Switching Concepts: Frame Forwarding
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A switch makes forwarding decisions based on which two factors?

  • Egress interface and source MAC address
  • Egress interface and destination MAC address
  • Ingress interface and source MAC address
  • Ingress interface and destination MAC address (correct)

A switch will forward traffic out the same interface it received the traffic.

False (B)

What is another name for the MAC address table?

Content Addressable Memory table

In the store-and-forward switching method, the switch checks the ____________ for errors.

<p>Frame Check Sequence</p> Signup and view all the answers

Match the switching method with its description.

<p>Store-and-Forward Switching = Receives the entire frame and ensures the frame is valid. Cut-Through Switching = Forwards the frame immediately after determining the destination MAC address and egress port.</p> Signup and view all the answers

Which of the following is a characteristic of cut-through switching?

<p>Appropriate for switches needing latency under 10 microseconds (C)</p> Signup and view all the answers

In full-duplex mode, collision domains are eliminated.

<p>True (A)</p> Signup and view all the answers

What type of device breaks up a broadcast domain?

<p>Layer 3 device/router</p> Signup and view all the answers

Switches use the MAC address table and ____________ to eliminate collisions and avoid congestion.

<p>full-duplex</p> Signup and view all the answers

Which of the following is NOT a feature of switches that alleviates network congestion?

<p>Limited Frame Buffers (A)</p> Signup and view all the answers

What is the primary function of a Content Addressable Memory (CAM) table in a switch?

<p>To map destination MAC addresses to output ports. (C)</p> Signup and view all the answers

A collision domain exists in a network segment operating in full-duplex mode.

<p>False (B)</p> Signup and view all the answers

What is the function of 'auto-negotiation' in network devices?

<p>Set duplex and speed automatically</p> Signup and view all the answers

A switch floods a frame out of all interfaces except the ingress port when the destination MAC address is a ____________ or is unknown.

<p>broadcast</p> Signup and view all the answers

Match the term with its description.

<p>Ingress = Entering the Interface Egress = Exiting the Interface</p> Signup and view all the answers

Which method does Cisco prefer a switch use to make frame forwarding decisions?

<p>Store-and-forward switching (B)</p> Signup and view all the answers

Cut-through switching always performs a full FCS check before forwarding a frame.

<p>False (B)</p> Signup and view all the answers

What is the maximum delay that is acceptable from source to destination when using a voice VLAN?

<p>150ms</p> Signup and view all the answers

VLANs are based on ____________ connections

<p>logical</p> Signup and view all the answers

Match the terms with their descriptions.

<p>Data VLAN = Dedicated to user-generated traffic. Native VLAN = Used for trunk links only. Management VLAN = Used for SSH/Telnet VTY traffic.</p> Signup and view all the answers

What benefit is provided by VLANs?

<p>Improved network security (B)</p> Signup and view all the answers

VLAN 1 can be deleted or renamed.

<p>False (B)</p> Signup and view all the answers

On what type of link is the native VLAN used?

<p>Trunk link</p> Signup and view all the answers

All frames are ____________ on an 802.1Q trunk link, except for those on the native VLAN.

<p>tagged</p> Signup and view all the answers

Match the VLAN type with its primary purpose.

<p>Voice VLAN = Prioritizes voice traffic for quality communication. Data VLAN = Carries user-generated traffic like emails and web browsing. Management VLAN = Secures administrative access to network devices.</p> Signup and view all the answers

Which of the following is NOT a characteristic of voice VLANs?

<p>Unlimited delay from source to destination (B)</p> Signup and view all the answers

Without a Layer 3 device, devices in different VLANs can communicate.

<p>False (B)</p> Signup and view all the answers

What is the size, in bytes, of the IEEE 802.1Q header?

<p>4</p> Signup and view all the answers

A trunk is a point-to-point link between two ____________ devices.

<p>network</p> Signup and view all the answers

Match the VLAN trunk term with its description.

<p>VLAN Trunk = Extends VLANs across the entire network. 802.1Q Trunking = A trunking protocol that supports multiple VLANs on a single link.</p> Signup and view all the answers

Which of the following is NOT a benefit of VLANs?

<p>Increased Broadcast Traffic (D)</p> Signup and view all the answers

The VLAN ID (VID) field in an 802.1Q tag is 16 bits long, enabling support for up to 65,536 VLANs.

<p>False (B)</p> Signup and view all the answers

What command is used to check DTP mode?

<p>show dtp interface</p> Signup and view all the answers

The ____________ range VLANs are used by service providers.

<p>extended</p> Signup and view all the answers

Match the DTP mode with its description.

