Ch. 8 Internetworking Review

ExquisiteAmetrine avatar
ExquisiteAmetrine
·
·
Download

Start Quiz

Study Flashcards

33 Questions

Internetworking is the seamless transfer of information throughout an ______, even if that enterprise has plants and offices throughout the world

enterprise

Most internetworking deployments are generally based on established ______, or standards to be, and that is the rationale for this chapter

standards

A Layer 2 device reads the data link information and uses it to perform some ______

action

Both devices read the packet’s Layer 2 destination address, the physical ______

address

The ______ method enables bridges to detect and eliminate network loops

standardized

The algorithm used to create the tree and to locate devices within the tree structure uses this ID ______ Tree Algorithm

Spanning

A configuration message should have three parts: Number of ______

hops

The lowest ID is the ______ and the concept of configuration messages

root

Most industrial bridges and switches use a slightly different algorithm called the rapid spanning ______ algorithm

tree

Redundant industrial Ethernet networks, or any other redundant network dedicated to industrial requirements, are generally ______-specific implementations

vendor

This includes having their packets go other ______

places

Layer 3 is where you find the network you want to address and where you find out how to route to the ______ you want

location

If the decimal value of the two Type/Length octets is fewer than 1500 decimal, it is expected that the 802.2 control octets ______

follow

If the two octets are more than 1500 decimal, the frame is a ______-802

non-802

Exterior Gateway Protocols (BGP) are used for routing between _______ systems and between Internet Service Providers.

autonomous

RIP is a _______ vector protocol using hop count and requires less CPU power, but can be inefficient.

distance

OSPF uses link state flooding and supports CIDR variable length _______ masks.

subnet

RIP is a distance vector protocol using hop count, which broadcasts full lists of routes every _______ seconds.

60

Open Shortest Path First (OSPF) is an example of a _______ state protocol.

link

Routers can use separate or shared databases for each _______.

protocol

Routers provide segmentation, reliability, and fast _______.

convergence

Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the _______ level, and level 2 routers talk to designated level 1 routers at the area level.

backbone

VLANs can be used to group end nodes into separate _______ and create a quarantine if needed.

domains

There are other internetworking devices, such as _______ , and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.

gateways

VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a _______.

VPN

PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or _______ v1/v2.

MS-CHAP

A switch reads the Layer 2 address and then uses an electronic switch to move the information to the addressed location. The switch consists of a processor, or processors, and an electronic crossbar that replaces the collapsed bus in a hub; this electronic crossbar is the ______.

switching fabric

Modern Ethernet switches can auto-detect speeds and perform conversions for 10 Mbps, 100 Mbps, and 1000 Mbps Ethernet. A bridge is a device that contains two sets of Layer 1 and 2 functions and connects network segments of the same type. If the bridge is transmitting, it develops a cyclic redundant check character , also called a frame check sequence , and appends it to the transmitted packet payload. The bridge uses an internal table, called a bridge table, to determine which side of the bridge the devices reside on. Regardless of the type, all bridges perform the following functions: Forwarding ______.

Filtering

Two methods are used to reduce the number of collisions on a many-node shared network segment: increasing the data speed or using a bridge to break up the collision domain into smaller domains. Several different devices are called bridges; some actually are bridges, and some are not. In general, bridges are classified as: ______.

Static

The learning bridge is the contemporary model bridge. Learning bridges are dynamic, in that changes are identified and reflected within a short time period. On systems running the Transmission Control Protocol/Internet Protocol suite of protocols, the Address Resolution Protocol can be used to populate the bridge tables. Transparent bridging is the easiest from the user’s point of view as there are no computations other than the spanning tree algorithm for the user to implement. In many cases, transparent bridging only applies to Ethernet and there are a host of other network protocols, particularly in industrial networking, that must be interconnected on a Layer 1/Layer 2 basis ______.

Translating

A translating bridge passes packets between two different networks, such as 802.3 and 802. A translating bridge must change between big endian and little endian transmission, different packet sizes , and different bridging techniques. The 802.5 network also uses source routing , a different concept than transparent bridging, which requires translation between the two bridging techniques: transparent and source routing. Used in token ring networks, a source route bridge places the Layer 2 packet routing and loop detection on the client, rather than on the bridge. Source routing is not as efficient as the spanning tree algorithm because it depends on the client, rather than the bridge ______.

Source Route Bridge

A bridge operates in “promiscuous” mode. Filtering means the bridge matches a packet to its bridge table. This produces one of three results: the match is on the same port, the match is on a different port, or there is no match. Referring to figure 8-2, note that when the bridge receives a packet from workstation 06-fe-01-c3-24-78 for delivery to workstation 06-fe-01-10-00-f4, it looks in the bridge table and it finds a match—on the same port. Then the bridge blocks the packet, preventing the packet from crossing the bridge. The bridge takes two actions on this packet: it prevents it from travelling across the bridge and it checks the CRCC. Referring to figure 8-2, note that if the bridge receives a packet from workstation 06-fe-01-35-c2-ce for delivery to workstation 06-fe-01-c324-78, it finds a match in the table— on a different port. The bridge therefore forwards the packet across the bridge and it checks the CRCC. Referring to figure 8-3, if the bridge receives a packet with a destination address that cannot be found in the bridge table , the bridge floods— sends the packet to—all of the available ports except the port where the packet originated. A two-port bridge would merely forward to the other port; bridges with three or more ports would flood this packet to all ports in the hopes of obtaining an answer from one of them. The method used to accomplish loop elimination in a transparent bridge is the ______.

Spanning Tree Algorithm

A switch reads the data link addresses, just as a bridge does, and determines which port to connect. A switch should be considered to be a multi-port bridge. For both switches and bridges, there are some considerations that must be taken into account with complex connections. A bridge operates in ______ mode.

promiscuous

Study Notes

  • Router actions: when a router receives a packet for another network, it creates a route and hands off the packet to the next router, changing Layer 2 addresses.
  • Exterior Gateway Protocols (BGP): used for routing between autonomous systems and between Internet Service Providers. Requires a 16-bit Autonomous System Number and communicates between border routers.
  • Interior Gateway Protocols: used for exchanging routing information within networks, such as RIP and OSPF. RIP is a distance vector protocol using hop count and requires less CPU power, but can be inefficient. OSPF uses link state flooding and supports CIDR variable length subnet masks.
  • Routing Information Protocol (RIP): a distance vector protocol using hop count, which broadcasts full lists of routes every 60 seconds.
  • Link State Protocols: use more information than hop count and converge faster. Open Shortest Path First (OSPF) is an example of a link state protocol.
  • Routers can use separate or shared databases for each protocol.
  • Routers can be designated as the reference router for others to synchronize their topology maps.
  • Routers provide segmentation, reliability, and fast convergence.
  • Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the backbone level, and level 2 routers talk to designated level 1 routers at the area level.
  • Routers may have one-to-one, one-to-many, or many-to-one I/Os.
  • VLANs can be used to group end nodes into separate domains and create a quarantine if needed.
  • Managed switches have varying features and configuration interfaces, and security and performance are being improved.
  • There are other internetworking devices, such as gateways, and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
  • VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a VPN.
  • PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or MS-CHAP v1/v2.

Test your knowledge of networking and routing protocols with this quiz. Explore concepts such as router actions, BGP, interior and exterior gateway protocols, VLANs, managed switches, hierarchies, internetworking devices, and VPN technologies.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser