Configure A Switch: LAN Switching and Wireless - Chapter 2

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 61

Configure a Switch

LAN Switching and Wireless


Chapter 2

Objectives
Summarize the operation of Ethernet as
defined for 100/1000 Mbps LANs in the IEEE
802.3 standard.
Explain the functions that enable a switch
to forward Ethernet frames in a LAN.
Configure a switch for operation in a
network designed to support voice, video,
and data transmissions.
Configure basic security on a switch that
will operate in a network designed to
support voice, video, and data
transmissions.

2.1.1 Key Elements of Ethernet/802.3


networks

CSMA/CD
Ethernet signals are transmitted to every host connected
to the LAN using a special set of rules to determine
which station can access the network. The set of rules
that Ethernet uses is based on the IEEE carrier sense
multiple access/collision detect (CSMA/CD) technology.

2.1.1 Key Elements of Ethernet/802.3


networks

Carrier Sense
In the CSMA/CD access method, all network devices that
have messages to send must listen before transmitting.
If a device detects a signal from another device, it waits
for a specified amount of time before attempting to
transmit. When there is no traffic detected, a device
transmits its message.

2.1.1 Key Elements of Ethernet/802.3


networks

Multi-access
If the distance between devices is such that the
latency of the signals of one device means that
signals are not detected by a second device,
the second device may also start to transmit.

2.1.1 Key Elements of Ethernet/802.3


networks

Multi-access
The media now has two devices transmitting signals
at the same time. The messages propagate across
the media until they encounter each other. At that
point, the signals mix and the messages are
destroyed, a collision.

2.1.1 Key Elements of Ethernet/802.3


networks

Collision Detection
When a device is in listening mode, it can detect
when a collision occurs on the shared media,
because all devices can detect an increase in the
amplitude of the signal above the normal level.

2.1.1 Key Elements of Ethernet/802.3


networks

Jam Signal and Random Backof


When a collision is detected, the transmitting
devices send out a jamming signal. The jamming
signal notifies the other devices of a collision, so
that they invoke a backoff algorithm.

2.1.1 Key Elements of Ethernet/802.3


networks

Jam Signal and Random Backof


This backoff algorithm causes all devices
to stop transmitting for a random amount
of time, which allows the collision signals

2.1.1 Key Elements of Ethernet/802.3


networks

Ethernet Communications
Communications in a switched LAN
network occur in three ways: unicast,

2.1.1 Key Elements of Ethernet/802.3


networks

Ethernet Frame
To briefly review, the Ethernet frame structure
adds headers and trailers around the Layer 3 PDU
to encapsulate the message being sent.

2.1.1 Key Elements of Ethernet/802.3


networks

MAC Address
An Ethernet MAC address is a two-part
48-bitbinary value expressed as 12

2.1.1 Key Elements of Ethernet/802.3


networks

Organizational Unique Identifier


The OUI is the first part of a MAC address. It is 24 bits
long and identifies the manufacturer of the NIC card.
The IEEE regulates the assignment of OUI numbers.

2.1.1 Key Elements of Ethernet/802.3


networks

Vendor Assignment Number


The vendor-assigned part of the MAC address is
24 bits long and uniquely identifies the Ethernet
hardware.

2.1.1 Key Elements of Ethernet/802.3


networks

2.1.1 Key Elements of Ethernet/802.3


networks

Switch Port Settings


A port on a switch needs to be configured
with duplex settings that match the

2.1.1 Key Elements of Ethernet/802.3


networks
MAC Addressing and Switch MAC Address Tables

2.1.1 Key Elements of Ethernet/802.3


networks
MAC Addressing and Switch MAC Address Tables

2.1.1 Key Elements of Ethernet/802.3


networks
MAC Addressing and Switch MAC Address Tables

2.1.1 Key Elements of Ethernet/802.3


networks
MAC Addressing and Switch MAC Address Tables

2.1.1 Key Elements of Ethernet/802.3


networks
MAC Addressing and Switch MAC Address Tables

2.1.1 Key Elements of Ethernet/802.3


networks
MAC Addressing and Switch MAC Address Tables

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Bandwidth and Throughput


A major disadvantage of Ethernet 802.3 networks is
collisions. Collisions occur when two hosts transmit frames
simultaneously. The sending hosts stop sending further
transmissions for a random period, based on the Ethernet
802.3 rules of CSMA/CD.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Collision Domains
When expanding an Ethernet LAN to accommodate
more users with more bandwidth requirements, the
potential for collisions increases.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Collision Domains
The network area where frames originate and collide is
called the collision domain. All shared media
environments, such as those created by using hubs, are
collision domains.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Collision Domains
When a host is connected to a switch port, the switch
creates a dedicated connection. This connection is
considered an individual collision domain, because traffic is
kept separate from all other traffic, thereby eliminating the
potential for a collision.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Collision Domains
Switches reduce collisions and improve bandwidth
use on network segments because they provide
dedicated bandwidth to each network segment.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Broadcast Domains
Although switches filter most frames
based on MAC addresses, they do not

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Broadcast Domains
A collection of interconnected switches
forms a single broadcast domain.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Broadcast Domains
Only a Layer 3 entity, such as a router, or a virtual LAN
(VLAN), can stop a Layer 3 broadcast domain. Routers
and VLANs are used to segment both collision and
broadcast domains.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Network Latency
Latency is the time a frame or a packet takes to
travel from the source station to the final
destination.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Network Latency
Latency has at least three sources.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Network Latency
First, there is the time it takes the source NIC to place voltage
pulses on the wire, and the time it takes the destination NIC to
interpret these pulses. This is sometimes called NIC delay.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Network Latency
Second, there is the actual propagation
delay as the signal takes time to travel

