Вы находитесь на странице: 1из 5

CCNA 3 CHAPTER quiz & exam [1234]

CCNA 3 CHAPTER1 CMS \The typical hierarchical design model is broken up in to three layers: access, distribution, and core. Access Layer The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points. Distribution Layer The distribution layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs) defined at the access layer. Core Layer The core area can also connect to Internet resources. The core aggregates the traffic from all the distribution layer devices, so it must be capable of forwarding large amounts of data quickly. \Benefits of a Hierarchical Network ScalabilityHierarchical networks scale very well. The modularity of the design allows you to replicate design elements as the network grows. Redundancy Access layer switches are connected to two different distribution layer switches to ensure path redundancy. If one of the distribution layer switches fails, the access layer switch can switch to the other distribution layer switch. Performance Communication performance is enhanced by avoiding the transmission of data through lowperforming, intermediary switches. Data is sent through aggregated switch port links from the access layer to the distribution layer at near wire speed in most cases. Network Diameter Network diameter is the number of devices that a packet has to cross before it reaches its destination. Bandwidth Aggregation Bandwidth aggregation is the practice of considering the specific bandwidth requirements of each part of the hierarchy. Redundancy Redundancy is one part of creating a highly available network. Redundancy can be provided in a number of ways. Modular Switches Modular switches offer more flexibility in their configuration. Modular switches typically come with different sized chassis that allow for the installation of different numbers of modular line cards. The line cards actually contain the ports. Stackable Switches Stackable switches can be interconnected using a special backplane cable that provides highbandwidth throughput between the switches. Stack Wise allows you to interconnect up to nine switches using fully redundant backplane connections. Manageability Manageability is relatively simple on a hierarchical network. Each layer of the hierarchical design performs specific functions that are consistent throughout that layer. MaintainabilityThe modularity of hierarchical design allows for the network to scale without becoming overly complicated. \Hierarchical Network Design Principles
Topology Diagrams A topology diagram is a graphical representation of a network infrastructure. User Communities Analysis User community analysis is the process of identifying various groupings of users and their impact on network performance.

Security Security is improved and easier to manage. Access layer switches can be configured with various port security options that provide control over which devices are allowed to connect to the network.
Traffic Flow AnalysisTraffic flow analysis is the process of measuring the bandwidth usage on a network and analyzing the data for the purpose of performance tuning, capacity planning, and making hardware improvement decisions. Traffic flow analysis is done using traffic flow analysis software. Analysis Tools Many traffic flow analysis tools that automatically record traffic flow data to a database and perform a trend analysis are available.

Performance When selecting a switch for the access, distributions, or core layers, consider the ability of the switch to support the port density, forwarding rates, and bandwidth aggregation requirements of your network. Port Density Port density is the number of ports available on a single switch. Forwarding Rates Forwarding rates define the processing capabilities of a switch by rating how much data the switch can process per second. Switch product lines are classified by forwarding rates. Link AggregationLink aggregation helps to reduce these bottlenecks of traffic by allowing up to eight switch ports to be bound together for data communications, providing up to 8 Gb/s of data throughput when Gigabit Ethernet ports are used. With the addition of multiple 10 Gigabit Ethernet (10GbE) uplinks on some enterprise-layer switches, very high throughput rates can be achieved.

.. \SWITCH for factors Fixed Configuration Switches Fixed configuration switches are just as you might expect, fixed in their configuration

CCNA 3 CHAPTER quiz & exam [1234]


CCNA3 CHAPTER 2 CMS
CSMA/CD Ethernet signals are transmitted to every host connected to the LAN using a special set of rules to determine which station can access the network. The set of rules that Ethernet uses is based on the IEEE carrier sense multiple access/collision detect (CSMA/CD) technology. Carrier Sense In the CSMA/CD access method, all network devices that have messages to send must listen before transmitting. Multi-access If the distance between devices is such that the latency of the signals of one device means that signals are not detected by a second device, the second device may also start to transmit. Collision Detection When a device is in listening mode, it can detect when a collision occurs on the shared media, because all devices can detect an increase in the amplitude of the signal above the normal level. Jam Signal and Random Backoff When a collision is detected, the transmitting devices send out a jamming signal. The jamming signal notifies the other devices of a collision, so that they invoke a backoff algorithm.

