Designing Scalable Networks

Table of Contents

Table of Contents

Module 2 - Design the Network Structure

Section 5 - Select Routing and Bridging Protocols

Solution

The correct answers are selected in the pull-down menus.

    10. This protocol can be compromised because the routing updates are easy to read with a protocol analyzer
          and an unsophisticated hacker can send invalid routing updates that routers will accept.

    11. Cisco refined the implementation of this protocol in May 1996 to increase stability in environments with
          many  low-speed  links in NBMA WANs such as Frame Relay, ATM, or X.25 backbones, and in highly
          redundant dense router-router peering configurations.
    12. If a customer wants a protocol with fast convergence that can scale to hundreds of networks, and that will
          fit well with a  hierarchical topology, you should recommend this protocol.


If you want to view the solutions at the same time, open a new browser window, so you can view two windows at the same time.

Click on the Back button in your browser to review Section 5 of Module 2. If you are finished with that section, click here if you are ready to advance to the case studies.


Copyright Cisco Systems, Inc. -- Version 2.0 7/98