Chapter 6 - Review

Network+ Guide to Networks, Chapter 6 Review
Network Hardware, Switching, and, Routing.

Chapter Summary

Network adapters come in a variety of types depending on access method (Ethernet), network transmission speed (for example, 100 Mbps versus 1 Gbps), connector interfaces (for example, SC versus RJ-45), number of ports, type of compatible motherboard or device, and manufacturer.

Newer computers may come with PCIe expansion board NICs, which attach to the motherboard via an expansion slot, or on-board NICs (especially in the case of laptops), which are integrated into the motherboard. Peripheral NICs, such as those that connect via USB port, can also be used.

NICs are designed to be used with either wire-bound or wireless connections. A wireless NIC uses an antenna to exchange signals with the network. This type of connectivity suits environments in which cabling cannot be installed or where roaming clients must be supported.

Modular interfaces such as GBICs (Gigabit interface converters) and SFP (small formfactor pluggable) transceivers enable network administrators to add and remove network connections to and from connectivity devices without negatively affecting operations.

Repeaters are the connectivity devices that perform the regeneration of a digital signal. They belong to the Physical layer of the OSI model; therefore, they do not have any means to interpret the data they are retransmitting.

At its most primitive, a hub is a multiport repeater. A hub contains multiple data ports into which the patch cables for network nodes are connected. The hub accepts signals from a transmitting node and repeats those signals to all other connected nodes in a broadcast fashion, thereby creating a single collision domain. Most hubs also contain one port, called an uplink port, which allows the hub to connect to another hub or other connectivity device.

Bridges resemble repeaters in that they have a single input and a single output port, but they can interpret the data they retransmit. Bridging occurs at the Data Link layer of the OSI model. Bridges read the destination’s MAC address information and decide whether to forward (retransmit) a packet to another segment on the network or, if the destination address belongs to the same segment as the source address, discard it.

As nodes transmit data through the bridge, the bridge establishes a filtering database of known MAC addresses and their locations on the network. The bridge uses its filtering database to determine whether a packet should be forwarded or filtered.

Switches subdivide a network into smaller, logical pieces. They operate at the Data Link layer (Layer 2) of the OSI model and can interpret MAC address information. In this respect, switches resemble bridges.

Switches are generally secure because they isolate one devices traffic from other devicestraffic. Because switches provide separate channels for potentially every device, they allow applications that transfer a large amount of traffic and that are sensitive to time delays, such as videoconferencing, to make full use of the network’s capacity.

A switch running in cut-through mode reads a frame’s header and decides where to forward the data before it receives the entire packet. In store-and-forward mode, switches read the entire data frame into their memory and check it for accuracy before transmitting it. Although this method is more time consuming than the cut-through method, it allows store-and-forward switches to transmit data more accurately.

Switches can create VLANs (virtual local area networks) by logically grouping several ports into a broadcast domain. The ports do not have to reside on the same switch or even on the same network segment. VLANs can isolate nodes and their traffic for security, easier management, or better performance. Multiple VLANs can be carried over single switch interfaces using VLAN trunking.

On networks with several interconnected switches, STP (Spanning Tree Protocol) prevents traffic loops (and, as a consequence, broadcast storms) by calculating paths that avoid potential loops and by artificially blocking the links that would complete a loop.

Manufacturers are producing switches that can operate at Layer 3 (Network layer) and Layer 4 (Transport layer) of the OSI model, making them act more like routers. The ability to interpret higher-layer data enables switches to perform advanced filtering, statistics keeping, and security functions.

A router is a multiport device that can connect dissimilar LANs and WANs running at different transmission speeds, using a variety of protocols. Routers interpret logical addresses and determine the best path between nodes. They operate at the Network layer (Layer 3) or higher of the OSI model.

Static routing is a technique in which a network administrator programs a router to use specific paths between nodes. Dynamic routing automatically calculates the best path between two nodes and accumulates this information in a routing table. If congestion or failures affect the network, a router using dynamic routing can detect the problems and reroute data through a different path. Most modern networks use dynamic routing.

To determine the best path, routers communicate with each other through routing protocols. Different routing protocols use different routing metrics to choose the best path.

