Vol 2 Part 5: Network Automation Flashcards

1
Q

Software Defined Networking (SDN) categorizes networking tasks into three different planes. What are the three planes in SDN?

A

Data plane, control plane, management plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens in the data plane, and what is it often referred to as?

A

The data plane, also known as the forwarding plane, relates to tasks that involve the receiving, processing, and forwarding of a message.

Encapsulation and de-encapsulation, adding and removing trunking headers, matching the destination address with MAC tables and routing tables are all data plane tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens in the control plane?

A

Information supplied to the data plane controls what happens within the data plane. The control plane is any action that controls the data plane. In a traditional network, the control and data planes are distributed AKA they are autonomous per device.

Routing protocols, ARP, NDP, MAC learning, and STP are examples of control plane tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens in the management plane?

A

Any protocol that allows the management of a network device falls into the management plane.

Telnet, SSH, SNMP, and Syslog are examples of management plane tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On a Cisco switch, the switching logic in the data plane does not happen on the CPU. Where does this happen?

A

Switching logic happens on an application specific integrated circuit (ASIC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ASICs need to be able to look up MAC tables when switching. What is the name for the special memory where the MAC table is stored so that it can be accessed by the ASIC?

A

Ternary Content-Addressable Memory (TCAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Control plane functions have been moved to a central software application as a result of new changes in technology. What is this centralized application called?

A

a controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Southbound Interface (SBI) is the interface in which the controller communicates with networking devices. It is a software interface, NOT a hardware one. Where is the SBI located?

A

In between the controller and a program on the networking device, allowing the two programs to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 main Cisco SBIs, and what are they used in conjunction with?

A
  1. OpFlex, used with ACI.
  2. CLI and SNMP used with Cisco APIC-EM
  3. CLI, SNMP, and NETCONF, used with Cisco software-defined access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Northbound interface (NBI) is the interface that opens the controller so its data and functions can be used by other programs. What is created as a result of the NBI and controller communicating?

A

A central repository of information such as port states, topology, device list, capabilities, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Representation State Transfer Application Programming Interfaces (REST APIs) enable applications to reside on different hosts. What is used to communicate and transfer data over the API, and when would a REST API be required?

A

HTTP messages are used to communicate and transfer data over the API. If an application is on a VM, a REST API is needed so that the controller and application can communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OpenDaylight Controller, Cisco Application Centric Infrastructure (ACI), and Cisco APIC Enterprise Module (APIC-EM) are all examples of what?

A

Software Defined Networking (SDN) solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cisco ACI uses a specific physical switch topology known as BLANK

A

spine and leaf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the properties of the spine switches and leaf switches with respect to how they are connected to each other? For example, each leaf switch must connect to every spine switch.

A
  1. each leaf must connect to every spine
  2. each spine must connect to every leaf switch
  3. leafs cannot connect to each other
  4. spines cannot connect to each other
  5. endpoints can only connect to leafs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

APIC-EM adds SDN capabilities to older devices that were created before ACI and APIC were created. While APIC-EM can learn and configure network devices, what is the major thing it CANNOT do?

A

APIC-EM does not program flows into tables or ask control planes to change how they operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network in which all routers and switches are in control without the use of a controller is called BLANK.

A

A centralized control plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cisco Software-Defined Access (SDA) creates a new way to build campus LANs by using the software-defined architectural moden defined with SDN. At the middle sits a Digital Network Architecture (DNA) Center controller. What does SDA use with DNA Center controllers for automation?

A

A GUI and APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The DNA is the controller for BLANK networks

A

SDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The southbound interface (SBI) contains the fabric, underlay, and overlay. Within the underlay, what is created for the use of passing data through the network?

A

Virtual Extensible LAN tunnels (VXLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The SBI contains the fabric, which is simply the combination of the underlay and overlay. What resides in the underlay, and what resides in the overlay?

A

The underlay consists of the network of devices and connections, both cable and wireless. This is where IP connectivity to all nodes in the fabric lays. The overlay is the mechanism to create VXLAN tunnels between SDA switches. Essentially, the overlay is the mechanism for which VXLAN tunnels are able to be created by the underlay so that devices in the underlay can communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SDA fabric uses BLANK design as its means to support switches and VXLAN tunnels.

A

routed access layer design.

Remember! with SDA fabric, as a result of the routed access layer design, access layer switches are layer 3.

22
Q

The DNA center will configure devices’ underlay configuration to use a BLANK layer.

A

routed access

23
Q

We have established that in a routed access layer, all switches act as layer 3 switches, with switches using the IS-IS routing protocol. What links between these switches are routed layer 3 links?

A

ALL links, to INCLUDE EtherChannel and single links.

24
Q

Security within an SDA is tied to groups of users known as what? What is used to identify these groups?

A
  1. Scalable groups

2. Scalable group tags

25
Q

Due to the architecture of SDA, which of the following are no longer necessary (choose 2)?

a. OSPF
b. STP
c. HSRP
d. Access ports

A

B. STP

C. HSRP

26
Q

What is the database that keeps the list of Endpoint Identifiers (EIDs) and matching routing locators (RLOCs)?

