Podcast
Questions and Answers
Internetworking is the seamless transfer of information throughout an ______, even if that enterprise has plants and offices throughout the world
Internetworking is the seamless transfer of information throughout an ______, even if that enterprise has plants and offices throughout the world
enterprise
Most internetworking deployments are generally based on established ______, or standards to be, and that is the rationale for this chapter
Most internetworking deployments are generally based on established ______, or standards to be, and that is the rationale for this chapter
standards
A Layer 2 device reads the data link information and uses it to perform some ______
A Layer 2 device reads the data link information and uses it to perform some ______
action
Both devices read the packet’s Layer 2 destination address, the physical ______
Both devices read the packet’s Layer 2 destination address, the physical ______
Signup and view all the answers
The ______ method enables bridges to detect and eliminate network loops
The ______ method enables bridges to detect and eliminate network loops
Signup and view all the answers
The algorithm used to create the tree and to locate devices within the tree structure uses this ID ______ Tree Algorithm
The algorithm used to create the tree and to locate devices within the tree structure uses this ID ______ Tree Algorithm
Signup and view all the answers
A configuration message should have three parts: Number of ______
A configuration message should have three parts: Number of ______
Signup and view all the answers
The lowest ID is the ______ and the concept of configuration messages
The lowest ID is the ______ and the concept of configuration messages
Signup and view all the answers
Most industrial bridges and switches use a slightly different algorithm called the rapid spanning ______ algorithm
Most industrial bridges and switches use a slightly different algorithm called the rapid spanning ______ algorithm
Signup and view all the answers
Redundant industrial Ethernet networks, or any other redundant network dedicated to industrial requirements, are generally ______-specific implementations
Redundant industrial Ethernet networks, or any other redundant network dedicated to industrial requirements, are generally ______-specific implementations
Signup and view all the answers
This includes having their packets go other ______
This includes having their packets go other ______
Signup and view all the answers
Layer 3 is where you find the network you want to address and where you find out how to route to the ______ you want
Layer 3 is where you find the network you want to address and where you find out how to route to the ______ you want
Signup and view all the answers
If the decimal value of the two Type/Length octets is fewer than 1500 decimal, it is expected that the 802.2 control octets ______
If the decimal value of the two Type/Length octets is fewer than 1500 decimal, it is expected that the 802.2 control octets ______
Signup and view all the answers
If the two octets are more than 1500 decimal, the frame is a ______-802
If the two octets are more than 1500 decimal, the frame is a ______-802
Signup and view all the answers
Exterior Gateway Protocols (BGP) are used for routing between _______ systems and between Internet Service Providers.
Exterior Gateway Protocols (BGP) are used for routing between _______ systems and between Internet Service Providers.
Signup and view all the answers
RIP is a _______ vector protocol using hop count and requires less CPU power, but can be inefficient.
RIP is a _______ vector protocol using hop count and requires less CPU power, but can be inefficient.
Signup and view all the answers
OSPF uses link state flooding and supports CIDR variable length _______ masks.
OSPF uses link state flooding and supports CIDR variable length _______ masks.
Signup and view all the answers
RIP is a distance vector protocol using hop count, which broadcasts full lists of routes every _______ seconds.
RIP is a distance vector protocol using hop count, which broadcasts full lists of routes every _______ seconds.
Signup and view all the answers
Open Shortest Path First (OSPF) is an example of a _______ state protocol.
Open Shortest Path First (OSPF) is an example of a _______ state protocol.
Signup and view all the answers
Routers can use separate or shared databases for each _______.
Routers can use separate or shared databases for each _______.
Signup and view all the answers
Routers provide segmentation, reliability, and fast _______.
Routers provide segmentation, reliability, and fast _______.
Signup and view all the answers
Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the _______ level, and level 2 routers talk to designated level 1 routers at the area level.
Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the _______ level, and level 2 routers talk to designated level 1 routers at the area level.
Signup and view all the answers
VLANs can be used to group end nodes into separate _______ and create a quarantine if needed.
VLANs can be used to group end nodes into separate _______ and create a quarantine if needed.
Signup and view all the answers
There are other internetworking devices, such as _______ , and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
There are other internetworking devices, such as _______ , and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
Signup and view all the answers
VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a _______.
VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a _______.
Signup and view all the answers
PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or _______ v1/v2.
PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or _______ v1/v2.
