Network Topology Concepts

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the role of a client in a computer network?

  • Runs on servers
  • Requests information from a server (correct)
  • Provides services to clients
  • Connects cable segments

Which device is considered a connectivity device in a network?

  • Network operating system (NOS)
  • Physical topology (correct)
  • Local-area network (LAN)
  • Wide-area network (WAN)

What does a network operating system (NOS) refer to?

  • Runs on servers
  • Provides services to clients
  • The operating system running on servers (correct)
  • Requests information from a server

In a network, what is the function of a wide-area network (WAN)?

<p>Interconnect LANs over a large geographic location (D)</p> Signup and view all the answers

What defines the characteristics of a network, including general cost considerations?

<p>Physical topology (A)</p> Signup and view all the answers

What is the primary function of the Access Layer in a network?

<p>Controls user and workgroup access to network resources (C)</p> Signup and view all the answers

What is the key advantage of a two-tier, spine-leaf network architecture?

<p>All of the above (D)</p> Signup and view all the answers

What is the primary function of spine switches in a two-tier, spine-leaf network architecture?

<p>Offer high-throughput, low-latency connections between leaf switches (D)</p> Signup and view all the answers

How do leaf switches differ from traditional top-of-rack (TOR) switches?

<p>Leaf switches have the increased capability of 40, 100, or 300Gbps uplinks to each spine switch (B)</p> Signup and view all the answers

What is the primary difference between on-premises infrastructure and cloud-based infrastructure?

<p>On-premises infrastructure is managed and maintained by the business, while cloud-based infrastructure is managed by a third-party provider (D)</p> Signup and view all the answers

What is the purpose of TRILL, SPB, or SDN protocols in a two-tier, spine-leaf network architecture?

<p>To enable the concurrent use of all uplink connections from each leaf switch to the spine switches (C)</p> Signup and view all the answers

What is the primary advantage of a private cloud over a public/enterprise cloud?

<p>Private clouds provide dedicated infrastructure owned by the organization (B)</p> Signup and view all the answers

What is the primary purpose of a firewall device in a SOHO LAN network?

<p>To filter out junk data packets coming from malicious computers (D)</p> Signup and view all the answers

What is the key function of a Software-Defined Wide Area Network (SD-WAN)?

<p>All of the above (D)</p> Signup and view all the answers

What is the primary role of a network interface card (NIC) in a computer?

<p>To connect a computer to a LAN (B)</p> Signup and view all the answers

Which statement best describes the role of a 'medium' in networking?

<p>The physical transport used to carry data between network devices (C)</p> Signup and view all the answers

What is the primary purpose of the Cisco IOS software in networking?

<p>To act as the most widely deployed network system software (C)</p> Signup and view all the answers

What is the primary function of the core layer in a 3-tier network architecture?

<p>To transport large amounts of traffic quickly and reliably (A)</p> Signup and view all the answers

Which topology connects all devices directly to each other, providing redundancy and fault tolerance?

<p>Full mesh topology (C)</p> Signup and view all the answers

What is the primary function of the distribution layer in a 3-tier network architecture?

<p>To provide routing, filtering, WAN access, and determine packet access to the core (A)</p> Signup and view all the answers

Which topology requires a terminator at the end of the cable to absorb the signal?

<p>Bus topology (D)</p> Signup and view all the answers

What component is responsible for connecting end devices to the network in a star topology?

<p>Any of the above (D)</p> Signup and view all the answers

In a ring topology, how do frames travel between nodes?

<p>Frames travel around the ring, stopping at each node (B)</p> Signup and view all the answers

What does the term 'Availability' refer to in the context of networks?

<p>The measure of the likelihood that the network will be accessible when needed (A)</p> Signup and view all the answers

Which of the following is NOT a class of attack mentioned in the text?

<p>Remote attack (C)</p> Signup and view all the answers

What type of attack focuses on malicious changes to hardware or software during manufacturing or distribution?

<p>Distribution attack (B)</p> Signup and view all the answers

Which of the following is an example of an Access Attack mentioned in the text?

<p>Man-in-the-middle attack (D)</p> Signup and view all the answers

What does the term 'Scalability' refer to in the context of networks?

