Ethernet Switching Flashcards

(45 cards)

1
Q

What is the role of the Access/Edge Layer in a three-tiered network hierarchy?

A

The Access/Edge Layer connects endpoint devices, such as computers and printers, using regular switches, providing direct network access to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the role of the Core Layer in a three-tiered network hierarchy?

A

The Core Layer houses high-performance routers and switches, merging geographically separated networks and ensuring fast, reliable data transfer across the network backbone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of the Distribution/Aggregation Layer in a three-tiered network hierarchy?

A

The Distribution/Aggregation Layer defines boundaries using access lists and filters, managing traffic flow between the Core and Access Layers while enforcing security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the benefits of having three layers in a network hierarchy?

A

Performance by optimizing traffic flow. Management through clear role separation. Scalability by allowing easier network expansion. Redundancy for increased reliability and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Collapsed Core Network Architecture?

A

A Collapsed Core Network Architecture merges the Core and Distribution Layers into a single layer, creating a simplified architecture ideal for medium to small datacenters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the role of the Leaf Layer in Spine and Leaf Architecture?

A

The Leaf Layer consists of access switches that aggregate traffic from servers and connect directly to the Spine Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of the Spine Layer in Spine and Leaf Architecture?

A

The Spine Layer contains switches that interconnect all Leaf switches in a full-mesh topology, ensuring high bandwidth and low latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Maximum Transmission Unit (MTU) for Ethernet?

A

1500 bytes—this is the largest payload size allowed in a standard Ethernet frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Ethernet header include?

A

Destination MAC Address – who the frame is going to
Source MAC Address – who sent it
EtherType field – tells whether the payload is IPv4, IPv6, or something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s included in a Layer 2 frame besides the header?

A

A payload (the actual data being carried).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Jumbo Frames?

A

Frames that exceed the 1500-byte MTU—used in high-performance networks to reduce overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What port role blocks traffic to prevent loops?

A

Non-designated port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You’re analyzing a segment between two non-root switches. One has a lower cost to the root. What port role does it get?

A

Designated port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a root port in STP?

A

The root port is the port on a non-root bridge that provides the best path to the root bridge. Each non-root switch has exactly one root port It’s used to forward traffic toward the root bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Spanning Tree Protocol (STP), what IEEE standard defines it, and what problem does it solve?

A

STP is defined by IEEE 802.1d. Prevents broadcast storms and network loops. Enables redundant links between switches while maintaining a loop-free topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the root bridge in STP, how is it elected, and what identifier is used in the election?

A

The root bridge is the central reference point in the STP topology. Elected based on the lowest Bridge ID (BID), which equals Priority value + MAC address. Lower BID wins; ties resolved by lowest MAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How is path cost calculated in STP, and what factors influence which port becomes the root port?

A

Faster cables = lower cost; slower cables = higher cost. If costs are equal, the lowest port number is chosen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A network engineer is tasked with extending a layer 2 network across multiple data centers using a layer 3 infrastructure. They implement a virtualization technology that encapsulates Ethernet frames within UDP packets to create scalable, agile virtual networks. What technology is being used?

A

Virtual Extensible Local Area Network (VXLAN), which enables layer 2 extension over layer 3 using network overlays and UDP encapsulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the primary Layer 2 protocol used in modern networks, and why is it preferred?

A

Ethernet — preferred for its simplicity, scalability, and efficiency. Uses contention-based access for bandwidth optimization.

20
Q

Compare deterministic vs. contention-based access methods.

A

Deterministic Access: Organized and predictable; devices take turns in a set order.

Contention-based Access: Devices compete for access; more chaotic but efficient use of bandwidth.

21
Q

For CSMA/CD, list what each part stands for and explain how it manages collisions.

A

Carrier Sense (CS): Devices listen for existing transmissions before sending

Multiple Access (MA): Many devices share the same medium

Collision Detection (CD): Devices detect collisions and stop transmitting CSMA/CD helps manage access and recover from collisions in Ethernet networks.

22
Q

Why is CSMA/CD less relevant in modern Ethernet networks?

A

Modern Ethernet uses full-duplex switching, eliminating collisions. CSMA/CD was essential in legacy half-duplex environments

23
Q

What is the purpose of a random back-off timer in Ethernet networks, and when is it used?

A

Used after a collision is detected (in CSMA/CD environments). Devices pause transmission and select a random back-off time before retrying—reduces repeated collisions.

24
Q

Define what a VLAN is, including its OSI layer, function, and how switches handle VLAN tagging.

A

Segments traffic into separate broadcast domains. Operates at Layer 2 (Data Link layer). Switches tag each data frame with a VLAN ID to define its VLAN membership.

