CNM 444 Enterprise Networks
True
The SDN application layer maps control layer service requests into specific commands and directives to data plane switches and supplies applications with information about data plane topology and activity.
True
The SDN data plane is where network forwarding devices perform the transport and processing of data according to decisions made by the SDN control plane.
5
The TCP/IP protocol architecture consists of __ layers.
Network applications, orchestration, and services
The __ layer of OpenDaylight consists of business and network logic applications that control and monitor network behavior.
Topology Manager
The __ maintains the topology information for the network and calculates routes in the network.
Event Handler
The __ module examines violation events and, depending on event type, either automatically invokes the policy enforcer or sends an action request to the network manager.
True
The application plane contains applications and services that define, monitor, and control network resources and behavior.
False
The basic building block of the logical switch architecture is the group table.
True
Hardware virtualization is the use of software to partition a computer's resources into separate and isolated entities called virtual machines.
False
The data forwarding function interacts with the SDN control layer to support programmability via resource-control interfaces.
True
The end user is the ultimate consumer of applications, data, and services on a computing platform.
True
The northbound interface enables applications to access control plane functions and services without needing to know the details of the underlying network switches.
Third Generation (3G)
The objective of the __ of wireless communication is to provide fairly high-speed wireless communications to support multimedia, data, and video in addition to voice.
True
In addition to northbound and southbound interfaces, a typical SDN controller will have an east/westbound interface that enables communication with other SDN controllers and other networks.
True
The routing function comprises a protocol for collecting information about the topology and traffic conditions of the network and an algorithm for designing routes through the network.
False
The southbound interface provides a uniform means for application developers and network managers to access SDN services and perform network management tasks.
Mobile data traffic Managed IP traffic Internet traffic
The three categories of mobile traffic are __. (Choose three correct answers.)
True
The traditional internetworking approach is based on the TCP/IP protocol architecture.
True
The two categories of routing protocols are interior router protocols (IRPs) and exterior router protocols (ERPs).
True
The virtual machine approach is a common way for businesses and individuals to deal with legacy applications and to optimize their hardware usage by maximizing the various kinds of applications that a single computer can handle.
True
The westbound interface enables applications to access control plane functions and services without needing to know the details of the underlying network switches.
True
Three key benefits of IP network convergence are cost savings, effectiveness, and transformation.
True
Traffic on the Internet and enterprise networks can be divided into two broad categories: elastic and inelastic.
True
Unlike some technology areas, such as Wi-Fi, there is no single standards body responsible for developing open standards for SDN and NFV.
True
Virtual machine enables different operating systems to run in the same computer at the same time and prevents application from interfering with each other.
True
Virtualization technologies effectively emulate or simulate a hardware platform, such as a server, storage device, or network resource, in software.
Inconsistent policies Vendor dependence Static, complex architecture Inability to scale
What are the four general limitations of traditional network architectures cited by the Open Networking Foundation? (Choose four correct answers.)
Group table Flow table Meter Table
What are the three types of tables in the logical switch architecture as defined by the OpenFlow specification? (Choose all correct answers.)
Unified communications
Whereas enterprise network convergence focuses on the consolidation of traditionally distinct voice, video, and data communications networks into a common infrastructure, __ focuses on the integration of real-time communication services to optimize business processes.
Service chaining Distributed architecture Management and orchestration
Which of the following are key NFV principles involved in creating practical network services? (Choose all correct answers.)
Backpressure Choke Packet Implicit Congestion Signaling
Which of the following is a congestion control technique? (Choose all correct answers.)
True
With information-centric networking (ICN), a distinction exists between location and identity. Ch5/6 End
Packet
A __ is a unit of data sent across a network.
True
A choke packet is a control packet generated at a congested node and transmitted back to a source node to restrict traffic flow.
True
A combination of Ethernet and Wi-Fi is currently the most common architecture found in the office environment.
Internet of Things
A dominant theme of the __ is the embedding of short-range mobile transceivers into a wide array of gadgets and everyday items, enabling new forms of communication between people and things, and between things themselves.
True
A flow is a sequence of packets traversing a network that share a set of header field values.
False
A machine running virtualization software can only host applications that are running on the same operating systems.
Packet Switching
A method of transmitting messages through a communications network in which long messages are subdivided into short packets is __.
High-availability cluster (HA)
A(n) __ is a multiple-computer architecture consisting of redundant network nodes that deliver a secondary or backup service when the primary service fails.
NOS
A(n) __ is a server-based operating system oriented to computer networking and may include directory services, network management, network monitoring, network policies, user group management, network security, and other network-related functions.
DDoS
A(n) __ is an attack in which multiple systems are used to flood servers or network devices or links with traffic in an attempt to overwhelm its available resources, making it unavailable to respond to legitimate users.
Network Provider
A(n) __ is an organization that delivers communications services over a typically large geographic area and provides, maintains, and manages network equipment and networks.
True
Actions describe packet forwarding, packet modification, and group table processing operations.
OpenFlow port
An __ is where packets enter and exit the OpenFlow pipeline.
True
An abstraction layer is a mechanism that translates a high-level request into the low-level commands required to perform the request.
True
An action set is a list of actions associated with a packet that are accumulated while the packet is processed by each table and that are executed when the packet exits the processing pipeline.
True
An example of a network services abstraction layer is the programming language Frenetic.
True
An example of application convergence is multimedia messaging.
True
Each group table consists of a number of rows, consisting of four components: group identifier, group type, counters, and action buckets.
True
The OpenFlow channel is the interface between an Open/Flow switch and an OpenFlow controller, and is used by the controller to manage the switch.