Multicast Communication in which a frame is sent to a specific group of devices or clients. Multicast transmission clients must be members of a logical multicast group to receive the information. \ Ethernet Frame Preamble and Start Frame Delimiter Fields The Preamble (7 bytes) and Start Frame Delimiter (SFD) (1 byte) fields are used for synchronization between the sending and receiving devices. Destination MAC Address Field The Destination MAC Address field (6 bytes) is the identifier for the intended recipient. This address is used by Layer 2 to assist a device in determining if a frame is addressed to it. The address in the frame is compared to the MAC address in the device. If there is a match, the device accepts the frame. Source MAC Address Field The Source MAC Address field (6 bytes) identifies the frame's originating NIC or interface. Switches use this address to add to their lookup tables. Length/Type Field The Length/Type field (2 bytes) defines the exact length of the frame's data field. This field is used later as part of the Frame Check Sequence (FCS) to ensure that the message was received properly. Data and Pad Fields The Data and Pad fields (46 to 1500 bytes) contain the encapsulated data from a higher layer, which is a generic Layer 3 PDU, or more commonly, an IPv4 packet. Frame Check Sequence Field The FCS field (4 bytes) detects errors in a frame. It uses a cyclic redundancy check (CRC). The sending device includes the results of a CRC in the FCS field of the frame. The receiving device receives the frame and generates a CRC to look for errors.

\ MAC Address Organizational Unique Identifier The OUI is the first part of a MAC address. It is 24 bits long and identifies the manufacturer of the NIC card. The IEEE regulates the assignment of OUI numbers. Vendor Assignment Number The vendor-assigned part of the MAC address is 24 bits long and uniquely identifies the Ethernet hardware. It can be a BIA or modified by software indicated by the local bit. \Duplex Settings Half Duplex Half-duplex communication relies on unidirectional data flow where sending and receiving data are not performed at the same time. This is similar to how walkie-talkies or two-way radios function in that only one person can talk at any one time. Full Duplex Full-duplex connections require a switch that supports full duplex or a direct connection between two nodes that each support full duplex. \ Switch Port Settings Auto - option sets autonegotiation of duplex mode. With autonegotiation enabled, the two ports communicate to decide the Full - option sets full-duplex mode. Half - option sets half-duplex mode. auto-MDIX
Additionally, you used to be required to use certain cable types (cross-over, straight-through) when connecting between specific devices, switch-to-switch or switch-torouter. auto-MDIX feature is enabled, the switch detects the required cable type for copper Ethernet connections and configures the interfaces accordingly. \Switch Packet Forwarding Methods

Store-and-Forward Switching
In store-and-forward switching, when the switch receives the frame, it stores the data in buffers until the complete frame has been received. During the storage process, the switch analyzes the frame for information about its destination. In this process, the switch also performs an error check using the Cyclic Redundancy Check (CRC) trailer portion of the Ethernet frame.

Cut-through Switching In cut-through switching, the switch acts upon the data as soon as it is received, even if the transmission is not complete. -Fast-forward switching: Fast-forward switching offers the lowest level of latency. Fast-forward switching immediately forwards a packet after reading the destination address. -Fragment-free switching: In fragment-free switching, the switch stores the first 64 bytes of the frame before forwarding. Fragment-free switching can be viewed as a compromise between store-andforward switching and cut-through switching. \Symmetric and Asymmetric Switching Asymmetric switching Enables more bandwidth to be dedicated to a server switch port to prevent a bottleneck. Symmetric On a symmetric switch all ports are of the same bandwidth. Symmetric switching is optimized for a reasonably distributed traffic load, such as in a peerto-peer desktop environment. \Port Based and Shared Memory Buffering Port-based Memory Buffering In port-based memory buffering, frames are stored in queues that are linked to specific incoming ports. Shared Memory Buffering Shared memory buffering deposits all frames into a common memory buffer that all the ports on the switch share.

