Ch. 8 Internetworking Test

ExquisiteAmetrine avatar
ExquisiteAmetrine
·
·
Download

Start Quiz

Study Flashcards

37 Questions

What is the primary focus of internetworking in an enterprise?

Seamless transfer of information within an enterprise

What is the role of a Layer 2 device in internetworking?

Reads the data link information and uses it to perform some action

What does a bridge or a switch read to identify the protocol of a network packet?

Type/length field

Why are most internetworking deployments based on established or emerging standards?

To ensure interoperability and compatibility

What is the purpose of the Spanning Tree Algorithm (STA) for bridges?

To eliminate network loops by determining a single path between network segments

What is the main function of the rapid spanning tree algorithm used in industrial bridges and switches?

To eliminate network loops by developing a tree structure with minimal delay

In industrial systems, what is the significance of redundant Ethernet networks?

They provide backup paths for data transmission to ensure continuity of operations

What layer of the network is responsible for addressing and routing?

Layer 3

What happens if the decimal value of the two Type/Length octets in a frame is fewer than 1500 decimal?

The frame is expected to have 802.2 control octets follow

What is the primary purpose of VLANs in industrial networks?

To allow packets to go beyond individual automation islands

How does the Spanning Tree Algorithm (STA) create a tree structure?

By developing a single path between network segments or ports

What is the significance of Layer 3 packet information in dealing with TCP/IP over Ethernet?

It provides information about the specific TCP/IP protocol being used for data transmission

What is a key feature of redundant industrial Ethernet networks?

They provide backup paths for data transmission to ensure continuity of operations

What helps determine the root bridge and open loops in a network using the Spanning Tree Algorithm (STA)?

The number of hops indicated in the configuration messages between bridges

What does a switch do with the Layer 2 address before moving the information to the addressed location?

Determines which port to connect based on the address

Which device connects network segments of the same type?

Bridge

What function does a bridge perform when it moves a packet from the source port to the destination port?

Forwarding

What is the purpose of the bridge table?

To ensure that the bridge forwards packets when necessary and blocks unnecessary packets

Which type of bridge was popular from the mid-1970s to the mid-1980s, but is no longer in use?

Static bridge

What does it mean when a bridge operates in 'promiscuous' mode?

It matches a packet to its bridge table

If a bridge receives a packet from a workstation for delivery to another workstation and finds no match in the bridge table, what action does it take?

'Flooding' by sending the packet to all available ports except the port where it originated

What method is used to accomplish loop elimination in a transparent bridge?

'Spanning tree algorithm'

What is one concern with remote bridging in most WAN applications?

Lack of bandwidth

What is a switch considered to be in relation to a bridge?

A multi-port bridge

What does 'filtering' mean when a bridge operates in this mode?

There is no match found

Which protocol is used for routing between autonomous systems and between Internet Service Providers?

Exterior Gateway Protocols (BGP)

What type of protocol is OSPF?

Link state protocol

Which feature is provided by routers to organize routers into hierarchies?

Establishment of hierarchies

What is the purpose of VLANs in networking?

To create a quarantine for end nodes

Which technology is used for building a secure and virtual private network environment?

IPsec

What are the popular network protocols for VPN developments?

PPTP, L2TP, and IPsec

What is the purpose of Managed switches in networking?

To offer varying features and configuration interfaces

What type of information do Link State Protocols use for routing?

Link state flooding

What do Exterior Gateway Protocols require for routing between autonomous systems and between Internet Service Providers?

16-bit Autonomous System Number

What do Hierarchies in networking organize?

Routers

What can VPNs provide over public or non-secure networks?

Confidential, source-authenticated, and content-verified communications

What type of routing does RIP use?

Distance vector routing using hop count

Study Notes

  • Router actions: when a router receives a packet for another network, it creates a route and hands off the packet to the next router, changing Layer 2 addresses.
  • Exterior Gateway Protocols (BGP): used for routing between autonomous systems and between Internet Service Providers. Requires a 16-bit Autonomous System Number and communicates between border routers.
  • Interior Gateway Protocols: used for exchanging routing information within networks, such as RIP and OSPF. RIP is a distance vector protocol using hop count and requires less CPU power, but can be inefficient. OSPF uses link state flooding and supports CIDR variable length subnet masks.
  • Routing Information Protocol (RIP): a distance vector protocol using hop count, which broadcasts full lists of routes every 60 seconds.
  • Link State Protocols: use more information than hop count and converge faster. Open Shortest Path First (OSPF) is an example of a link state protocol.
  • Routers can use separate or shared databases for each protocol.
  • Routers can be designated as the reference router for others to synchronize their topology maps.
  • Routers provide segmentation, reliability, and fast convergence.
  • Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the backbone level, and level 2 routers talk to designated level 1 routers at the area level.
  • Routers may have one-to-one, one-to-many, or many-to-one I/Os.
  • VLANs can be used to group end nodes into separate domains and create a quarantine if needed.
  • Managed switches have varying features and configuration interfaces, and security and performance are being improved.
  • There are other internetworking devices, such as gateways, and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
  • VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a VPN.
  • PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or MS-CHAP v1/v2.

Test your knowledge of basic networking and routing concepts with this quiz. Topics include router actions, interior and exterior gateway protocols, routing information protocol, link state protocols, VLANs, managed switches, and VPN technologies.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Unicast Routing Protocols Quiz
5 questions
Classless Routing Protocols Quiz
3 questions
Dynamic Routing Protocols Quiz
7 questions
Ch. 8 Internetworking Review
33 questions
Use Quizgecko on...
Browser
Browser