37 Questions
What is the primary focus of internetworking in an enterprise?
Seamless transfer of information within an enterprise
What is the role of a Layer 2 device in internetworking?
Reads the data link information and uses it to perform some action
What does a bridge or a switch read to identify the protocol of a network packet?
Type/length field
Why are most internetworking deployments based on established or emerging standards?
To ensure interoperability and compatibility
What is the purpose of the Spanning Tree Algorithm (STA) for bridges?
To eliminate network loops by determining a single path between network segments
What is the main function of the rapid spanning tree algorithm used in industrial bridges and switches?
To eliminate network loops by developing a tree structure with minimal delay
In industrial systems, what is the significance of redundant Ethernet networks?
They provide backup paths for data transmission to ensure continuity of operations
What layer of the network is responsible for addressing and routing?
Layer 3
What happens if the decimal value of the two Type/Length octets in a frame is fewer than 1500 decimal?
The frame is expected to have 802.2 control octets follow
What is the primary purpose of VLANs in industrial networks?
To allow packets to go beyond individual automation islands
How does the Spanning Tree Algorithm (STA) create a tree structure?
By developing a single path between network segments or ports
What is the significance of Layer 3 packet information in dealing with TCP/IP over Ethernet?
It provides information about the specific TCP/IP protocol being used for data transmission
What is a key feature of redundant industrial Ethernet networks?
They provide backup paths for data transmission to ensure continuity of operations
What helps determine the root bridge and open loops in a network using the Spanning Tree Algorithm (STA)?
The number of hops indicated in the configuration messages between bridges
What does a switch do with the Layer 2 address before moving the information to the addressed location?
Determines which port to connect based on the address
Which device connects network segments of the same type?
Bridge
What function does a bridge perform when it moves a packet from the source port to the destination port?
Forwarding
What is the purpose of the bridge table?
To ensure that the bridge forwards packets when necessary and blocks unnecessary packets
Which type of bridge was popular from the mid-1970s to the mid-1980s, but is no longer in use?
Static bridge
What does it mean when a bridge operates in 'promiscuous' mode?
It matches a packet to its bridge table
If a bridge receives a packet from a workstation for delivery to another workstation and finds no match in the bridge table, what action does it take?
'Flooding' by sending the packet to all available ports except the port where it originated
What method is used to accomplish loop elimination in a transparent bridge?
'Spanning tree algorithm'
What is one concern with remote bridging in most WAN applications?
Lack of bandwidth
What is a switch considered to be in relation to a bridge?
A multi-port bridge
What does 'filtering' mean when a bridge operates in this mode?
There is no match found
Which protocol is used for routing between autonomous systems and between Internet Service Providers?
Exterior Gateway Protocols (BGP)
What type of protocol is OSPF?
Link state protocol
Which feature is provided by routers to organize routers into hierarchies?
Establishment of hierarchies
What is the purpose of VLANs in networking?
To create a quarantine for end nodes
Which technology is used for building a secure and virtual private network environment?
IPsec
What are the popular network protocols for VPN developments?
PPTP, L2TP, and IPsec
What is the purpose of Managed switches in networking?
To offer varying features and configuration interfaces
What type of information do Link State Protocols use for routing?
Link state flooding
What do Exterior Gateway Protocols require for routing between autonomous systems and between Internet Service Providers?
16-bit Autonomous System Number
What do Hierarchies in networking organize?
Routers
What can VPNs provide over public or non-secure networks?
Confidential, source-authenticated, and content-verified communications
What type of routing does RIP use?
Distance vector routing using hop count
Study Notes
- Router actions: when a router receives a packet for another network, it creates a route and hands off the packet to the next router, changing Layer 2 addresses.
- Exterior Gateway Protocols (BGP): used for routing between autonomous systems and between Internet Service Providers. Requires a 16-bit Autonomous System Number and communicates between border routers.
- Interior Gateway Protocols: used for exchanging routing information within networks, such as RIP and OSPF. RIP is a distance vector protocol using hop count and requires less CPU power, but can be inefficient. OSPF uses link state flooding and supports CIDR variable length subnet masks.
- Routing Information Protocol (RIP): a distance vector protocol using hop count, which broadcasts full lists of routes every 60 seconds.
- Link State Protocols: use more information than hop count and converge faster. Open Shortest Path First (OSPF) is an example of a link state protocol.
- Routers can use separate or shared databases for each protocol.
- Routers can be designated as the reference router for others to synchronize their topology maps.
- Routers provide segmentation, reliability, and fast convergence.
- Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the backbone level, and level 2 routers talk to designated level 1 routers at the area level.
- Routers may have one-to-one, one-to-many, or many-to-one I/Os.
- VLANs can be used to group end nodes into separate domains and create a quarantine if needed.
- Managed switches have varying features and configuration interfaces, and security and performance are being improved.
- There are other internetworking devices, such as gateways, and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
- VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a VPN.
- PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or MS-CHAP v1/v2.
Test your knowledge of basic networking and routing concepts with this quiz. Topics include router actions, interior and exterior gateway protocols, routing information protocol, link state protocols, VLANs, managed switches, and VPN technologies.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free