Switching Flashcards

0
Q

What are other names for the data link layer addresses ?

A

Physical

Hardware

Machine

MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Defines how devices are addressed at the data link layer

A

Physical addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This defines how devices are to be physically and logically connected, such as in a bus or a ring topology

A

Network topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reorders frames that are received out of sequence …

Also uses added bits to signal beginning and ending frames

A

Sequencing of data frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Moderates the transmission of data so that the receiving device is not overwhelmed with more traffic than it can handle at any one time.

A switches primary method of flow control is buffering

A

Flow control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 common methods of flow control?

A

Windows

Buffering

Source quench message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a forwarding technique used in packet-switched networks.

A

Bridging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of devices depend on flooding and examination of source addresses in received packet headers to locate unknown devices.

A

Bridging devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bridges are _________ based

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Switches are _________ based devices that use Application Specific Integrated circuits(ASIC) for faster operation.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between bridges and switches spanning-tree control ?

A

Bridges have limited spanning tree control

Switches have advance spanning tree control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Difference between the number of ports on a bridge vs a switch ….

A

Bridge max of 16 ports

Switches can have hundreds of ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used to build and maintain MAC address(filter) tables

A

ASICs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Commonly found between 2 different types of media access methods

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These are used for workgroup connectivity and network segmentation

(Considered the predominate device for internet working)

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A physical or logical network segment in which data packets can collide with each other.

A

Collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A logical network segment defined by its router port connection

A

Broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When the host field contains all 1s

A

Directed broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

All devices in this can communicate with each other by using broadcasts

A

Same broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A term referring to the hypothetical peak bit rate of a cable

(Useful information rate, 10,100,1000 Mbps)

A

Wire speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This term expresses how much time an event takes in networking

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Considered the most common type of switches

A

Ethernet switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Considered the “aggregation point” that connects network components such as computers and printers together

A

Ethernet switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the 3 major functions of layer 2 switches ?

A

Address learning

Forward/filter decision

Loop avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

To function smoothly the layer 2 switch must learn the MAC address of all devices that connect to it …. What is this called ?

A

Address learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

These use buffering and for receiving and transmitting

A

Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When does the switch overwrite information?

A

When it’s full and the it takes the device that has been inactive for the greatest amount of time ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

If the destination hardware address is known and listed in the database, the frame is _______ out only on the correct interface

A

Forwarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Helps to preserve bandwidth on other network segments

A

Frame filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the 3 frame switching methods ?

A

Store-and-forward

Cut-Through(Real Time)

Fragment-free(Modified Cut-through)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In this method the switch copies the entire frame into its buffers and computes the CRC

Best for sending error free frames because they are thoroughly checked

High latency (slow)

A

Store and Forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

With this method the LAN switch copies only the destination address onto its onboard buffers

( the first 6 bytes following the preamble)

Fastest processing - no error checking

A

Cut-Through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

This method the switch waits for the first 64 bytes to pass before forwarding.

Provides better error checking than cut-through , with practically no increase in latency (delay)

A

Fragment free ( modified cut through )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A broadcast targets every device on the ______ by setting all the bits in the destination MAC address to 1

A

Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Switches and bridges in a network environment can create __________________ in the topology.

A

Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

If loop avoidance schemes are not put in place the switches will flood broadcasts endlessly throughout the internetwork

A

Broadcast storms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

When a device can receive multiple copies of the same frame because the frame can arrive from different segments at the same time

A

Multiple frame copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Loops occurring within other loops

A

Multiple loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Is designed to detect loops and close or open the necessary ports to avoid such loops

A

Spanning tree protocol (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the two categories that an Ethernet can be categorized into ?

A

External and internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The physical connections to the switch …

Examples are console port and network interfaces

A

External components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

This port allows locally direct access to the switch during configuration using a dumb terminal with software like Microsoft hyper term that is connected by a “rollover” cable

A

Console port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

This is where you actually connect your end devices such as your computers or printers

Aka switch ports

A

Network interfaces

43
Q

What are the four internal components ?

A

ROM

Flash memory

NVRAM

RAM

44
Q

This is where the diagnostic and boot up routines are stored and the contents can’t be changed since they are “burned in” to the chip

A

ROM

45
Q

This holds the IOS

During startup operation the IOS is copied from this into RAM for execution

A

Flash memory

46
Q

Non volatile memory

When the power is removed from the switch the content of this memory will remain unchanged

A

NVRAM

47
Q

This is volatile memory

When power is removed from the switch the content of this memory will be lost.

This is also where the configuration file “run” and the IOS are executed during operation

A

RAM

48
Q

This is a logical grouping of network computers and resources connected to administratively defined ports on a layer 2 switch

A

VLAN

49
Q

This is also called a broadcast domain and all connected devices see all broadcast packets that are transmitted

Has a single broadcast

This design could be a single Ethernet segment , an Ethernet switch with many ports, or networks with several interconnected Ethernet switches

A

Flat Network

50
Q

What are some benefits from creating VLANs?

A

Increased security

No geographical barrier

Flexibility and scalability

Broadcast control

51
Q

This service will tell the switch port which VLAN it belongs to based on the MAC address of the device that connects to the port

A

Dynamic VLANs

52
Q

With this VLAN membership, the administration creates VLANs and assigns the respected switch ports to it. This association is permanent and will not change until the administrator changes the port assignment

A

Static VLAN

53
Q

Group of connected switches

A

Switch-fabric

54
Q

What are the two types of links in a switched environment?

A

Access link

Trunk link

55
Q

This protocol allows Cisco switches to automatically negotiate with other Cisco devices when they connect

A

Dynamic trunking protocol (DTP)

56
Q

A link assigned to one VLAN

A

Access link

57
Q

These are neutral, they will carry traffic for all VLANs unless you specify otherwise.

A

Trunk link

58
Q

This is uniquely assigning a user-defined ID to each frame ?

Aka VLAN ID

A

Frame tagging

59
Q

This is a Cisco proprietary protocol that is a way of encapsulating a VLAN frame with an added header and trailer.

A

Inter-Switch Link Protocol(ISL)

60
Q

This process enables VLANs to be multiplexed over a trunk link

A

External encapsulation method

61
Q

This Cisco protocol allows for the creation, addition, deletion, modification and synchronizing of VLANs from a central point of control within a administrative domain

A

VLAN Trunking Protocol (VTP)

62
Q

What are the three VTP modes of operation?

A

Server

Client

Transparent

63
Q

All switches that share VLAN information must …..

A

Use the same VTP domain name and VTP password

64
Q

This mode is default for all Cisco switches

A

Server

65
Q

What do VTP servers do ?

A

Create,add,modify, or delete VLANs in a VTP domain

Assign VLANs to switch ports

Synchronize configuration revision number with other servers

Send,receive,and forward VTP advertisements

66
Q

Switches set to this mode will receive information form a VTP server via the trunk link using multicast message

A

Client

67
Q

What are things that Client mode does ?

A

Receive VTP advertisements from switches in the server mode

Forward VTP advertisements to other clients

Synchronize configuration revision number with the server

Assign VLANs to switch ports if using Dynamic membership

68
Q

This standard was created as anyone source standard method of frame tagging

A

IEEE 802.1q

69
Q

This type of switch doesn’t participate in the VTP domain, but they still receive and forward VTP advertisements through the trunk links.

A

Transparent

70
Q

What are some actions that are accomplished in transparent mode ?

A

Create,add,modify or delete VLANs for itself only within the VTP domain

Assign VLANs to switch ports for itself

No synchronized with other switches

Receive and forward VTP advertisements but it doesn’t process or synchronize to them

71
Q

Switches In this VTP mode will receive information from a VTP server via the trunk link using multicast messaging

A

Client mode

72
Q

This can forward received updates to other switches, synchronize itself to a revision number, assign the VLAN to a port(if using dynamic membership)

A

Client mode

73
Q

Receive multicast from server , can’t change, but can forward, assign VLANs if dynamic

A

Client mode

74
Q

Only deals with advertisements not domain info, maintain own database

A

Transparent mode

75
Q

This is set after the operational mode for VTP is set, the switch (server) will begin this on its trunk link to other switches in the domain.

