Escolar Documentos
Profissional Documentos
Cultura Documentos
APPENDIX C
Memory Tables
Chapter 5
Table 5-2 Catalyst VTP Modes
VTP Mode Characteristics
Server
Chapter 6
Table 6-4 EtherChannel Negotiation Protocols
Negotiation Mode Negotiation Packets Sent? Characteristics
PAgP LACP
Chapter 7
Table 7-4 STP States and Port Activity
STP State The Port Can... The Port Cannot... Duration
Chapter 8
Recall the sequence of four criteria that STP uses to choose a path:
Some additional methods allow faster STP convergence in the event of a link failure:
■ _______________—Enables fast connectivity to be established on access-layer switch
ports to workstations that are booting
Chapter 9
UDLD has two modes of operation:
Chapter 10
Table 10-2 MST Configuration Commands
Task Command Syntax
Set root bridge Switch(config)# _________________________________________________
(macro)
Set bridge priority Switch(config)# _________________________________________________
Chapter 11
The switch has an additional functional block that performs a packet rewrite in real time.
The packet rewrite engine (shown in Figure 11-3) makes the following changes to the
packet just before forwarding:
■ Layer 3 IP ______—Decremented by one because one router hop has just occurred
Chapter 12
Table 12-2 Types of Network Services
Service Type Location of Service Extent of Traffic Flow
Local Same segment/VLAN as user _______ layer only
Remote Different segment/VLAN as user _______ to ___________layers
Enterprise Central to all campus users ______to __________to ______layers
Chapter 14
Table 14-2 IEEE 802.3af Power Classes
Power Class Maximum Power Offered at 48V DC Notes
0 Default class
1 Optional class
2 Optional class
3 Optional class
4 Optional class (802.3at)
Three basic things can happen to packets as they are sent from one host to another across
a network:
■ _______—As a packet is sent from one network device to another, its delivery is de-
layed by some amount of time. This can be caused by the time required to send the
packet serially across a wire, the time required for a router or switch to perform table
lookups or make decisions, the time required for the data to travel over a geographi-
cally long path, and so on. The total delay from start to finish is called the latency.
This is seen most easily as the time from when a user presses a key until the time the
character is echoed and displayed in a terminal session.
■ _______—In extreme cases, packets that enter a congested or error-prone part of the
network are simply dropped without delivery. Some amount of packet loss is accept-
able and recoverable by applications that use a reliable, connection-oriented protocol
such as TCP. Other application protocols are not as tolerant, and dropped packets
mean data is missing.
00_9781587202438_appc.qxp 1/5/10 9:06 AM Page 8
Chapter 16
A violation occurs if more than the maximum number of MAC addresses are learned or if
an unknown (not statically defined) MAC address attempts to transmit on the port. The
switch port takes one of the following configured actions when a violation is detected:
■ __________—The port immediately is put into the Errdisable state, which effectively
shuts it down. It must be reenabled manually or through errdisable recovery to be
used again.
■ __________—The Port Is Allowed To Stay Up, But All Packets From Violating MAC
Addresses are dropped. The switch keeps a running count of the number of violating
packets and can send an SNMP trap and a syslog message as an alert of the violation.
Chapter 17
A secondary VLAN is configured as one of the following types:
■ __________—Any switch ports associated with an isolated VLAN can reach the pri-
mary VLAN but not any other secondary VLAN. In addition, hosts associated with
the same isolated VLAN cannot reach each other. They are, in effect, isolated from
everything except the primary VLAN.
You must configure each physical switch port that uses a private VLAN with a VLAN as-
sociation. You also must define the port with one of the following modes: