Ch. 8 Internetworking Test
37 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary focus of internetworking in an enterprise?

  • Expanding enterprise networks globally
  • Establishing new communication standards
  • Seamless transfer of information within an enterprise (correct)
  • Creating new hardware for enterprise communications
  • What is the role of a Layer 2 device in internetworking?

  • Modifies the physical address of the packet
  • Translates the type/length field of the packet
  • Transfers data across different network protocols
  • Reads the data link information and uses it to perform some action (correct)
  • What does a bridge or a switch read to identify the protocol of a network packet?

  • Type/length field (correct)
  • Packet's source address
  • Physical address
  • Data link information
  • Why are most internetworking deployments based on established or emerging standards?

    <p>To ensure interoperability and compatibility</p> Signup and view all the answers

    What is the purpose of the Spanning Tree Algorithm (STA) for bridges?

    <p>To eliminate network loops by determining a single path between network segments</p> Signup and view all the answers

    What is the main function of the rapid spanning tree algorithm used in industrial bridges and switches?

    <p>To eliminate network loops by developing a tree structure with minimal delay</p> Signup and view all the answers

    In industrial systems, what is the significance of redundant Ethernet networks?

    <p>They provide backup paths for data transmission to ensure continuity of operations</p> Signup and view all the answers

    What layer of the network is responsible for addressing and routing?

    <p>Layer 3</p> Signup and view all the answers

    What happens if the decimal value of the two Type/Length octets in a frame is fewer than 1500 decimal?

    <p>The frame is expected to have 802.2 control octets follow</p> Signup and view all the answers

    What is the primary purpose of VLANs in industrial networks?

    <p>To allow packets to go beyond individual automation islands</p> Signup and view all the answers

    How does the Spanning Tree Algorithm (STA) create a tree structure?

    <p>By developing a single path between network segments or ports</p> Signup and view all the answers

    What is the significance of Layer 3 packet information in dealing with TCP/IP over Ethernet?

    <p>It provides information about the specific TCP/IP protocol being used for data transmission</p> Signup and view all the answers

    What is a key feature of redundant industrial Ethernet networks?

    <p>They provide backup paths for data transmission to ensure continuity of operations</p> Signup and view all the answers

    What helps determine the root bridge and open loops in a network using the Spanning Tree Algorithm (STA)?

    <p>The number of hops indicated in the configuration messages between bridges</p> Signup and view all the answers

    What does a switch do with the Layer 2 address before moving the information to the addressed location?

    <p>Determines which port to connect based on the address</p> Signup and view all the answers

    Which device connects network segments of the same type?

    <p>Bridge</p> Signup and view all the answers

    What function does a bridge perform when it moves a packet from the source port to the destination port?

    <p>Forwarding</p> Signup and view all the answers

    What is the purpose of the bridge table?

    <p>To ensure that the bridge forwards packets when necessary and blocks unnecessary packets</p> Signup and view all the answers

    Which type of bridge was popular from the mid-1970s to the mid-1980s, but is no longer in use?

    <p>Static bridge</p> Signup and view all the answers

    What does it mean when a bridge operates in 'promiscuous' mode?

    <p>It matches a packet to its bridge table</p> Signup and view all the answers

    If a bridge receives a packet from a workstation for delivery to another workstation and finds no match in the bridge table, what action does it take?

    <p>'Flooding' by sending the packet to all available ports except the port where it originated</p> Signup and view all the answers

    What method is used to accomplish loop elimination in a transparent bridge?

    <p>'Spanning tree algorithm'</p> Signup and view all the answers

    What is one concern with remote bridging in most WAN applications?

    <p>Lack of bandwidth</p> Signup and view all the answers

    What is a switch considered to be in relation to a bridge?

    <p>A multi-port bridge</p> Signup and view all the answers

    What does 'filtering' mean when a bridge operates in this mode?

    <p>There is no match found</p> Signup and view all the answers

    Which protocol is used for routing between autonomous systems and between Internet Service Providers?

    <p>Exterior Gateway Protocols (BGP)</p> Signup and view all the answers

    What type of protocol is OSPF?

    <p>Link state protocol</p> Signup and view all the answers

    Which feature is provided by routers to organize routers into hierarchies?

    <p>Establishment of hierarchies</p> Signup and view all the answers

    What is the purpose of VLANs in networking?

    <p>To create a quarantine for end nodes</p> Signup and view all the answers

    Which technology is used for building a secure and virtual private network environment?

    <p>IPsec</p> Signup and view all the answers

    What are the popular network protocols for VPN developments?

    <p>PPTP, L2TP, and IPsec</p> Signup and view all the answers

    What is the purpose of Managed switches in networking?

    <p>To offer varying features and configuration interfaces</p> Signup and view all the answers

    What type of information do Link State Protocols use for routing?

    <p>Link state flooding</p> Signup and view all the answers

    What do Exterior Gateway Protocols require for routing between autonomous systems and between Internet Service Providers?

    <p>16-bit Autonomous System Number</p> Signup and view all the answers

    What do Hierarchies in networking organize?

    <p>Routers</p> Signup and view all the answers

    What can VPNs provide over public or non-secure networks?

    <p>Confidential, source-authenticated, and content-verified communications</p> Signup and view all the answers

    What type of routing does RIP use?

    <p>Distance vector routing using hop count</p> Signup and view all the answers

    Study Notes

    • Router actions: when a router receives a packet for another network, it creates a route and hands off the packet to the next router, changing Layer 2 addresses.
    • Exterior Gateway Protocols (BGP): used for routing between autonomous systems and between Internet Service Providers. Requires a 16-bit Autonomous System Number and communicates between border routers.
    • Interior Gateway Protocols: used for exchanging routing information within networks, such as RIP and OSPF. RIP is a distance vector protocol using hop count and requires less CPU power, but can be inefficient. OSPF uses link state flooding and supports CIDR variable length subnet masks.
    • Routing Information Protocol (RIP): a distance vector protocol using hop count, which broadcasts full lists of routes every 60 seconds.
    • Link State Protocols: use more information than hop count and converge faster. Open Shortest Path First (OSPF) is an example of a link state protocol.
    • Routers can use separate or shared databases for each protocol.
    • Routers can be designated as the reference router for others to synchronize their topology maps.
    • Routers provide segmentation, reliability, and fast convergence.
    • Hierarchies are established to organize routers. Level 2 routers talk to level 2 routers at the backbone level, and level 2 routers talk to designated level 1 routers at the area level.
    • Routers may have one-to-one, one-to-many, or many-to-one I/Os.
    • VLANs can be used to group end nodes into separate domains and create a quarantine if needed.
    • Managed switches have varying features and configuration interfaces, and security and performance are being improved.
    • There are other internetworking devices, such as gateways, and VPNs provide confidential, source-authenticated, and content-verified communications over public or non-secure networks.
    • VPNs create a secure and virtual private network environment, and there are different technologies, such as SSL and IPsec, for building a VPN.
    • PPTP, L2TP, and IPsec are popular network protocols for VPN developments, and they can be authenticated using Challenge-Handshake Authentication Protocol or MS-CHAP v1/v2.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Internetworking Ch. 8.pptx

    Description

    Test your knowledge of basic networking and routing concepts with this quiz. Topics include router actions, interior and exterior gateway protocols, routing information protocol, link state protocols, VLANs, managed switches, and VPN technologies.

    More Like This

    Dynamic Routing Protocols Quiz
    7 questions
    Ch. 8 Internetworking Review
    33 questions
    Use Quizgecko on...
    Browser
    Browser