Signup and view all the answers
A switch reads the Layer 2 address and then uses an electronic switch to move the information to the addressed location. The switch consists of a processor, or processors, and an electronic crossbar that replaces the collapsed bus in a hub; this electronic crossbar is the ______.
A switch reads the Layer 2 address and then uses an electronic switch to move the information to the addressed location. The switch consists of a processor, or processors, and an electronic crossbar that replaces the collapsed bus in a hub; this electronic crossbar is the ______.
Signup and view all the answers
Modern Ethernet switches can auto-detect speeds and perform conversions for 10 Mbps, 100 Mbps, and 1000 Mbps Ethernet. A bridge is a device that contains two sets of Layer 1 and 2 functions and connects network segments of the same type. If the bridge is transmitting, it develops a cyclic redundant check character , also called a frame check sequence , and appends it to the transmitted packet payload. The bridge uses an internal table, called a bridge table, to determine which side of the bridge the devices reside on. Regardless of the type, all bridges perform the following functions: Forwarding ______.
Modern Ethernet switches can auto-detect speeds and perform conversions for 10 Mbps, 100 Mbps, and 1000 Mbps Ethernet. A bridge is a device that contains two sets of Layer 1 and 2 functions and connects network segments of the same type. If the bridge is transmitting, it develops a cyclic redundant check character , also called a frame check sequence , and appends it to the transmitted packet payload. The bridge uses an internal table, called a bridge table, to determine which side of the bridge the devices reside on. Regardless of the type, all bridges perform the following functions: Forwarding ______.
Signup and view all the answers
Two methods are used to reduce the number of collisions on a many-node shared network segment: increasing the data speed or using a bridge to break up the collision domain into smaller domains. Several different devices are called bridges; some actually are bridges, and some are not. In general, bridges are classified as: ______.
Two methods are used to reduce the number of collisions on a many-node shared network segment: increasing the data speed or using a bridge to break up the collision domain into smaller domains. Several different devices are called bridges; some actually are bridges, and some are not. In general, bridges are classified as: ______.
Signup and view all the answers
The learning bridge is the contemporary model bridge. Learning bridges are dynamic, in that changes are identified and reflected within a short time period. On systems running the Transmission Control Protocol/Internet Protocol suite of protocols, the Address Resolution Protocol can be used to populate the bridge tables. Transparent bridging is the easiest from the user’s point of view as there are no computations other than the spanning tree algorithm for the user to implement. In many cases, transparent bridging only applies to Ethernet and there are a host of other network protocols, particularly in industrial networking, that must be interconnected on a Layer 1/Layer 2 basis ______.
The learning bridge is the contemporary model bridge. Learning bridges are dynamic, in that changes are identified and reflected within a short time period. On systems running the Transmission Control Protocol/Internet Protocol suite of protocols, the Address Resolution Protocol can be used to populate the bridge tables. Transparent bridging is the easiest from the user’s point of view as there are no computations other than the spanning tree algorithm for the user to implement. In many cases, transparent bridging only applies to Ethernet and there are a host of other network protocols, particularly in industrial networking, that must be interconnected on a Layer 1/Layer 2 basis ______.
Signup and view all the answers
A translating bridge passes packets between two different networks, such as 802.3 and 802. A translating bridge must change between big endian and little endian transmission, different packet sizes , and different bridging techniques. The 802.5 network also uses source routing , a different concept than transparent bridging, which requires translation between the two bridging techniques: transparent and source routing. Used in token ring networks, a source route bridge places the Layer 2 packet routing and loop detection on the client, rather than on the bridge. Source routing is not as efficient as the spanning tree algorithm because it depends on the client, rather than the bridge ______.
A translating bridge passes packets between two different networks, such as 802.3 and 802. A translating bridge must change between big endian and little endian transmission, different packet sizes , and different bridging techniques. The 802.5 network also uses source routing , a different concept than transparent bridging, which requires translation between the two bridging techniques: transparent and source routing. Used in token ring networks, a source route bridge places the Layer 2 packet routing and loop detection on the client, rather than on the bridge. Source routing is not as efficient as the spanning tree algorithm because it depends on the client, rather than the bridge ______.
