CCNP switch slides 6 Flashcards

1
Q

source

A

http://quizlet.com/3373203/ccnp-switch-deck-6-flash-cards/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 power over ethernet methods?

A

Cisco ILP and 802.3af

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many 802.3af power classes are there?

A

5 (0-4 with 4 being the highest)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the default 802.3af power class and its use?

A

if the switch or the powered device doesn’t suport power class discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does 802.3af do power discovery?

A

sends a voltage across the receive pairs to detect a 25k ohm resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does ILP do power discovery?

A

sends a test tone on the transmit pair. If a device is detected, CDP is used to narrow down the power class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What ILP mode are all ports in by default?

A

auto mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a Cisco IP phone connect upstream?

A

via an 802.1Q trunk or a single VLAN access port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 2 choices for VLANs with IPT?

A

they must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is the IPT 802.1 trunk negotiated?

A

Automatically using DTP and CDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does IPT behave when the voice VLAN is in vlan-id mode?

A

data goes over native vlan, voice goes over specified VLAN, voice QOS is 802.1p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does IPT behave when the voice VLAN is in dot1p mode?

A

data goes over native vlan, voice goes over VLAN0, voice QOS is 802.1p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does IPT behave when the voice VLAN is in untagged mode?

A

data and voice over native vlan, no QOS but still uses 802.1p trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does IPT behave when the voce VLAN is in the default none mode?

A

data and voice over native vlan no QOS and no 802.1p trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is latency?

A

the total delay from start to finish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is jitter?

A

variation in delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three basic types of QOS?

A

best effort delivery, integrated services model, and differentiated services model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is best effort delivery QOS?

A

switches make an effort to move packets as quickly as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is integrated services model QOS?

A

A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is differentiated services model QOS?

A

Each network device handles packets individually with no advance reservations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What method of QOS does voice traffic use most frequently?

A

differentiated services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does an L2 switch do QOS?

A

an L2 switch can only forward frames best effort unless going across a trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does 802.1q handle COS?

A

The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does ISL handle COS?