\ Ethernet Communications Unicast Communication in which a frame is sent from one host and addressed to one specific destination. In unicast transmission, there is just one sender and one receiver. Unicast transmission is the predominant form of transmission on LANs and within the Internet. Broadcast Communication in which a frame is sent from one address to all other addresses. In this case, there is just one sender, but the information is sent to all connected receivers. Broadcast transmission is essential when sending the same message to all devices on the LAN.

CCNA 3 CHAPTER quiz & exam [1234]


CCNA 3 CHAPTER 3 CMS \Benefits of a VLAN Security Groups that have sensitive data are separated from the rest of the network, decreasing the chances of confidential information breaches. Faculty computers are on VLAN 10 and completely separated from student and guest data traffic. Cost reduction Cost savings result from less need for expensive network upgrades and more efficient use of existing bandwidth and uplinks. Broadcast storm mitigation Dividing a network into VLANs reduces the number of devices that may participate in a broadcast storm. Improved IT staff efficiency VLANs make it easier to manage the network because users with similar network requirements share the same VLAN. Simpler project or application management VLANs aggregate users and network devices to support business or geographic requirements. \ VLAN ID Ranges Normal Range VLANs >IDs 1002 through 1005 are reserved for Token Ring and FDDI VLANs. > The VLAN trunking protocol (VTP), which helps manage VLAN configurations between switches, can only learn normal range VLANs and stores them in the VLAN database file. Extended Range VLANs > Enable service providers to extend their infrastructure to a greater number of customers. Some global enterprises could be large enough to need extended range VLAN IDs. >Are identified by a VLAN ID between 1006 and 4094. 255 VLANs Configurable One Cisco Catalyst 2960 switch can support up to 255 normal range and extended range VLANs, although the number configured affects the performance of the switch hardware. \TYPES OF VLANs: Data VLAN A data VLAN is a VLAN that is configured to carry only user-generated traffic. A VLAN could carry voice-based traffic or traffic used to manage the switch, but this traffic would not be part of a data VLAN. Default VLAN All switch ports become a member of the default VLAN after the initial boot up of the switch. The default VLAN for Cisco switches is VLAN 1. Native VLAN A native VLAN is assigned to an 802.1Q trunk port. An 802.1Q trunk port supports traffic coming from many VLANs (tagged traffic) as well as traffic that does not come from a VLAN (untagged traffic). Management VLAN A management VLAN is any VLAN you configure to access the management capabilities of a switch. \ Voice VLANs A Cisco Phone is a SwitchPort 1 - connects to the switch or other voice-over-IP (VoIP) device. Port 2 - is an internal 10/100 interface that carries the IP phone traffic. Port 3 - (access port) connects to a PC or other device. Static VLAN - Ports on a switch are manually assigned to a VLAN. Static VLANs are configured using the Cisco CLI. Dynamic VLAN - A dynamic port VLAN membership is configured using a special server called a VLAN Membership Policy Server (VMPS Voice VLAN - A port is configured to be in voice mode so that it can support an IP phone attached to it. Before you configure a voice VLAN on the port, you need to first configure a VLAN for voice and a VLAN for data. \ Network Traffic Types Network Management and Control Traffic Many different types of network management and control traffic can be present on the network, such as Cisco Discovery Protocol (CDP) updates, Simple Network Management Protocol (SNMP) traffic, and Remote Monitoring (RMON) traffic. IP Telephony The types of IP telephony traffic are signaling traffic and voice traffic. Signaling traffic is, responsible for call setup, progress, and teardown, and traverses the network end to end. IP Multicast IP multicast traffic is sent from a particular source address to a multicast group that is identified by a single IP and MAC destination-group address pair. Normal Data Normal data traffic is related to file creation and storage, print services, e-mail database access, and other shared network applications that are common to business uses. Scavenger Class The Scavenger class is intended to provide less-than best-effort services to certain applications. \VLAN Switch Port Modes: \Network Without VLANS Network with VLANs When VLANs are implemented on a switch, the transmission of unicast, multicast, and broadcast traffic from a host on a particular VLAN are constrained to the devices that are on the VLAN. \Controlling Broadcast Domains with Switches and Routers Intra-VLAN CommunicationCommunicating with a device in the same VLAN is called intra-VLAN communication. Inter-VLAN CommunicationCommunicating with a device in another VLAN is called inter-VLAN communication. \Controlling Broadcast Domains with VLANs and Layer 3 Forwarding Layer 3 Forwarding pA Layer 3 switch has the ability to route transmissions between VLANs. The procedure is the same as described for the inter-VLAN communication using a separate router, except that the SVIs act as the router interfaces for routing the data between VLANs. Definition of a VLAN Trunk A trunk is a point-to-point link between one or more Ethernet switch interfaces and another networking device, such as a router or a switch. Ethernet trunks carry the traffic of multiple VLANs over a single link. A VLAN trunk allows you to extend the VLANs across an entire network. ..