<p>How well the network can accommodate more users and more data (A)</p> Signup and view all the answers

Which of the following is NOT mentioned as a type of attack in the text?

<p>Phishing attack (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

The Access Layer

  • Controls user and workgroup access to internetwork resources and handles remote service traffic.

Two-Tier, Spine-Leaf Architecture

  • Uses high-throughput, low-latency, and port-dense spine switches with direct high-speed connections to each leaf switch.
  • Leaf switches have increased capabilities, including 40, 100, or 300Gbps uplinks to each spine switch.

Advantages of Two-Tier, Spine-Leaf Architecture

  • Resiliency: Each leaf switch connects to every spine switch, enabling concurrent use of uplinks.
  • Latency: Maximum of 2 hops for any East-West packet flows, providing ultra-low latency.
  • Performance: True active-active uplinks enable traffic to flow over the least congested high-speed links.
  • Scalability: Ability to increase leaf switch quantity and add spine switches as needed.
  • Adaptability: Multiple spine-leaf networks can be connected and managed from a single pane of glass.

Cloud and Premises

  • Clouds On-premises: Infrastructure, services, and management are within the business on their own hardware and servers.
  • Client: A computer or program that requests information from a server.
  • Server: A computer or program that provides services or information to clients.

Network Fundamentals

  • Network Operating System (NOS): The operating system running on servers.
  • Connectivity Device: Any device that connects cable segments, connects two or more small networks, or divides a large network.
  • Local-Area Network (LAN): A network confined to a small geographic area.
  • Wide-Area Network (WAN): Interconnects LANs using leased carrier lines or satellite technology.

Network Characteristics

  • Cost: The general cost of network components, installation, and maintenance.
  • Physical Topology: A network's physical shape.
  • Logical Topology: The path that data takes from one computer to another.

WAN and SDWAN

  • WAN: A network that uses various links to connect smaller metropolitan and campus networks.
  • Software-Defined Wide Area Network (SDWAN): A virtual WAN architecture that securely connects users to applications.

Networking Fundamentals

  • Network Interface Card (NIC): Connects a computer to a LAN.
  • Medium: The physical transport used to carry data, such as a cable.
  • Protocol: A set of communication rules used by computer or network devices.
  • Cisco IOS Software: The most widely deployed network system software.

Network Topology

  • Defines how computers, printers, and network devices are connected.
  • Physical Topology: Defines the physical components of the network.
  • Logical Topology: Defines the data path of the network.
  • Bus Topology: Connects all devices using a single cable.
  • Star Topology: The most commonly used physical topology in Ethernet LAN.
  • Ring Topology: Hosts are connected in the form of a ring or circle.
  • Full Mesh Topology: Connects all devices to each other for redundancy and fault tolerance.

Network Architecture

  • 3 Tier Architecture: Consists of the Core Layer, Distribution Layer, and Access Layer.
  • Core Layer: The core of the network, responsible for transporting large amounts of traffic.
  • Distribution Layer: The communication point between the access layer and the core.
  • Security: Defines how secure the network and network data are.
  • Availability: The measure of the likelihood that the network will be available for use when required.
  • Scalability: How well the network can accommodate more users and more data.
  • Reliability: The dependability of the devices that make up the network.

Classes of Attacks

  • Passive: Attacks that capture and monitor unprotected communication and capture passwords.
  • Active: Attacks that actively try to break or bypass security devices.
  • Close-in: Attacks attempted by an individual in close physical proximity to networks or facilities.
  • Insider: Attacks that occur from authorized users inside a network.
  • Distribution: Attacks that focus on malicious changes to hardware or software during distribution.
  • Access Attacks: Exploit known web services, databases, operating systems, and authentication services.
  • Examples of Access Attacks: Password attacks, Port redirection, Man-in-the-middle attacks, Buffer overflow.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Network Topology Quiz
8 questions

Network Topology Quiz

LikeChalcedony2111 avatar
LikeChalcedony2111
Network Topology Basics
10 questions
Network Topology Types
11 questions
Use Quizgecko on...
Browser
Browser