for configuring and troubleshooting IS - IS, even when it is used only for IP. (page 104)
True
False
What data-link environments does IS-IS support? (page 104)
Cross-over
Ethernet
Frame Relay
Point-to-point
IS - IS is comparable to, and in some cases preferable to, OSPF. (page 105)
True
False
What do OSPF and IS-IS have in common? (page 106)
Similar mechanisms to maintain the health of the LSDB (link - state advertisements [LSAs], link - state aging timers, and LSDB synchronization)
Support route summarization between areas
Open - standard link - state routing protocols
Use the shortest path first (SPF) algorithm, with similar update, decision, and flooding processes
Support VLSM
Successful in the largest and most demanding ISP networks
Support route transmission and time delay
Converge quickly after network changes
The OSI protocol suite uses CLNS to provide connectionless delivery of data, and the actual Layer 3 protocol is the CLNP. (page 107)
True
False
IS - IS serves as an IGP for the CLNS. (page 107)
True
False
The original IS - IS implementation only supported ......... (page 107)
NLS
FNS
Broadcast
CNLS
IS - IS allows the routing domain to be partitioned into areas. (page 108)
True
False
Level 1 routing occurs within an IS - IS area. (page 109)
True
False
With IS-IS, all devices in a Level 1 routing area have the same area address. (page 109)
True
False
Level 2 routers learn the locations of Level 1 routing areas and build an interarea routing table. (page 109)
True
False
All ISs in a Level 2 routing area use the destination area address to route traffic using the lowest cost path. (page 109)
True
False
IS-IS Level 1 routers..... (page 110)
They do not have any knowledge of the networks in other areas.
These routers learn about paths between areas ( interarea ).
These routers learn about paths within the area that they are connected to (intra - area).
IS-IS Level 2 routers..... (page 110)
They are equivalent to area border routers (ABRs) in OSPF.
They do not have any knowledge of the networks in other areas.
These routers learn about paths between areas ( interarea ).
IS-IS Level 1-2 routers.....
They are equivalent to area border routers (ABRs) in OSPF.
These routers learn about paths between areas ( interarea ).
These routers learn about paths both within and between areas.
These routers learn about paths within the area that they are connected to (intra - area).
The path of connected Level 2 and Level 1 – 2 routers is called the backbone. (page 110)
True
False
In IS-IS, all areas and the backbone must be contiguous. (page 110)
True
False
In IS-IS, area boundaries fall on the links. (page 110)
True
False
Level 1 - 2 routers act as border routers between Level 1 and Level 2 routing domains. (page 111)
True
False
Integrated IS - IS provides IP with an alternative to OSPF and combines ISO CLNS and IP routing in one protocol. (page 112)
True
False
Integrated IS - IS uses its own protocol data units (PDUs) to transport information between routers, including IP reachability information. (page 112)
True
False
IS - IS information is not carried within a network - layer protocol; instead, it is carried directly within........... (page 112).
