O'Reilly logo

Router Security Strategies: Securing IP Network Traffic Planes by David J. Smith - CCIE No. 1986, Gregg Schudel - CCIE No. 9591

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Answers to Chapter Review Questions

Chapter 1

1 • IP is connectionless.

• IP provides end-to-end and any-to-any connectivity.

• IP performs everything in-band whereas legacy protocols tend to have separate control channel and data channel mechanisms.

2 Building and operating IP network infrastructures for converged services that meet carrier-class requirements must consider multiple, diverse services that have distinct bandwidth, jitter, and latency requirements. In addition, the interactions between these services must be considered as they may affect one another, along with the scale and security requirements.

3Transit IP packets: Any IP packet that has a destination IP address that is not one considered to be owned by the forwarding ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required