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Network Latency
Third, latency is added based on network devices
that are in the path between two devices. These are
either Layer 1, Layer 2, or Layer 3 devices.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

Network Congestion
The primary reason for segmenting a LAN into
smaller parts is to isolate traffic and to achieve
better use of bandwidth per user.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

These are the most common causes of


network congestion:
Increasingly powerful computer and network technologies.
Increasing volume of network traffic.
High-bandwidth applications.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

LAN Segmentation
LANs are segmented into a number of smaller
collision and broadcast domains using routers
and switches.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

LAN Segmentation
LANs are segmented into a number of smaller
collision and broadcast domains using routers
and switches.

2.1.2 Design Consideration of


Ethernet/802.3 Networks

LAN Segmentation
LANs are segmented into a number of smaller
collision and broadcast domains using routers
and switches.

2.1.3 LAN Design


Considerations

2.1.3 LAN Design


Considerations

Removing Network Bottlenecks


What happens when all six computers try to access
the server at the same time? Does each workstation
get 1000 Mb/s dedicated access to the server?

2.1.3 LAN Design


Considerations

Removing Network Bottlenecks


No, all the computers have to share the 1000 Mb/s
connection that the server has to the switch. Cumulatively,
the computers are capable of 6000 Mb/s to the switch.

Configure a Switch
2.2 Forwarding Frames using a Switch

LAN Switching and Wireless


Chapter 2

2.2.1 Switch Forwarding


Method

Switch Packet Forwarding Methods


In the past, switches used one of the following
forwarding methods for switching data between
network ports

2.2.1 Switch Forwarding


Method

Store-and-Forward Switching
In store-and-forward switching, when the switch
receives the frame, it stores the data in buffers
until the complete frame has been received.

2.2.1 Switch Forwarding


Method

Cut-through Switching
In cut-through switching, the switch acts upon the
data as soon as it is received, even if the
transmission is not complete.

2.2.1 Switch Forwarding


Method

There are two variants of cutthrough switching:


Fast-forward switching destination address

2.2.2 Symmetric and Asymmetric Switching

Symmetric and Asymmetric Switching


Symmetric switching provides switched connections
between ports with the same bandwidth, such as all
100 Mb/s ports or all 1000 Mb/s ports.

2.2.2 Symmetric and Asymmetric Switching

Symmetric and Asymmetric Switching


An asymmetric LAN switch provides switched connections
between ports of unlike bandwidth, such as a
combination of 10 Mb/s, 100 Mb/s, and 1000 Mb/s ports.

2.2.2 Symmetric and Asymmetric Switching

Asymmetric
Asymmetric switching enables more bandwidth to be
dedicated to a server switch port to prevent a bottleneck.
This allows smoother traffic flows where multiple clients are
communicating with a server at the same time.

2.2.2 Symmetric and Asymmetric Switching

Asymmetric
Memory buffering is required on an asymmetric switch. For
the switch to match the different data rates on different
ports, entire frames are kept in the memory buffer and are
moved to the port one after the other as required.

2.2.2 Symmetric and Asymmetric Switching

Symmetric
On a symmetric switch all ports are of the same bandwidth.
Symmetric switching is optimized for a reasonably
distributed traffic load, such as in a peer-to-peer desktop
environment.

2.2.3 Memory Buffering

Port Based and Shared Memory Bufering


An Ethernet switch may use a buffering technique to store
frames before forwarding them. Buffering may also be used
when the destination port is busy due to congestion and
the switch stores the frame until it can be transmitted.

2.2.3 Memory Buffering

Port Based and Shared Memory Bufering


Memory buffering is built into the hardware of
the switch and, other than increasing the amount
of memory available, is not configurable.

2.2.3 Memory Buffering

Port-based Memory Bufering


In port-based memory buffering, frames are stored in queues
that are linked to specific incoming ports. A frame is
transmitted to the outgoing port only when all the frames
ahead of it in the queue have been successfully transmitted.

2.2.3 Memory Buffering

Shared Memory Bufering


Shared memory buffering deposits all frames into a common
memory buffer that all the ports on the switch share. The
amount of buffer memory required by a port is dynamically
allocated.

2.2.4 Layer 2 and Layer 3


Switching

Layer 2 and Layer 3 Switching


A Layer 2 LAN switch performs switching and filtering
based only on the OSI Data Link layer (Layer 2) MAC
address. A Layer 2 switch is completely transparent to
network protocols and user applications.

2.2.4 Layer 2 and Layer 3


Switching

Layer 2 and Layer 3 Switching


A Layer 3 switch, such as the Catalyst 3560, functions similarly
to a Layer 2 switch, such as the Catalyst 2960, but instead of
using only the Layer 2 MAC address information for forwarding
decisions, a Layer 3 switch can also use IP address information.

2.2.4 Layer 2 and Layer 3


Switching

Layer 2 and Layer 3 Switching


Layer 3 switches are also capable of performing
Layer 3 routing functions, reducing the need for
dedicated routers on a LAN.

2.2.4 Layer 2 and Layer 3


Switching

Layer 3 Switch and Router Comparison


Layer 3 switches can route packets between different
LAN segments similarly to dedicated routers. However,
Layer 3 switches do not completely replace the need
for routers on a network.

You might also like