Managed Switches and STP Quiz
48 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of a load balancer in a network?

  • To evenly distribute traffic across multiple devices in a cluster (correct)
  • To serve as the main router for the network
  • To direct traffic only to the core layer
  • To store data for backup purposes
  • Which of the following layers is NOT part of the three-tiered architecture?

  • Distribution layer
  • Branch layer (correct)
  • Core layer
  • Access layer
  • What type of traffic must leave the local segment to reach its destination?

  • Local traffic
  • East-west traffic
  • Bypass traffic
  • North-south traffic (correct)
  • What advantage is NOT associated with the spine-and-leaf architecture?

    <p>Single point of failure</p> Signup and view all the answers

    How did new technologies like virtualization impact east-west traffic in networks?

    <p>They increased the latency in east-west traffic.</p> Signup and view all the answers

    In a spine-and-leaf architecture, which statement accurately describes the connection between switches?

    <p>Spine switches connect to leaf switches in a mesh topology.</p> Signup and view all the answers

    Which layer in a traditional three-tier architecture is responsible for connecting directly to hosts?

    <p>Access layer</p> Signup and view all the answers

    What is a key benefit of collapsing the core and distribution layers in modern network architecture?

    <p>Reduced expense and improved scalability</p> Signup and view all the answers

    What is the primary function of Spanning Tree Protocol (STP) in a network?

    <p>To prevent traffic loops in the network</p> Signup and view all the answers

    Which statement distinguishes a managed switch from an unmanaged switch?

    <p>Managed switches can be configured and have an IP address.</p> Signup and view all the answers

    What type of switch can interpret layer 3 data and functions similarly to a router?

    <p>Layer 3 switch</p> Signup and view all the answers

    What is a potential issue that arises with having multiple paths in a network?

    <p>Traffic loops creating network instability</p> Signup and view all the answers

    How does STP adapt to changes within a network?

    <p>By recalculating paths to avoid loops</p> Signup and view all the answers

    In the context of switch path management, what does 'least cost path' refer to?

    <p>The most efficient path selected by STP</p> Signup and view all the answers

    Which of the following statements is false regarding unmanaged switches?

    <p>They can manage redundant network paths.</p> Signup and view all the answers

    What role does redundancy play in a network with multiple switches?

    <p>It makes the network less vulnerable to hardware failures.</p> Signup and view all the answers

    What is the primary characteristic of Software-Defined Networking (SDN)?

    <p>Centralized approach to networking</p> Signup and view all the answers

    Which plane in SDN is responsible for handling decision-making processes?

    <p>Control plane</p> Signup and view all the answers

    What does the Infrastructure plane in SDN consist of?

    <p>Physical and virtual devices for messaging</p> Signup and view all the answers

    What is disaggregation in the context of SDN?

    <p>Separating functions of network devices into layers</p> Signup and view all the answers

    How does the Application plane interact with other components in SDN?

    <p>It uses APIs to communicate with network applications</p> Signup and view all the answers

    Which plane could the Management plane be considered a part of?

    <p>Control plane</p> Signup and view all the answers

    What is the function of the Control plane in SDN?

    <p>To make decisions about data flow</p> Signup and view all the answers

    Which layer is responsible for sending and receiving messages in SDN?

    <p>Infrastructure plane</p> Signup and view all the answers

    What is iSCSI primarily used for in networking?

    <p>Working on twisted-pair Ethernet networks.</p> Signup and view all the answers

    Which type of hypervisor runs directly on the hardware without an operating system?

    <p>Type 1 hypervisor</p> Signup and view all the answers

    Which of the following is NOT a characteristic that can be customized when creating a VM?

    <p>Network protocols</p> Signup and view all the answers

    What does a hypervisor manage in relation to virtual machines?

    <p>Resource allocation and sharing</p> Signup and view all the answers

    Which statement accurately describes a guest in a virtualization context?

    <p>It is a virtual machine operating within a host system.</p> Signup and view all the answers

    What is the primary difference between Type 1 and Type 2 hypervisors?

    <p>Type 2 hypervisors are applications running on a host OS.</p> Signup and view all the answers

    Which of the following statements is true regarding iSCSI and FC?