A

VTP advertisements

76
Q

What do VTP advertisements include ?

A

Management domain name

Configuration revision number

VLANs

And the parameters for each VLAN

77
Q

Switches use what type of MAC addresses so all neighbor devices receive the frames

A

Multicast

78
Q

What are the three types of VTP advertisements?

A

Client requests

Summary advertisements

Subset advertisements

79
Q

This type of VTP address is sent out every 5minutes (300 seconds) on VLAN-1 to tell change (domain name, revision number, updater identity)

A

Summary

80
Q

This type of VTP advertisement sends request for the VLAN info to the server. The servers in return will respond with both summary and subset advertisements

A

Client requests

81
Q

This VTP advertisement are VLAN specific about each when a change occurs to trunk

A

Subset advertisements

82
Q

When a client receives an advertisement that has a higher revision number it will overwrite the database in NVRAM with the database being advertised

A

Threat of higher revision numbers

83
Q

To prevent disaster you would configure the switch to perform in the VTP mode that it will participate in , then save the configuration info and then add the switch to the internetwork.what is this process called ?

A

Adding a VTP domain

84
Q

This is a standardized protocol that provides a stable, fault tolerant, loop free network environment while selecting the fastest network path when redundant links exist within an internetwork

A

Spanning tree protocol

85
Q

This prevents loops on layer 2( bridges or switches) by using an algorithm to turn on 1 path and block the other unless the path breaks then it switches back

A

Spanning tree protocol (STP)

86
Q

The entire switching domain or can be limited to each VLAN that’s best path that doesn’t form a loop

A

Spanning-tree instance

87
Q

Switches communicate and root bridge selected to say port state

A

Selecting the best path

88
Q

Layer 2 device in charge of STP ( lowest bridge ID)

Has designated ports to forward

A

Root bridge

89
Q

All other switches are this … , they block passing of data

A

Non-root bridge

90
Q

What is used to find the root bridge by looking at lowest bridge id then MAC address?

A

Bpdu (bridge protocol data units)

91
Q

A port that is active and that forwards traffic

A

Designated port (Forwarding)

92
Q

This port are in forwarding mode and provide a constant connection to the root bridge from the non-root bridge so ads and updates are received

A

Root port(listening)

93
Q

These ports are used to prevent loops.

A

Non-designated ports(blocked)

94
Q

This occurs when bridges and switches have completed the transition to either forwarding or the blocking state.

A

Convergence

95
Q

What are the 4 spanning tree port states ?

A

Blocking

Listening

Learning

Forwarding

96
Q

This is what are all ports are in by default when the switch is powered on.

Will not forward frames

Only listens and process BPDUs

A

Blocking State

97
Q

This is the state when it listens to BPDUs to make sure no loops occur on the network before passing data frames

A

Listening

98
Q

This is another spanning tree port state that learns the MAC address and builds the MAC address filter table,but does not forward frames

A

Learning

99
Q

The last spanning tree port state is when there are no redundant links or the port determines that it has the best path to the root bridge

Rarely ever happens

A

Forwarding

100
Q

This used to speed up convergence on ports that are connected to workstations, servers or other devices that will not cause layer 2 loops

A

Spanning-tree Portfast

101
Q

This is used to minimize network downtime by ensuring that network loops do not occur when the network topology changes.

A

Spanning-tree up link fast

102
Q

The IEEE 802.1d and 802.1w are referred to as this …..

A

Common spanning tree(CST)

103
Q

This was designed to operate on switches other than Cisco switches from other vendors

A

CST( common spanning tree)

104
Q

This STP standard is Cisco proprietary implementation of STP.

This makes for smaller STP implementations with easier convergence.

Also default for Cisco switches

A

Per-VLAN Spanning tree (PVST)

105
Q

This is an extension of PVST and and allows Cisco switches to operate with CST switches

And errors checks

Plug and play compatible

A

Per-VLAN Spanning Tree +(PVST+)