25
List four key reasons for using VLANs, and explain how each improves network design.
Enhanced Security: Isolates sensitive data Improved Performance: Shrinks broadcast domains Increased Management: Simplifies policy enforcement Cost Efficiency: Maximizes use of existing hardware
26
What is the VLAN database, and what key configuration elements does it store for switches? 3/3
Stores VLAN configurations on a switch, including: VLAN Identifier (ID) VLAN Name MTU size (Maximum Transmission Unit)
27
What is a Switch Virtual Interface (SVI), and how does it enable inter-VLAN communication?
A virtual Layer 3 interface on a switch. Provides routing between VLANs without needing an external router. Each VLAN can be assigned an SVI with an IP address.
28
What is 802.1Q tagging, and how does it support VLAN management across switches?
Inserts a VLAN Identifier (VID) into each frame to maintain VLAN separation across trunk links.
29
What is a native VLAN, and how should it be configured on trunk ports to avoid misrouting?
The default VLAN for untagged frames on a trunk port. Does not receive a VLAN tag (VID). Must be consistently configured across interconnected switches.
30
Define trunking in VLAN environments—include its purpose and how it maintains VLAN separation.
Trunking allows traffic from multiple VLANs to travel over the same physical link. Used between switches or switch-to-router connections. Requires 802.1Q tagging to identify VLANs.
31
What is a voice VLAN, and why is it used in VoIP deployments?
A dedicated VLAN for voice traffic (VoIP). Segregates voice from data to ensure quality and reliability.
32
What is link aggregation, and how does it improve bandwidth and redundancy? Where is it used the most?
Bundles multiple physical cables/ports between two devices into one logical link. This combines speed of the indivual cables and ports to boosts total bandwidth and adds redundancy Common for connecting switches or high‑speed links in data centers.
33
How does auto-negotiation simplify the configuration of devices like switches, routers, and computers?
Auto-negotiation allows connected devices to automatically determine and select the highest mutually supported speed and duplex settings—reduces manual setup and prevents mismatches.
34
Why do wireless networks typically use a smaller MTU size than wired networks?
Due to instability and higher error rates, smaller MTU reduces fragmentation and improves reliability.
35
What is the recommended MTU size range for VPN and PPPoE connections?
1400 to 1420 bytes, to account for encapsulation overhead and avoid fragmentation.
36
What are jumbo frames used for and what must be ensured when configuring jumbo frames across a network?
Used for high-bandwidth applications to reduce CPU overhead and improve throughput. Must be consistently configured across all devices to avoid packet drops.
37
A network frequently transitions between blocking and forwarding states, disrupting connectivity. What protocol upgrade and configuration can reduce these disruptions?
Enable RSTP — it speeds up convergence when topology changes occur and root bridge election is redone.
38
What is the EtherType field in an Ethernet frame used for? and what are common values for IPv4 and IPv6
It identifies the protocol carried in the payload (e.g., IPv4 = 0x0800, IPv6 = 0x86DD, ARP = 0x0806).
39
How does a broadcast storm affect a switch’s MAC address table?
A broadcast storm causes the same MAC addresses to appear on multiple ports repeatedly, forcing the switch to constantly relearn them, making the MAC table unstable and sometimes requiring it to be cleared.
40
A network admin notices that a switch port stopped forwarding traffic after a user connected an unauthorized device, and it cannot be manually re-enabled until inspected. What likely caused this?
The port was automatically disabled (“err-disabled”) by the switch as a protective measure due to a security or policy violation.
41
What is the difference between an access port and a tagged (trunk) port on a switch?
An access port connects a single device to one VLAN and sends untagged traffic; a tagged (trunk) port connects switches or a switch to a router, carries multiple VLANs, and uses VLAN tags to distinguish traffic.
42
42
What is an MDI interface, and how does it differ from MDI-X?
MDI (Medium-Dependent Interface) is the Ethernet interface on an end device, while MDI-X is on a hub or switch; MDI connects to MDI-X using a straight-through cable or auto-negotiates in modern devices.
43
What is the role of a native VLAN on a switch trunk port?
The native VLAN carries untagged traffic on a trunk port, ensuring communication for devices that don’t support VLAN tagging, such as some legacy or management systems.
44
What’s the difference between a native VLAN and a default VLAN?
Default VLAN: The VLAN that all switch ports belong to when first configured (usually VLAN 1). It handles management and control traffic by default. Native VLAN: The VLAN on a trunk port that carries untagged traffic between switches. It can be changed from VLAN 1 for security or traffic separation.