Routing metrics may factor in the number of hops between nodes, throughput, delay, MTU, cost, load, and reliability.

Distance-vector routing protocols determine the best route for data based on the distance to a destination. Some distance-vector routing protocols only factor in the number of hops to the destination, while others take into account latency and other network traffic characteristics.

A link-state routing protocol enables routers across a network to share information, after which each router can independently map the network and determine the best path between itself and a packet’s destination node.

Some routing protocols reflect characteristics of both link-state and distance-vector routing protocols and are known as hybrid routing protocols.

RIP (Routing Information Protocol), a distance-vector routing protocol, is the slowest and least secure and limits transmissions to 15 hops. RIPv2 makes up for some of the original RIP’s overhead and security limitations, but its forwarding remains limited to 15 hops. RIP belongs to the IGP (Interior Gateway Protocol) category of protocols that can forward data only within an autonomous LAN.

  BGP (Border Gateway Protocol), used primarily for routing over Internet backbones, uses the most complex best-path calculation of all the commonly used routing protocols. It’s considered a border routing protocol.

OSPF (Open Shortest Path First) is a link-state routing protocol used on interior or border routers. It was introduced as an improvement to RIP and can coexist with RIP (or RIPv2) on a network. Unlike RIP, OSPF imposes no hop limits on a transmission path. Also, OSPF uses a more complex algorithm for determining best paths than RIP uses.

IS-IS uses virtually the same methods as OSPF to calculate best paths, is less common, and is limited to interior routers.

EIGRP (Enhanced Interior Gateway Routing Protocol) is a hybrid EGP type of routing protocol and is a Cisco standard commonly used on LANs that use exclusively Cisco routers.

Gateways are combinations of networking hardware and software that connect two dissimilar kinds of networks. Specifically, they may connect two systems that use different formatting, 
communications protocols, or architecture. To accomplish this task, they must operate at multiple layers of the OSI model.

Several different network devices can perform functions at multiple layers of the OSI model, including e-mail gateways, Internet gateways, LAN gateways, firewalls, and voice/data gateways.


