Suppose the link between routers 1 and 2 is down in the Internet shown in Figure 8-1 on page 289. What happens if someone at site C sends a message to a user on a workstation attached to the Ethernet cable at site A? What happens if the router at site A is down? What does this tell you about design- ing network configurations?
What will be an ideal response?
Instead of traffic going from site C to router 1 to router 2 and then to site
A, traffic goes from site C to router 1 to router 3 to router 2 and then to
site A.
Network configurations are flexible and adaptive if redundancy has been
designed in from the start.
You might also like to view...
A guest is the virtual machine using the host's ____ hardware resources.
A. simulated B. virtual C. physical D. logical
Creating and modifying page layouts in CSS involves specifying size and position information for web page elements.
Answer the following statement true (T) or false (F)
What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?
A. Internal virus B. Inside attack C. Hacking D. Social engineering
____ technique is also known as disk mirroring.?
A. ?RAID-0 B. ?RAID-1 C. ?RAID-3 D. ?RAID-5