CNM 444 Enterprise Networks

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

True

The SDN application layer maps control layer service requests into specific commands and directives to data plane switches and supplies applications with information about data plane topology and activity.

True

The SDN data plane is where network forwarding devices perform the transport and processing of data according to decisions made by the SDN control plane.

5

The TCP/IP protocol architecture consists of __ layers.

Network applications, orchestration, and services

The __ layer of OpenDaylight consists of business and network logic applications that control and monitor network behavior.

Topology Manager

The __ maintains the topology information for the network and calculates routes in the network.

Event Handler

The __ module examines violation events and, depending on event type, either automatically invokes the policy enforcer or sends an action request to the network manager.

True

The application plane contains applications and services that define, monitor, and control network resources and behavior.

False

The basic building block of the logical switch architecture is the group table.

True

Hardware virtualization is the use of software to partition a computer's resources into separate and isolated entities called virtual machines.

False

The data forwarding function interacts with the SDN control layer to support programmability via resource-control interfaces.

True

The end user is the ultimate consumer of applications, data, and services on a computing platform.

True

The northbound interface enables applications to access control plane functions and services without needing to know the details of the underlying network switches.

Third Generation (3G)

The objective of the __ of wireless communication is to provide fairly high-speed wireless communications to support multimedia, data, and video in addition to voice.

True

In addition to northbound and southbound interfaces, a typical SDN controller will have an east/westbound interface that enables communication with other SDN controllers and other networks.

True

The routing function comprises a protocol for collecting information about the topology and traffic conditions of the network and an algorithm for designing routes through the network.

False

The southbound interface provides a uniform means for application developers and network managers to access SDN services and perform network management tasks.

Mobile data traffic Managed IP traffic Internet traffic

The three categories of mobile traffic are __. (Choose three correct answers.)

True

The traditional internetworking approach is based on the TCP/IP protocol architecture.

True

The two categories of routing protocols are interior router protocols (IRPs) and exterior router protocols (ERPs).

True

The virtual machine approach is a common way for businesses and individuals to deal with legacy applications and to optimize their hardware usage by maximizing the various kinds of applications that a single computer can handle.

True

The westbound interface enables applications to access control plane functions and services without needing to know the details of the underlying network switches.

True

Three key benefits of IP network convergence are cost savings, effectiveness, and transformation.

True

Traffic on the Internet and enterprise networks can be divided into two broad categories: elastic and inelastic.

True

Unlike some technology areas, such as Wi-Fi, there is no single standards body responsible for developing open standards for SDN and NFV.

True

Virtual machine enables different operating systems to run in the same computer at the same time and prevents application from interfering with each other.

True

Virtualization technologies effectively emulate or simulate a hardware platform, such as a server, storage device, or network resource, in software.

Inconsistent policies Vendor dependence Static, complex architecture Inability to scale

What are the four general limitations of traditional network architectures cited by the Open Networking Foundation? (Choose four correct answers.)

Group table Flow table Meter Table

What are the three types of tables in the logical switch architecture as defined by the OpenFlow specification? (Choose all correct answers.)

Unified communications

Whereas enterprise network convergence focuses on the consolidation of traditionally distinct voice, video, and data communications networks into a common infrastructure, __ focuses on the integration of real-time communication services to optimize business processes.

Service chaining Distributed architecture Management and orchestration

Which of the following are key NFV principles involved in creating practical network services? (Choose all correct answers.)

Backpressure Choke Packet Implicit Congestion Signaling

Which of the following is a congestion control technique? (Choose all correct answers.)

True

With information-centric networking (ICN), a distinction exists between location and identity. Ch5/6 End

Packet

A __ is a unit of data sent across a network.

True

A choke packet is a control packet generated at a congested node and transmitted back to a source node to restrict traffic flow.

True

A combination of Ethernet and Wi-Fi is currently the most common architecture found in the office environment.

Internet of Things

A dominant theme of the __ is the embedding of short-range mobile transceivers into a wide array of gadgets and everyday items, enabling new forms of communication between people and things, and between things themselves.

True

A flow is a sequence of packets traversing a network that share a set of header field values.

False

A machine running virtualization software can only host applications that are running on the same operating systems.

Packet Switching

A method of transmitting messages through a communications network in which long messages are subdivided into short packets is __.

High-availability cluster (HA)

A(n) __ is a multiple-computer architecture consisting of redundant network nodes that deliver a secondary or backup service when the primary service fails.

NOS

A(n) __ is a server-based operating system oriented to computer networking and may include directory services, network management, network monitoring, network policies, user group management, network security, and other network-related functions.

DDoS

A(n) __ is an attack in which multiple systems are used to flood servers or network devices or links with traffic in an attempt to overwhelm its available resources, making it unavailable to respond to legitimate users.

Network Provider

A(n) __ is an organization that delivers communications services over a typically large geographic area and provides, maintains, and manages network equipment and networks.

True

Actions describe packet forwarding, packet modification, and group table processing operations.

OpenFlow port

An __ is where packets enter and exit the OpenFlow pipeline.

True

An abstraction layer is a mechanism that translates a high-level request into the low-level commands required to perform the request.

True

An action set is a list of actions associated with a packet that are accumulated while the packet is processed by each table and that are executed when the packet exits the processing pipeline.

True

An example of a network services abstraction layer is the programming language Frenetic.

True

An example of application convergence is multimedia messaging.

True

Each group table consists of a number of rows, consisting of four components: group identifier, group type, counters, and action buckets.

True

The OpenFlow channel is the interface between an Open/Flow switch and an OpenFlow controller, and is used by the controller to manage the switch.

True

The OpenFlow protocol describes message exchanges that take place between an OpenFlow controller and an OpenFlow switch.