Key Terms

802.1D - The IEEE standard that describes, among other things, bridging and STP (Spanning Tree Protocol).
802.1q - The IEEE standard that specifies how VLAN and trunking information appear in frames and how switches and bridges interpret that information.
802.1w - The IEEE standard that describes RSTP (Rapid Spanning Tree Protocol), which evolved from STP (Spanning Tree Protocol).
access port - The interface on a switch used for an end node. Devices connected to access ports are unaware of VLAN information.
application switch A - switch that provides functions between Layer 4 and Layer 7 of the OSI model.
backplane - A synonym for motherboard, often used in the context of switches and routers.
best path - The most efficient route from one node on a network to another. Under optimal network conditions, the best path is the most direct path between two points. However, when traffic congestion, segment failures, and other factors create obstacles, the most direct path might not be the best path.
BGP (Border Gateway Protocol) - A distance-vector routing protocol capable of considering many factors in its routing metrics. BGP, an Exterior Gateway Protocol, is the routing protocol used on Internet backbones.
BID (Bridge ID) - A combination of a 2-byte priority field and a bridge’s MAC address, used in STP (Spanning Tree Protocol) to select a root bridge.
Border Gateway Protocol - See BGP.
border router - A router that connects an autonomous LAN with an exterior network—for example, the router that connects a business to its ISP. bridge A connectivity device that operates at the Data Link layer (Layer 2) of the OSI model and reads header information to forward packets according to their MAC addresses. Bridges use a filtering database to determine which packets to discard and which to forward. Bridges contain one input and one output port and separate network segments.
Bridge ID - See BID.
bus - The type of circuit used by a computer’s motherboard to transmit data to components. Most new Pentium computers use buses capable of exchanging 32 or 64 bits of data. As the number of bits of data a bus handles increases, so too does the speed of the device attached to the bus.
content switch - A switch that provides functions between Layer 4 and Layer 7 of the OSI model.
convergence time - The time it takes for a router to recognize a best path in the event of a change or network outage.
cost - In the context of routing metrics, the value assigned to a particular route as judged by the network administrator. The more desirable the path, the lower its cost.
cut-through mode - A switching mode in which a switch reads a frame’s header and decides where to forward the data before it receives the entire packet. Cut-through mode is faster, but less accurate, than the other switching method, store-and-forward mode.
device driver - The software that enables an attached device to communicate with the computer’s operating system.
distance-vector - The simplest type of routing protocols, these determine the best route for data based on the distance to a destination. Some distance-vector routing protocols, like RIP, only factor in the number of hops to the destination, while others take into account latency and other network traffic characteristics.
driver - See device driver.
dynamic routing - A method of routing that automatically calculates the best path between two nodes and accumulates this information in a routing table. If congestion or failures affect the network, a router using dynamic routing can detect the problems and reroute data through a different path. Modern networks primarily use dynamic routing.
EGP (Exterior Gateway Protocol) - A routing protocol that can span multiple, autonomous networks. BGP and EIGRP are examples of Exterior Gateway Protocols.
EIGRP (Enhanced Interior Gateway Routing Protocol) - A routing protocol developed in the mid-1980s by Cisco Systems that has a fast convergence time and a low network overhead, but is easier to configure and less CPU-intensive than OSPF. EIGRP also offers the benefits of supporting multiple protocols and limiting unnecessary network traffic between routers.
Enhanced Interior Gateway Routing Protocol - See EIGRP.
ethtool - A popular tool for viewing and modifying network interface properties on Linux computers.
expansion board - A circuit board used to connect a device to a computer’s motherboard.
expansion card - See expansion board.
expansion slot - A receptacle on a computer’s motherboard that contains multiple electrical contacts into which an expansion board can be inserted.
Exterior Gateway Protocol - See EGP.
exterior router - A router that directs data between nodes outside a given autonomous LAN, for example, routers used on the Internet’s backbone.
filtering database - A collection of data created and used by a bridge that correlates the MAC addresses of connected workstations with their locations. A filtering database is also known as a forwarding table.
firewall - A device (either a router or a computer running special software) that selectively filters or blocks traffic between networks. Firewalls are commonly used to improve data security.
forwarding table - See filtering database.
gateway - A combination of networking hardware and software that connects two dissimilar kinds of networks. Gateways perform connectivity, session management, and data translation, so they must operate at multiple layers of the OSI model.
gateway router - See border router.
GBIC (Gigabit interface converter) - A standard type of modular interface designed in the 1990s for Gigabit Ethernet connections. GBICs may contain RJ-45 or fiber-optic cable ports (such as LC, SC, or ST). They are inserted into a socket on a connectivity device’s backplane.
Gigabit interface converter - See GBIC.
hot-swappable - The feature of a component that allows it to be installed or removed without disrupting operations.
hub - A connectivity device that retransmits incoming data signals to its multiple ports. Typically, hubs contain one uplink port, which is used to connect to a network’s backbone.
IGP (Interior Gateway Protocol) - A routing protocol, such as RIP, that can only route data within an autonomous (internal) network.
interior router - A router that directs data between nodes on an autonomous LAN.
Intermediate System to Intermediate System - See IS-IS.
Interior Gateway Protocol - See IGP.
