Podcast
Questions and Answers
What is the primary focus of internetworking in an enterprise?
What is the primary focus of internetworking in an enterprise?
What is the role of a Layer 2 device in internetworking?
What is the role of a Layer 2 device in internetworking?
What does a bridge or a switch read to identify the protocol of a network packet?
What does a bridge or a switch read to identify the protocol of a network packet?
Why are most internetworking deployments based on established or emerging standards?
Why are most internetworking deployments based on established or emerging standards?
Signup and view all the answers
What is the purpose of the Spanning Tree Algorithm (STA) for bridges?
What is the purpose of the Spanning Tree Algorithm (STA) for bridges?
Signup and view all the answers
What is the main function of the rapid spanning tree algorithm used in industrial bridges and switches?
What is the main function of the rapid spanning tree algorithm used in industrial bridges and switches?
Signup and view all the answers
In industrial systems, what is the significance of redundant Ethernet networks?
In industrial systems, what is the significance of redundant Ethernet networks?
Signup and view all the answers
What layer of the network is responsible for addressing and routing?
What layer of the network is responsible for addressing and routing?
Signup and view all the answers
What happens if the decimal value of the two Type/Length octets in a frame is fewer than 1500 decimal?
What happens if the decimal value of the two Type/Length octets in a frame is fewer than 1500 decimal?
Signup and view all the answers
What is the primary purpose of VLANs in industrial networks?
What is the primary purpose of VLANs in industrial networks?
Signup and view all the answers
How does the Spanning Tree Algorithm (STA) create a tree structure?
How does the Spanning Tree Algorithm (STA) create a tree structure?
Signup and view all the answers
What is the significance of Layer 3 packet information in dealing with TCP/IP over Ethernet?
What is the significance of Layer 3 packet information in dealing with TCP/IP over Ethernet?
Signup and view all the answers
What is a key feature of redundant industrial Ethernet networks?
What is a key feature of redundant industrial Ethernet networks?
Signup and view all the answers
What helps determine the root bridge and open loops in a network using the Spanning Tree Algorithm (STA)?
What helps determine the root bridge and open loops in a network using the Spanning Tree Algorithm (STA)?
Signup and view all the answers
What does a switch do with the Layer 2 address before moving the information to the addressed location?
What does a switch do with the Layer 2 address before moving the information to the addressed location?
Signup and view all the answers
Which device connects network segments of the same type?
Which device connects network segments of the same type?
Signup and view all the answers
What function does a bridge perform when it moves a packet from the source port to the destination port?
What function does a bridge perform when it moves a packet from the source port to the destination port?
Signup and view all the answers
What is the purpose of the bridge table?
What is the purpose of the bridge table?
Signup and view all the answers
Which type of bridge was popular from the mid-1970s to the mid-1980s, but is no longer in use?
Which type of bridge was popular from the mid-1970s to the mid-1980s, but is no longer in use?
Signup and view all the answers
What does it mean when a bridge operates in 'promiscuous' mode?
What does it mean when a bridge operates in 'promiscuous' mode?
Signup and view all the answers
If a bridge receives a packet from a workstation for delivery to another workstation and finds no match in the bridge table, what action does it take?
If a bridge receives a packet from a workstation for delivery to another workstation and finds no match in the bridge table, what action does it take?
Signup and view all the answers
What method is used to accomplish loop elimination in a transparent bridge?
What method is used to accomplish loop elimination in a transparent bridge?
Signup and view all the answers
What is one concern with remote bridging in most WAN applications?
What is one concern with remote bridging in most WAN applications?
Signup and view all the answers
What is a switch considered to be in relation to a bridge?
What is a switch considered to be in relation to a bridge?
Signup and view all the answers
What does 'filtering' mean when a bridge operates in this mode?
What does 'filtering' mean when a bridge operates in this mode?
Signup and view all the answers
Which protocol is used for routing between autonomous systems and between Internet Service Providers?
Which protocol is used for routing between autonomous systems and between Internet Service Providers?
Signup and view all the answers
What type of protocol is OSPF?
What type of protocol is OSPF?
Signup and view all the answers
Which feature is provided by routers to organize routers into hierarchies?
Which feature is provided by routers to organize routers into hierarchies?
Signup and view all the answers
What is the purpose of VLANs in networking?
What is the purpose of VLANs in networking?
Signup and view all the answers
Which technology is used for building a secure and virtual private network environment?
Which technology is used for building a secure and virtual private network environment?
Signup and view all the answers
What are the popular network protocols for VPN developments?
What are the popular network protocols for VPN developments?
Signup and view all the answers
What is the purpose of Managed switches in networking?
What is the purpose of Managed switches in networking?
Signup and view all the answers
What type of information do Link State Protocols use for routing?
What type of information do Link State Protocols use for routing?
Signup and view all the answers
What do Exterior Gateway Protocols require for routing between autonomous systems and between Internet Service Providers?
What do Exterior Gateway Protocols require for routing between autonomous systems and between Internet Service Providers?
Signup and view all the answers
What do Hierarchies in networking organize?
What do Hierarchies in networking organize?
Signup and view all the answers
What can VPNs provide over public or non-secure networks?
What can VPNs provide over public or non-secure networks?
Signup and view all the answers
What type of routing does RIP use?
What type of routing does RIP use?
Signup and view all the answers
Study Notes
- Router actions: when a router receives a packet for another network, it creates a route and hands off the packet to the next router, changing Layer 2 addresses.
- Exterior Gateway Protocols (BGP): used for routing between autonomous systems and between Internet Service Providers. Requires a 16-bit Autonomous System Number and communicates between border routers.
- Interior Gateway Protocols: used for exchanging routing information within networks, such as RIP and OSPF. RIP is a distance vector protocol using hop count and requires less CPU power, but can be inefficient. OSPF uses link state flooding and supports CIDR variable length subnet masks.
- Routing Information Protocol (RIP): a distance vector protocol using hop count, which broadcasts full lists of routes every 60 seconds.
- Link State Protocols: use more information than hop count and converge faster. Open Shortest Path First (OSPF) is an example of a link state protocol.
- Routers can use separate or shared databases for each protocol.
- Routers can be designated as the reference router for others to synchronize their topology maps.
- Routers provide segmentation, reliability, and fast convergence.
- Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the backbone level, and level 2 routers talk to designated level 1 routers at the area level.
- Routers may have one-to-one, one-to-many, or many-to-one I/Os.
- VLANs can be used to group end nodes into separate domains and create a quarantine if needed.
- Managed switches have varying features and configuration interfaces, and security and performance are being improved.
- There are other internetworking devices, such as gateways, and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
- VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a VPN.
- PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or MS-CHAP v1/v2.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of basic networking and routing concepts with this quiz. Topics include router actions, interior and exterior gateway protocols, routing information protocol, link state protocols, VLANs, managed switches, and VPN technologies.