<p>Dynamic Auto = Will become a trunk interface, if the neighboring interface is set to trunk or desirable mode. Dynamic Desirable = Actively seeks to become a trunk by negotiating. Access = Permanent access mode and negotiates to convert the neighboring link into an access link. Trunk = Permanent trunking mode and negotiates to convert the neighboring link into a trunk link.</p> Signup and view all the answers

By default, what VLAN is the native VLAN?

<p>VLAN 1 (D)</p> Signup and view all the answers

The use of a native VLAN is a modern security protocol.

<p>False (B)</p> Signup and view all the answers

What value is used for a 2-Byte VLAN Tag?

<p>0x8100</p> Signup and view all the answers

DTP is a proprietary protocol from ____________

<p>Cisco</p> Signup and view all the answers

Which of the following commands removes the VLANs from a switch?

<p>delete flash:vlan.dat (D)</p> Signup and view all the answers

Flashcards

Ingress

Entering the interface

Egress

Exiting the interface

MAC address table

A table used by switches to make forwarding decisions based on MAC addresses.

Destination MAC address

It determines the egress interface and learns interface destination.

Signup and view all the flashcards

Source MAC address

Records the source MAC address into the table along with the port it was received on.

Signup and view all the flashcards

Store-and-forward switching

Receives the entire frame and ensures the frame is valid. Cisco's preferred method.

Signup and view all the flashcards

Error Checking

Error checking – The switch will check the Frame Check Sequence (FCS) for CRC errors. Bad frames will be discarded.

Signup and view all the flashcards

Buffering

The ingress interface will buffer the frame while it checks the FCS.

Signup and view all the flashcards

Cut-through switching

Forwards frame immediately after determining the destination MAC.

Signup and view all the flashcards

Full Duplex

When there is full duplex on the link the collision domains are eliminated.

Signup and view all the flashcards

Broadcast domain

Extends across all Layer 1 or Layer 2 devices on a LAN and consists of all devices on the LAN that receive the broadcast traffic.

Signup and view all the flashcards

Router

A Layer 3 device (router) will break this broadcast domain. Also called a MAC broadcast domain.

Signup and view all the flashcards

VLAN

A logical grouping of network devices into the same broadcast domain; can span multiple physical switch ports.

Signup and view all the flashcards

VLANs

Logically connections with other similar devices. Placing devices into various VLANs have the following characteristics.

Signup and view all the flashcards

Smaller Broadcast Domains

Dividing the LAN reduces the number of broadcast domains

Signup and view all the flashcards

Improved IT Efficiency

VLANs can group devices with similar requirements, e.g. faculty vs. students

Signup and view all the flashcards

Data VLAN

VLAN 1 is the default data VLAN because all interfaces are assigned to this VLAN.

Signup and view all the flashcards

Management VLAN

Set aside for SSH/Telnet VTY traffic and should not be carried with end user traffic. Typically, the VLAN that is the SVI for the Layer 2 switch.

Signup and view all the flashcards

Voice VLAN

A separate VLAN is required because Voice traffic requires Assured bandwidth, High QoS priority and Ability to avoid congestion

Signup and view all the flashcards

VLAN Trunks

A point to point link between two network devices with trunk functions that Allow more than one VLAN, Extend the VLAN across the entire network

Signup and view all the flashcards

IEEE 802.1Q

The IEEE 802.1Q header is 4 Bytes

Signup and view all the flashcards

Voice VLAN Tagging Function

Tagged with an appropriate Layer 2 class of service (CoS) priority value

Signup and view all the flashcards

VLAN Trunks

Configures a trunk port on a LAN switch.

Signup and view all the flashcards

Switchport Mode Trunk

This command is used to configure a switchport to operate in trunk mode if a negotiation is successful.

Signup and view all the flashcards

Switchport nonegotiate

Prevents the unwanted autonegotiation and configuration of trunk connections

Signup and view all the flashcards

Dynamic Trunking Protocol (DTP)

A Cisco proprietary protocol is used for autonegotiation trunk configurations.

Signup and view all the flashcards

Access

Permanent access mode and negotiates to convert the neighboring link into an access link

Signup and view all the flashcards

Dynamic auto

Will becomes a trunk interface if the neighboring interface is set to trunk or desirable mode

Signup and view all the flashcards

Dynamic Desirable

Actively seeks to become a trunk by negotiating with other auto or desirable interfaces

Signup and view all the flashcards

Study Notes

Module 2: Switching Concepts

  • Explains how Layer 2 switches forward data.
  • Frame forwarding is explained
  • Collision domains are compared to broadcast domains.