IS-IS (Intermediate System to Intermediate System) - A link-state routing protocol that uses a best-path algorithm similar to OSPF’s. IS-IS was originally codified by ISO, which referred to routers as “intermediate systems,” thus the protocol’s name. Unlike OSPF, IS-IS is designed for use on interior routers only.
Layer 3 switch - A switch capable of interpreting data at Layer 3 (Network layer) of the OSI model.
Layer 4 switch - A switch capable of interpreting data at Layer 4 (Transport layer) of the OSI model.
link-state - A type of routing protocol that enables routers across a network to share information, after which each router can independently map the network and determine the best path between itself and a packet’s destination node.
loopback adapter - See loopback plug.
loopback plug - A connector used for troubleshooting that plugs into a port (for example, a serial, parallel, or RJ-45 port) and crosses over the transmit line to the receive line, allowing outgoing signals to be redirected back into the computer for testing.
main bus - See bus.
mini GBIC - See SFP.
on-board NIC - A NIC that is integrated into a computer’s motherboard, rather than connected via an expansion slot or peripheral bus.
on-board port - A port that is integrated into a computer’s motherboard.
Open Shortest Path First - See OSPF.
OSPF (Open Shortest Path First) - A routing protocol that makes up for some of the limitations of RIP and can coexist with RIP on a network.
PCIe (PCI Component Interconnect Express) - A 32-bit bus standard capable of transferring data at up to 1 Gbps per data path, or lane, in full-duplex transmission. PCIe is commonly used for expansion board NICs.
PCI Component Interconnect Express - See PCIe.
Rapid Spanning Tree Protocol - See RSTP.
RIP (Routing Information Protocol) - The oldest routing protocol that is still widely used, RIP is a distance-vector protocol that uses hop count as its routing metric and allows up to only 15 hops. It is considered an IGP. Compared with other, more modern, routing protocols, RIP is slower and less secure.
RIPv2 (Routing Information Protocol version 2) - An updated version of the original RIP routing protocol, which makes up for some of its predecessor’s overhead and security flaws. However, RIPv2’s packet forwarding is still limited to a maximum 15 hops.
root bridge - The single bridge on a network selected by the Spanning Tree Protocol to provide the basis for all subsequent path calculations.
router - A multiport device that operates at Layer 3 of the OSI model and uses logical addressing information to direct data between networks or segments. Routers can connect dissimilar LANs and WANs running at different transmission speeds and using a variety of Network layer protocols. They determine the best path between nodes based on traffic congestion, available versus unavailable routes, load balancing targets, and other factors.
Routing Information Protocol - See RIP.
Routing Information Protocol version 2 - See RIPv2.
routing metric - The method used by routing protocols to determine the best path for data to follow over a network. Routing metrics may be calculated using any of several variables, including number of hops, bandwidth, delay, MTU, cost, and load.
routing protocols - The means by which routers communicate with each other about network status. Routing protocols determine the best path for data to take between nodes.
routing switch - See Layer 3 switch.
routing table - A database stored in a router’s memory that maintains information about the location of hosts and best paths for forwarding packets to them.
RSTP (Rapid Spanning Tree Protocol) - As described in IEEE’s 802.1w standard, a version of the Spanning Tree Protocol that can detect and correct for network changes much more quickly.
runt - An erroneously shortened packet.
SFP (small form-factor pluggable) transceiver - A standard hot-swappable network interface used to link a connectivity device’s backplane with fiber-optic or copper cabling. SFPs are known as mini GBICs because they perform a similar function as GBICs, but have a smaller profile. Current SFP standards enable them to send and receive data at up to 10 Gbps.
SFP GBIC - See SFP.
Spanning Tree Protocol - See STP.
static routing - A technique in which a network administrator programs a router to use specific paths between nodes. Because it does not account for occasional network congestion, failed connections, or device moves and requires manual configuration, static routing is not optimal.
store-and-forward mode-  A method of switching in which a switch reads the entire data frame into its memory and checks it for accuracy before transmitting it. Although this method is more time consuming than the cut-through method, it allows store-and-forward switches to transmit data more accurately.
STP (Spanning Tree Protocol) - A switching protocol defined in IEEE 802.1D. STP operates in the Data Link layer to prevent traffic loops by calculating paths that avoid potential loops and by artificially blocking links that would complete a loop. Given changes to a network’s links or devices, STP recalculates its paths.
switch - A connectivity device that logically subdivides a network into smaller, individual collision domains. A switch operates at the Data Link layer of the OSI model and can interpret MAC address information to determine whether to filter (discard) or forward packets it receives.
system bus - See bus.
trunk port - The interface on a switch capable of managing traffic from multiple VLANs.
trunking - The aggregation of multiple logical connections in one physical connection between connectivity devices. In the case of VLANs, a trunk allows two switches to manage and exchange data between multiple VLANs.
uplink port - A port on a connectivity device, such as a hub or switch, used to connect it to another connectivity device.
virtual local area network - See VLAN.
VLAN (virtual local area network) - A network within a network that is logically defined by grouping its devices’ switch ports in the same broadcast domain. A VLAN can consist of any type of network node in any geographic location and can incorporate nodes connected to different switches.
VLAN trunking protocol - See VTP.
VTP (VLAN trunking protocol) - Cisco’s protocol for exchanging VLAN information over trunks. VTP allows one switch on a network to centrally manage all VLANs.

