Você está na página 1de 8

00_9781587202438_appc.

qxp 1/5/10 9:06 AM Page 2


00_9781587202438_appc.qxp 1/5/10 9:06 AM Page 3

APPENDIX C

Memory Tables

Chapter 5
Table 5-2 Catalyst VTP Modes
VTP Mode Characteristics

Server

Listens to all VTP advertisements from servers in a VTP domain. Advertisements


are relayed out other trunk links. No VLAN or VTP configuration changes can
be made on a client.
VLAN configuration changes are made locally, independent of any VTP
domain. VTP advertisements are not received but merely are relayed out other
trunk links, if possible.

Chapter 6
Table 6-4 EtherChannel Negotiation Protocols
Negotiation Mode Negotiation Packets Sent? Characteristics

PAgP LACP

All ports channeling


Waits to channel until asked
Actively asks to form a channel
00_9781587202438_appc.qxp 1/5/10 9:06 AM Page 4

4 CCNP SWITCH 642-813 Official Certification Guide

Chapter 7
Table 7-4 STP States and Port Activity
STP State The Port Can... The Port Cannot... Duration

Disabled N/A Send or receive data N/A


Blocking Indefinite if loop has been detected

Listening Forward Delay timer (15 seconds)

Learning Forward Delay timer (15 seconds)

Forwarding Indefinite as long as port is up and


loop is not detected

Table 7-5 Manual STP Computation


Task Description
1. Identify ____________ on links. For each link between switches, write the
___________ that each switch uses for the
link.
2. Identify the ____________ Find the switch with the lowest
____________; mark it on the drawing.
3. Select ____________ (1 per switch). For each switch, find the one port that has
the best ______________________. This is the
one with the lowest __________________.
Mark the port with an ____ label.
4. Select __________________ (1 per segment). For each link between switches, identify
which end of the link will be the
______________________. This is the one
with the lowest root path cost; if equal on
both ends, use STP tie-breakers. Mark the
port with a _______ label.
5. Identify the _____________ ports. Every switch port that is neither
_________________________ will be put into
the ___________________ state. Mark these
with an X.
00_9781587202438_appc.qxp 1/5/10 9:06 AM Page 5

Appendix C: Memory Tables 5

Table 7-6 STP Timers


Timer Function Default
Value
Hello Interval between ________________________________________ ___ seconds
Forward Time spent in ________________________________ states before ___ seconds
Delay transitioning toward _________________________________ state
Max Age Maximum length of time _________________________________ ___ seconds
___________________. Timer expiration signals an indirect fail-
ure with designated or root bridge

Table 7-8 Types of STP


Type of STP Function
CST
PVST
PVST+

Chapter 8
Recall the sequence of four criteria that STP uses to choose a path:

Step 1. Lowest _____________________


Step 2. Lowest _____________________
Step 3. Lowest sender _______________
Step 4. Lowest sender _______________

Some additional methods allow faster STP convergence in the event of a link failure:
■ _______________—Enables fast connectivity to be established on access-layer switch
ports to workstations that are booting

■ _______________—Enables fast-uplink failover on an access-layer switch when dual


uplinks are connected into the distribution layer

■ _______________—Enables fast convergence in the network backbone or core layer


switches after a spanning-tree topology change occurs
00_9781587202438_appc.qxp 1/5/10 9:06 AM Page 6

6 CCNP SWITCH 642-813 Official Certification Guide

Chapter 9
UDLD has two modes of operation:

■ ____________ mode—When a unidirectional link condition is detected, the port is


allowed to continue its operation. UDLD merely marks the port as having an undeter-
mined state and generates a syslog message.

■ _____________ mode—When a unidirectional link condition is detected, the switch


takes action to reestablish the link. UDLD messages are sent out once a second for 8
seconds. If none of those messages is echoed back, the port is placed in the Errdis-
able state so that it cannot be used.

