Key Topic Review Flashcards
Collision Domain
A network segment where packets can collide
Discuss flooding and unknown unicast flooding
Flooding - sending a frame out all ports
Unknown Unicast Flooding - Received a packet with a destination MAC that is unknown to the switch so it floods it out all ports except originator
Describe togology based switching
Layer 3 routing information builds and populates a single database of the entire network topology. The database is consulted for forwarding. The longest match found is used as the layer 3 destination.
Describe the CAM (Content Addressable Memory) table
As frames arrive on ports MAC addresses added to CAM table with MAC correspondant to receiving port. VLAN and timestamp also added.
Explain TCAM (Ternary Content-Addressable Memory)
TCAM values are composed of value, mask, and result combinations. Fields from frame or packet headers are fed into the TCAM, where they are matched against the value and mask pairs to yield a result.
Values - 134-bit quantities, consisting of source and destination addresses and other relevant protocol information
Masks - 134-bit quantities, in exactly the same format, or bit order, as the values. Masks select only the value bits of interest.
Results - Numeric values that represent what action to take after the TCAM lookup occurs.
Discuss the properties of Ethernet switching.
Addresses the problems of collisions by reducing the number of users connected to an Ethernet segment. Typically allows for full duplex with only once device connected to either end of the cable.
Explain Ethernet auto negotiation.
The link speed is determined by electrical signaling so that either end of a link can determine what speed the other end is trying to use. If both ends of the link are configured to autonegotiate, they will use the highest speed that is common to them.
A link’s duplex mode, however, is negotiated through an exchange of information. This means that for one end to successfully autonegotiate the duplex mode, the other end also must be set to autonegotiate. Otherwise, one end never will see duplex information from the other end and won’t be capable of determining the correct mode to use. If duplex autonegotiation fails, a switch port always falls back to its default setting: half duplex.
Discuss the similarities and differences between Ethernet types.
Similarities
-Scale speed by using the same IEEE 802.3 frame format
Differences
- Physical layer has been modified to increase data-transmission speeds.
- Merged IEEE 802.3 standard and the ANSI X3T11 FibreChannel standard to gain speed.
Describe 10-Gigabit Ethernet
- Differs only at the physical layer
- Only operates at full duplex
Two classifications of transceivers that can be used as Physical Media Dependent (PMD) interfaces
LAN PHY-Interconnects switches in a campus network, predominantly in the core layer
WAN PHY-Interfaces with existing synchronous optical network (SONET) or synchronous digital hierarchy (SDH) network typically found in metropolitan-area network.
Explain VLAN characteristics
A single broadcast domain.
Discuss how to create a VLAN
- VLAN must be created on a switch
- Must be assigned to specific ports
- VLANs 1002 through 1005 for special use
- Default range 1 to 1001 and 1 to 4094 with extended VLANs
- Extended range only works in transparent mode
Discuss planning strategies for VLAN implementation and the two types of VLANs
Things to consider: traffic patterns, application types, segmentation of common workgroups, and network-management requirements.
Cisco recommends a one-to-one correspondence between VLANs and IP subnets. VLANs sholud not extend beyond the layer 2 domain of the distribution switch. IE should not straddle the core.
End-to-End VLANs (aka campuswide VLANs) span the entire switch fabric of a network. Users maintain VLAN regardless of physical location.
Local VLANs-In today’s world most users follow the 20/80 rule. These VLANs group users based on geographic location.
Explain 802.1Q Trunking
Used to carry VLAN associations over trunk links. 802.1Q does not perform encapsulation like ISL. It embeds tagging information within the layer 2 frame. Introduces concept of native VLAN (defaults to 1).
Dynamic Trunking Protocol (DTP) and VLAN trunk configuration
Used to autonegotiate trunking protocol. Default setting is negotiate. Favors ISL if both sides support it. Trunks can be configured to determine which VLANs they will trunk. Trunk switchports can be set to any of the below three settings:
Trunk - This setting places the port in permanent trunking mode. DTP is still operational so if the far-end switch port is configured to trunk, dynamic desirable or dynamic auto mode, trunking will negotiate successfully.
Dynamic Desirable (the default) - The port actively attempts to convert the link into trunking mode. Will successfully negotiate with any of the three settings.
Dynamic Auto - The port can be converted into a trunk link, but only if the far-end switch actively requests it. If both ends are set to dynamic auto the trunk will not come up.
Use switchport nonegotiate to disable DTP
What must be agreeable on both ends before a trunk can be enabled?
Trunking mode (IE can’t both be auto), trunk encapsulation, native VLAN (trunk will come up, but with errors), and allowed VLANs (will come up as trunk, but VLANs discontinuous)
How is port duplex mode configured?
Ports operate either in half-duplex, full-duplex, or autonegotiated mode. Autonegotiation is only performed over UTP fast ethernet and gigabit ethernet ports. Autonegotiation works by attempting full-duplex operation first and half if full is unsuccessful.
FastEthernet1/0/1 is up, line protocol is up
What do the two ups refer to respectively?
The first up tells the state of the port’s physical or data link layer. If this is down, the link is physically disconnected or a link cannot be detected.
The second up shows the layer 2 status. If the state is given as errdisable the switch has detected a serious error condition on this port and has automatically disabled it.
How do you detect duplex mismatches?
Use the show interface command and look for error counts greater than 0. You may also notice a high runt count.
Describe the VTP modes
Server mode - VTP servers have full control over VLAN creation and modification for their domains. This is the default switch state.
Client Mode - VTP clients do not allow the administrator to create, change, or delete any VLANs. They will listen and modify configs based on advertisements from other switches. Will forward.