Frame Forwarding

  • A switch forwards based on the ingress interface and the destination MAC address
  • A switch uses its MAC address table to make forwarding decisions.
  • A switch will never allow traffic to be forwarded out the interface it received.
  • Ingress is the term for entering the interface
  • Egress is the term for exiting the interface
  • The switch uses the destination MAC address to determine the egress interface.
  • A switch builds a MAC address table, or Content Addressable Memory (CAM) table.
  • The MAC address table is built by recording the source MAC address into the table along with the port it was received.
  • The switch utilizes a two step process to learn and forward
    • Step 1: Learn - Examines the Source Address
    • Adds the source MAC if it's not in the table.
    • Resets the time out setting back to 5 minutes if the source is in the table.
    • Step 2: Forward – Examines the Destination Address
    • If the destination MAC is in the MAC address table, the frame gets forwarded out the specified port.
    • If a destination MAC isn't in the table, it's flooded out all interfaces except the one it was received.
  • Types of Switching
    • Store-and-forward switching
    • Cut-through switching
  • Store-and-forward switching receives the entire frame and verifies that the frame is valid, it is a preferred method from Cisco
  • Store-and-forward has two primary characteristics:
    • Error Checking: The switch checks the Frame Check Sequence (FCS) for CRC errors and discards bad frames.
    • Buffering: The ingress interface buffers the frame while checking the FCS, allowing adjustment to speed differences between ingress/egress ports.
  • Cut-through forwards frames immediately after determining the destination MAC.
  • Fragment (Frag) Free method checks destination and ensures the frame is at least 64 Bytes, eliminating runts.
  • Cut-through switching is appropriate for switches needing <10 microseconds latency.
  • Cut through has some drawbacks:
    • It does not check the FCS, allowing it to propagate errors.
    • It may cause bandwidth issues if the switch propagates too many errors.
    • It cannot support ports with differing speeds going from ingress to egress

Switching Domains

  • Switches eliminate collision domains and reduce congestion
  • When full duplex is enabled on the link, collision domains are eliminated
  • In half-duplex with one or more multiple devices, contention and collisions can occur for bandwidth
  • Most devices, including Cisco and Microsoft, use auto-negotiation for duplex and speed by default
  • In Broadcast domains, broadcast extends across all Layer 1 / Layer 2 devices on a LAN
  • Only a Layer 3 device (router) breaks the broadcast domain, also a MAC broadcast domain
  • The Broadcast domain includes all devices on the LAN that receive broadcast traffic
  • When a Layer 2 switch receives a broadcast, it floods out all interfaces except the ingress interface
  • Too many broadcasts may result in congestion and reduced network performance
  • Increasing devices at Layer 1 or Layer 2 will cause the broadcast domain to expand
  • Switches use both a MAC address table and full-duplex to eliminate collisions and avoid congestion
  • Switch performance is impacted by:
    • Fast Port Speeds: Switches may have up to 100Gbps port speeds, depending on the model
    • Fast Internal Switching: Utilizes fast internal bus or shared memory to optimize performance
    • Large Frame Buffers: Allows for temporary data storage while processing large quantities of frames.
    • High Port Density: This provides many ports for devices to be connected to LAN with less cost, and provides for more local traffic with less congestion.

Module Recap

  • Ingress is the entry port of the interface, egress is the exit port
  • Switches build a MAC address table for forwarding frames on the LAN
  • Switches employ either the store-and-forward method or the cut-through method for switching frames
  • In half-duplex, Ethernet ports are part of a collision domain; full-duplex eliminates collision domains
  • For broadcasts or unknown unicast destinations, a switch floods all interfaces except the ingress port
  • Layer 3 devices (routers) break up broadcast domains
  • Switches expand broadcast domains, but reduce collision domains to relieve congestion.

Terms to Know

  • Content accessible memory (CAM)
  • MAC address table
  • Store-and-forward switching
  • Cut-through switching
  • Automatic buffering
  • Fragment free switching
  • Collision domains
  • Broadcast domains

Module 3: VLANs

  • Explains how network protocols enable devices to access resources locally and remotely.

