Download presentation
Presentation is loading. Please wait.
Published byLeslie Wells Modified over 9 years ago
1
CN2668 Routers and Switches (V2) Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
2
Agenda Chapter 12: Basic Switching and Switch Configuration Exercise Quiz
3
Ethernet Operations Carrier Sense Multiple Access with Collision Detection (CSMA/CD) ▫Ethernet contention method ▫Any station connected to a network can transmit anytime a transmission is not present on the wire Interframe gap or interpacket gap (IPG) ▫Each station must wait a minimum of 9.6 microseconds before transmitting another packet
4
Ethernet Operations (Cont.) Collisions Collision Domain Broadcasts ▫Increase the speed/performance by disable the unnecessary service such as IPX where it is not needed
5
Latency or propagation delay The length of time that is required to forward, send, or otherwise propagate a data frame Latency depends on ▫the resistance offered by the transmission medium, the number of nodes ▫The amount of processing that must be done on the packet Transmission time ▫The amount of time it takes for a packet to be sent from one device to another
6
Latency (Cont.) Bit time ▫The amount of time required to transmit one bit Slot time (512 bit times) ▫A specification that limits the physical size of each Ethernet collision domain All collisions should be detected from anywhere in a network in less time than is required to place a 64- byte frame on the network 5-4-3 rule Five segments of wire, four repeaters, 3 populated hubs between any two stations on 10-Mbps network
7
Ethernet Errors Frame size errors ▫Short frame or runt a frame shorter than 64 bytes ▫Long frame or giant a frame greater than 1518 bytes ▫Jabber a frame longer than 1518 bytes and has wrong FCS Frame check sequence (FCS) error ▫Indicates that bits of a frame were corrupted during transmission
8
Ethernet Errors Collision errors ▫Reducing the number of devices per collision domain will usually solve the problem Late collision ▫Occurs when two stations transmit more than 64 bytes of data frames before detecting a collision
9
Fast Ethernet (100 Mbps) Uses the same CSMA/CD as 10BaseT Ethernet Defined under the IEEE 802.3u standard Implementations ▫100Base-TX ▫100Base-T4 ▫100Base-FX ▫See Page 342 for detail implementation
10
Gigabit Ethernet (1000 Mbps) Gigabit Ethernet implementations ▫1000Base-TX (802.3ab) ▫1000Base-SX (802.3z) ▫1000Base-LX (802.3z) ▫1000Base-CX (802.3z)
11
Half- and Full-Duplex Communications Half-duplex communications ▫Devices can send and receive signals, but not at the same time Full-duplex (or duplex) communications ▫Devices can send and receive signals simultaneously Ethernet networks can use equipment that supports half- and full-duplex communications
12
Half- and Full-Duplex Communications On a Cisco Catalyst 2950 switch, you can set the duplex capabilities port-by-port The four different duplex options are: ▫Auto ▫Full ▫Full-flow control Use for 100Base-TX ports only ▫Half
13
A Review of LAN Segmentation Improve the performance of Ethernet network ▫By reducing the number of stations per collision domain ▫Implement bridges, switches, or routers to segment the network and divide the collision domains
14
Segmenting with Bridges Segments a network by filtering traffic at the Data Link layer Divides a network into two or more segments Only forwards a frame from one segment to another if the frame is a broadcast or has the MAC address of a station on a different segment Bridges learn MAC addresses by reading the source MAC addresses from frames ▫As the frames are passed across the bridge
15
Segmenting with Bridges (continued) Bridging table ▫Maps the MAC addresses on each segment to the corresponding port on the bridge to which each segment is connected Bridges increase latency, but because they effectively divide the collision domain ▫This does not affect slot time
16
Segmenting with Routers Operates at layer 3 of the OSI reference model Interprets the Network layer protocol and makes forwarding decisions based on the layer 3 address Routers typically do not propagate broadcast traffic Routers maintain routing tables that include the Network layer addresses of different segments
17
Segmenting with Routers (continued) Decrease collisions by filtering traffic Reduce broadcast and multicast traffic Support multiple paths and routes between them Provide increased Provide layer 3 routing, packet fragmentation and reassembly, and traffic flow control Provide communications between different technologies
18
LAN Switching Switches are often called multiport bridges ▫Segmenting a LAN into multiple collision domains Switches microsegment the network ▫By connecting each port to an individual workstation Switched bandwidth ▫Bandwidth is not shared as long as each workstation connects to its own switch port
19
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition 19
20
Switch Operations A switch learns the hardware address of devices to which it is attached ▫By reading the source address of frames The switch then matches the source MAC address with the port from which the frame was sent ▫The MAC-to-switch-port mapping is stored in the switch’s content-addressable memory (CAM) The switch uses a memory buffer to store frames as it determines to which port(s) a frame will be forwarded
21