Review Questions

1.   Which of the following utilities could you use to force the NIC on your Linux server to use full-duplex transmission?
a.   ipconfig
b.   ifconfig
c.   iftool
d.  ethtool


2.   Which of the following is a significant advantage to using an SFP interface on a router rather than an on-board NIC?
a. The SFP will be capable of higher throughputs.
b. The SFP can be added or removed without affecting operations, thus allowing for customization and future upgrades.
c. The SFP can accept multiple types of connectors, allowing the router to connect two disparate network types.
d. The SFP promises greater security, as it can encrypt and decrypt data.

  
3.   You and a friend decide to set up Fast Ethernet networks in your respective houses to connect a half-dozen computers at each location. Both of you will connect your networks to high-speed Internet connections. As the connectivity device for end nodes, you purchase a router, whereas your friend uses an old, but functional, 12-port hub he found at a garage sale. Which of the following will your network do that your friend’s network won’t do?

a.   Filter traffic based on IP address.
b.   Transmit data from any one of the connected computers to any other.
c.   Create a VLAN out of some of the computers to isolate their transmissions and prevent them from affecting other connections.
d.   Allow other connectivity devices to be added to the network in the future.


4.   You are a network technician working on a 100Base-T network. A coworker has been having trouble logging on to the server and asks whether you can quickly tell her if her workstation’s NIC is operating properly. You do not have the NIC’s utility disk on hand, but you look at the back of her workstation and learn that although the NIC is properly installed and connected to the network, something’s wrong with it. What might you have seen that causes you to come to this conclusion?
a.   Its activity LED is blinking green.
b.   Its loopback plug is improperly terminated.
c.   It has two types of receptaclesSC and RJ-45—and the wrong one is in use.
d.  None of its LEDs are lit.


5.   How do bridges keep track of whether they should forward or filter frames?
a.   From each frame they receive, they extract source addresses; those frames whose source addresses don’t belong to the bridge’s broadcast domain are filtered.
b.   They hold each frame until it is requested by the destination node, at which time the bridge forwards the data to the correct segment based on its MAC address.
c.   They maintain a filtering database that identifies which frames can be filtered and which should be forwarded, based on their destination MAC address.
d.   They compare the incoming frames network address to known addresses on both segments and filter those that don’t belong to either.

`
6.   Which of the following distinguishes switches from repeating devices, such as hubs?
a.   Switches separate collision domains.
b.   Switches separate broadcast domains.
c.   Switches can alert the network administrator to high data collision rates.
d.   Switches do not examine Network layer protocol information, which makes them faster than repeating devices.


7.   In cut-through switching, which frame field does the switch never read?
a.   Start frame delimiter
b.   Source address
c.   Frame check sequence
d.   Protocol type


8.   What potential problem does STP (Spanning Tree Protocol) address?
a.   An excess of erroneously short packets
b.  A broadcast storm
c.   Network congestion due to a router failure
d.   Slow convergence time


9.   You are asked to configure a backbone switch that connects servers supplying oceanic and atmospheric data to mariners and pilots around the world. Your network’s traffic load is very high at all times, day and night. What type of switching do you configure the switch to use?
a.   Bypass switching
b.  Store-and-forward switching
c.   Cut-through switching
d.   Message switching


10. Suppose your company’s network contains two separate VLANs. Computer A is on the Customer Service VLAN and Computer B is on the Warehouse VLAN. Besides a Layer 2 switch, what device is required for Computer A and Computer B to exchange data?
a.   Repeater
b.   Bridge
c.   Multiplexer
d.  Router


11. In STP, what device acts as a guide to setting the best paths between switches?
a.   Root bridge
b.   Workgroup bridge
c.   Parent bridge
d.   Link bridge


12. What switching technique allows you to funnel traffic belonging to more than one VLAN through a single switch interface?
a.   Jamming
b.   Route capturing
c.   Trunking
d.   Multiplexing


