Podcast
Questions and Answers
Internetworking is the seamless transfer of information throughout an ______, even if that enterprise has plants and offices throughout the world
Internetworking is the seamless transfer of information throughout an ______, even if that enterprise has plants and offices throughout the world
enterprise
Most internetworking deployments are generally based on established ______, or standards to be, and that is the rationale for this chapter
Most internetworking deployments are generally based on established ______, or standards to be, and that is the rationale for this chapter
standards
A Layer 2 device reads the data link information and uses it to perform some ______
A Layer 2 device reads the data link information and uses it to perform some ______
action
Both devices read the packet’s Layer 2 destination address, the physical ______
Both devices read the packet’s Layer 2 destination address, the physical ______
The ______ method enables bridges to detect and eliminate network loops
The ______ method enables bridges to detect and eliminate network loops
The algorithm used to create the tree and to locate devices within the tree structure uses this ID ______ Tree Algorithm
The algorithm used to create the tree and to locate devices within the tree structure uses this ID ______ Tree Algorithm
A configuration message should have three parts: Number of ______
A configuration message should have three parts: Number of ______
The lowest ID is the ______ and the concept of configuration messages
The lowest ID is the ______ and the concept of configuration messages
Most industrial bridges and switches use a slightly different algorithm called the rapid spanning ______ algorithm
Most industrial bridges and switches use a slightly different algorithm called the rapid spanning ______ algorithm
Redundant industrial Ethernet networks, or any other redundant network dedicated to industrial requirements, are generally ______-specific implementations
Redundant industrial Ethernet networks, or any other redundant network dedicated to industrial requirements, are generally ______-specific implementations
This includes having their packets go other ______
This includes having their packets go other ______
Layer 3 is where you find the network you want to address and where you find out how to route to the ______ you want
Layer 3 is where you find the network you want to address and where you find out how to route to the ______ you want
If the decimal value of the two Type/Length octets is fewer than 1500 decimal, it is expected that the 802.2 control octets ______
If the decimal value of the two Type/Length octets is fewer than 1500 decimal, it is expected that the 802.2 control octets ______
If the two octets are more than 1500 decimal, the frame is a ______-802
If the two octets are more than 1500 decimal, the frame is a ______-802
Exterior Gateway Protocols (BGP) are used for routing between _______ systems and between Internet Service Providers.
Exterior Gateway Protocols (BGP) are used for routing between _______ systems and between Internet Service Providers.
RIP is a _______ vector protocol using hop count and requires less CPU power, but can be inefficient.
RIP is a _______ vector protocol using hop count and requires less CPU power, but can be inefficient.
OSPF uses link state flooding and supports CIDR variable length _______ masks.
OSPF uses link state flooding and supports CIDR variable length _______ masks.
RIP is a distance vector protocol using hop count, which broadcasts full lists of routes every _______ seconds.
RIP is a distance vector protocol using hop count, which broadcasts full lists of routes every _______ seconds.
Open Shortest Path First (OSPF) is an example of a _______ state protocol.
Open Shortest Path First (OSPF) is an example of a _______ state protocol.
Routers can use separate or shared databases for each _______.
Routers can use separate or shared databases for each _______.
Routers provide segmentation, reliability, and fast _______.
Routers provide segmentation, reliability, and fast _______.
Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the _______ level, and level 2 routers talk to designated level 1 routers at the area level.
Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the _______ level, and level 2 routers talk to designated level 1 routers at the area level.
VLANs can be used to group end nodes into separate _______ and create a quarantine if needed.
VLANs can be used to group end nodes into separate _______ and create a quarantine if needed.
There are other internetworking devices, such as _______ , and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
There are other internetworking devices, such as _______ , and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a _______.
VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a _______.
PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or _______ v1/v2.
PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or _______ v1/v2.
A switch reads the Layer 2 address and then uses an electronic switch to move the information to the addressed location. The switch consists of a processor, or processors, and an electronic crossbar that replaces the collapsed bus in a hub; this electronic crossbar is the ______.