Switch Operations Types of memory buffering: ▫Port-based memory buffering Each port has its own buffer memory ▫Shared memory buffering Asymmetric switching ▫Can interconnect network interfaces of different speeds Symmetric switching ▫Require all attached network interface devices to use the same transmit/receive speed
22
Switching Methods All switches base frame-forwarding decisions on a frame’s destination MAC address The three main methods for processing and forwarding frames are: ▫Cut-through ▫Store-and-forward ▫Fragment-free ▫Adaptive cut-through forwarding A combination of the cut-through and store-and- forward methods
23
Cut-Through Forwarding Send a frame immediately after reading the destination MAC address into their buffers The main benefit is a reduction in latency The drawback is the potential for errors in the frame that the switch would be unable to detect ▫Because the switch only reads a small portion of the frame into its buffer See Figure 12-5 on Page 249 for the amount of bit read
24
Store-and-Forward Forwarding Read the entire frame, no matter how large, into their buffers before forwarding ▫It will not forward frames with errors The store-and-forward method has the highest latency See Figure 12-6 on Page 350
25
Fragment-Free Forwarding Reads the first 64 bytes of an Ethernet frame ▫Then begins forwarding it to the appropriate port(s) ▫An effort to provide more error-reducing benefits than cut-through switching ▫Latency lower than store-and-forward switching ▫See Figure 12-7 on Page 350
26
Adaptive cut-through Forwarding For the most part, the adaptive cut-through switch will act as a cut-through switch If a certain level of errors is detected, the switch will ▫Change forwarding techniques to act more as a store-and-forward switch
27
Switch User Interface Two types of operating systems are in use on Cisco switches ▫IOS-based Catalyst 1900, 2820, 2900 ▫Set-based Older and uses set commands 1984G, 2926, 4000, 5000, and 6000 series ▫The Cisco switch has a console port to which you can connect your laptop or PC Once you power on the switch you will be in the command-line interface
28
Modes and Passwords You CANNOT actually configure a switch until you get to enable mode To enter enable mode ▫Type enable at the command-line prompt The first step in configuring a switch is to set up a password ▫To start configuration mode Type configure terminal or config t at the command prompt
29
Modes and Passwords (Cont.) A secret (encrypted) password ▫Switch(config)# enable secret ccnasafe ▫Cannot be retrieved from the configuration file Password on VTY (telnet) or console line ▫Switch(config)# service password-encryption ▫Switch(config)# line vty 0 15 For telnet, from line 0 to 15 ▫Switch(config-line)# password vtysafe ▫Switch(config-line)# Exit ▫Switch(config)# line con 0 ▫Switch(config-line)# password consolesafe ▫Switch(config-line)# Exit ▫Switch(config)# copy run start To save your configuration to the startup config
30
Setting the Host Name To configure this name, you would type: ▫ Switch(config)#hostname name Once the host name is set, the prompt will change to reflect the name of the switch
31
IP on the Switch By default, Cisco switches are not configured with IP addresses ▫Configure an IP address for your switch so that you can manage it over the network ▫If you want to implement VLANs on your network Switch(config)# int vlan 1 Switch(config-if)# ip address 192.168.1.204 255.255.255.0 Switch(config-if)# exit Switch(config)# ip default-gateway 192.168.1.1 Switch(config)# ip domain-name classroom
32
Configuring Switch Ports To enter interface configuration mode for the first port of a switch named Rm410HL, you would use the following commands: ▫ Rm410HL#configure terminal ▫ Rm410HL(config)#interface f0/1 ▫ Rm410HL(config-if)# To view the configuration of a port, use the show command
33
Configuring Switch Ports (continued) Configuring the duplex mode ▫ Rm410HL#configure terminal ▫ Rm410HL(config)#interface f0/24 ▫ Rm410HL(config-if)#duplex full
34
Securing Switch Ports Several option of security on a switch ▫Configure a permanent MAC address for a specific port on your switch ▫Define a static MAC address entry into your switching table Maps a restricted communication path between two ports ▫Configure port security Setting a limit on the number of MAC addresses
35
Securing Switch Ports (continued) Display options by typing the following command: ▫ Rm410HL(config-if)#switchport port- security ? A ging Mac-address M aximum V iolation ▫ Rm410HL(config-if)#switchport mode access ▫ Rm410HL(config-if)#switchport port- security
36
Securing Switch Ports (continued) Aging Mac-address ▫Tie a specific MAC address to a specific port Rm410HL(config-if)#switchport port-security Mac- address 0000.aaaa.bbbb Maximum ▫Default value is 1; Range is 1 – 132 per interface Rm410HL(config-if)#switchport port-security Maximum 10
37
Securing Switch Ports (continued) Violation ▫What happens when a switch encounters a violation of the configured switchport security ▫Protect Stop forwarding the traffic of the exceeded MAC address (11 th and above; if it was set maximum to 10) ▫Restrict Same as protect. Also sends an alert ▫Shutdown By default to shut the interface down
38
Securing Switch Ports (continued) To turn switchport security off, use: ▫ Rm410HL(config-if)#no switchport port-security To clear the settings to include erasing the static MAC addresses, use the clear command: ▫ Rm410HL(config-if)#clear port- security
39
Assignment Review Questions ▫1 – 25 Lab 12.1
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.