Transport layer segments
Physical layer bits
Data link layer frames
In a IS-IS network design, using areas confines the scope of LSP propagation and saves bandwidth. (page 114)
True
False
In a IS-IS network design, the logical place to implement route summarization is on the Level 1 – 2 routers, which is on the border between a Level 1 area and the Level 2 backbone. (page 114)
True
False
Hosts in the OSI terminology are called.............. (page 115)
Point-to-point systems (P2Ps)
End systems (ESs)
External and internal systems (EIS)
The End System - to - Intermediate System (ES - IS) protocol permits Ess (hosts) and ISs (routers) to discover one another. (page 115)
True
False
ES - IS allows ESs to learn their network - layer addresses. (page 115)
True
False
ES - IS performs which following tasks? (page 115)
Creates user authentication
Identifies the area (prefix) to the ESs
Creates adjacencies between ESs and ISs
Creates data link - to - network address mappings
Forwards information to IS-IS database
ESs listen for ISHs and randomly pick an IS to which they forward all their packets. (page 116)
True
False
When an ES needs to send a packet to another ES, it sends the packet to one of the ISs (routers) on its directly attached network. (page 116)
True
False
IP systems use ES - IS. (page 116)
True
False
IP has its own processes and applications to handle the same functions as ES - IS, such as Internet Control Message Protocol (ICMP). (page 116)
True
False
How many routing operations are there in OSI routing? (page 117)
2
3
4
OSI routing begins with ES - IS when the ESs discover the nearest IS by listening to ISH packets. This is done on..... (page 117)
Level 1 routing
Level 0 routing
When an ES needs to send a packet to another ES, it sends the packet to an IS on an attached network. This is done on.... (page 117)
Level 0 routing
Level 2 routing
Each ES and IS resides in a particular area. This is in..... (page 117)
Level 3 routing
Level 1 routing
To pass traffic, the router looks up the destination address and forwards the packet using the best route. This is done in..... (page 117)
Level 0 routing
Level 1 routing
If the destination is on the same subnetwork , the IS is aware of the location (from listening to the ESH) and forwards the packet appropriately. This is done in.... (page 117)
Level 1 routing
Level 0 routing
IS can provide a redirect message to the source that tells it that a more direct route is available. This is done in.... (page 117)
Level 3 routing
Level 1 routing
If the destination is on a different subnetwork but within the same area, the router identifies the best path using the system ID and forwards the traffic appropriately. This is done in.... (page 117)
Level 1 routing
Level 0 routing
If a destination address is in another area, the Level 1 IS sends the packet to the nearest Level 1 – 2 IS. This is done in... (page 118)
Level 2 routing
Level 3 routing
Packet forwarding continues through Level 2 ISs until the packet reaches a Level 1 – 2 or Level 2 IS in the destination area. (page 118)
True
False
Within the destination area, ISs forward the packet along the best path, based on system ID, until the packet reaches the destination. This is done in.... (page 118)
Level 1 routing
Level 2 routing
Routing between separate domains is called Level 3 routing. (page 118)
True
False
Level 3 routing is comparable to Border Gateway Protocol (BGP) interdomain routing in IP. (page 118)
True
False
Level 3 routing passes traffic between different autonomous systems, which might have different routing logic but might not have metrics that can be directly compared. (page 118)
True
False
Level 3 OSI routing is implemented on Cisco routers. (page 118)
True
False
With OSPF, network design is constrained by the fact that OSPF is based on a central backbone (area 0), with all other areas being physically attached to area 0. (page 119)
True
False
The border between areas is inside the ABRs and each link is only in one area. (page 119)
True
False
Summarization also reduces the amount of information carried in the backbone and advertised across the network. (page 119)
True
False
IS - IS permits a more flexible approach to extending the backbone by simply adding more Level 2 and Level 1 – 2 routers, which is a less complex process than with OSPF. (page 119)
True
False
OSPF runs on top of IP, whereas IS - IS runs through CLNS. (page 120)
True
False
OSPF produces many small LSAs. (page 120)
True
False
IS - IS updates are grouped by the router and sent as one LSP; therefore, the number of IS - IS updates is not an issue as network complexity increases. (page 120)
True
False
Since IS - IS uses significantly fewer LSPs, at least 1,000 routers can reside in a single area, making IS - IS more scalable than OSPF. (page 120)
True
False
Based on the default timers, IS - IS detects a failure faster than OSPF; therefore, convergence occurs more rapidly. (page 121)
True
False
IS - IS is also more efficient than OSPF in the use of CPU resources and in the way it processes routing updates. (page 121)
True
False
Similar to a designated router (DR) in OSPF, IS - IS elects a designated IS router (DIS). (page 122)
True
False
IS - IS does not elect a backup DR like OSPF does. (page 122)
True
False
IS - IS doesn't repeat the election process whenever a new router becomes active. (page 122)
True
False
A company may choose OSPF over IS - IS, because OSPF is more optimized and was designed exclusively as an IP routing protocol. (page 122)
True
False
The default OSPF metric is related to the interface bandwidth, while IS - IS defaults to a metric of 10 on all interfaces. (page 122)
True
False
{"name":"THE THREE LAYER NETWORK DESIGN", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"The three layer network design models are useful because they facilitate modularity such as? (page 12), In network services, the new network model provides remote services quickly and easily to all users. (page 13), What are the three types of network services? (page 13)","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker