Packet Forwarding Flashcards
Forwarding of network traffic from a layer 2 perspective users what information?
Destination MAC address
What type of network device helps reduce the size of a collision domain?
Switch
Forwarding of network traffic from layer 3 perspective uses what information?
Destination IP Address
What type of network device reduce the size of a broadcast domain?
Router
The ____________ can be directly correlated to the MAC address table.
CAM
A ___________ forwarding architecture provides increased port density and forwarding scalability.
Distributed
CEF is composed of which components? (Choose two)
A) Routing Information Base B) Forwarding Information Base C) Label Information Base D) Adjacency Table E) MAC address table
Fowarding Information Base & Adjacency Table
Ethernet commonly uses __________ to forward data on the Link Layer.
MAC Addresses
Ethernet devices use ___________ to ensure only one device talks at the same time in a collision domain.
CSMA/CD (Collision Sense Multiple Access/Collision Detection)
A Switch maintains a table of __________ that are associated to a specific device.
MAC (Media Access Control) Addresses
When a switch forwards a packet out of every port except the one that it was received on, this is known as a __________?
Unicast Broadcast
All devices that reside in the same layer 2 segment are in the same ____________.
Broadcast Domain
__________ creates a logical segmentation by creating multiple broadcast domains on the same network switch.
VLANS (Virtual LANs)
T/F - VLAN 0 is reserved for 802.1P traffic and cannot be modified or deleted.
True
T/F - VLAN 1 is the default VLAN and cannot be modified or deleted.
True
VLANs 2 to 1001 are in the normal range but can not be added, deleted, or modified.
False (These are normal, but they CAN be added, deleted, or modified)
VLANs 1002 to 1005 are normal ranges but can be deleted or modified.
False ( These are reserved and cannot be deleted or modified)
VLANs 1006 to 4094 are in the extended VLAN range and can be added, deleted, or modified.
True
How many VLANs can be assigned to an access port on a switch?
One
How many VLANs can be assigned to a trunk port?
There is no limit
Any traffic that is advertised or received on a trunk port without the 802.1Q VLAN tag, is associated to the _________ VLAN?
Native
Excluding MAC Addresses, a switches MAC address table shows which of the following:
A) VLAN
B) Type (Dynamic or Static)
C) Ports
D) All of the above
All of the above
The MAC Address table resides in the _________ on the switch.
CAM (Content Addressable Memory)
The _________ provides a method of mapping Layer 3 IP addresses to Layer 2 MAC addresses?
ARP (Address Resolution Protocol) Table
If any entry does not exist in the local ARP table, the device __________ an ARP request the entire Layer 2 switching segment.
Broadcasts
A device with an IP address that is in the up state is stored on the routers routing table refereed to as the ________ ?
RIB (Routing Information Base)
T/F - Connected networks or routes have an administrative distance of 1?
False (0)
With Catalyst switches it is possible to assign an IP address to a ___________ also know as a VLAN interface.
SVI (Switched Virtual Interface)
The command ___________ turns a layer 2 switch port into a layer 3 switch port.
No Switchport
T/F - Software switching is Significantly faster than hardware switching?
False
_________ is a Cisco proprietary switching mechanism.
CEF (Cisco Express Forwarding)
T/F - CEF is a form of software switching?
False
_________ allows for the matching and evaluation of a packet on more than one field and is an extension of the CAM architecture.
TCAM (Ternary Content Addressable Memory)
TTL stands for what?
Time to Live
TTL reduced by what number for every layer 3 hop?
One
What happens to a packet when a router receives the packet with TTL of 0?
It is discarded
_________ is a redundancy feature that allows a Cisco router with two route processors to sync router configurations.
Stateful Switchover
The process of mirroring information between RP’s is referred to as _________ ?
Checkpointing
A method of forwarding packets in hardware through the use of the FIB and adjacency tables is referred to as __________?
CEF (Cisco Express Forwarding)
__________ is the hardware programming of a forwarding table
FIB (Forwarding Information Base)