Certmaster Explaining Network Topologies and Types Flashcards
A network administrator is looking at a switch where the network is not converged. What does this mean?
A.Regular communications are not taking place
B.Builds MAC address table
C.Discovers topology of network
D.Drops BPDU frames
A
When the network is not converged, no communications can take place. Under the original 802.1D standard, this made the network unavailable for extended periods (tens of seconds) during configuration changes.
In learning mode, the port discovers the topology of the network and builds the MAC address table. It does not forward frames, but it does learn MAC addresses.
In listening mode, the port is listening for BPDUs to detect loops.
In dropping mode, it drops all frames other than bridge protocol data units (BPDUs). When all ports on all switches are in forwarding or blocking states, the network is converged.
A network technician does not have enough ports on a single switch and has to connect multiple switches. What should the technician research for interconnections between switches?
A.MDI-X
B.Uplink port
C.Trunks
D.Crossover cables
C
The interconnections between switches are known as trunks. The network technician should configure one of the ports on each switch as a trunk port for this purpose.
When a switch needs to connect to another switch, communications would fail if both interfaces used media-dependent interface crossover (MDI-X).
Historically (in the days of hubs and very early 10/100 switches), dedicated uplink ports connected to switches. Multiple switches may also deploy to provide redundant links.
Network administrators used crossover cables in conjunction with dedicated uplink ports to connect switches. The actual connections, though, are known as trunks.
A network analyst is looking at traffic from switches to other switches, which determines the shortest path. What is this called?
A.Bus
B.BPDU
C.DPs
D.Lowest ID
B
The spanning tree protocol (STP) information gets packaged as bridge protocol data unit (BPDU) multicast frames. Each switch then determines the shortest path to the root bridge by exchanging information with other switches.
A bus is a topology that is not part of the traditional three-tiered network. A physical bus topology with more than two nodes is a shared access topology, meaning that all nodes share the media’s bandwidth.
The root bridge has two designated ports (DP) connected to Bridge A and Bridge B. There are also root ports (RP) connected back to the interfaces on the root bridge.
The switch with the lowest ID, comprising a priority value and the MAC address, will be selected as the root.
A network administrator is configuring the handling of frames addressed to ports within the same VLAN on the same switch. In this context, what happens to the frame when it reaches its destination port?
A.Forwarded to trunk
B.No tag is added
C.Tag is stripped
D.The packet is dropped
B
If the frame gets addressed to a port in the same VLAN on the same switch, then the administrator does not need to add a tag to the frame.
If the frame needs transporting over a trunk link, then the switch adds the relevant 802.1Q tag to identify the VLAN and then forwards the frame over the trunk port.
If the switch receives an 802.1Q tagged frame on an access port, it strips the tag before forwarding it.
The packet would not get dropped unless there was some other external logic that would cause the packet to get dropped.
A network administrator wants to set up a switch port to integrate with Virtual Local Area Networks (VLANs) to distinguish the PC and VoIP traffic without having to set up a trunk port. Which of the following commands should the administrator perform first?
A.interface GigabitEthernet0/0
B.switchport mode access
C.switchport access vlan 100
D.switchport voice vlan 101
A
The interface GigabitEthernet0/0 is the first command. This command will allow the network administrator to configure access to VLAN(s) along with various other settings for the switch port.
The switchport mode access is the second command. To accommodate the lack of dedicated wall ports for handsets, most Voice over Internet Protocol (VoIP) endpoints incorporate an embedded switch with just two external ports.
The switchport access vlan 100 is the third command for the interface configuration to assign traffic from the PC to VLAN 100 and the voice traffic to VLAN 101.
The switchport voice vlan 101 is the last line to assign traffic accordingly.
A network architect is researching VLAN IDs (VID) for each frame, to preserve them for the receiving switch to forward them correctly. The network architect should look at which standard?
A.802.1p
B.802.1Q
C.802.1x
D.802.3
B
The IEEE 802.1Q standard normally defines VIDs under 802.1Q. A tag inserted in the Ethernet frame, between the Source Address and EtherType fields, identifies each VLAN traffic.
The administrator implemented IEEE 802.1p, which can operate at Layer 2 (independently or in conjunction with DiffServ) to classify and prioritize traffic passing over a switch or wireless access point.
The IEEE 802.1X Port-based Network Access Control (NAC) protocol provides the means of using an Extensible Authentication Protocol (EAP) method when a device connects to an Ethernet switch port, wireless access point, or Virtual Private Network (VPN) gateway.
The most important standard developed is the Institute of Electrical and Electronics Engineers (IEEE) 802.3 Ethernet standards.
A network architect is reviewing the architecture for a large company. Which of the following tiers is NOT part of the traditional three-tiered network hierarchy?
A.Access
B.Distribution
C.Bus
D.Core
C
A bus is a type of topology and is not part of the traditional three-tiered network. A physical bus topology with more than two nodes is a shared access topology, meaning that all nodes share the bandwidth of the media.
The access or edge layer allows end-user devices such as computers, printers, and smartphones, to connect to the network. The network architect implements the access layer for each site using structured cabling and wall ports.
The distribution or aggregation layer provides fault-tolerant interconnections between different access blocks and either the core or other distribution blocks.
The core layer provides a highly available network backbone. Devices, such as client and server computers, should not be attached directly to the core.