[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] tag stacking encapsulation 2nd MANs and 2nd 3rd 4th tail dropping (congestion avoidance) 2nd 3rd TC While timers TCAM tables 2nd 3rd TCNs (topology change notifications) loops eliminating TCP header compression TCP/IP multicasting telephony auxiliary VLANs 2nd congestion avoidance RED (random early detection) tail dropping 2nd 3rd WRED 2nd 3rd WRED (weighted random early detection) network design considerations 2nd 3rd network management strategy policing traffic power requirements 2nd 3rd QoS (Quality of Service) architectures 2nd bandwidth 2nd 3rd Best Effort architecture components 2nd delay issues 2nd DiffServ architecture 2nd 3rd IntServ architecture 2nd jitter 2nd overview 2nd packet loss 2nd solution characteristics 2nd 3rd scalability design issues 2nd shaping traffic traffic congestion class-based weighted fair queuing 2nd custom queuing 2nd FIFO queuing 2nd low latency queuing 2nd priority queuing 2nd queuing 2nd real time transport protocol priority queuing (RTP-PQ) 2nd weighted fair queuing 2nd weighted round-robin queuing (WRRQ) 2nd test exams 2nd 3rd answer keys 2nd test-taking environment 2nd 3rd testing routing configuration STP port verification 2nd tests sample tests 2nd 3rd answer keys 2nd three-layer hierarchical model timers (STP) changing values 2nd TLS (transparent LAN services) MANs and 2nd 3rd token-ring support VLANs 2nd 3rd topology RSTP changes 2nd 3rd topology-based switching architecture) 2nd traffic broadcasts 2nd multicast routing 2nd dense mode protocols 2nd distribution trees 2nd PIM (Protocol Independent Multicast) PIM-DM 2nd PIM-SM 2nd protocols 2nd shared distribution trees 2nd source-based distribution trees 2nd sparse mode protocols 2nd multicasts 2nd 3rd 4th unicasts 2nd transparency MANs (metropolitan area networks) Ethernet considerations TLS 2nd 3rd transparent bridges automaic address table updating capability functions loop elimination troubleshooting CEF 2nd STP steps to take 2nd types of problems 2nd switches 2nd 3rd trunk connections 2nd VLANs 2nd VTP (VLAN Trunk Protocol) 2nd trunk links VLANs trunk ports VLANs trunking Catalyst switch security PR interfaces and trunking (routing) reouter-on-a-stick configuration trunks configuring 2nd verfiying configuration 2nd 3rd troubleshooting connections 2nd VTP (VLAN Trunk Protocol) 2nd advantages 2nd management domain 2nd message processing 2nd message types 2nd messages 2nd modes 2nd 3rd tunneling 802.1Q (VLANs) 2nd 3rd 4th |