EN02 Technical Fundamentals of Data Communications Networks
EN02 Technical Fundamentals of Data Communications Networks
• If the MAC address of packets changes frequently but the IP address is fixed, using
load balancing based on the source MAC address, destination MAC address, or both
can better balance traffic among physical links.
• If a load balancing mode does not match the actual service characteristics, traffic may
be unevenly load balanced. As a result, some member links may be heavily loaded,
while other member links are idle. For example, if the source and destination IP
addresses of packets change frequently but the source and destination MAC addresses
are fixed, choosing source and destination MAC addresses-based load balancing may
cause all traffic to be carried over only one member link.
• MSTP divides a switching network into multiple regions, each of which has multiple
spanning trees that are independent of each other.
• Binding multiple VLANs to a single MSTI reduces communication costs and resource
utilization.
• The topology of each MSTI is calculated independently, and traffic can be load
balanced among MSTIs.
• Multiple VLANs with the same topology can be mapped to a single MSTI. The
forwarding state of VLANs for an interface is determined by the interface state in the
MSTI.
• OSPF classifies networks into the following four types based on the link layer protocol
type. OSPF operations vary according to interface types.
▫ Broadcast
▫ Point-to-multipoint (P2MP)
▫ Point-to-point (P2P)
• In this example, spine and leaf nodes are connected using Ethernet interfaces, and
OSPF adjacency relationships are established using VLANIF interfaces. Therefore, the
network type of these interfaces is broadcast by default. During the establishment of
neighbor relationships, OSPF elects a designated router (DR) in each network segment,
which takes some time. However, this time-consuming DR election process is actually
unnecessary, because these links are actually point-to-point connections from a logical
point of view. To improve OSPF efficiency and speed up the establishment of adjacency
relationships, you can change the network type of the interconnection interfaces to
P2P.
• The Dynamic Host Configuration Protocol (DHCP) dynamically configures and
uniformly manages IP addresses of hosts. It simplifies network deployment and scale-
out, even for small networks.
• DHCP dynamically assigns an IP address to each host, instead of specifying a static IP
address for each host.
• DHCP also allocates other configuration parameters, such as the startup configuration
file to a client, so that the client can obtain all the required configuration information
through only one message.
• DHCP is defined in RFC 2131 and uses the client/server communication model. A DHCP
client requests configuration information from a DHCP server, and the server returns
the configuration information allocated to the client.
• DHCP supports dynamic and static IP address allocation. Network administrators can
use either mechanism to allocate IP addresses to hosts based on their network
requirements.
▫ Dynamic allocation: DHCP allocates an IP address with a limited validity period
(known as a lease) to a client. This mechanism applies to scenarios where hosts
temporarily access the network and the number of idle IP addresses is less than
the total number of hosts.
▫ Static allocation: DHCP allocates fixed IP addresses to clients as configured.
Compared with manual IP address configuration, DHCP static allocation prevents
manual configuration errors and enables unified maintenance and management.
• DHCP has the following benefits:
▫ Reduced client configuration and maintenance costs
▫ Centralized management
• Network Time Protocol (NTP) is an application layer protocol in the TCP/IP suite. NTP
synchronizes time between distributed time servers and clients. NTP is implemented
based on IP and UDP. NTP packets are transmitted over UDP using port 123.
▫ Incremental backup between the backup server and clients: Clocks on the backup
server and clients must be synchronized.
▫ System time: Some applications need to know the user login time and file
modification time.
▫ Action: Each rule contains a permit or deny action. ACLs are usually used
together with other technologies, and the meanings of the permit and deny
actions may vary according to scenarios.
• Data origin authentication: The receiver can authenticate the sender's identity.
• Data encryption: The sender encrypts data packets and transmits them in cipher text
over the Internet. The receiver decrypts or directly forwards the received data packets.
• Data integrity: The receiver verifies the received data to determine whether the packets
have been tampered with during transmission.
• Anti-replay: The receiver rejects old or duplicate data packets to prevent malicious
users from launching attacks by repeatedly sending obtained packets.
• The static VXLAN solution does not have a control plane. VTEP discovery and learning
of host information (including IP addresses, MAC addresses, VNIs, and gateway VTEP
IP addresses) are performed through traffic flooding on the data plane. As a result,
there is a lot of flooded traffic on VXLAN networks. To address this problem, EVPN is
introduced as the control plane of VXLAN. EVPN allows VTEPs to exchange BGP EVPN
routes to implement automatic VTEP discovery and host information advertisement,
preventing unnecessary traffic flooding.
▫ Remote MAC addresses can be learned only through broadcast ARP packets.
• Answer:
1. ACD
2. C