1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
15

Describe the main roles of the communication layer, the network-wide state-management layer, and the network-control application

layer in an SDN controller.
Computers and Technology
1 answer:
mylen [45]3 years ago
6 0

Answer:

1.

Role of communication layer:

-it has the responsibility of transferring information among network controlled devices.

-it provides up to date view of the state of the network to SDN controller which shows that a new device has being added to the network as well as the link that was attached being non-existent.

2.

Role of network wide state management layer:

-it is responsible for the controller having the network's state information

-it also helps in the making of ultimate control decisions.

c

role of network control application layer:

- It is responsible for the reading and also the writing of the state of the network as well as flow tables which are in the layer of state management.

- It also notifies of changes such as state-event change. this helps to take actions with regards to the event notification.

You might be interested in
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
3 years ago
Why is Brainly always deleting either my answers or my questions? I am putting nothing inappropriate in them. Can someone answer
Artist 52 [7]

Answer:

hey i do not know

Explanation:

3 0
3 years ago
Read 2 more answers
Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the
irakobra [83]

Answer:

Option A.

Explanation:

7 0
3 years ago
Which of the following strategies will help you to stay focused and on topic while writing your essay?
AveGali [126]

Answer:

the answer is D,both A and B

8 0
3 years ago
Read 2 more answers
Which mechanism transmits rotary motion to reciprocating?
weqwewe [10]
The mechanism transmits rotary motion to reciprocating is the crank and slider. <span>A crank and slider mechanism changes straight-line motion into rotation motion. Typically found in piston engines or piston pumps, this design consists of a rod that connects to a rotating driving beam and a sliding body.</span>
5 0
3 years ago
Other questions:
  • Select the proper ergonomic keyboarding techniques.
    9·1 answer
  • What does subscribing to a website’s RSS feed provide to a subscriber?
    10·1 answer
  • "The pkill command terminates _________."
    14·1 answer
  • How do most database users perform data searches?
    6·1 answer
  • The main purpose of a constructor is to initialize the data members at the moment that an object is created. true or false?
    8·1 answer
  • How can you add contrast between text and headlines in a document? increase the font size of the headline make the headline long
    6·1 answer
  • You can change the transparency of a picture used as a slide’s background with the ____.
    10·1 answer
  • What are rules that enforce basic and fundamental information-based constraints?
    12·1 answer
  • What's the drawback of using Screened Subnet (DMZ)?
    12·1 answer
  • Consumer consequences for illegally downloading software
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!