    <p>iSCSI works on standard Ethernet and does not need special hardware.</p> Signup and view all the answers

    When configuring a VM within a hypervisor, which of the following factors is NOT typically adjustable?

    <p>Amount of available bandwidth</p> Signup and view all the answers

    What is the primary role of a vNIC in a virtual machine?

    <p>Facilitates communication between the VM and other machines</p> Signup and view all the answers

    What does the hypervisor create when a vNIC is selected for a VM?

    <p>A connection between the VM and the host</p> Signup and view all the answers

    In bridged mode, how does a vNIC obtain its IP address?

    <p>Via a DHCP server on the physical LAN</p> Signup and view all the answers

    Which statement best describes NAT mode for a vNIC?

    <p>The hypervisor acts as the DHCP server providing IP addressing information</p> Signup and view all the answers

    How do multiple virtual switches operate in a host environment?

    <p>They are managed and controlled by the hypervisor</p> Signup and view all the answers

    What is a key characteristic of a vNIC operating at the Data Link layer?

    <p>It facilitates the transfer of data frames over the network</p> Signup and view all the answers

    What determines the maximum number of vNICs a VM can have?

    <p>Limits imposed by the hypervisor</p> Signup and view all the answers

    What happens to a VM's visibility on the network when it operates in bridged mode?

    <p>It appears as just another client or server on the LAN</p> Signup and view all the answers

    What is a characteristic of host-only mode in virtual networks?

    <p>VMs can exchange data with each other and the host.</p> Signup and view all the answers

    Which of the following is NOT an advantage of virtualization?

    <p>Compromised performance.</p> Signup and view all the answers

    What happens to vNICs in host-only networks?

    <p>They can only talk to other VMs on the same host.</p> Signup and view all the answers

    Which statement reflects a disadvantage of virtualization?

    <p>Increased complexity in management.</p> Signup and view all the answers

    In what scenario do vNICs in bridged mode operate?

    <p>They access the physical network directly.</p> Signup and view all the answers

    Which of these is a pros of virtualization?

    <p>Efficient resource management.</p> Signup and view all the answers

    What is a potential effect of a single point of failure in a virtualized environment?

    <p>Complete downtime of applications.</p> Signup and view all the answers

    Which is a disadvantage of virtualization relating to costs?

    <p>Increases licensing costs.</p> Signup and view all the answers

    Study Notes

    Managed Switches

    • An unmanaged switch offers plug-and-play functionality with basic configuration options.
    • It lacks an assigned IP address.
    • Managed switches are layer 2 devices.
    • Higher-layer switches include layer 3 switches, which function like routers by interpreting layer 3 data.
    • Layer 4 switches interpret layer 4 data.

    Switch Path Management

    • Redundancy in network switching safeguards against hardware failures by allowing data to travel through multiple paths.
    • Traffic loops are a potential problem with multiple paths.
    • Spanning Tree Protocol (STP) prevents loops by calculating paths that avoid them and blocking unnecessary links.
    • STP adaptively modifies the network.
    • STP prioritizes the lowest-cost paths for maximum efficiency.

    Switch Path Management (Continued)

    • Designated ports (DP) and root ports (RP) are components of switch path management, as seen in Figure 7-4.
    • BPDUs (Bridge Protocol Data Units) enable communication between switches in STP.
    • Security measures like BPDU guard, BPDU filter, and root guard are important for STP-enabled interfaces.
    • Newer technologies like RSTP (Rapid Spanning Tree Protocol), TRILL (Transparent Interconnection of Lots and Links), and SPB (Shortest Path Bridging) are used as replacements or enhancements to STP.
    • Some switch manufacturers optimize their STP implementations for efficiency.

    Switch Port Security

    • Unused physical and virtual ports on switches and other network devices should be disabled until needed.
    • Commands like shutdown disable ports temporarily on Cisco, Huawei, and Arista devices.
    • switchport port-security is a Cisco command to secure switch access ports, functioning as MAC filtering.
    • MAC filtering protects against MAC flooding.
    • A layered security strategy, defense in depth, is crucial for comprehensive network security.