Transparent Mode - Will not participate in VTP. In version 1 they will not relay VTP information to other switches unless the VTP domain names and version match. In version 2 they will relay all VTP information out their trunks.
Explain VTP configuration revision number
Configuration revision number used to keep track of the most recent information. Every switch in the VTP domain stores the most recent revision number received. Always defaults to 0. VTP servers will push version number out if not already configured on other switches (and they are version 2 capable).
Explain VTP synchronization problem
If a switch is introduced in VTP sever mode with a high revision number it will override the settings on all other switches. For critical portions of the network consider using VTP transparent mode to prevent the issue.
How can you verify VTP settings?
show vtp status
What is VTP pruning?
VTP pruning makes more efficient use of trunk bandwidth by reducing unnecessary flooded traffic. Broadcast and unknown unicast frames on a VLAN are forwarded over a trunk link only if the switch on the receiving end of the trunk has ports in that VLAN.
Describe EtherChannel bundling
Two to eight links of the same type can be bundled together for use in their aggregate bandwidth.
Explain how traffic is distributed in EtherChannel
Frames are forwarded dependent on a hashing algorithm. Hashing algorithm can be based on IP address, destination IP address, combo of src and dest IP addresses, source and destination MAC addresses, or TCP/UDP port numbers.
The switch hashes based on the number of ports grouped into the EtherChannel. If two ports are bundled together a 1 bit index is required. Either the lowest-order address bit or the XOR of the last bit of the addresses in the frame is used as the index.
Describe Port Aggregation Protocol (PAgP)
PAgP packets are exchanged between switches over EtherChannel-capable ports.
Ports that have the same neighbor device ID and port group capability are bundled together as a bidirectional, point-to-point EtherChannel link.
PAgP forms an EtherChannel only on ports that are configured for either identical static VLANs or trunking.
PAgP can be configured in active mode (desirable), in which a switch actively asks a far-end switch to negotiate an EtherChannel, or in passive mode, in which a switch negotiates an EtherChannel only if the far end initiates it.
Link Aggregation Control Protocol
LACP also identifies neighbor (like PAgP). It also assigns switches on either end roles.
The switch with the lowest system priority (2-byte priority value followed by MAC) is allowed to make decisions about what ports actively are participating in EtherChannel at any given time.
Ports contain port priority (2 byte priority and 2 byte port number). Up to 8 ports may be active at any given time.
Describe PAcP configuration (specifically silent submode)
By default PAgP operates in silent submode with the desirable and auto modes, and allows ports to be added to an EtherChannel even if the other end of the link is silent and never transmits PAgP packets. If no packets are received from the other end PAgP assumes the channel should be built anyway. If you want to ensure traffic is sent use the non-silent subcommand. If PAgP isn’t heard on a port than PAgP reports to spanning tree that the port is down.
Describe LACP configuration
Contains modes on, passive and active.
Each interface included in a single EtherChannel bundle must be assigned to the same unique channel group number.
Can contain standby interfaces.
List some troubleshooting techniques for EtherChannel.
EtherChannel on mode does not send or receive PAgP or LACP packets. Therefore, both ends should be set to on mode before the channel can form.
EtherChannel desirable (PAgP) or active (LACP) mode attempts to ask the far end to bring up a channel. Therefore, the other end must be set to either desirable or auto mode.
EtherChannel auto (PAgP) or passive (LACP) mode participates in the channel protocol, but only if the far end asks for participation. Therefore, two switches in the auto or passive mode will not form an EtherChannel.
PAgP desirable and auto modes default to the silent submode, in which no PAgP packets are expected from the far end. If ports are set to nonsilent submode, PAgP packets must be received before a channel will form.
Describe transparent bridge operation.
Listens for frames and learns their source.
Uses destination to determine what port to send frame out.
Floods broadcast and unknown unicast
The bridging process must be effectively transparent
Explain a bridging loop
See page 130
Describe BPDUs (Bridge Protocol Data Unit)
Two types:
Configuration BPDU: Used for spanning tree configuration
Topology Change Notification (TCN) BPDU: Used to announce changes in the network topology
Describe Root Bridge Election
Each switch has a unique bridge ID made up of a 2 byte bridge priority that defaults to 32,768 followed by the 6 byte MAC address.
Each switch after bootup first sends out BPDUs to other switches listing itself as the root bridge.
If a switch hears a better (in this case lower) advertisement, it sets that switch as the root
Explain root port selection and root port cost
Port cost is set based on the bandwidth of a link.
Cost is whatever is the advertised cost plus the cost of the incoming port. These are the advertisements sent out. The lowest cost path becomes the root port.
How is a designated port selected?
Lowest cost on a single ethernet segment. Based on the following in order:
1) Lowest root bridge ID
2) Lowest root path cost to root bridge
3) Lowest sender bridge ID
4) Lowest sender port ID
The ports on the segment that aren’t the designated port enter into blocking mode.
Explain STP port states
Disabled: Ports that are administratively shut down
Blocking: Ports cannot receive or transmit data or add MAC addresses to the table. Can receive BPDUs
Listening: Allowed to send and receive BPDUs. May become a root port or designated port. Will return to blocking if it loses status. Lasts for forwardDelay seconds.
Learning: Port sends and receives BPDUs and can learn MAC addresses. Also lasts forwardDelay seconds.
Forwarding: Fully functioning port. Typically belongs to an end user connection.
Explain the three STP timers
Hello Time: Time between configuration BPDUs send by the root bridge. Root bridge sets hello time. Default is 2 seconds.
Forward Delay: The time interval that a switch port spends in both the listening and learning states. Default is 15 seconds.
Max Age: The time interval that a switch stores a BPDU before discarding it. Assumes topology change if Max Age reached without hearing a hello. Default is 20 seconds.