Overview of VLANs

  • Describes the purpose of VLANs in a switched network.
  • VLANs are logical connections with similar devices
  • Benefits include:
    • Segmentation of different device groups on the same switches
    • Improved, more manageable organization
    • Keeping broadcasts, multicasts and unicasts isolated to the individual VLAN.
    • Allowing Each VLAN its own its own range of IP addresses
    • Overall results are smaller broadcast domains

Benefits of VLAN design

  • Improved Security
  • Reduce Broadcast Domains
  • Improvement of IT efficiency
    • by grouping devices by a set of specific requirements like faculty and students
  • Reduced costs
    • 1 switch can provide many VLAN's
    • allows for reduction in bandwidth traffic
  • Improved performance
  • Simpler management of similar groups with application sets

Types of VLAN's

  • Default VLAN
  • One VLAN for Data
  • Native
  • Management
  • Voice

Information about VLAN 1

  • a Default VLAN
  • VLAN which cannot be renamed
  • It is recommended to assign default features to native VLAN's

Data VLAN information

  • dedicated to users as per email and web traffic
  • VLAN 1 is the default data VLAN as all interfaces are assigned it.

Native VLAN

  • It is for a trunk link only
  • Frames are Tagged on an 802.1Q
  • Frames are trunked except the native VLANS

Management VLAN

  • used when using the SSH/TELNET application
  • Should not be carried with end user traffic
  • The Switch Virtual Interface layer 2 should be assigned to Typical VLAN

Voice VLAN

  • A separate VLAN is required due to voice traffic
  • Traffic that requires a safe bandwidth plus a high QoS priority
  • Designed to make Ability to avoid congestion that is Less then 150ms from source to destination as a requirement to support traffic

VLAN Trunks

  • A Trunk is a point between 2 network devices
  • Cisco Trunk function allows VLAN
  • extend the VLAN across the entire network
  • By default support all VLAN's
  • Supports 802.1Q

Networks

  • Broadcast Traffic - connected to the broadcast without VLAN traffic

Layer 2 network

  • The Layer two broadcast sends a broadcast frame to configure VLAN10 ( PC 1 configures switches just forwards broadcast when VLAN is configure)
  • the IEEE 802.1Q header is 4 Bytes
  • once the tag is created ,the FCS has to equal it
  • when sent to end device the Tag must be removed the FCS must calculate back to original number.
  • tagging is used on all VLANS(802. 1Q)
  • Both ends of the Trunk have to be configured with the native VALN
  • Each Trunk is configured separate and can have different Native VLANs using separate trunks

Voice VLAN

  • tag it's own traffic
  • the phone has access to the layer
  • Phone can tag the from's from a PC but only the VOIP frames
  • the show interface command can assist in showing us two sets of data VLAN that are assigned to an interfac

Command examples for VLAN

  • Switchport - enabled
  • Administrative mode- static access
  • Vlan mode- VLAN and voice

Catalyst switches

  • 2960 and 3650 can support over 4000+VLAN's

Normal and Extend VLAN

  • Range of 1 to 1005 is used for small business and legacy VLAN's 1005 is created by the system and can't be deleted(1 and 1002-1005) ,data gets stored in the flash and the VTP syncs between switches. range of 1006-4095
  • Range of 1006-4095 are used for service providers
  • Are in running config mode

Command IOS'

  • Switch config T gives access /assign VLAN id/switch config name / then you end process

Port assignment commands

  • Access Interface is needed for vlan interface
  • Enter config T/Then you enter interface assignment/the ports get assigned/then use end command

Data and Voice VLANS

  • an Access port can be assigned to a VLAN but is also assigned a Voice VLAN for when an IP phone is on the device .
  • A VLAN will want create and name data and voice VLAN's the newer catalyst switch will create existing device that are assigned.

Commands to Verify /Show VLAN

  • summary/ name is equal to a string from 1-32/show run/interface data to be displayed

Commands to Change VLANS

  • to assign you have to reenter the command's
  • to place interface back in VLAN 1 you have to use a no switch command.

Command to check assignment

  • Sh int fast and switch port is the command

Command to Delete

Caution-reassign all member ports to a different VLAN.

Trunk configuration command

  • interface that is set to default can be reverted by using switch port
  • must be set to a permanent trunk mode switch can be a local VLAN

Verification

Encapsulation must be verified using dot1q

Dynamic Trunking Protocol

  • DTP is a Cisco proprietor
  • it has Dynamic Auto(is set to default)
  • can be turn off (noneogiate command)

More on interfaces

Actively seeks to become a trunk using auto or other desirable interfaces

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Learn how Layer 2 switches forward data based on the destination MAC address. Understand MAC address tables. Explore how switches learn and forward traffic, examining source addresses and building their MAC address tables.

More Like This

Frame Shop Operations Basics
34 questions

Frame Shop Operations Basics

ImpartialAlbuquerque avatar
ImpartialAlbuquerque
Rahmen-Weiterleitung im Netzwerk
22 questions
Use Quizgecko on...
Browser
Browser