Ch. 8 Internetworking Review
33 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Internetworking is the seamless transfer of information throughout an ______, even if that enterprise has plants and offices throughout the world

enterprise

Most internetworking deployments are generally based on established ______, or standards to be, and that is the rationale for this chapter

standards

A Layer 2 device reads the data link information and uses it to perform some ______

action

Both devices read the packet’s Layer 2 destination address, the physical ______

<p>address</p> Signup and view all the answers

The ______ method enables bridges to detect and eliminate network loops

<p>standardized</p> Signup and view all the answers

The algorithm used to create the tree and to locate devices within the tree structure uses this ID ______ Tree Algorithm

<p>Spanning</p> Signup and view all the answers

A configuration message should have three parts: Number of ______

<p>hops</p> Signup and view all the answers

The lowest ID is the ______ and the concept of configuration messages

<p>root</p> Signup and view all the answers

Most industrial bridges and switches use a slightly different algorithm called the rapid spanning ______ algorithm

<p>tree</p> Signup and view all the answers

Redundant industrial Ethernet networks, or any other redundant network dedicated to industrial requirements, are generally ______-specific implementations

<p>vendor</p> Signup and view all the answers

This includes having their packets go other ______

<p>places</p> Signup and view all the answers

Layer 3 is where you find the network you want to address and where you find out how to route to the ______ you want

<p>location</p> Signup and view all the answers

If the decimal value of the two Type/Length octets is fewer than 1500 decimal, it is expected that the 802.2 control octets ______

<p>follow</p> Signup and view all the answers

If the two octets are more than 1500 decimal, the frame is a ______-802

<p>non-802</p> Signup and view all the answers

Exterior Gateway Protocols (BGP) are used for routing between _______ systems and between Internet Service Providers.

<p>autonomous</p> Signup and view all the answers

RIP is a _______ vector protocol using hop count and requires less CPU power, but can be inefficient.

<p>distance</p> Signup and view all the answers

OSPF uses link state flooding and supports CIDR variable length _______ masks.

<p>subnet</p> Signup and view all the answers

RIP is a distance vector protocol using hop count, which broadcasts full lists of routes every _______ seconds.

<p>60</p> Signup and view all the answers

Open Shortest Path First (OSPF) is an example of a _______ state protocol.

<p>link</p> Signup and view all the answers

Routers can use separate or shared databases for each _______.

<p>protocol</p> Signup and view all the answers

Routers provide segmentation, reliability, and fast _______.

<p>convergence</p> Signup and view all the answers

Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the _______ level, and level 2 routers talk to designated level 1 routers at the area level.

<p>backbone</p> Signup and view all the answers

VLANs can be used to group end nodes into separate _______ and create a quarantine if needed.

<p>domains</p> Signup and view all the answers

There are other internetworking devices, such as _______ , and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.

<p>gateways</p> Signup and view all the answers

VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a _______.

<p>VPN</p> Signup and view all the answers

PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or _______ v1/v2.

<p>MS-CHAP</p> Signup and view all the answers

A switch reads the Layer 2 address and then uses an electronic switch to move the information to the addressed location. The switch consists of a processor, or processors, and an electronic crossbar that replaces the collapsed bus in a hub; this electronic crossbar is the ______.

<p>switching fabric</p> Signup and view all the answers

Modern Ethernet switches can auto-detect speeds and perform conversions for 10 Mbps, 100 Mbps, and 1000 Mbps Ethernet. A bridge is a device that contains two sets of Layer 1 and 2 functions and connects network segments of the same type. If the bridge is transmitting, it develops a cyclic redundant check character , also called a frame check sequence , and appends it to the transmitted packet payload. The bridge uses an internal table, called a bridge table, to determine which side of the bridge the devices reside on. Regardless of the type, all bridges perform the following functions: Forwarding ______.

<p>Filtering</p> Signup and view all the answers

Two methods are used to reduce the number of collisions on a many-node shared network segment: increasing the data speed or using a bridge to break up the collision domain into smaller domains. Several different devices are called bridges; some actually are bridges, and some are not. In general, bridges are classified as: ______.

