Ch. 8 Internetworking Test

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary focus of internetworking in an enterprise?

  • Expanding enterprise networks globally
  • Establishing new communication standards
  • Seamless transfer of information within an enterprise (correct)
  • Creating new hardware for enterprise communications

What is the role of a Layer 2 device in internetworking?

  • Modifies the physical address of the packet
  • Translates the type/length field of the packet
  • Transfers data across different network protocols
  • Reads the data link information and uses it to perform some action (correct)

What does a bridge or a switch read to identify the protocol of a network packet?

  • Type/length field (correct)
  • Packet's source address
  • Physical address
  • Data link information

Why are most internetworking deployments based on established or emerging standards?

<p>To ensure interoperability and compatibility (B)</p> Signup and view all the answers

What is the purpose of the Spanning Tree Algorithm (STA) for bridges?

<p>To eliminate network loops by determining a single path between network segments (C)</p> Signup and view all the answers

What is the main function of the rapid spanning tree algorithm used in industrial bridges and switches?

<p>To eliminate network loops by developing a tree structure with minimal delay (A)</p> Signup and view all the answers

In industrial systems, what is the significance of redundant Ethernet networks?

<p>They provide backup paths for data transmission to ensure continuity of operations (D)</p> Signup and view all the answers

What layer of the network is responsible for addressing and routing?

<p>Layer 3 (C)</p> Signup and view all the answers

What happens if the decimal value of the two Type/Length octets in a frame is fewer than 1500 decimal?

<p>The frame is expected to have 802.2 control octets follow (C)</p> Signup and view all the answers

What is the primary purpose of VLANs in industrial networks?

<p>To allow packets to go beyond individual automation islands (B)</p> Signup and view all the answers

How does the Spanning Tree Algorithm (STA) create a tree structure?

<p>By developing a single path between network segments or ports (C)</p> Signup and view all the answers

What is the significance of Layer 3 packet information in dealing with TCP/IP over Ethernet?

<p>It provides information about the specific TCP/IP protocol being used for data transmission (D)</p> Signup and view all the answers

What is a key feature of redundant industrial Ethernet networks?

<p>They provide backup paths for data transmission to ensure continuity of operations (C)</p> Signup and view all the answers

What helps determine the root bridge and open loops in a network using the Spanning Tree Algorithm (STA)?

<p>The number of hops indicated in the configuration messages between bridges (C)</p> Signup and view all the answers

What does a switch do with the Layer 2 address before moving the information to the addressed location?

<p>Determines which port to connect based on the address (D)</p> Signup and view all the answers

Which device connects network segments of the same type?

<p>Bridge (A)</p> Signup and view all the answers

What function does a bridge perform when it moves a packet from the source port to the destination port?

<p>Forwarding (A)</p> Signup and view all the answers

What is the purpose of the bridge table?

<p>To ensure that the bridge forwards packets when necessary and blocks unnecessary packets (A)</p> Signup and view all the answers

Which type of bridge was popular from the mid-1970s to the mid-1980s, but is no longer in use?

<p>Static bridge (C)</p> Signup and view all the answers

What does it mean when a bridge operates in 'promiscuous' mode?

<p>It matches a packet to its bridge table (C)</p> Signup and view all the answers

If a bridge receives a packet from a workstation for delivery to another workstation and finds no match in the bridge table, what action does it take?

<p>'Flooding' by sending the packet to all available ports except the port where it originated (B)</p> Signup and view all the answers

What method is used to accomplish loop elimination in a transparent bridge?

<p>'Spanning tree algorithm' (A)</p> Signup and view all the answers

What is one concern with remote bridging in most WAN applications?

<p>Lack of bandwidth (C)</p> Signup and view all the answers

What is a switch considered to be in relation to a bridge?

<p>A multi-port bridge (A)</p> Signup and view all the answers

What does 'filtering' mean when a bridge operates in this mode?

<p>There is no match found (A)</p> Signup and view all the answers

Which protocol is used for routing between autonomous systems and between Internet Service Providers?

<p>Exterior Gateway Protocols (BGP) (D)</p> Signup and view all the answers

What type of protocol is OSPF?

<p>Link state protocol (D)</p> Signup and view all the answers

Which feature is provided by routers to organize routers into hierarchies?

<p>Establishment of hierarchies (C)</p> Signup and view all the answers

What is the purpose of VLANs in networking?

<p>To create a quarantine for end nodes (C)</p> Signup and view all the answers

Which technology is used for building a secure and virtual private network environment?

<p>IPsec (A)</p> Signup and view all the answers

What are the popular network protocols for VPN developments?

<p>PPTP, L2TP, and IPsec (A)</p> Signup and view all the answers

What is the purpose of Managed switches in networking?

<p>To offer varying features and configuration interfaces (D)</p> Signup and view all the answers

What type of information do Link State Protocols use for routing?

<p>Link state flooding (A)</p> Signup and view all the answers

What do Exterior Gateway Protocols require for routing between autonomous systems and between Internet Service Providers?

<p>16-bit Autonomous System Number (C)</p> Signup and view all the answers

What do Hierarchies in networking organize?

<p>Routers (B)</p> Signup and view all the answers

What can VPNs provide over public or non-secure networks?

<p>Confidential, source-authenticated, and content-verified communications (D)</p> Signup and view all the answers

What type of routing does RIP use?

<p>Distance vector routing using hop count (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

  • Router actions: when a router receives a packet for another network, it creates a route and hands off the packet to the next router, changing Layer 2 addresses.
  • Exterior Gateway Protocols (BGP): used for routing between autonomous systems and between Internet Service Providers. Requires a 16-bit Autonomous System Number and communicates between border routers.
  • Interior Gateway Protocols: used for exchanging routing information within networks, such as RIP and OSPF. RIP is a distance vector protocol using hop count and requires less CPU power, but can be inefficient. OSPF uses link state flooding and supports CIDR variable length subnet masks.
  • Routing Information Protocol (RIP): a distance vector protocol using hop count, which broadcasts full lists of routes every 60 seconds.
  • Link State Protocols: use more information than hop count and converge faster. Open Shortest Path First (OSPF) is an example of a link state protocol.
  • Routers can use separate or shared databases for each protocol.
  • Routers can be designated as the reference router for others to synchronize their topology maps.
  • Routers provide segmentation, reliability, and fast convergence.
  • Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the backbone level, and level 2 routers talk to designated level 1 routers at the area level.
  • Routers may have one-to-one, one-to-many, or many-to-one I/Os.
  • VLANs can be used to group end nodes into separate domains and create a quarantine if needed.
  • Managed switches have varying features and configuration interfaces, and security and performance are being improved.
  • There are other internetworking devices, such as gateways, and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
  • VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a VPN.
  • PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or MS-CHAP v1/v2.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Internetworking Ch. 8.pptx

More Like This

Networking Protocols Lab - VLANs and Routing
45 questions
Switching and Routing Concepts
98 questions
Use Quizgecko on...
Browser
Browser