CCNA 3 CHAPTER quiz & exam [1234]


CCNS 3 CHAPTER 4 / What is VTP? VTP allows a network manager to configure a switch so that it will propagate VLAN configurations to other switches in the network. The switch can be configured in the role of a VTP server or a VTP client. / VTP Benefits .VLAN configuration consistency across the network .Accurate tracking and monitoring of VLANs .Dynamic reporting of added VLANs across a network .Dynamic trunk configuration when VLANs are added to the network \ VTP Components VTP DomainConsists of one or more interconnected switches. All switches in a domain share VLAN configuration details using VTP advertisements. VTP AdvertisementsVTP uses a hierarchy of advertisements to distribute and synchronize VLAN configurations across the network. VTP ModesA switch can be configured in one of three modes: server, client, or transparent. VTP ServerVTP servers advertise the VTP domain VLAN information to other VTP-enabled switches in the same VTP domain. VTP servers store the VLAN information for the entire domain in NVRAM. The server is where VLAN can created, deleted, or renamed for the domain. VTP TransparentTransparent switches forward VTP advertisements to VTP clients and VTP servers. Transparent switches do not participate in VTP. VLANs that are created, renamed, or deleted on transparent switches are local to that switch only. Maximum VLANs Supported LocallyMaximum number of VLANs supported locally. Number of Existing VLANs-Number of existing VLANs. VTP Operating ModeCan be server, client, or transparent. VTP Domain Name-Name that identifies the administrative domain for the switch. VTP Pruning ModeDisplays whether pruning is enabled or disabled. VTP V2 Mode-Displays if VTP version 2 mode is enabled. VTP version 2 is disabled by default. VTP Traps GenerationDisplays whether VTP traps are sent to a network management station. MD5 DigestA 16-byte checksum of the VTP configuration. Configuration Last Modified-Date and time of the last configuration modification. Displays the IP address of the switch that caused the configuration change to the database. \ VTP Frame Structure VTP Frame Encapsulation A VTP frame consists of a header field and a message field. The VTP information is inserted into the data VTP message fieldVaries depending on the message type. LLC fieldLogical link control (LLC) field contains a destination service access point (DSAP) and a source service access point (SSAP) set to the value of AA. SNAP fieldSubnetwork Access Protocol (SNAP) field has an OUI set to AAAA and type set to 2003. VTP header fieldThe contents vary depending on the VTP message type-summary, subset, or request-but it always contains these VTP fields: -Domain nameIdentifies the administrative domain for the switch. -Domain name lengthLength of the domain name. Version- Set to either VTP 1, VTP 2, or VTP 3. The Cisco 2960 switch only supports VTP 1 and VTP 2. -Configuration revision numberThe current configuration revision number on this switch. VTP PruningVTP pruning increases network available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to reach the destination devices. \ Displaying the VTP Status VTP VersionDisplays the VTP version the switch is capable of running. By default, the switch implements version 1, but can be set to version 2. Configuration RevisionCurrent configuration revision number on this switch. You will learn more about revisions numbers in this chapter. field of an Ethernet frame. The Ethernet frame is then encapsulated as a 802.1Q trunk frame (or ISL frame). \VTP Message Contents VTP frames contain the following fixed-length global domain information: -VTP domain name -Identity of the switch sending the message, and the time it was sent -MD5 digest VLAN configuration, including maximum transmission unit (MTU) size for each VLAN -Frame format: ISL or 802.1Q

