To identify the default gateway
To assign a fallback IP address
To supply the specific WLAN controllers IP address
To supply the specific NAME server IP address
The subnet can accommodate 20 hosts per network
/20 is the prefix length: the first 20 bits are the network address; the remaining 12 bits are the host portion
This subnet is the 20th usable range
This IP address is the 20th usable IP in the range
Large amounts of broadcast traffic consume resources.
All PCs share the same collision domain.
Layer 3 routing overhead is high.
It is difficult to apply security policies because there are no boundaries between devices.
2 usable subnets and 126 hosts per subnet
4 usable subnets and 62 hosts per subnet
8 usable subnets and 30 hosts per subnet
16 usable subnets and 14 hosts per subnet
32 usable subnets and 6 hosts per subnet
Layer 2 routing protocol
Layer 2 loop prevention protocol
Layer 2 frame speed double verification protocol
Layer 3 routing protocol
STP is used to defend against spoofing attacks.
STP is used to maintain the VLAN configuration consistency across the Layer 2 network.
STP is used to prevent loops from being formed when switches or bridges are interconnected via multiple paths across the Layer 2 network.
STP is used to negotiate whether an interconnection between two switches should be put into access or trunk mode.
STP is used to detect the loss of bidirectional communication on a link.
Lightweight access points are self-contained, each offering one or more fully functional BSSs.
Standalone access points can be configured one-by-one and offer complete functionality by themselves.
Lightweight access points rely on a central wireless LAN controller to retrieve their configurations.
Lightweight access points are also known as autonomous access points.
Here's an interesting quiz for you.