A

Locator ID Separation Protocol (LISP)

27
Q

REST-Based APIs are known as what?

A

RESTful APIs

28
Q

The REST application acts as a server, responding to what with respect to the client?

A

client API calls

29
Q

What are the 6 main attributes of RESTful APIs?

A
  1. Client/server architecture
  2. Stateless operation
  3. Clear statement of cacheable/uncacheable
  4. Uniform interface
  5. Layered
  6. Code-on-demand
30
Q

What is meant by stateless operation with respect to it as an attribute of RESTful APIs?

A

Requests and replies never use past history of requests made

31
Q

What is meant by cacheable/uncacheable with respect to it as an attribute of RESTful APIs?

A

Resources within a REST API must be defined as cacheable or not. If the resource is cacheable, the resource is stored by the REST API for future use, resulting in an improvement in performance.

32
Q

What is the term used to refer to a name or label that has an assigned value? This is important for later!

A

A variable

33
Q

When looking at the variable X, the statement X=1 means what about variable X?

A

It means that X is a variable with an assigned value of 1, and remember, X DOES NOT EQUAL 1! It simply has been assigned a value of 1.

34
Q

List variables are more complex variables that are needed for use with programs. How do they differ from normal variables?

A

A list, unlike a normal variable, can have multiple assigned values as opposed to just one.

35
Q

List variables have a specific type of structured list known as a dictionary. Dictionaries contain values, but they also contain another item. What is this other item called?

A

Along with values, a dictionary also contains keys.

36
Q

HTTP contains verbs, and software contain CRUD actions. What does the acronym CRUD stand for, and what does each portion of CRUD do?

A

Create- clients can create some new instance of variables and data structures at the server and initialize their values as kept at the server.

Read- clients can read (retrieve) current values of variables and store them

Update- clients can change (update) values of variables at the server

Delete- clients can, you guessed it, DELETE different instances of data variables from the server

37
Q

What are the corresponding REST (HTTP) Verbs associated with each letter of CRUD?

A

Create=POST
Read=GET
Update=PATCH,PUT
Delete=DELETE

38
Q

When you see “HTTP GET URI=URI3” what is happening with the API resource?

A

The GET verb means the message being sent is intending to read a variable. URI=URI3 means that the message is looking to read a URI variable, more specifically, the variables/resource associated within the API assigned to URI3.

39
Q

The response status code meaning “OK” for a GET verb is what? Hint, its a number!

A

200

40
Q

What data serialization language is easily readable by most people and designed to make it easy for programs to convert it into variables?

A

JavaScript Object Notation (JSON)

41
Q

YAML Aint Markup Language (YAML) is a data serialization language that focuses on data model details while remaining clean and simple. What software based tool makes extensive use of YAML?

A

Ansible

42
Q

Within JSON, there are Key:Value Pairs consisting of a key and a value. The key is text inside of double quotes, and is used as the BLANK that references a value?

A

name

43
Q

What is the primary function of a REST API?

A

The enabling of the learning of variables and data structures

44
Q

What does data serialization do for us?

A

It acts as a method to represent variables with text

45
Q

What is configuration drift?

A

When legitimate changes are made to a device, but the changes made to address the problem are different, resulting in devices with different configurations, causing issues when using manual configuration.

46
Q

In order to track the changes made to devices on a network, we must monitor all changes made. What is this concept known as?

A

configuration monitoring or configuration enforcement

47
Q

What software is commonly used for rapidly provisioning changes and configurations (ie. templates) you want to make on network devices? What language does it use, and what does it use in order to supply values for configurations?

A

Ansible. It uses the Jinja2 language, recognizable by its use of double curly brackets, with YAML used in conjunction to supply values.

48
Q

Templates increase the focus on having a standard configuration for each device role. When a device has a unique configuration compared to other devices on the network performing the same role, the uniquely configured device is known as a what?

A

A snowflake

49
Q

Ansible is one popular software package that is commonly used for configuration, but what are the other two common software packages that we see regularly used? Why do we have multiple packages to choose from?

A

Puppet and Chef. Between ansible, puppet, and chef, a network engineer can purchase each tool with variations on the package in order to fit your needs.

50
Q

What operating system is puppet compatible with?

A

Linux

51
Q

Typically, puppet is a BLANK based architecture for network device support

A

an agent based architecture

52
Q

Ansible, Puppet, and Chef fall into two categories with respect to the model they use to send information to network devices. Describe the two models, and state which package uses which model.

A

Push Model- ansible uses a push model, with a file listing actions, known as the playbook, used for reference. Information is then pushed out from the package to the network device.

Pull Model- puppet and chef use the pull model, where their file that list actions (Manifest for Puppet, recipe/runlist for Chef) is used by the agent to pull details from the server, telling the agent what its configuration should be.

Essentially, the agentless ansible PUSHES info out to devices, while Puppet and Chef are agent based, with agents PULLING information from a server.