13. Which of the following identifies the VLAN to which each piece of data belongs?
a.   A shim added to each packet’s header
b.   An envelope that encapsulates each packet
c.   A tag added to each frame’s header
d.   A FCS added to each packet’s header


14. Which of the following routing protocols is used on the Internet’s backbone?
a.   EIGRP
b.   OSPF
c.   BGP
d.   RIP


15. Which of the following types of routing protocols allows routers to exchange information about best paths with their neighboring routers only?
a.   Link-state
b.   Hybrid
c.   Distance-vector
d.   All of the above


16. Why is a large, busy network more likely to use dynamic routing?
a.   Because dynamic routing is the default option on most routers, and it is difficult to configure routers to use static routing.
b.   Because dynamic routing is the only routing method compatible with the
BGP routing protocol, which is necessary for routing between WANs.
c.   Because dynamic routing allows for stricter IP filtering and, therefore,
offers greater data security than static routing.
d.  Because dynamic routing automatically selects the most efficient route between nodes, reducing the possibility for human error.

  
17. A packet on a network using the RIP routing method has been passed from one connectivity device to another 15 times. What happens when it gets passed to one more device?
a.   It is returned to the node that originally transmitted it.
b.   It is encapsulated by the routing protocol and retransmitted.
c.   It is forwarded to its destination by the last device.
d.  It is discarded.


18. Which of the following factors is not considered when OSPF determines the best path for a packet?
a.   Link failure
b.  Number of hops
c.   Throughput
d.   Latency


19. What is a router’s convergence time?
a.   The time a router takes to interpret Layer 2 addressing information for any given frame.
b.   The maximum amount of time a router is allowed for choosing the best path
c.   The time it takes for a router to recognize a best path in the event of a change or network outage
d.   The time it takes for border routers to exchange routing table information


20. At which layers of the OSI model are gateways capable of functioning?
a.   Layers 1 and 2
b.   Layers 2 and 3
c.   Layers 1, 2, and 3
d.  At all layers


Sample Quiz

1. Which statement is true with regard to routers?
a. A router is a very inflexible device.
b. Routers connect dissimilar networks.               
c. A router must connect to a switch to monitor network traffic and report statistics.      
d. If a primary path is down, a router cancels the transmission.  


2. A ________ is a multiport connectivity device that directs data between nodes on a network.
a. gateway         
b. switch             
c. NIC   
d. router             
3. A device driver is software that enables an attached device to communicate with the computer's operating system.
a. True 
b. False


4. In ________ mode, a switch reads the entire data frame into its memory and checks it for accuracy before transmitting the information.
a. store-and-forward    
b. cut-through  
c. autonomous
d. fragment free             


5. Routers can create VLANs within networks by grouping a number of ports into a broadcast domain.
a. True 
b. False


6. ________ are the simplest type of connectivity devices that regenerate a digital signal.
a. Bridges           
b. Repeaters     
c. Gateways      
d. Firewalls        


7. Routers using RIP broadcast their routing tables every 30 seconds to other routers, but only if the tables have changed.
a. True 
b. False


8. In broad terms, ________ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
a. gateways       
b. switches        
c. routers            
d. NICs


9. By far, the most popular expansion board NIC today is one that uses a PCI bus.
a. True 
b. False


10. A server may act as a LAN gateway.
a. True 
b. False


11. Which statement is true with regard to switches?
a. Switches handle continuous, heavy traffic very efficiently.     
b. All switches operate at the Data Link layer of the OSI model.
c. Each port on a switch acts like a bridge.            
d. Backbone routers provide better security and better performance over switches.      


12. Which NIC attaches to the computer using an external PCMCIA slot?
a. Onboard        
b. Peripheral     
c. Expansion board         
d. USB  


13. ________ are devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame's MAC address.
a. Routers          
b. Gateways      
c. Bridges
d. Switches


14. ________ are connectivity devices that subdivide a network into smaller logical pieces, or segments.
a. Gateways      
b. Routers          
c. Switches         
d. Hubs


15. Which modular interface has made the GBIC largely obsolete?
a. RJ-45                
b. PCI   
c. PCIe
d. SFP