VTP Frame Details VTP frame structure in more detail. Keep in mind that a VTP frame encapsulated as an 802.1Q frame is not static. The contents of the VTP message determines which fields are present. The receiving VTP-enabled switch looks for specific fields and values in the 802.1Q frame to know what to process. Destination MAC addressThis address is set to 01-00-0C-CC-CC-CC, which is the reserved multicast address for all VTP messages.

VTP frames contain the following information for each configured VLAN: -VLAN IDs (IEEE 802.1Q) -VLAN name -VLAN type -VLAN state -Additional VLAN configuration information specific to the VLAN type VTP Revision Number The configuration revision number is a 32-bit number that indicates the level of revision for a VTP frame. The default configuration number for a switch is zero. Each time a VLAN is added or removed, the configuration revision number is incremented. Each VTP device tracks the VTP configuration revision number that is assigned to it. \VTP Advertisements Summary Advertisements The summary advertisement contains the VTP domain name, the current revision number, and other VTP configuration details. Summary advertisements are sent: -Every 5 minutes by a VTP server or client to inform neighboring VTP-enabled switches of the current VTP configuration revision number for its VTP domain -Immediately after a configuration has been made

CCNA 3 CHAPTER quiz & exam [1234]


Subset Advertisements A subset advertisement contains VLAN information. Changes that trigger the subset advertisement include: -Creating or deleting a VLAN -Suspending or activating a VLAN -Changing the name of a VLAN -Changing the MTU of a VLAN \ VTP Modes Overview Server Mode In server mode, you can create, modify, and delete VLANs for the entire VTP domain. VTP server mode is the default mode for a Cisco switch. VTP servers advertise their VLAN configurations to other switches in the same VTP domain and synchronize their VLAN configurations with other switches based on advertisements received over trunk links. Client Mode If a switch is in client mode, you cannot create, change, or delete VLANs. In addition, the VLAN configuration information that a VTP client switch receives from a VTP server switch is stored in a VLAN database, not in NVRAM. Consequently, VTP clients require less memory than VTP servers. Transparent Mode Switches configured in transparent mode forward VTP advertisements that they receive on trunk ports to other switches in the network. VTP transparent mode switches do not advertise their VLAN configuration and do not synchronize their VLAN configuration with any other switch

Request Advertisements When a request advertisement is sent to a VTP server in the same VTP domain, the VTP server responds by sending a summary advertisement and then a subset advertisement. Request advertisements are sent if: -The VTP domain name has been changed The switch receives a summary advertisement with a higher configuration revision number than its own -A subset advertisement message is missed for some reason The switch has been reset \ VTP Advertisements Details Summary Advertisements Summary advertisements comprise the majority of VTP advertisement traffic. Subset Advertisements The fields found in a subset advertisement are briefly described. The fields in the VLAN-info are not described. Request Advertisements The fields found in a request advertisement are briefly described.

Вам также может понравиться