SlideShare a Scribd company logo
1)What Is Topology?
A topology is a map of an internetwork that indicates network segments, interconnection points,
and user communities.
2)What is Hierarchial Topology?
A typical hierarchical topology is
■ A core layer of high-end routers and switches that are optimized for availability and
performance.
■ A distribution layer of routers and switches that implement policies. In small and
medium-sized organizations, the core and distribution layers can be combined.
■ An access layer that connects users via lower-end switches and wireless access points
3)What is the Roles ofHierarchial Model Layers?
Each layer of the hierarchical model has a specific role:
■ The core layer provides optimal transport between sites.
■ The distribution layer connects network services to the access layer and implements
policies regarding security, traffic loading
 In a WAN design, the access layer consists of the routers at the edge of the campus
networks. In a campus network, the access layer provides switches or hubs for enduser
access
4)What is Distribution Layer ofHierarchail Topology?
The distribution layer of the network is the demarcation point between the access and
core layers of the network. The distribution layer has many roles, including controlling
access to resources for security reasons and controlling network traffic that traverses theCore.
5)What is Access Layer in Hierarchial Topology?
The access layer provides users on local segments with access to the internetwork. The
access layer can include routers, switches, bridges, shared-media hubs, and wireless
access points.
6)What is Backdoor?
A backdoor is a connection between devices in the same layer. A backdoor can be an extra
router, bridge, or switch added to connect two networks. A backdoor can also be a hub.
7)What is Back Path?
Backup path consists of routers and switches and individual backup links
between routers and switches, which duplicate devices and links on the primary path.
8)What is MPPP?
The Multilink Point-to-Point Protocol (MPPP) is an Internet Engineering Task Force (IETF)
standard for channel aggregation. MPPP ensures that packets arrive in sequence at the receiving
router.
9)What is meant by SAFE?
SAFE is a reference architecture that network designers can use to simplify the complexity
of a large internetwork. The architecture lets you apply a modular approach to network
design. With SAFE, you can analyze the functional, logical, and physical components of
a network and thus simplify the process of designing an overall enterprise network.
10)What is Spanning Tree Protocal?
The Spanning Tree Protocol (STP), is a protocol and algorithm, documented in IEEE 802.1D, for
dynamically “pruning” an arbitrary topology of connected Layer 2 switches into a spanning
tree.
11)What are the states ofRSTP?
RSTP stands for Rapid Spanning Tree Protocol .
The states of RTSTP are:
1)Discarding
2)Learning
3)Forwarding.
12)What is Bandwidth Domain?
A bandwidth domain is a set of devices that share bandwidth and compete for
access to the bandwidth.
13)What is Broadcast domain & Broadcast Frame?
A broadcast domain is a set of devices that can all hear each other’s broadcast frames. A
broadcast frame is a frame that is sent to the MAC address FF:FF:FF:FF:FF:FF. By default,
switches do not divide broadcast domains
14)What is VLAN?
A virtual LAN (VLAN) is an emulation of a standard LAN that allows data transfer to
take place without the traditional physical restraints placed on a network. A VLAN is a
set of LAN devices that belong to an administrative group
15)Whjat is Hot Standby Mode?
Hot Standby mode is a mode that supports two access points being configured
to use the same channel in a single coverage area. Only one of the access points is
active. The standby access point passively monitors the network and the primary access
point
16)What is Storage Area network?
Storage-area network (SAN) are a popular solution for organizations seeking highly reliable,
uninterrupted access to large amounts of stored information.
17)What is HSRP?
HSRP stands for Hot Standby Router Protocol.HSRP works by creating a virtual router, also
called a phantom route. The virtual router has its own IP and MAC addresses. Each workstation
is configured to use the virtual router as its default gateway.
18)What is GLBP?
GLBP stands for Gateway Load Balancing Protocol .GLBP provides loadbalancing over
multiple routers using a single virtual IP address and multiple virtual MAC addresses. Each host
is configured with the same virtual IP address, and all routers in the virtual router group
participate in forwarding packets.
19)What is default Route?
A default route specifies where a packet should go if there is
no explicit entry for the destination network in a router’s routing table. The default route
is also sometimes called the gateway of last resort.
20)What is Virtual Private Networking?
Virtual private networks (VPN) are the networks which use advanced encryption and tunneling
to permit
organizations to establish secure, end-to-end, private network connections over a thirdparty
network.
21)What is meant by Firewall?
A firewall is a system or combination of systems that enforces a boundary between two
or more networks. A firewall can be a router with ACLs, a dedicated hardware box, or
software running on a PC or UNIX system. A firewall should be placed in the network
topology so that all traffic from outside the protected network must pass through the firewall.
22)What is meant by Buying Transit?
In common ISP relationship, is a provider-customer one, where a smaller ISP
pays a larger ISP for the privilege of sending traffic through the larger ISP’s network. This
is often called buying transit.
23) What is Campus Network?
 Campus network design topologies should meet a customer’s goals for availability and
performance by featuring small bandwidth domains, small broadcast domains, redundancy,
mirrored servers, and multiple ways for a workstation to reach a router for off-net
communications.
 Campus networks should be designed using a hierarchical, modular
approach so that the network offers good performance, maintainability, and scalability.
 A campus network consist of access, distribution, and core layers.
24)What are the modules ofSAFE architecture?
SAFE architecture comprises the following major modules:
 Core
 Data Center
 Campus
 Management
 WAN Edge
 Internet Edge
 Branches
 Extranet
 Partner Site
 E-Commerce
 Teleworker
 Cisco Sensor Base
25)What is meant By Core Layer?
 The core layer of a three-layer hierarchical topology is the high-speed backbone of the
internetwork. Because the core layer is critical for interconnectivity, you should design
 The core layer with redundant components.
 The core layer should be highly reliable and should adapt to changes quickly.