Signup and view all the answers
A bridge operates in “promiscuous” mode. Filtering means the bridge matches a packet to its bridge table. This produces one of three results: the match is on the same port, the match is on a different port, or there is no match. Referring to figure 8-2, note that when the bridge receives a packet from workstation 06-fe-01-c3-24-78 for delivery to workstation 06-fe-01-10-00-f4, it looks in the bridge table and it finds a match—on the same port. Then the bridge blocks the packet, preventing the packet from crossing the bridge. The bridge takes two actions on this packet: it prevents it from travelling across the bridge and it checks the CRCC. Referring to figure 8-2, note that if the bridge receives a packet from workstation 06-fe-01-35-c2-ce for delivery to workstation 06-fe-01-c324-78, it finds a match in the table— on a different port. The bridge therefore forwards the packet across the bridge and it checks the CRCC. Referring to figure 8-3, if the bridge receives a packet with a destination address that cannot be found in the bridge table , the bridge floods— sends the packet to—all of the available ports except the port where the packet originated. A two-port bridge would merely forward to the other port; bridges with three or more ports would flood this packet to all ports in the hopes of obtaining an answer from one of them. The method used to accomplish loop elimination in a transparent bridge is the ______.
A bridge operates in “promiscuous” mode. Filtering means the bridge matches a packet to its bridge table. This produces one of three results: the match is on the same port, the match is on a different port, or there is no match. Referring to figure 8-2, note that when the bridge receives a packet from workstation 06-fe-01-c3-24-78 for delivery to workstation 06-fe-01-10-00-f4, it looks in the bridge table and it finds a match—on the same port. Then the bridge blocks the packet, preventing the packet from crossing the bridge. The bridge takes two actions on this packet: it prevents it from travelling across the bridge and it checks the CRCC. Referring to figure 8-2, note that if the bridge receives a packet from workstation 06-fe-01-35-c2-ce for delivery to workstation 06-fe-01-c324-78, it finds a match in the table— on a different port. The bridge therefore forwards the packet across the bridge and it checks the CRCC. Referring to figure 8-3, if the bridge receives a packet with a destination address that cannot be found in the bridge table , the bridge floods— sends the packet to—all of the available ports except the port where the packet originated. A two-port bridge would merely forward to the other port; bridges with three or more ports would flood this packet to all ports in the hopes of obtaining an answer from one of them. The method used to accomplish loop elimination in a transparent bridge is the ______.
Signup and view all the answers
A switch reads the data link addresses, just as a bridge does, and determines which port to connect. A switch should be considered to be a multi-port bridge. For both switches and bridges, there are some considerations that must be taken into account with complex connections. A bridge operates in ______ mode.
A switch reads the data link addresses, just as a bridge does, and determines which port to connect. A switch should be considered to be a multi-port bridge. For both switches and bridges, there are some considerations that must be taken into account with complex connections. A bridge operates in ______ mode.
Signup and view all the answers
Study Notes
- Router actions: when a router receives a packet for another network, it creates a route and hands off the packet to the next router, changing Layer 2 addresses.
- Exterior Gateway Protocols (BGP): used for routing between autonomous systems and between Internet Service Providers. Requires a 16-bit Autonomous System Number and communicates between border routers.
- Interior Gateway Protocols: used for exchanging routing information within networks, such as RIP and OSPF. RIP is a distance vector protocol using hop count and requires less CPU power, but can be inefficient. OSPF uses link state flooding and supports CIDR variable length subnet masks.
- Routing Information Protocol (RIP): a distance vector protocol using hop count, which broadcasts full lists of routes every 60 seconds.
- Link State Protocols: use more information than hop count and converge faster. Open Shortest Path First (OSPF) is an example of a link state protocol.
- Routers can use separate or shared databases for each protocol.
- Routers can be designated as the reference router for others to synchronize their topology maps.
- Routers provide segmentation, reliability, and fast convergence.
- Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the backbone level, and level 2 routers talk to designated level 1 routers at the area level.
- Routers may have one-to-one, one-to-many, or many-to-one I/Os.
- VLANs can be used to group end nodes into separate domains and create a quarantine if needed.
- Managed switches have varying features and configuration interfaces, and security and performance are being improved.
- There are other internetworking devices, such as gateways, and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
- VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a VPN.
- PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or MS-CHAP v1/v2.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of networking and routing protocols with this quiz. Explore concepts such as router actions, BGP, interior and exterior gateway protocols, VLANs, managed switches, hierarchies, internetworking devices, and VPN technologies.