Switching, STP, and WANs

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which layer of the OSI model does Layer 2 switching operate at?

  • Data Link Layer (correct)
  • Network Layer
  • Transport Layer
  • Physical Layer

What primary action do switches perform based on the MAC address table?

  • Making forwarding decisions for frames (correct)
  • Learning new MAC addresses
  • Filtering broadcast traffic
  • Assigning IP addresses to devices

How do switches typically learn MAC addresses of connected devices?

  • By querying a DNS server
  • Dynamically, by examining the source MAC address of incoming frames (correct)
  • Manually configured by an administrator
  • Through a central DHCP server

What happens to a switch's MAC address table when a device moves from one port to another on the same switch?

<p>The table is updated to reflect the device's new port. (C)</p> Signup and view all the answers

What is the primary benefit of using VLANs in a network?

<p>Improving network performance, security, and management (C)</p> Signup and view all the answers

If a switch port is configured as a trunk port, what type of traffic can it carry?

<p>Traffic from multiple VLANs (A)</p> Signup and view all the answers

What is the purpose of the 802.1Q standard in the context of VLANs?

<p>Tagging frames to identify VLAN membership (D)</p> Signup and view all the answers

Which of the following accurately describes the function of a native VLAN?

<p>It is the default VLAN for untagged traffic on a trunk port. (C)</p> Signup and view all the answers

What is the primary function of EtherChannel?

<p>Combining multiple physical links into one logical link (C)</p> Signup and view all the answers

Which of the following is a benefit of using EtherChannel?

<p>Increased bandwidth and redundancy (D)</p> Signup and view all the answers

What does LACP do in the context of EtherChannel?

<p>Negotiates EtherChannel links automatically. (B)</p> Signup and view all the answers

In which EtherChannel mode does the switch actively attempt to form an EtherChannel?

<p>Desirable or Active (A)</p> Signup and view all the answers

What is the primary purpose of Dynamic Trunking Protocol (DTP)?

<p>Negotiate trunk links between switches. (A)</p> Signup and view all the answers

A network administrator configures a switch port with the command switchport mode dynamic desirable. What does this command achieve?

<p>Makes the port actively attempt to form a trunk link. (D)</p> Signup and view all the answers

In the context of VLAN configuration, what is the purpose of the switchport access vlan command?

<p>Assigning a port to a specific VLAN (C)</p> Signup and view all the answers

What is the purpose of a VLAN voice?

<p>To separate voice traffic from data traffic for QoS. (B)</p> Signup and view all the answers

What type of traffic is carried on a trunk link?

<p>Tagged traffic from multiple VLANs. (A)</p> Signup and view all the answers

What is the function of the 802.1Q protocol in trunk links?

<p>To tag frames with VLAN information. (A)</p> Signup and view all the answers

What is the key benefit of using EtherChannel in a network design?

<p>Increased bandwidth and link redundancy. (B)</p> Signup and view all the answers

What is the primary function of Spanning Tree Protocol (STP)?

<p>To prevent network loops in a switched network. (D)</p> Signup and view all the answers

Which algorithm does STP use to determine the best path and avoid loops?

<p>Spanning Tree Algorithm (STA) (B)</p> Signup and view all the answers

What is the role of the root bridge in an STP topology?

<p>To act as the central point in the spanning tree. (A)</p> Signup and view all the answers

Which port state in STP involves actively transmitting and receiving frames?

<p>Forwarding (D)</p> Signup and view all the answers

What is the primary function of PortFast in STP?

<p>To accelerate the port's transition to the forwarding state. (A)</p> Signup and view all the answers

What is the purpose of BPDU Guard?

<p>To protect the network from unauthorized switches. (B)</p> Signup and view all the answers

Which of the following best describes a Wide Area Network (WAN)?

<p>A network that connects devices across a broad geographical area. (A)</p> Signup and view all the answers

Which technologies are commonly used in WANs?

<p>MPLS, VPNs, and Internet (D)</p> Signup and view all the answers

Which WAN topology connects each site to every other site, providing high redundancy?

<p>Mesh (A)</p> Signup and view all the answers

What is the purpose of the Point-to-Point Protocol (PPP)?

<p>To provide a direct connection between two nodes. (C)</p> Signup and view all the answers

What are PAP and CHAP?

<p>Authentication methods used with PPP. (A)</p> Signup and view all the answers

What is the purpose of Generic Routing Encapsulation (GRE) tunnels?

<p>To create secure tunnels over a network. (C)</p> Signup and view all the answers

Which layer protocols can GRE tunnels encapsulate?

<p>Layer 3 protocols such as IP and IPX. (B)</p> Signup and view all the answers

What is the function of VLAN Trunking Protocol (VTP)?

<p>Manage VLAN configurations across a network. (B)</p> Signup and view all the answers

What command is typically used for diagnosing STP issues?

<p><code>show spanning-tree</code> (D)</p> Signup and view all the answers

What is the primary benefit of using MPLS (Multiprotocol Label Switching) in a WAN?

<p>Optimized routing and reduced latency. (C)</p> Signup and view all the answers

How does EtherChannel enhance network reliability in the context of STP?

<p>By providing redundancy without the need for STP in certain configurations. (D)</p> Signup and view all the answers

Which tool can be used to verify the integrity of a network regarding VLANs and STP in large networks?

<p>Network monitoring tools and NMS. (B)</p> Signup and view all the answers

Why is it important to implement security practices in VLANs and STP?

<p>To ensure the network is protected against unauthorized access and loops. (B)</p> Signup and view all the answers

Flashcards

Layer 2 Switching

Switching at layer 2 operates at the data link level of the OSI model, using MAC addresses to forward frames between devices.

MAC Address Learning

Switches learn MAC addresses of connected devices and make forwarding decisions based on the MAC address table.

VLAN Definition

A VLAN groups devices logically, independent of physical location, improving network performance, security and management.

VLAN Port Types

Ports can be assigned to access VLANs (one VLAN per port) or trunk VLANs (multiple VLANs per port).

Signup and view all the flashcards

Trunking

Trunk links carry traffic from multiple VLANs, using the 802.1Q standard to tag frames with their VLAN ID.

Signup and view all the flashcards

Native VLAN

The native VLAN is the default VLAN for untagged traffic; 802.1Q adds VLAN tags to frames.

Signup and view all the flashcards

EtherChannel

EtherChannel combines multiple physical links into one logical channel, increasing bandwidth and redundancy.

Signup and view all the flashcards

EtherChannel Modes

Modes include On (manual), Desirable/Auto (PAgP), and Active/Passive (LACP) for negotiating EtherChannel.

Signup and view all the flashcards

Dynamic Trunking Protocol (DTP)

DTP negotiates trunk links between switches and can be configured in Desirable, Auto, On, or Nonegotiate mode.

Signup and view all the flashcards

VLAN Configuration

VLANs are configured by VLAN ID. Ports are assigned to VLANs using 'switchport access vlan'. Each VLAN can have an IP range.

Signup and view all the flashcards

Data vs. Voice VLANs

Data VLANs for normal traffic; Voice VLANs isolate voice traffic, ensuring QoS.

Signup and view all the flashcards

Spanning Tree Protocol (STP)

STP prevents network loops in a network with switches.

Signup and view all the flashcards

STP Algorithm

STP uses the Spanning Tree Algorithm (STA); The root bridge is the primary switch.

Signup and view all the flashcards

STP Port States

Blocking (no sending/receiving), Listening (listens only), Learning (learns MACs), Forwarding (sends/receives).

Signup and view all the flashcards

PortFast

Accelerates port transition from blocking to forwarding, useful for end-device ports.

Signup and view all the flashcards

BPDU Guard

Protects the network by blocking ports that receive unauthorized BPDUs.

Signup and view all the flashcards

WAN Definition

WANs connect geographically dispersed devices, utilizing technologies like MPLS, VPNs, and the Internet.

Signup and view all the flashcards

WAN Topologies

Point-to-Point, Star, Mesh, and Ring topologies.

Signup and view all the flashcards

PPP Protocol

PPP is a point-to-point link protocol with authentication methods like PAP and CHAP.

Signup and view all the flashcards

GRE Tunnels

GRE creates secure tunnels between devices, encapsulating layer 3 protocols like IP or IPX.

Signup and view all the flashcards

VLAN Trunking Protocol (VTP)

VTP manages VLAN configuration across a network, reducing manual switch configuration.

Signup and view all the flashcards

STP Troubleshooting

Identify and resolve common STP issues, use 'show spanning-tree' to diagnose.

Signup and view all the flashcards

MPLS Use in WAN

. MPLS directs and accelerates data traffic, optimizing routing and reducing latency.

Signup and view all the flashcards

Etherchannel and STP Redundancy

EtherChannel provides redundancy, reducing the need for STP; STP prevents loops.

Signup and view all the flashcards

VLAN and STP monitoring

Monitor tools for VLAN health.

Signup and view all the flashcards

VLANs and STP Security

Utilizing BPDU Guard, Root Guard and Loop Guard, isolate VLANs to protect the network.

Signup and view all the flashcards

Study Notes

  • The study notes cover advanced switching concepts, Spanning Tree Protocol (STP), and Wide Area Networks (WAN).

Basic Concepts of Layer 2 Switching

  • Layer 2 switching operates at the data link layer of the OSI model.
  • MAC addresses are used to forward frames between devices.
  • Switches learn MAC addresses of connected devices.
  • Switches forward frames based on the MAC address table.

MAC Address Learning

  • Switches dynamically learn MAC addresses.
  • The MAC table is built and updated as devices send frames.
  • If a device moves to another port, the MAC address table is updated.

Introduction to VLANs

  • A VLAN is a logical network that groups devices regardless of their physical location.
  • VLANs improve network performance, security, and management.
  • A physical network can contain multiple VLANs, separating traffic between them.