A switch reads the Layer 2 address and then uses an electronic switch to move the information to the addressed location. The switch consists of a processor, or processors, and an electronic crossbar that replaces the collapsed bus in a hub; this electronic crossbar is the ______.
Modern Ethernet switches can auto-detect speeds and perform conversions for 10 Mbps, 100 Mbps, and 1000 Mbps Ethernet. A bridge is a device that contains two sets of Layer 1 and 2 functions and connects network segments of the same type. If the bridge is transmitting, it develops a cyclic redundant check character , also called a frame check sequence , and appends it to the transmitted packet payload. The bridge uses an internal table, called a bridge table, to determine which side of the bridge the devices reside on. Regardless of the type, all bridges perform the following functions: Forwarding ______.
Modern Ethernet switches can auto-detect speeds and perform conversions for 10 Mbps, 100 Mbps, and 1000 Mbps Ethernet. A bridge is a device that contains two sets of Layer 1 and 2 functions and connects network segments of the same type. If the bridge is transmitting, it develops a cyclic redundant check character , also called a frame check sequence , and appends it to the transmitted packet payload. The bridge uses an internal table, called a bridge table, to determine which side of the bridge the devices reside on. Regardless of the type, all bridges perform the following functions: Forwarding ______.
Two methods are used to reduce the number of collisions on a many-node shared network segment: increasing the data speed or using a bridge to break up the collision domain into smaller domains. Several different devices are called bridges; some actually are bridges, and some are not. In general, bridges are classified as: ______.
Two methods are used to reduce the number of collisions on a many-node shared network segment: increasing the data speed or using a bridge to break up the collision domain into smaller domains. Several different devices are called bridges; some actually are bridges, and some are not. In general, bridges are classified as: ______.
The learning bridge is the contemporary model bridge. Learning bridges are dynamic, in that changes are identified and reflected within a short time period. On systems running the Transmission Control Protocol/Internet Protocol suite of protocols, the Address Resolution Protocol can be used to populate the bridge tables. Transparent bridging is the easiest from the user’s point of view as there are no computations other than the spanning tree algorithm for the user to implement. In many cases, transparent bridging only applies to Ethernet and there are a host of other network protocols, particularly in industrial networking, that must be interconnected on a Layer 1/Layer 2 basis ______.
The learning bridge is the contemporary model bridge. Learning bridges are dynamic, in that changes are identified and reflected within a short time period. On systems running the Transmission Control Protocol/Internet Protocol suite of protocols, the Address Resolution Protocol can be used to populate the bridge tables. Transparent bridging is the easiest from the user’s point of view as there are no computations other than the spanning tree algorithm for the user to implement. In many cases, transparent bridging only applies to Ethernet and there are a host of other network protocols, particularly in industrial networking, that must be interconnected on a Layer 1/Layer 2 basis ______.
A translating bridge passes packets between two different networks, such as 802.3 and 802. A translating bridge must change between big endian and little endian transmission, different packet sizes , and different bridging techniques. The 802.5 network also uses source routing , a different concept than transparent bridging, which requires translation between the two bridging techniques: transparent and source routing. Used in token ring networks, a source route bridge places the Layer 2 packet routing and loop detection on the client, rather than on the bridge. Source routing is not as efficient as the spanning tree algorithm because it depends on the client, rather than the bridge ______.
A translating bridge passes packets between two different networks, such as 802.3 and 802. A translating bridge must change between big endian and little endian transmission, different packet sizes , and different bridging techniques. The 802.5 network also uses source routing , a different concept than transparent bridging, which requires translation between the two bridging techniques: transparent and source routing. Used in token ring networks, a source route bridge places the Layer 2 packet routing and loop detection on the client, rather than on the bridge. Source routing is not as efficient as the spanning tree algorithm because it depends on the client, rather than the bridge ______.