More Related Content

What's hot

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
skobu
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
Elanthendral Mariappan
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothi
divyajyothi405
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
International Journal for management Science and Technology - https://www.ijmst.com/
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
Abhishek Kona
 
Text compression
Text compressionText compression
Text compression
krishnagd22
 
AD-HOC NETWORK
AD-HOC NETWORKAD-HOC NETWORK
AD-HOC NETWORK
Harin Veera
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
Salahuddin Jokhio
 
Ad hoc networks introduction
Ad hoc networks   introductionAd hoc networks   introduction
Ad hoc networks introduction
Prof. Dr. Noman Islam
 
Lecture 3 4. prnet
Lecture 3 4. prnetLecture 3 4. prnet
Lecture 3 4. prnet
Chandra Meena
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
Monodip Singha Roy
 
Ad hoc Wireless Network
Ad hoc Wireless NetworkAd hoc Wireless Network
Ad hoc Wireless Network
Malik Zaib
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
Darpan Dekivadiya
 
Manet
ManetManet
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
Jayesh Rane
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
Chandra Meena
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
Thesis Scientist Private Limited
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
Vivek Maurya
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
Arunabh Mishra
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
Ipsita Sharma
 

What's hot (20)

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothi
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
 
Text compression
Text compressionText compression
Text compression
 
AD-HOC NETWORK
AD-HOC NETWORKAD-HOC NETWORK
AD-HOC NETWORK
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
Ad hoc networks introduction
Ad hoc networks   introductionAd hoc networks   introduction
Ad hoc networks introduction
 
Lecture 3 4. prnet
Lecture 3 4. prnetLecture 3 4. prnet
Lecture 3 4. prnet
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
Ad hoc Wireless Network
Ad hoc Wireless NetworkAd hoc Wireless Network
Ad hoc Wireless Network
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Manet
ManetManet
Manet
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 

Similar to Chapter 5 2 marks for PG PAWSN

Unit 4 for PG PAWSN
Unit 4 for PG PAWSNUnit 4 for PG PAWSN
Unit 4 for PG PAWSN
Dhaya kanthavel
 
