Ch 1: Packet Forwarding Flashcards
Forwarding of network traffic from a Layer 2 perspective uses what information?
a. Source IP address
b. Destination IP address
c. Source MAC address
d. Destination MAC address
e. Data protocol
D. The switch uses the destination MAC address to identify the port out of which the packet should be forwarded.
What type of network device helps reduce the size of a collision domain?
a. Hub
b. Switch
c. Load balancer
d. Router
B. A switch uses the MAC address table to limit the Layer 2 communication between only the two devices communicating with each other.
Forwarding of network traffic from a Layer 3 perspective uses what information?
a. Source IP address
b. Destination IP address
c. Source MAC address
d. Destination MAC address
e. Data protocol
B. The destination IP address is used to locate the longest matching route and the outbound interface out which it should be forwarded.
What type of network device helps reduce the size of a broadcast domain?
a. Hub
b. Switch
c. Load balancer
d. Router
D. Broadcast domains do not cross Layer 3 boundaries. Splitting a Layer 2 topology into multiple subnets and joining them with a router reduces the size of a broadcast domain.
The _________ can be directly correlated to the MAC address table.
a. Adjacency table
b. CAM
c. TCAM
d. Routing table
B. The CAM is high-speed memory that contains the MAC address table.
A ___________ forwarding architecture provides increased port density and forwarding scalability.
a. Centralized
b. Clustered
c. Software
d. Distributed
D. A distributed architecture uses dedicated components for building the routing table, adjacency table, and forwarding engines. This allows for the forwarding decisions to be made closer to the packet’s egress and is more scalable.
CEF is composed of which components? (Choose two.)
a. Routing Information Base
b. Forwarding Information Base
c. Label Information Base
d. Adjacency table
B and D.
CEF is composed of the adjacency table and the Forwarding Information Base.
What happens when a packet contains a destination MAC address that is not in the switch’s MAC address table?
The switch forwards the packet out of every switch port. This is known as unknown unicast flooding because the destination MAC address is not known.
VLANs are defined in the Institute of Electrical and Electronic Engineers (IEEE) 802.1Q standard, which states that 32 bits are added to the packet header. Diagram the layer 2 header with fields.
■ Tag protocol identifier (TPID): This 16-bit is field set to 0x8100 to identify the packet as an 802.1Q packet.
■ Priority code point (PCP): This 3-bit field indicates a class of service (CoS) as part of Layer 2 quality of service (QoS) between switches.
■ Drop elgible indicator (DEI): This 1-bit field indicates whether the packet can be dropped when there is bandwidth contention.
■ VLAN identifier (VLAN ID): This 12-bit field specifies the VLAN associated with a network packet.
The VLAN identifier has only 12 bits, which provides 4094 unique VLANs. Catalyst switches use the following logic for VLAN identifiers. List the VLAN ranges and uses. Hint: VL0, VL1, and three more ranges.
- VLAN 0 is reserved for 802.1P traffic and cannot be modified or deleted. 802.1p tagging is a mechanism to mark ports at layer 2 with a Class of Service (CoS) value to help implement QoS at layer 2, often used with VoIP.
- VLAN 1 is the default VLAN and cannot be modified or deleted.
- VLANs 2 to 1001 are in the normal VLAN range and can be added, deleted, or modified as necessary.
- VLANS 1002 to 1005 are reserved and cannot be deleted.
- VLANs 1006 to 4094 are in the extended VLAN range and can be added, deleted, or modified as necessary.
T/F: A new VLAN is not created with the vlan vlan-id command until the command-line interface (CLI) has been moved back to the global configuration context or a different VLAN identifier.
True.
VLANs are created by using the global configuration command vlan vlan-id. A friendly name (32 characters) is associated with a VLAN through the VLAN submode configuration command name vlan-name. The VLAN is not created until the command-line interface (CLI) has been moved back to the global configuration context or a different VLAN identifier.
T/F: The 802.1Q tags are not included on packets transmitted or received on access ports.
True.
Access ports are the fundamental building blocks of a managed switch. An access port is assigned to only one VLAN. It carries traffic from the specified VLAN to the device connected to it or from the device to other devices on the same VLAN on that switch. The 802.1Q tags are not included on packets transmitted or received on access ports.
Catalyst switches place switch ports as Layer 2 access ports for VLAN 1 by default. The port can be manually configured as an access port with the command switchport mode access. A specific VLAN is associated to the port with the command switchport access {vlan vlan-id | name vlanname}. The ability to set VLANs to an access port by name was recently added with newer code but is stored in numeric form in the configuration.
T/F: Upon receipt of a packet on a remote trunk link, the headers are examined, traffic is associated to the proper VLAN, then the 802.1Q headers are removed, and traffic is forwarded to the next port, based on the destination MAC address for that VLAN.
True.
Trunk ports can carry multiple VLANs. Trunk ports are typically used when multiple VLANs need connectivity between a switch and another switch, router, or firewall and use only one port.
Trunk ports are statically defined on Catalyst switches with the interface command switchport mode trunk. Example 1-5 displays Gi1/0/2 and Gi1/0/3 being converted to a trunk port.
The command show interfaces trunk provides a lot of valuable information in several sections for troubleshooting connectivity between network devices.
T/F: The MAC address table resides in content addressable memory (CAM).
True.
The CAM uses high-speed memory that is faster than typical computer RAM due to its search techniques. The CAM table provides a binary result for any query of 0 for true or 1 for false. The CAM is used with other functions to analyze and forward packets very quickly. Switches are built with large CAM to accommodate all the Layer 2 hosts for which they must maintain forwarding tables.
What happens if an entry does not exist in the local ARP table?
If an entry does not exist in the local ARP table, the device broadcasts an ARP request to the entire Layer 2 switching segment. The ARP request strictly asks that whoever owns the IP address in the ARP request reply. All hosts in the Layer 2 segment receive the request, but only the device with the matching IP address should respond to the request.
The response is unicast and includes the MAC and IP addresses of the requestor. The device then updates its local ARP table upon receipt of the ARP reply, adds the appropriate Layer 2 headers, and sends the original data packet down to Layer 2 for processing and forwarding.