Podcast
Questions and Answers
What is the primary focus of internetworking in an enterprise?
What is the primary focus of internetworking in an enterprise?
- Expanding enterprise networks globally
- Establishing new communication standards
- Seamless transfer of information within an enterprise (correct)
- Creating new hardware for enterprise communications
What is the role of a Layer 2 device in internetworking?
What is the role of a Layer 2 device in internetworking?
- Modifies the physical address of the packet
- Translates the type/length field of the packet
- Transfers data across different network protocols
- Reads the data link information and uses it to perform some action (correct)
What does a bridge or a switch read to identify the protocol of a network packet?
What does a bridge or a switch read to identify the protocol of a network packet?
- Type/length field (correct)
- Packet's source address
- Physical address
- Data link information
Why are most internetworking deployments based on established or emerging standards?
Why are most internetworking deployments based on established or emerging standards?
What is the purpose of the Spanning Tree Algorithm (STA) for bridges?
What is the purpose of the Spanning Tree Algorithm (STA) for bridges?
What is the main function of the rapid spanning tree algorithm used in industrial bridges and switches?
What is the main function of the rapid spanning tree algorithm used in industrial bridges and switches?
In industrial systems, what is the significance of redundant Ethernet networks?
In industrial systems, what is the significance of redundant Ethernet networks?
What layer of the network is responsible for addressing and routing?
What layer of the network is responsible for addressing and routing?
What happens if the decimal value of the two Type/Length octets in a frame is fewer than 1500 decimal?
What happens if the decimal value of the two Type/Length octets in a frame is fewer than 1500 decimal?
What is the primary purpose of VLANs in industrial networks?
What is the primary purpose of VLANs in industrial networks?
How does the Spanning Tree Algorithm (STA) create a tree structure?
How does the Spanning Tree Algorithm (STA) create a tree structure?
What is the significance of Layer 3 packet information in dealing with TCP/IP over Ethernet?
What is the significance of Layer 3 packet information in dealing with TCP/IP over Ethernet?
What is a key feature of redundant industrial Ethernet networks?
What is a key feature of redundant industrial Ethernet networks?
What helps determine the root bridge and open loops in a network using the Spanning Tree Algorithm (STA)?
What helps determine the root bridge and open loops in a network using the Spanning Tree Algorithm (STA)?
What does a switch do with the Layer 2 address before moving the information to the addressed location?
What does a switch do with the Layer 2 address before moving the information to the addressed location?
Which device connects network segments of the same type?
Which device connects network segments of the same type?
What function does a bridge perform when it moves a packet from the source port to the destination port?
What function does a bridge perform when it moves a packet from the source port to the destination port?
What is the purpose of the bridge table?
What is the purpose of the bridge table?
Which type of bridge was popular from the mid-1970s to the mid-1980s, but is no longer in use?
Which type of bridge was popular from the mid-1970s to the mid-1980s, but is no longer in use?
What does it mean when a bridge operates in 'promiscuous' mode?
What does it mean when a bridge operates in 'promiscuous' mode?
If a bridge receives a packet from a workstation for delivery to another workstation and finds no match in the bridge table, what action does it take?
If a bridge receives a packet from a workstation for delivery to another workstation and finds no match in the bridge table, what action does it take?
What method is used to accomplish loop elimination in a transparent bridge?
What method is used to accomplish loop elimination in a transparent bridge?
What is one concern with remote bridging in most WAN applications?
What is one concern with remote bridging in most WAN applications?
What is a switch considered to be in relation to a bridge?
What is a switch considered to be in relation to a bridge?
What does 'filtering' mean when a bridge operates in this mode?
What does 'filtering' mean when a bridge operates in this mode?
Which protocol is used for routing between autonomous systems and between Internet Service Providers?
Which protocol is used for routing between autonomous systems and between Internet Service Providers?
What type of protocol is OSPF?
What type of protocol is OSPF?
Which feature is provided by routers to organize routers into hierarchies?
Which feature is provided by routers to organize routers into hierarchies?
What is the purpose of VLANs in networking?
What is the purpose of VLANs in networking?
Which technology is used for building a secure and virtual private network environment?
Which technology is used for building a secure and virtual private network environment?
What are the popular network protocols for VPN developments?
What are the popular network protocols for VPN developments?
What is the purpose of Managed switches in networking?
What is the purpose of Managed switches in networking?
What type of information do Link State Protocols use for routing?
What type of information do Link State Protocols use for routing?
What do Exterior Gateway Protocols require for routing between autonomous systems and between Internet Service Providers?
What do Exterior Gateway Protocols require for routing between autonomous systems and between Internet Service Providers?
What do Hierarchies in networking organize?
What do Hierarchies in networking organize?
What can VPNs provide over public or non-secure networks?
What can VPNs provide over public or non-secure networks?
What type of routing does RIP use?
What type of routing does RIP use?
Study Notes
- Router actions: when a router receives a packet for another network, it creates a route and hands off the packet to the next router, changing Layer 2 addresses.
- Exterior Gateway Protocols (BGP): used for routing between autonomous systems and between Internet Service Providers. Requires a 16-bit Autonomous System Number and communicates between border routers.
- Interior Gateway Protocols: used for exchanging routing information within networks, such as RIP and OSPF. RIP is a distance vector protocol using hop count and requires less CPU power, but can be inefficient. OSPF uses link state flooding and supports CIDR variable length subnet masks.
- Routing Information Protocol (RIP): a distance vector protocol using hop count, which broadcasts full lists of routes every 60 seconds.
- Link State Protocols: use more information than hop count and converge faster. Open Shortest Path First (OSPF) is an example of a link state protocol.
- Routers can use separate or shared databases for each protocol.
- Routers can be designated as the reference router for others to synchronize their topology maps.
- Routers provide segmentation, reliability, and fast convergence.
- Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the backbone level, and level 2 routers talk to designated level 1 routers at the area level.
- Routers may have one-to-one, one-to-many, or many-to-one I/Os.
- VLANs can be used to group end nodes into separate domains and create a quarantine if needed.
- Managed switches have varying features and configuration interfaces, and security and performance are being improved.
- There are other internetworking devices, such as gateways, and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
- VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a VPN.
- PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or MS-CHAP v1/v2.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of basic networking and routing concepts with this quiz. Topics include router actions, interior and exterior gateway protocols, routing information protocol, link state protocols, VLANs, managed switches, and VPN technologies.