A bridge operates in “promiscuous” mode. Filtering means the bridge matches a packet to its bridge table. This produces one of three results: the match is on the same port, the match is on a different port, or there is no match. Referring to figure 8-2, note that when the bridge receives a packet from workstation 06-fe-01-c3-24-78 for delivery to workstation 06-fe-01-10-00-f4, it looks in the bridge table and it finds a match—on the same port. Then the bridge blocks the packet, preventing the packet from crossing the bridge. The bridge takes two actions on this packet: it prevents it from travelling across the bridge and it checks the CRCC. Referring to figure 8-2, note that if the bridge receives a packet from workstation 06-fe-01-35-c2-ce for delivery to workstation 06-fe-01-c324-78, it finds a match in the table— on a different port. The bridge therefore forwards the packet across the bridge and it checks the CRCC. Referring to figure 8-3, if the bridge receives a packet with a destination address that cannot be found in the bridge table , the bridge floods— sends the packet to—all of the available ports except the port where the packet originated. A two-port bridge would merely forward to the other port; bridges with three or more ports would flood this packet to all ports in the hopes of obtaining an answer from one of them. The method used to accomplish loop elimination in a transparent bridge is the ______.
A bridge operates in “promiscuous” mode. Filtering means the bridge matches a packet to its bridge table. This produces one of three results: the match is on the same port, the match is on a different port, or there is no match. Referring to figure 8-2, note that when the bridge receives a packet from workstation 06-fe-01-c3-24-78 for delivery to workstation 06-fe-01-10-00-f4, it looks in the bridge table and it finds a match—on the same port. Then the bridge blocks the packet, preventing the packet from crossing the bridge. The bridge takes two actions on this packet: it prevents it from travelling across the bridge and it checks the CRCC. Referring to figure 8-2, note that if the bridge receives a packet from workstation 06-fe-01-35-c2-ce for delivery to workstation 06-fe-01-c324-78, it finds a match in the table— on a different port. The bridge therefore forwards the packet across the bridge and it checks the CRCC. Referring to figure 8-3, if the bridge receives a packet with a destination address that cannot be found in the bridge table , the bridge floods— sends the packet to—all of the available ports except the port where the packet originated. A two-port bridge would merely forward to the other port; bridges with three or more ports would flood this packet to all ports in the hopes of obtaining an answer from one of them. The method used to accomplish loop elimination in a transparent bridge is the ______.
A switch reads the data link addresses, just as a bridge does, and determines which port to connect. A switch should be considered to be a multi-port bridge. For both switches and bridges, there are some considerations that must be taken into account with complex connections. A bridge operates in ______ mode.
A switch reads the data link addresses, just as a bridge does, and determines which port to connect. A switch should be considered to be a multi-port bridge. For both switches and bridges, there are some considerations that must be taken into account with complex connections. A bridge operates in ______ mode.
Study Notes
- Router actions: when a router receives a packet for another network, it creates a route and hands off the packet to the next router, changing Layer 2 addresses.
- Exterior Gateway Protocols (BGP): used for routing between autonomous systems and between Internet Service Providers. Requires a 16-bit Autonomous System Number and communicates between border routers.
- Interior Gateway Protocols: used for exchanging routing information within networks, such as RIP and OSPF. RIP is a distance vector protocol using hop count and requires less CPU power, but can be inefficient. OSPF uses link state flooding and supports CIDR variable length subnet masks.
- Routing Information Protocol (RIP): a distance vector protocol using hop count, which broadcasts full lists of routes every 60 seconds.
- Link State Protocols: use more information than hop count and converge faster. Open Shortest Path First (OSPF) is an example of a link state protocol.
- Routers can use separate or shared databases for each protocol.
- Routers can be designated as the reference router for others to synchronize their topology maps.
- Routers provide segmentation, reliability, and fast convergence.
- Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the backbone level, and level 2 routers talk to designated level 1 routers at the area level.
- Routers may have one-to-one, one-to-many, or many-to-one I/Os.
- VLANs can be used to group end nodes into separate domains and create a quarantine if needed.
- Managed switches have varying features and configuration interfaces, and security and performance are being improved.
- There are other internetworking devices, such as gateways, and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
- VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a VPN.
- PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or MS-CHAP v1/v2.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of networking and routing protocols with this quiz. Explore concepts such as router actions, BGP, interior and exterior gateway protocols, VLANs, managed switches, hierarchies, internetworking devices, and VPN technologies.