2 Marks Questions And Answers MC1628 TCP IP Protocol Suite
2 Marks Questions And Answers MC1628   TCP IP Protocol Suite2 Marks Questions And Answers MC1628   TCP IP Protocol Suite
2 Marks Questions And Answers MC1628 TCP IP Protocol Suite
Scott Bou
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
csk selva
 
ROUTING
ROUTINGROUTING
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers Essay
Jennifer Letterman
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
Jatin Singh
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
MdmArfah Baharudin
 
Network architecture
Network architectureNetwork architecture
Network architecture
csk selva
 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questions
rajasekar1712
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
sulaiman_karim
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
prajapatidev644
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
FathimaFarsana9
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
jaba kumar
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
IOSR Journals
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
MohitKumarSingh71
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
IOSR Journals
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
IOSR Journals
 
Router (computing) : Notes
Router (computing) : NotesRouter (computing) : Notes
Router (computing) : Notes
Subhajit Sahu
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
5c4318d6e4b09da1ac668621_original.pdf
5c4318d6e4b09da1ac668621_original.pdf5c4318d6e4b09da1ac668621_original.pdf
5c4318d6e4b09da1ac668621_original.pdf
AsgarAlam6
 

Similar to Chapter 5 2 marks for PG PAWSN (20)

Unit 4 for PG PAWSN
Unit 4 for PG PAWSNUnit 4 for PG PAWSN
Unit 4 for PG PAWSN
 
2 Marks Questions And Answers MC1628 TCP IP Protocol Suite
2 Marks Questions And Answers MC1628   TCP IP Protocol Suite2 Marks Questions And Answers MC1628   TCP IP Protocol Suite
2 Marks Questions And Answers MC1628 TCP IP Protocol Suite
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
ROUTING
ROUTINGROUTING
ROUTING
 
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers Essay
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questions
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Router (computing) : Notes
Router (computing) : NotesRouter (computing) : Notes
Router (computing) : Notes
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
5c4318d6e4b09da1ac668621_original.pdf
5c4318d6e4b09da1ac668621_original.pdf5c4318d6e4b09da1ac668621_original.pdf
5c4318d6e4b09da1ac668621_original.pdf
 

Recently uploaded

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 

Recently uploaded (20)