A

The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How does L3 QOS classification happen?
The TOS field in the header is used. 2 methods 3 bits or 6 bits
26
What is DSCP?
Differentiated services code point
27
How does DSCP handle IP precedence?
5 classes with 3 drop precedences
28
What is DSCP codepoint EF(46)?
Critical...used most often for IPT
29
What is DSCP codepoint AF41(34)?
Flash override (class 4)
30
What is DSCP codepoint AF31(26)?
Flash (class 3)
31
What is DSCP codepoint AF21(18)?
immediate (class 2)
32
What is DSCP codepoint AF11(10)?
priority (class 1)
33
What is a QoS trust boundary?
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
34
How is a QoS trust bondary configured?
Every switch and router in a network must be configured with appropriate QoS features and policies
35
Where is the QoS trust boundary usually configured on an IP phone?
Usually QoS from VOIP but not PC dataa
36
What are the 4 steps to extend QoS trust?
1- enable qos, 2-define qos parameters to be trusted, 3-make trust conditional, 4-instruct IP phone how to extnd boundary
37
For QoS, switch uplinks should always be considered as ____ _____?
trusted ports
38
How much BW does a PSTN connection use?
63 kbps
39
How much BW does a voip connection use?
12 kbps with headers and compression
40
How do Cisco IP phones communicate with the CCM?
with the skinny protocol
41
What does the skinny protocol do?
transmits keystrokes from phone and commands from CCM
42
How do IP phones communicate with each other?
Once the CCM gives them the parameters, they use RTP
43
What is RTP?
Real-time Transport Protocol
44
What is the standard for WLANs?
802.11
45
What duplex setting does 802.11 use and why?
half because transmitting and receiving stations use the same frequency
46
What feedback mechanism does wireless use?
when a wireless station transmits a frame, the receiving one must send an ack
47
If a wireless station needs to transmit and no other device is transmitting, what happens?
The station can transmit immediately and wait for an ack
48
If a wireless station needs to transmit and another device is transmitting, what happens?
The station must wait until the frame in progress has completed, then wait a random amount of time before transmitting
49
What is the DIFS?
The DCF interframe space- the random backoff time before a wireless set can transmit
50
What is the duration time in a wireless frame?
Each frame transmits its expected duration time
51
What is DCF?
Distributed coordinion function - the use of timers to prevent wireless collisions
52
What is a service set?
A group of wireless devices that share a common SSID
53
What is an IBSS?
the wireless clients communicate directly with no other means of connectivity such as a WAP
54
What is a BSS?
Using a single WAP to centralize access and control over a group of wireless devices.
55
What must be in common for a BSS to form?
matching SSID, compatible data rate, authentication credentials
56
What is an ESS?
When the AP uplinks to an Ethernet network.
57
How are multiple VLANs mapped to multiple SSIDs?
By using a trunk link
58
What is a cell?
An AP's coverage area
59
What must you be sure of if AP cells overlap?
That they aren't using the same frequencies.
60
What is layer 2 roaming?
If the client maintains the same IP address as it roams between Aps. All must have same VLAN, SSID, and subnet
61
What is layer 3 roaming?
When a client roams between Aps in different subnets
62
What is a microcell?
When the size of a cell is intentionally reduced
63
What is an autonomous mode AP?
When each AP stands alone within the larger network.
64
What functions does a LAP perform?
Real-time functions such as beacons and probes, encryption and interactions with the client at L2
65
What functions does a WLC perform?
Control functions
66
How does an LAP bind with a WLC?
by brining up a tunnel between them to carry 802.11 related messages and client data.
67
Does a WLC and a LAP need to be on the same subnet?
No
68
What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
69
How many tunnels exist between the LAP and WLC?
2 - one for control messages and one for data
70
How does a LAP and a WLC authenticate between each other?
using digital certificates
71
What are the 5 steps a LAP uses to establish communication with a WLC?
1-LAP gets a DHCP address, 2-LAP learns IP of available WLC, 3-LAP sends a join request to WLC and receives join reply, 4-WLC sends code image, if necessary, 5-Tunnels are created
72
How does a DHCP server send WLC addresses?
Option 43
73
What does a LAP do if it loses communication with it's WLC?
Reboots and searches for a new WLC
74
How does a WLC hand off a client's association to another WLC?
using a mobility exchange message
75
How is a WLC handoff handled when the WLCs are in different subnets?
by using an Ether-IP tunnel
76
What is a wireless mobility group?
A client can roam to any WLC as long as it stays in a mobility group
77
How should the switch port to which an autonomous AP be configured?
trunk
78
How should the switch port to which a LAP be configured?
access
79
At what layer should the WLC be connected?
distribution
80
How should the switch port to which a WLC be configured?
trunk
81
If the WLC connects to an Etherchannel, how should the channel be configured and why?
they should be an unconditional Etherchannel because the WLC can't negotiate a channel.
82
How much overlap should WAPs have?
10-15%
83
How much overlap should a wireless repeater have?
roughly 50%
84
What can cause a wireless client to switch between Aps?
missed beacons, dropped packets (max retry), weak signal (data rate switches down), an AP periodicallytries to find a stronger signal
85
What are the 3 unlicensed frequencies?
900 MHz, 2.4Ghz, and 5-6GHz
86
802.11b
1,2,5.5 and 11 Mbps, Channels 1/6/11, 2.4Ghz
87
802.11g
Compatible with 802.11b, up to 54Mbps in 12 data rates, 3 channels, 2.4Ghz
88
802.11a
up to 54Mbps, not cross-compatible, 12 to 23 clean channels, 5.8 Ghz
89
WEP encryption
weak key rotation
90
EAP encryption
dynamic WEP keys that change periodically
91
WPA encryption
interim solution, uses same hardware as WEP, but uses TKIP encryption
92
WPA2 encryption
needs hardware upgrade over WEP, uses AES encryption