Variety/Variability Velocity Volume

Big data refers to the __ of structured and unstructured data pouring through networks into processors and storage devices, along with the conversion of such data into business advice for enterprises. (Choose all correct answers.)

Cloud Computing

Broad network access, rapid elasticity, measured service, on-demand self-service, and resource pooling are defined by NIST as the essential characteristics of __.

False

Cloud computing refers to everything that enables an organization to create, manipulate, and manage very large data sets and the facilities in which these are stored.

False

CloudNaaS primitives are not directly implemented within the cloud infrastructure itself, making CloudNaaS highly inefficient.

True

Cross-section bandwidth is the maximum bidirectional data rate that can pass between two parts of the network if it is divided into two equal halves.

True

Data transport and processing and control support are sublayers of the resource layer.

True

Deep packet inspection is analyzing network traffic to discover the type of application that sent the data.

True

Defense4All is an open SDN security application integrated into OpenDaylight.

True

PolicyCop uses the control plane of SDNs to monitor the compliance with QoS policies.

False

Products do not need to be certified by the Wi-Fi Alliance to be designated as Wi-Fi.

True

QoS without QoE is not sufficient to provide adequate service to the user for multimedia applications.

True

REpresentational State Transfer (REST) is an architectural style used to define APIs.

False

RFC is the coordinating committee for Internet design, engineering, and management.

False

The OpenFlow protocol enables the controller to manage the logical structure of a switch with regard to the details of how the switch implements the OpenFlow logical architecture. Ch3/4 End

Event-based messages Encapsulated packets Flow statistics

The OpenFlow protocol provides the SDN controller with which types of information to be used in managing the network? (Choose all correct answers.)

True

Standards are documents that provide requirements, specifications, guidelines, or characteristics that can be used consistently to ensure that materials, products, processes, and services are fit for their purpose.

False

The IoT is a massive system consisting of seven layers, all of which are essential to an effective use of the IoT concept.

True

The NFV framework consists of three domains of operation: virtualized network functions, NFV infrastructure, and NFV management and orchestration.

Adaptability, integrated security, and on-demand scaling

The Open Data Center Alliance (ODCA) lists __ as principal requirements for a modern networking approach.

Forwarding

The OpenFlow API is an example of a __ abstraction.

Asynchronous Symmetric Controller to switch

The OpenFlow protocol supports __ messages. (Choose all correct answers.)

Data Forwarding Function

__ accepts incoming data flows from other network devices and end systems and forwards them along the data forwarding paths that have been computed and established according to the rules defined by the SDN applications.

Core networks Distribution networks Access networks

__ comprise a typical network hierarchy. (Choose all correct answers.)

PolicyCop

__ consists of eleven software modules and two databases; it monitors the network to detect policy violations and reconfigures the network to reinforce the violated policy.

Hardware Virtualization

__ enables multiple copies of the same or different operating system to execute on the computer and prevents applications from different virtual machines from interfering with each other.

ETSI

__ is a EU-sponsored standards organization that produces globally applicable standards for information and communications technologies.

ITU-T

__ is a United Nations agency that produces recommendations with a view to standardizing telecommunication on a worldwide basis.

Cloud Network as a Service

__ is a cloud networking system that exploits OpenFlow SDN capabilities to provide a greater degree of control over cloud network functions by the cloud customer.

IEEE 802

__ is a committee of the Institute of Electrical and Electronics Engineers responsible for developing standards for wireless LANs.

Uniform resource identifier (URI)

__ is a compact sequence of characters that identifies an abstract or physical resource.

ODCA

__ is a consortium of leading IT organizations developing interoperable solutions and services for cloud computing.

Exterior Router Protocol

__ is a generic term for a protocol that distributes routing information to collaborating routers that connect autonomous systems.

Application programming interface

__ is a language and message format used by an application program to communicate with the operating system or some other control program such as a database management system or communications protocol.

Traffic Engineering

__ is a method for dynamically analyzing, regulating, and predicting the behavior of data flowing in networks with the aim of performance optimization to meet service level agreements.

Autonomous System

__ is a network that is administered by a single set of management rules that are controlled by one person, group, or organization.

Flow

__ is a sequence of packets between a source and destination that are recognized by the network as related and are treated in a uniform fashion.

Abstraction Application support Orchestration

__ is a sublayer of the SDN control layer. (Choose all correct answers.)

Container virtualization

__ is a technique where the underlying operating environment of an application is virtualized.

Virtualization

__ is a variety of technologies for managing computer resources by providing an abstraction layer between the software and the physical hardware.

SDN

__ is an approach to designing, building and operating large-scale networks based on programming the forwarding decisions in routers and switches via software from a central server.

ONF

__ is an industry consortium dedicated to the promotion and adoption of SDN through open standard development.

Ethernet

__ is the commercial name for a wired local-area network technology.

QoS

__ is the measurable end-to-end performance properties of a network service that can be guaranteed in advance by a service level agreement between a user and a service provider, so as to satisfy specific customer application requirements.

Network Convergence

__ is the provision of telephone, video, and data communication services within a single network.

Delay Jitter

__ is the variation in delay associated with the transfer of packets between two points, and is typically measured as the maximum variation in delay experienced by packets in a single session.

NFV

__ is the virtualization of network functions by implementing these functions in software and running them on virtual machines. Ch1/2 End

Elastic

__ traffic can adjust, over wide ranges, to changes in delay and throughput across an internet and still meet the needs of its applications.

Elastic

__ traffic does not easily adapt, if at all, to changes in delay and throughput across an internet.


Ensembles d'études connexes

NJ Insurance Prep (Chapter One Reading)

View Set

Chapter 8 Knowledge Review- Nutrition

View Set