What is port-channel hashing used for in a switch or NIC team?

Prepare for the Google Data Center Technician Exam. Use our interactive quiz featuring flashcards and multiple choice questions with hints and explanations. Get exam-ready today!

Multiple Choice

What is port-channel hashing used for in a switch or NIC team?

Explanation:
Port-channel hashing decides which physical link in a bonded group carries a given flow. It does this by computing a hash from packet header fields—typically source and destination IP addresses, source and destination ports, and the protocol—and then mapping that hash to one of the member links. This approach spreads different flows across the available links to increase overall bandwidth while keeping all packets belonging to the same flow on the same link to preserve in-order delivery. While some implementations may include additional fields like VLAN, the main purpose is consistent, flow-based distribution across the team. This is why the best choice describes distributing flows across member links based on header fields. The other options don’t describe per-flow load distribution: VLAN tagging isn’t driven by hashing, spanning-tree relies on topology decisions, and encryption is a separate security function.

Port-channel hashing decides which physical link in a bonded group carries a given flow. It does this by computing a hash from packet header fields—typically source and destination IP addresses, source and destination ports, and the protocol—and then mapping that hash to one of the member links. This approach spreads different flows across the available links to increase overall bandwidth while keeping all packets belonging to the same flow on the same link to preserve in-order delivery. While some implementations may include additional fields like VLAN, the main purpose is consistent, flow-based distribution across the team.

This is why the best choice describes distributing flows across member links based on header fields. The other options don’t describe per-flow load distribution: VLAN tagging isn’t driven by hashing, spanning-tree relies on topology decisions, and encryption is a separate security function.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy