HNE211 Demo Questions
HNE211 Demo Questions
HNE211 Demo Questions
devices
within a workgroup, such as a group of PCs.The heart of a Layer 2 switch is its
Media Access Control (MAC) address table, also known as its
content-addressable memory (CAM). This table contains a list of the MAC addresses
that are
reachable through each switch port. (Recall that the physical MAC address uniquely
identifies a
device on a network. When a network interface card is manufactured, the card is
assigned an
address—called a burned-in address [BIA]—which doesn’t change when the network card
is
installed in a device and is moved from one network to another. Typically, this BIA
is copied to
interface memory and is used as the MAC address of the interface.) The MAC address
table can be
statically configured, or the switch can learn the MAC addresses dynamically. When
a switch is first
powered up, its MAC address table is empty
Broadcast and multicast frames are, by default, flooded to all ports of a Layer 2
switch, other than
the incoming port. The same is true for unicast frames that are destined to any
device that is not
in the MAC address table
Layer 3 Switching
A Layer 3 switch is really a router with some of the functions implemented in
hardware to
improve performance. In other words, some of the OSI model network layer routing
functions are
performed in high-performance ASICs rather than in software
State any three guidelines for ensuring acceptable voice quality when routing Voice
traffic is sensitive to delays, jitter, and extensive packet loss.
guidelines for ensuring acceptable voice quality are as follows:
■ The one-way delay should be no more than 150 milliseconds (ms).
■ The jitter should be no more than 30 ms.
■ No more than 1 percent of the packets should be lost
Fault management. This involves identifying system faults as they occur, isolating
the cause of the fault(s), and correcting the fault(s), if possible.
The principal functions of fault monitoring include:
Manual tracking of reported or monitored faults
Tracking progress on status of problem resolution and escalating the level of
intervention, if necessary
Information distribution to appropriate parties
Referral to other groups for resolution and action
Write brief notes on the following three functions that comprise the hierarchical
network design model
Access layer—Provides user and workgroup access to the resources of the network
The access layer is where users access the network. Users can be local or remote.
Local users typically access the network through connections to a hub or a switch.
Recall that hubs operate at OSI Layer 1, and all devices connected to a hub are in
the same collision (or bandwidth) domain. Switches operate at Layer 2, and each
port on a switch is its own collision domain, meaning that multiple conversations
between devices connected through the switch can be happening simultaneously. Using
a LAN switch rather than a hub has a performance advantage: A LAN switch forwards
unicast traffic only out of the port through which the traffic’s destination is
considered reachable. However, a hub forwards all traffic out of all its ports. For
this reason, most of today’s networks have LAN switches rather than hubs.
(Switching, including Layer 3 switching, is discussed in Chapter 2, “Switching
Design.”) Remote users might access the network through the Internet, using VPN
connections, for example. Connections to the Internet can be through dial-up,
digital subscriber line (DSL), cable, and so
forth. Other access possibilities include WANs such as Frame Relay, leased lines,
and Integrated Services Digital Network (ISDN). The access layer must also ensure
that only users who are authorized to access the network are admitted.
in-band management occurs when the traffic for network management follow the same
network path as the traffic flows for users and their applications. This simplifies
the network management architecture, for the same network paths can be used for
both types of data and a seperate path is not required.
out-of-band management occurs when different paths are provided for network
management data flows and user traffic flows. It has a distinct advantage of
allowing the management system to continue to mnitor the network during most
network events, even when such event disable the network