LAN Switching and Wireless – Chapter 2

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Virtual Trunk Protocol
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 11 Ethernet Evolution: Fast and Gigabit Ethernet.
Chapter 1: Introduction to Scaling Networks
Local Area Networks - Internetworking
What is access control list (ACL)?
Connecting LANs, Backbone Networks, and Virtual LANs
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Chapter 5 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Describe the operation of the Ethernet sublayers.
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
Chabot College Chapter 2 Review Questions Semester IIIELEC Semester III ELEC
Ch. 6 – Switch Configuration CCNA 3 version Overview Identify the major components of a Catalyst switch Monitor switch activity and status using.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
CCNA 3 v3.1 Module 4.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 1: Internetworking.
Chapter 4: Managing LAN Traffic
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
LAN Switching and Wireless – Chapter 2
Network Devices.
CCNA 3 Week 6 Switch Configuration. Copyright © 2005 University of Bolton Physical Details Available in variety of sizes –12 port, 16 port, up to 48 port.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
S3C2 – LAN Switching Addressing LAN Problems. Congestion is Caused By Multitasking, Faster operating systems, More Web-based applications Client-Server.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Switch LAN Switching and Wireless – Chapter 2.
CN2668 Routers and Switches (V2) Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Discovery 2 Internetworking Module 5 JEOPARDY John Celum.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Basic Switch Concepts and Configuration Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Design LAN Switching and Wireless – Chapter 1.
Chapter 6 – Connectivity Devices
Module 8: Ethernet Switching
Chapter Overview Bridging Switching Routing.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Switch LAN Switching and Wireless – Chapter 2.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
LAN Switching and Wireless Basic Switch Concepts and Configuration.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 16/Cisco 4 - Module 9 CCNA Certification Exam Review By Your Name.
Switching Topic 1 Basic concepts. Agenda Ethernet CSMA/CD and duplex Frames and MACs Switching process – Store, forward and buffers Issues – Collisions.
Switching Concepts Introduction to Ethernet/802.3 LANs
CISCO NETWORKING ACADEMY Chabot College ELEC Ethernet Switches.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
Chapter-2 Basic switch concept and configuration.
LAN Switching and Wireless – Chapter 2
Youngstown State University Cisco Regional Academy
Introduction to Networks v6.0
Instructor Materials Chapter 4: Introduction to Switched Networks
Instructor Materials Chapter 5: Ethernet
Chapter 5: Switch Configuration
Instructor Materials Chapter 4: Introduction to Switched Networks
CT1403 Lecture #3 Peer to Peer NWs
Chapter 4: Switched Networks
LAN Switching and Wireless – Chapter 2
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 5: Switch Configuration
© 2002, Cisco Systems, Inc. All rights reserved.
LAN Switching and Wireless – Chapter 2
LAN Switching and Wireless – Chapter 2
Presentation transcript:

LAN Switching and Wireless – Chapter 2 Configure a Switch LAN Switching and Wireless – Chapter 2

Take a look at http://www.intunenetworks.com Ethernet is a family of frame-based computer networking technologies for local area networks (LANs). The name came from the physical concept of the ether. It defines a number of wiring and signaling standards for the Physical Layer of the OSI networking model as well as a common addressing format and Media Access Control at the Data Link Layer. Not that exciting? Take a look at http://www.intunenetworks.com

Ethernet The design of Ehernet allowed for multiple endpoints to share access to a shared medium. See http://en.wikipedia.org/wiki/ALOHAnet (sharing of UHF radio spectrum). Cable laying between islands may not have been feasible. Access to the share medium (cable or wireless) relied upon either detecting or avoid signal collisions. 2.1.1 in CNAP notes. To-day guided/wired networks eliminate collision domains by direct connection to a switch port.

Transmission modes Signals are heard by all endpoints on the collision domain / network segment

Ethernet Frame Media Access Control (MAC) address See CNAP Notes

Half & Full Duplex Half Duplex: Half-duplex communication relies on unidirectional data flow where sending and receiving data are not performed at the same time. This is similar to how walkie-talkies or two-way radios function in that only one person can talk at any one time. If someone talks while someone else is already speaking, a collision occurs. Full Duplex: In full-duplex communication, data flow is bidirectional, so data can be sent and received at the same time.

MAC Addressing and Switch MAC Address Tables CNAP notes 2.1.1.5 Switches use MAC addresses to direct network communications through their switch fabric to the appropriate port toward the destination node. (layer 2 switching) When an incoming data frame is received by a switch and the destination MAC address is not in the table, the switch forwards (broadcasts) the frame out all ports, except for the port on which it was received. When the destination node responds, the switch records the node's MAC address in the address table.

Collision and Broadcast domains 2.1.3.2

Newtwork latency

Sources of Latency First, there is the time it takes the source NIC to place voltage pulses on the wire, and the time it takes the destination NIC to interpret these pulses. This is sometimes called NIC delay, typically around 1 microsecond for a 10BASE-T NIC. Second, there is the actual propagation delay as the signal takes time to travel through the cable. Typically, this is about 0.556 microseconds per 100 m for Cat 5 UTP. Longer cable and slower nominal velocity of propagation (NVP) result in more propagation delay. Third, latency is added based on network devices that are in the path between two devices. These are either Layer 1, Layer 2, or Layer 3 devices. These three contributors to latency can be discerned from the animation as the frame traverses the network.

network latency

Cut-through, store and forward Cut-through method was used to deliver wirespeed, miminal latency To-day layer 3 functions require use of store and forward

There are two variants of cut-through switching: Fast-forward switching: Fast-forward switching offers the lowest level of latency. Fast-forward switching immediately forwards a packet after reading the destination address. Because fast-forward switching starts forwarding before the entire packet has been received, there may be times when packets are relayed with errors. This occurs infrequently, and the destination network adapter discards the faulty packet upon receipt. In fast-forward mode, latency is measured from the first bit received to the first bit transmitted. Fast-forward switching is the typical cut-through method of switching. Fragment-free switching: In fragment-free switching, the switch stores the first 64 bytes of the frame before forwarding. Fragment-free switching can be viewed as a compromise between store-and-forward switching and cut-through switching. The reason fragment-free switching stores only the first 64 bytes of the frame is that most network errors and collisions occur during the first 64 bytes. Fragment-free switching tries to enhance cut-through switching by performing a small error check on the first 64 bytes of the frame to ensure that a collision has not occurred before forwarding the frame. Fragment-free switching is a compromise between the high latency and high integrity of store-and-forward switching, and the low latency and reduced integrity of cut-through switching.

Asymmetric switching enables more bandwidth to be dedicated to a server switch port to prevent a bottleneck. This allows smoother traffic flows where multiple clients are communicating with a server at the same time.

An Ethernet switch may use a buffering technique to store frames before forwarding them. Buffering may also be used when the destination port is busy due to congestion and the switch stores the frame until it can be transmitted.

Layer 3 switches are also capable of performing some Layer 3 routing functions, reducing the need for dedicated routers on a LAN. Because Layer 3 switches have specialised switching hardware, they can typically route data as quickly as they can switch. Note- no WAN support. Designed to support VLAN switching in corporate LAN’s.

Configuring and managing a Switch

Configuring and managing a Switch Make sure to set password challenge on console and telnet access use – Router#enable secret pwd Router#config t Router(config)#service password-encryption Router(config)#enable password todd Router(config)#line vty 0 4 Router(config-line)#login Router(config-line)#password todd Router(config-line)#line con 0 Router(config-line)#login Router(config-line)#password cisco Router(config-line)#line aux 0 Router(config-line)#login Router(config-line)#password sanjose Router(config-line)#exit

Configuring and managing a Switch CNAP notes switch from GUI tools (see 2.3.6.3) and back to Command Line Interface (CLI) mode See 2.3.1.2 , 3 Command line support auto-completion, error diagnostics and buffered history of commands.

The boot loader: Performs low-level CPU initialization. It initializes the CPU registers, which control where physical memory is mapped, the quantity of memory, and its speed. Performs power-on self-test (POST) for the CPU subsystem. It tests the CPU DRAM and the portion of the flash device that makes up the flash file system. Initializes the flash file system on the system board. Loads a default operating system software image into memory and boots the switch. The boot loader finds the Cisco IOS image on the switch by first looking in a directory that has the same name as the image file (excluding the .bin extension). If it does not find it there, the boot loader software searches each subdirectory before continuing the search in the original directory.

Configure the switch via the console port using terminal emulation software e.g Hyperterminal Access remotely via virtual terminal using Telnet or SSH

Configure a Switch for Operation in a Network Describe the Cisco IOS help facilities

Configure a Switch for Operation in a Network Describe the Cisco IOS commands used to access the command history

Configure a Switch for Operation in a Network Describe the boot sequence of a Cisco switch

Configure a Switch for Operation in a Network Describe how to prepare the switch to be configured

Configure a Switch - see 2.3.6.1 basic switch configuration

Configure a Switch Show commands

CNAP page 2.3.6.4 probably in the wrong place

Configure a Switch

Configure Basic Security on a Switch Describe the Cisco IOS commands used to configure password options

Configure Basic Security on a Switch Describe the Cisco IOS commands used to configure a login banner

Configure Basic Security on a Switch Note CNAP panel 2.4.3.3 setting up SSH server.

Configure Basic Security on a Switch MAC address flooding, spoofing attacks, CDP attacks, and Telnet attacks (probably too much detail in CNAP notes)

The key to understanding how MAC address table overflow attacks work is to know that MAC address tables are limited in size. MAC flooding makes use of this limitation to bombard the switch with fake source MAC addresses until the switch MAC address table is full. The switch then enters into what is known as a fail-open mode, starts acting as a hub, and broadcasts packets to all the machines on the network. As a result, the attacker can see all of the frames sent from a victim host to another host without a MAC address table entry.

Configure Basic Security on a Switch Describe how network security tools are used to improve network security

Configure Basic Security on a Switch Describe why you need to secure ports on a switch

Configure Basic Security on a Switch Very minimal form of port security

Switch Port security If you limit the number of secure MAC addresses to one and assign a single secure MAC address to that port, the workstation attached to that port is assured the full bandwidth of the port, and only that workstation with that particular secure MAC address can successfully connect to that switch port. i.e. use static secure MAC addresses: MAC addresses are manually configured by using the switchport port-security mac-address mac-address interface configuration command.

Use ‘sticky’ to learn and remember MAC addresses Use ‘sticky’ to learn and remember MAC addresses. switchport port-security mac-address sticky Note -When you configure sticky secure MAC addresses by using the switchport port-security mac-address sticky mac-address interface configuration command, these addresses are added to the address table and the running configuration. Save running config to remember learned MAC addresses if switch is reset or looses power.