<p>Static</p> Signup and view all the answers

The learning bridge is the contemporary model bridge. Learning bridges are dynamic, in that changes are identified and reflected within a short time period. On systems running the Transmission Control Protocol/Internet Protocol suite of protocols, the Address Resolution Protocol can be used to populate the bridge tables. Transparent bridging is the easiest from the user’s point of view as there are no computations other than the spanning tree algorithm for the user to implement. In many cases, transparent bridging only applies to Ethernet and there are a host of other network protocols, particularly in industrial networking, that must be interconnected on a Layer 1/Layer 2 basis ______.

<p>Translating</p> Signup and view all the answers

A translating bridge passes packets between two different networks, such as 802.3 and 802. A translating bridge must change between big endian and little endian transmission, different packet sizes , and different bridging techniques. The 802.5 network also uses source routing , a different concept than transparent bridging, which requires translation between the two bridging techniques: transparent and source routing. Used in token ring networks, a source route bridge places the Layer 2 packet routing and loop detection on the client, rather than on the bridge. Source routing is not as efficient as the spanning tree algorithm because it depends on the client, rather than the bridge ______.

<p>Source Route Bridge</p> Signup and view all the answers

A bridge operates in “promiscuous” mode. Filtering means the bridge matches a packet to its bridge table. This produces one of three results: the match is on the same port, the match is on a different port, or there is no match. Referring to figure 8-2, note that when the bridge receives a packet from workstation 06-fe-01-c3-24-78 for delivery to workstation 06-fe-01-10-00-f4, it looks in the bridge table and it finds a match—on the same port. Then the bridge blocks the packet, preventing the packet from crossing the bridge. The bridge takes two actions on this packet: it prevents it from travelling across the bridge and it checks the CRCC. Referring to figure 8-2, note that if the bridge receives a packet from workstation 06-fe-01-35-c2-ce for delivery to workstation 06-fe-01-c324-78, it finds a match in the table— on a different port. The bridge therefore forwards the packet across the bridge and it checks the CRCC. Referring to figure 8-3, if the bridge receives a packet with a destination address that cannot be found in the bridge table , the bridge floods— sends the packet to—all of the available ports except the port where the packet originated. A two-port bridge would merely forward to the other port; bridges with three or more ports would flood this packet to all ports in the hopes of obtaining an answer from one of them. The method used to accomplish loop elimination in a transparent bridge is the ______.

<p>Spanning Tree Algorithm</p> Signup and view all the answers

A switch reads the data link addresses, just as a bridge does, and determines which port to connect. A switch should be considered to be a multi-port bridge. For both switches and bridges, there are some considerations that must be taken into account with complex connections. A bridge operates in ______ mode.

<p>promiscuous</p> Signup and view all the answers

Study Notes

  • Router actions: when a router receives a packet for another network, it creates a route and hands off the packet to the next router, changing Layer 2 addresses.
  • Exterior Gateway Protocols (BGP): used for routing between autonomous systems and between Internet Service Providers. Requires a 16-bit Autonomous System Number and communicates between border routers.
  • Interior Gateway Protocols: used for exchanging routing information within networks, such as RIP and OSPF. RIP is a distance vector protocol using hop count and requires less CPU power, but can be inefficient. OSPF uses link state flooding and supports CIDR variable length subnet masks.
  • Routing Information Protocol (RIP): a distance vector protocol using hop count, which broadcasts full lists of routes every 60 seconds.
  • Link State Protocols: use more information than hop count and converge faster. Open Shortest Path First (OSPF) is an example of a link state protocol.
  • Routers can use separate or shared databases for each protocol.
  • Routers can be designated as the reference router for others to synchronize their topology maps.
  • Routers provide segmentation, reliability, and fast convergence.
  • Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the backbone level, and level 2 routers talk to designated level 1 routers at the area level.
  • Routers may have one-to-one, one-to-many, or many-to-one I/Os.
  • VLANs can be used to group end nodes into separate domains and create a quarantine if needed.
  • Managed switches have varying features and configuration interfaces, and security and performance are being improved.
  • There are other internetworking devices, such as gateways, and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
  • VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a VPN.
  • PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or MS-CHAP v1/v2.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Internetworking Ch. 8.pptx

Description

Test your knowledge of networking and routing protocols with this quiz. Explore concepts such as router actions, BGP, interior and exterior gateway protocols, VLANs, managed switches, hierarchies, internetworking devices, and VPN technologies.

More Like This

Use Quizgecko on...
Browser
Browser