Chapter 10
Table 10-2 MST Configuration Commands
Task Command Syntax
Set root bridge Switch(config)# _________________________________________________
(macro)
Set bridge priority Switch(config)# _________________________________________________

Set port cost Switch(config)# _________________________________________________

Set port priority Switch(config)# _________________________________________________

Set STP timers Switch(config)# _________________________________________________


Switch(config)# _________________________________________________
Switch(config)# _________________________________________________

Chapter 11
The switch has an additional functional block that performs a packet rewrite in real time.
The packet rewrite engine (shown in Figure 11-3) makes the following changes to the
packet just before forwarding:

■ Layer 2 destination address—Changed to the ______________________________


address

■ Layer 2 source address—Changed to the __________________________________


____________________________ address

■ Layer 3 IP ______—Decremented by one because one router hop has just occurred

■ Layer 3 IP ____________—Recalculated to include changes to the IP header

■ Layer 2 frame ____________—Recalculated to include changes to the Layer 2 and


Layer 3 headers
00_9781587202438_appc.qxp 1/5/10 9:06 AM Page 7

Appendix C: Memory Tables 7

Chapter 12
Table 12-2 Types of Network Services
Service Type Location of Service Extent of Traffic Flow
Local Same segment/VLAN as user _______ layer only
Remote Different segment/VLAN as user _______ to ___________layers
Enterprise Central to all campus users ______to __________to ______layers

Chapter 14
Table 14-2 IEEE 802.3af Power Classes
Power Class Maximum Power Offered at 48V DC Notes
0 Default class
1 Optional class
2 Optional class
3 Optional class
4 Optional class (802.3at)

Three basic things can happen to packets as they are sent from one host to another across
a network:

■ _______—As a packet is sent from one network device to another, its delivery is de-
layed by some amount of time. This can be caused by the time required to send the
packet serially across a wire, the time required for a router or switch to perform table
lookups or make decisions, the time required for the data to travel over a geographi-
cally long path, and so on. The total delay from start to finish is called the latency.
This is seen most easily as the time from when a user presses a key until the time the
character is echoed and displayed in a terminal session.

■ _______—Some applications involve the delivery of a stream of related data. As these


packets are delivered, variations can occur in the amount of delay so that they do not
all arrive at predictable times. The variation in delay is called jitter. Audio streams are
particularly susceptible to jitter; if the audio data is not played back at a constant
rate, the resulting speech or music sounds choppy.

■ _______—In extreme cases, packets that enter a congested or error-prone part of the
network are simply dropped without delivery. Some amount of packet loss is accept-
able and recoverable by applications that use a reliable, connection-oriented protocol
such as TCP. Other application protocols are not as tolerant, and dropped packets
mean data is missing.
00_9781587202438_appc.qxp 1/5/10 9:06 AM Page 8

8 CCNP SWITCH 642-813 Official Certification Guide

Chapter 16
A violation occurs if more than the maximum number of MAC addresses are learned or if
an unknown (not statically defined) MAC address attempts to transmit on the port. The
switch port takes one of the following configured actions when a violation is detected:

■ __________—The port immediately is put into the Errdisable state, which effectively
shuts it down. It must be reenabled manually or through errdisable recovery to be
used again.

■ __________—The Port Is Allowed To Stay Up, But All Packets From Violating MAC
Addresses are dropped. The switch keeps a running count of the number of violating
packets and can send an SNMP trap and a syslog message as an alert of the violation.

■ __________—The port is allowed to stay up, as in the __________ mode. Although


packets from violating addresses are dropped, no record of the violation is kept.

Chapter 17
A secondary VLAN is configured as one of the following types:

■ __________—Any switch ports associated with an isolated VLAN can reach the pri-
mary VLAN but not any other secondary VLAN. In addition, hosts associated with
the same isolated VLAN cannot reach each other. They are, in effect, isolated from
everything except the primary VLAN.

■ __________—Any switch ports associated with a common community VLAN can


communicate with each other and with the primary VLAN but not with any other
secondary VLAN. This provides the basis for server farms and workgroups within an
organization, while giving isolation between organizations.

You must configure each physical switch port that uses a private VLAN with a VLAN as-
sociation. You also must define the port with one of the following modes:

■ __________—The switch port connects to a router, firewall, or other common gate-


way device. This port can communicate with anything else connected to the primary
or any secondary VLAN. In other words, the port is in promiscuous mode, in which
the rules of private VLANs are ignored.

■ __________—The switch port connects to a regular host that resides on an isolated or


community VLAN. The port communicates only with a promiscuous port or ports
on the same community VLAN.
00_9781587202438_appc.qxp 1/5/10 9:06 AM Page 9

Você também pode gostar