True
The OpenFlow protocol describes message exchanges that take place between an OpenFlow controller and an OpenFlow switch.
Variety/Variability Velocity Volume
Big data refers to the __ of structured and unstructured data pouring through networks into processors and storage devices, along with the conversion of such data into business advice for enterprises. (Choose all correct answers.)
Cloud Computing
Broad network access, rapid elasticity, measured service, on-demand self-service, and resource pooling are defined by NIST as the essential characteristics of __.
False
Cloud computing refers to everything that enables an organization to create, manipulate, and manage very large data sets and the facilities in which these are stored.
False
CloudNaaS primitives are not directly implemented within the cloud infrastructure itself, making CloudNaaS highly inefficient.
True
Cross-section bandwidth is the maximum bidirectional data rate that can pass between two parts of the network if it is divided into two equal halves.
True
Data transport and processing and control support are sublayers of the resource layer.
True
Deep packet inspection is analyzing network traffic to discover the type of application that sent the data.
True
Defense4All is an open SDN security application integrated into OpenDaylight.
True
PolicyCop uses the control plane of SDNs to monitor the compliance with QoS policies.
False
Products do not need to be certified by the Wi-Fi Alliance to be designated as Wi-Fi.
True
QoS without QoE is not sufficient to provide adequate service to the user for multimedia applications.
True
REpresentational State Transfer (REST) is an architectural style used to define APIs.
False
RFC is the coordinating committee for Internet design, engineering, and management.
False
The OpenFlow protocol enables the controller to manage the logical structure of a switch with regard to the details of how the switch implements the OpenFlow logical architecture. Ch3/4 End
Event-based messages Encapsulated packets Flow statistics
The OpenFlow protocol provides the SDN controller with which types of information to be used in managing the network? (Choose all correct answers.)
True
Standards are documents that provide requirements, specifications, guidelines, or characteristics that can be used consistently to ensure that materials, products, processes, and services are fit for their purpose.
False
The IoT is a massive system consisting of seven layers, all of which are essential to an effective use of the IoT concept.
True
The NFV framework consists of three domains of operation: virtualized network functions, NFV infrastructure, and NFV management and orchestration.
Adaptability, integrated security, and on-demand scaling
The Open Data Center Alliance (ODCA) lists __ as principal requirements for a modern networking approach.
Forwarding
The OpenFlow API is an example of a __ abstraction.
Asynchronous Symmetric Controller to switch
The OpenFlow protocol supports __ messages. (Choose all correct answers.)
Data Forwarding Function
__ accepts incoming data flows from other network devices and end systems and forwards them along the data forwarding paths that have been computed and established according to the rules defined by the SDN applications.
Core networks Distribution networks Access networks
__ comprise a typical network hierarchy. (Choose all correct answers.)
PolicyCop
__ consists of eleven software modules and two databases; it monitors the network to detect policy violations and reconfigures the network to reinforce the violated policy.
Hardware Virtualization
__ enables multiple copies of the same or different operating system to execute on the computer and prevents applications from different virtual machines from interfering with each other.
ETSI
__ is a EU-sponsored standards organization that produces globally applicable standards for information and communications technologies.
ITU-T
__ is a United Nations agency that produces recommendations with a view to standardizing telecommunication on a worldwide basis.
Cloud Network as a Service
__ is a cloud networking system that exploits OpenFlow SDN capabilities to provide a greater degree of control over cloud network functions by the cloud customer.
IEEE 802
__ is a committee of the Institute of Electrical and Electronics Engineers responsible for developing standards for wireless LANs.
Uniform resource identifier (URI)
__ is a compact sequence of characters that identifies an abstract or physical resource.
ODCA
__ is a consortium of leading IT organizations developing interoperable solutions and services for cloud computing.
Exterior Router Protocol
__ is a generic term for a protocol that distributes routing information to collaborating routers that connect autonomous systems.
Application programming interface
__ is a language and message format used by an application program to communicate with the operating system or some other control program such as a database management system or communications protocol.
Traffic Engineering
__ is a method for dynamically analyzing, regulating, and predicting the behavior of data flowing in networks with the aim of performance optimization to meet service level agreements.
Autonomous System
__ is a network that is administered by a single set of management rules that are controlled by one person, group, or organization.
Flow
__ is a sequence of packets between a source and destination that are recognized by the network as related and are treated in a uniform fashion.
Abstraction Application support Orchestration
__ is a sublayer of the SDN control layer. (Choose all correct answers.)
Container virtualization
__ is a technique where the underlying operating environment of an application is virtualized.
Virtualization
__ is a variety of technologies for managing computer resources by providing an abstraction layer between the software and the physical hardware.
SDN
__ is an approach to designing, building and operating large-scale networks based on programming the forwarding decisions in routers and switches via software from a central server.
ONF
__ is an industry consortium dedicated to the promotion and adoption of SDN through open standard development.
Ethernet
__ is the commercial name for a wired local-area network technology.
QoS
__ is the measurable end-to-end performance properties of a network service that can be guaranteed in advance by a service level agreement between a user and a service provider, so as to satisfy specific customer application requirements.
Network Convergence
__ is the provision of telephone, video, and data communication services within a single network.
Delay Jitter
__ is the variation in delay associated with the transfer of packets between two points, and is typically measured as the maximum variation in delay experienced by packets in a single session.
NFV
__ is the virtualization of network functions by implementing these functions in software and running them on virtual machines. Ch1/2 End
Elastic
__ traffic can adjust, over wide ranges, to changes in delay and throughput across an internet and still meet the needs of its applications.
Elastic
__ traffic does not easily adapt, if at all, to changes in delay and throughput across an internet.