Assigning VLANs to Switch Ports

  • Switch ports can be assigned to access VLANs or trunk VLANs.
  • Access ports allow connected devices to belong to one VLAN only.
  • Trunk ports allow multiple VLANs to share a link between switches.
  • Trunk links carry traffic for multiple VLANs.
  • The 802.1Q standard tags the frames to identify the VLAN to which they belong.
  • Trunk links interconnect switches.

Native VLAN and 802.1Q

  • The native VLAN is the default VLAN for untagged traffic.
  • The 802.1Q standard adds a VLAN tag to the frames.
  • Frames of the native VLAN are not tagged, but those of the other VLANs are.

What is EtherChannel?

  • EtherChannel combines multiple physical links into one logical channel.
  • It provides greater bandwidth and redundancy.
  • EtherChannel is compatible with LACP and PAgP for link negotiation.

EtherChannel Configuration Modes

  • On Mode: Manual EtherChannel configuration without negotiation.
  • Desirable Mode: The switch tries to form an EtherChannel using PAgP.
  • Active Mode: The switch tries to form an EtherChannel using LACP.
  • Auto and Passive Modes: Automatic configuration that waits for the other device to start negotiation.

Dynamic Trunking Protocol (DTP)

  • DTP is a protocol used to negotiate trunk links between switches.
  • DTP can be configured in Desirable, Auto, On, or Nonegotiate mode.

Configuring VLANs: Creation and Assignment

  • VLANs are configured by VLAN ID.
  • Ports are assigned to VLANs using switchport access vlan.
  • Each VLAN has an associated IP address range.

Data VLANs and Voice VLANs

  • Data VLAN: For normal network traffic.
  • Voice VLAN: To separate voice traffic, guaranteeing quality of service (QoS).
  • Trunk links allow traffic from multiple VLANs.
  • A native VLAN is assigned for untagged traffic.
  • 802.1Q tags are used in trunk links to distinguish VLANs.
  • Switches can tag the traffic to transmit multiple VLANs over a single link.

EtherChannel: Mode of Operation and Advantages

  • EtherChannel combines multiple links into one logical channel.
  • It Improves bandwidth and redundancy.

Introduction to Spanning Tree Protocol (STP)

  • STPprevents network loops in switched networks.
  • It identifies a single active path for traffic.

STP Algorithm

  • STP uses the Spanning Tree Algorithm (STA).
  • The root bridge is the primary switch in the tree.

STP Port Status: Blocking, Listening, Learning and Forwarding

  • Blocking: The port does not send or receive frames.
  • Listening: The port listens to frames but does not forward them.
  • Learning: The port learns MAC addresses.
  • Forwarding: The port actively sends and receives frames.

PortFast Configuration in STP

  • PortFast accelerates the port's transition process from blocking to forwarding state.
  • It is helpful in ports that connect to end devices such as computers.

BPDU Guard Configuration

  • BPDU Guard protects the network from unwanted devices.
  • It blocks ports that receive unauthorized BPDUs.

Basic WAN Concepts

  • WAN connects geographically dispersed devices.
  • MPLS, VPN and Internet protocols are key technologies in WAN.

WAN Topologies

  • Point-to-Point, Star, Mesh, and Ring are common WAN topologies.
  • Topology selection depends on redundancy and cost.

PPP and Authentication Protocols

  • PPP is a point-to-point link protocol.
  • PAP and CHAP are authentication methods.

GRE Tunnel Configuration

  • GRE enables the creation of secure tunnels between devices.
  • Tunnels encapsulate layer 3 protocols (IP, IPX, etc.).

VLAN Trunking Protocol (VTP) Concept

  • VLAN Trunking Protocol manages VLAN configuration across a network.
  • It reduces the manual configuration of VLANs on multiple switches.

Troubleshooting Practice in STP

  • Identification and resolution of common STP problems.
  • Diagnostic tools like show spanning-tree can be used to troubleshoot STP

Use of MPLS in WAN

  • MPLS (Multiprotocol Label Switching) is an advanced protocol for directing and accelerating data traffic on the network.
  • It optimizes routing and reduces latency.

Redundancy in EtherChannel and STP

  • EtherChannel provides redundancy without the need for STP.
  • STP is still useful for preventing loops in complex networks.

Monitoring VLANs and STP in Large Networks

  • Monitoring tools are used to verify network integrity.
  • Network management commands and systems (NMS) are valuable.

Security Practices in VLANs and STP

  • STP Security: Configuration of BPDU Guard, Root Guard, and Loop Guard to protect the network.
  • VLAN Protection: Isolation of critical VLANs.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Spanning Tree Protocol (STP) Overview
43 questions
Spanning Tree Protocol Overview
11 questions

Spanning Tree Protocol Overview

ConciliatoryNovaculite1952 avatar
ConciliatoryNovaculite1952
Spanning Tree Protocol Operations
24 questions
Spanning Tree Protocol and RSTP Overview
24 questions
Use Quizgecko on...
Browser
Browser