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 

Chapter 5 2 marks for PG PAWSN

  • 1. 1)What Is Topology? A topology is a map of an internetwork that indicates network segments, interconnection points, and user communities. 2)What is Hierarchial Topology? A typical hierarchical topology is ■ A core layer of high-end routers and switches that are optimized for availability and performance. ■ A distribution layer of routers and switches that implement policies. In small and medium-sized organizations, the core and distribution layers can be combined. ■ An access layer that connects users via lower-end switches and wireless access points 3)What is the Roles ofHierarchial Model Layers? Each layer of the hierarchical model has a specific role: ■ The core layer provides optimal transport between sites. ■ The distribution layer connects network services to the access layer and implements policies regarding security, traffic loading  In a WAN design, the access layer consists of the routers at the edge of the campus networks. In a campus network, the access layer provides switches or hubs for enduser access 4)What is Distribution Layer ofHierarchail Topology? The distribution layer of the network is the demarcation point between the access and core layers of the network. The distribution layer has many roles, including controlling access to resources for security reasons and controlling network traffic that traverses theCore. 5)What is Access Layer in Hierarchial Topology? The access layer provides users on local segments with access to the internetwork. The access layer can include routers, switches, bridges, shared-media hubs, and wireless access points. 6)What is Backdoor? A backdoor is a connection between devices in the same layer. A backdoor can be an extra router, bridge, or switch added to connect two networks. A backdoor can also be a hub. 7)What is Back Path? Backup path consists of routers and switches and individual backup links between routers and switches, which duplicate devices and links on the primary path.
  • 2. 8)What is MPPP? The Multilink Point-to-Point Protocol (MPPP) is an Internet Engineering Task Force (IETF) standard for channel aggregation. MPPP ensures that packets arrive in sequence at the receiving router. 9)What is meant by SAFE? SAFE is a reference architecture that network designers can use to simplify the complexity of a large internetwork. The architecture lets you apply a modular approach to network design. With SAFE, you can analyze the functional, logical, and physical components of a network and thus simplify the process of designing an overall enterprise network. 10)What is Spanning Tree Protocal? The Spanning Tree Protocol (STP), is a protocol and algorithm, documented in IEEE 802.1D, for dynamically “pruning” an arbitrary topology of connected Layer 2 switches into a spanning tree. 11)What are the states ofRSTP? RSTP stands for Rapid Spanning Tree Protocol . The states of RTSTP are: 1)Discarding 2)Learning 3)Forwarding. 12)What is Bandwidth Domain? A bandwidth domain is a set of devices that share bandwidth and compete for access to the bandwidth. 13)What is Broadcast domain & Broadcast Frame? A broadcast domain is a set of devices that can all hear each other’s broadcast frames. A broadcast frame is a frame that is sent to the MAC address FF:FF:FF:FF:FF:FF. By default, switches do not divide broadcast domains 14)What is VLAN? A virtual LAN (VLAN) is an emulation of a standard LAN that allows data transfer to take place without the traditional physical restraints placed on a network. A VLAN is a set of LAN devices that belong to an administrative group 15)Whjat is Hot Standby Mode? Hot Standby mode is a mode that supports two access points being configured to use the same channel in a single coverage area. Only one of the access points is active. The standby access point passively monitors the network and the primary access point
  • 3. 16)What is Storage Area network? Storage-area network (SAN) are a popular solution for organizations seeking highly reliable, uninterrupted access to large amounts of stored information. 17)What is HSRP? HSRP stands for Hot Standby Router Protocol.HSRP works by creating a virtual router, also called a phantom route. The virtual router has its own IP and MAC addresses. Each workstation is configured to use the virtual router as its default gateway. 18)What is GLBP? GLBP stands for Gateway Load Balancing Protocol .GLBP provides loadbalancing over multiple routers using a single virtual IP address and multiple virtual MAC addresses. Each host is configured with the same virtual IP address, and all routers in the virtual router group participate in forwarding packets. 19)What is default Route? A default route specifies where a packet should go if there is no explicit entry for the destination network in a router’s routing table. The default route is also sometimes called the gateway of last resort. 20)What is Virtual Private Networking? Virtual private networks (VPN) are the networks which use advanced encryption and tunneling to permit organizations to establish secure, end-to-end, private network connections over a thirdparty network. 21)What is meant by Firewall? A firewall is a system or combination of systems that enforces a boundary between two or more networks. A firewall can be a router with ACLs, a dedicated hardware box, or software running on a PC or UNIX system. A firewall should be placed in the network topology so that all traffic from outside the protected network must pass through the firewall. 22)What is meant by Buying Transit? In common ISP relationship, is a provider-customer one, where a smaller ISP pays a larger ISP for the privilege of sending traffic through the larger ISP’s network. This is often called buying transit.
  • 4. 23) What is Campus Network?  Campus network design topologies should meet a customer’s goals for availability and performance by featuring small bandwidth domains, small broadcast domains, redundancy, mirrored servers, and multiple ways for a workstation to reach a router for off-net communications.  Campus networks should be designed using a hierarchical, modular approach so that the network offers good performance, maintainability, and scalability.  A campus network consist of access, distribution, and core layers. 24)What are the modules ofSAFE architecture? SAFE architecture comprises the following major modules:  Core  Data Center  Campus  Management  WAN Edge  Internet Edge  Branches  Extranet  Partner Site  E-Commerce  Teleworker  Cisco Sensor Base 25)What is meant By Core Layer?  The core layer of a three-layer hierarchical topology is the high-speed backbone of the internetwork. Because the core layer is critical for interconnectivity, you should design  The core layer with redundant components.  The core layer should be highly reliable and should adapt to changes quickly.