    Hierarchical Design

    • Load balancers distribute network traffic evenly.
    • Cisco and other manufacturers use a three-tiered network architecture for switches.
    • The access layer (edge layer) connects to hosts directly.
    • The distribution layer (aggregation layer) is highly redundant to connect multilayer switches or routers.
    • The core layer contains efficient multilayer switches or routers that support the backbone traffic of the network.
    • Traffic within a network segment is called east-west traffic.
    • Network traffic that needs to leave or enter the local segment is called north-south traffic.
    • Figure 7-5 shows a three-tiered architecture, with optimized switches that perform different functions at each layer.
    • Newer technologies, such as virtualization, SDN, and cloud computing, have caused latency in east-west traffic, driving the need for a new method optimizing this kind of traffic.
    • Spine-and-leaf architecture collapses the core and distribution layers into one, while using a mesh topology.
    • This design enhances redundancy and scalability, reduces latency, and improves security.
    • Figure 7-8 depicts a two-layered architecture, improving efficiency in resource access.

    Software-Defined Networking (SDN)

    • SDN is a centralized network approach that combines virtual and physical devices into a single system.
    • SDN uses disaggregation to abstract network device functions into different layers (planes).
    • Infrastructure plane handles data transmission.
    • The control plane manages decisions.
    • The application plane communicates with application using APIs.
    • The management plane is considered part of the control plane.
    • Figure 7-11 illustrates the SDN planes and their interactions.

    Storage Area Network (SAN)

    • A storage area network (SAN) is made up of storage devices that communicate directly with other components and network devices.
    • Storage devices often contain multiple drives.
    • SANs use FC (Fibre Channel), FCoE (Fibre Channel over Ethernet) or iSCSI (Internet SCSI) or IB (InfiniBand) to perform data storage and access with maximum efficiency.
    • iSCSI uses IP networks, making it compatible with standard ethernet.
    • SANs generally connect to LAN, and use Figure 7-13, and Figure 7-15 diagrams.

    Knowledge Check Activity 7-1

    • iSCSI is the SAN connection technology that runs over ordinary Ethernet NICs without any special equipment.

    Virtual Architecture

    • Virtualization replicates something logically rather than physically.
    • A host computer runs virtual machines (VMs).
    • Guest VMs and hypervisors manage resources, like CPU, memory, and storage.
    • Two hypervisor types exist:
    • Type 1 (bare-metal): installed before any operating system.
    • Type 2 (hosted): installed as an application within a host operating system.
    • Figure 7-17 illustrates the difference between these two hypervisor types.
    • VM software and hardware attributes are assigned at creation.
    • Guest OS, Memory, Hard drive, and processor configurations are customizable.

    Network Connection Types

    • Each VM has its own virtual network interface card (vNIC), connecting it to other devices.
    • vNICs operate at the Data Link layer.
    • The hypervisor determines the maximum number of vNICs.
    • Connections are sometimes called bridges or switches (vSwitch).
    • A single host can support multiple virtual switches.
    • VMs can connect to both physical or virtual networks determined by configuration.
    • Various connection modes exist, like bridged, NAT, and host-only modes.
    • Figure 7-21 shows configuration examples for a virtual switch.
    • Figure 7-23 shows VM and host using physical network for connection.
    • In bridged mode, VMs act as independent network nodes, obtaining IP addresses from the physical network.
    • In NAT mode, the host acts as a NAT device, redistributing IP addresses.
    • Host-only mode allows VM communication among themselves, but not to other parts of the network.

    Pros and Cons of Virtualization

    • Advantages: Efficient resource usage, cost reduction, simpler backups/recovery, and isolation.
    • Disadvantages: Potential performance issues, added complexity, and higher licensing costs.

    Network Functions Virtualization (NFV)

    • NFV virtualizes network functionalities by integrating hardware and software to provide flexible and cost-effective network architecture.
    • Virtual devices can be quickly migrated between servers.
    • Virtualization helps in utilizing resources and easily scaling services as needed.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Week 6 ITM301 PDF

    Description

    Test your knowledge on managed switches, their functionality, and the essential concepts of Switch Path Management. This quiz explores redundancy, Spanning Tree Protocol (STP), and the roles of designated and root ports. Dive into the details of layer functionality and network efficiency!

    More Like This

    Managed Switches in Networking
    18 questions
    Managed Care Concepts and Risk Management
    18 questions
    Managed Care Chapter 4 Flashcards
    9 questions
    Use Quizgecko on...
    Browser
    Browser