Review Chapter 1. To relieve network congestion more bandwidth is needed or the available of it must be used more efficiently.

Slides:



Advertisements
Similar presentations
Antonio González Torres
Advertisements

Chapter 7: Intranet LAN Design
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
S4 C1 REVIEW. Review Topics Switching, VLANs, LAN Design, Routing Protocols (especially IGRP), ACLs, and IPX Why use LAN switching and VLANs Must gather.
Chabot College Chapter 2 Review Questions Semester IIIELEC Semester III ELEC
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Cisco 3 - Switches Perrine - Brierley Page 15/10/2015 Module 5 Switches LAN Design LAN Switches.
LAN DESIGN. Functionality - the network must work with reasonable speed and reliability.
Chabot College ELEC VLAN. Data Link Sublayers LLC (Logical Link Control) MAC (Media Access Control)
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
CCNA 3 v3.1 Module 4.
Institute of Technology, Sligo Dept of Computing Cisco Semester 4 Chapter 1, version Review.
Ch.6 - Switches CCNA 3 version 3.0.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
1 CCNA 3 v3.1 Module 5. 2 CCNA 3 Module 5 Switches/LAN Design.
Routing and Routing Protocols
Institute of Technology Sligo - Dept of Computing Chapter 11 Layer 3 Protocols Paul Flynn.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Connecting LANs, Backbone Networks, and Virtual LANs
Each computer and router interface maintains an ARP table for Layer 2 communication The ARP table is only effective for the broadcast domain (or LAN)
Chapter Six NetworkingHardware. Agenda Questions about Ch. 11 Midterm Exam Ch.6 Cable kit.
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Chapter 4: Managing LAN Traffic
Routing and Routing Protocols Routing Protocols Overview.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
1 CISCO NETWORKING ACADEMY PROGRAM (CNAP) SEMESTER 1/ MODULE 8 Ethernet Switching.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
S3C2 – LAN Switching Addressing LAN Problems. Congestion is Caused By Multitasking, Faster operating systems, More Web-based applications Client-Server.
Chapter 6 – Connectivity Devices
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 3, v Chapter.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Page 110/27/2015 A router ‘knows’ only of networks attached to it directly – unless you configure a static route or use routing protocols Routing protocols.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Institute of Technology Sligo - Dept of Computing Sem 2 Chapter 12 Routing Protocols.
LAN DESIGN – first step 5 ISB – school year 2006/07.
Routing and Routing Protocols
Cisco 3 - Switches Perrine - Brierley Page 112/1/2015 Module 5 Switches.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
LAN Switching Concepts. Overview Ethernet networks used to be built using repeaters. When the performance of these networks began to suffer because too.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Routing Fundamentals and Subnets Introduction to IT and Communications Technology CE
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
1 Version 3.1 Module 6 Routed & Routing Protocols.
OSI Model Topology Patch cable Flow control Common layer 2 device Best path Purpose of Layer 2 devices.
© 2002, Cisco Systems, Inc. All rights reserved..
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
Sem1 - Module 10 Routing Fundamentals and Subnets
1 Networking and Internetworking Devices we need networking and internetworking devices to extend physical distance and to improve efficiency and manageability.
Release 16/7/2009 Internetworking Devices Chapter 10 Jetking Infotrain Ltd.
CCNA3 v3 Module 4 v3 CCNA 3 Module 4 JEOPARDY K. Martin.
Sem 2 v2 Chapter 12: Routing. Routers can be configured to use one or more IP routing protocols. Two of these IP routing protocols are RIP and IGRP. After.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
Youngstown State University Cisco Regional Academy
Virtual LANs.
Network Layer Path Determination.
Module 5 - Switches CCNA 3 version 3.0.
Chapter 3 VLANs Chaffee County Academy
Presentation transcript:

Review Chapter 1

To relieve network congestion more bandwidth is needed or the available of it must be used more efficiently.

CSMA/CD A network can be divided into smaller units called segments. A network can be divided into smaller units called segments. Each segment uses the Carrier Sense Multiple Access/Collision Detection protocol and maintains traffic between users on the segment. Each segment uses the Carrier Sense Multiple Access/Collision Detection protocol and maintains traffic between users on the segment. By using segments in a network less users/devices are sharing the same 10Mbps when communicating to one another within the segment. Each segment is considered its own collision domain. By using segments in a network less users/devices are sharing the same 10Mbps when communicating to one another within the segment. Each segment is considered its own collision domain.

Backbone In a segmented Ethernet Lan, data passed between segments is transmitted on the backbone of the network using a bridge, switch or router. In a segmented Ethernet Lan, data passed between segments is transmitted on the backbone of the network using a bridge, switch or router.

A Lan which uses a switched Ethernet topology creates a network that behaves like it only has two nodes: the sending node and the receiving node. A Lan which uses a switched Ethernet topology creates a network that behaves like it only has two nodes: the sending node and the receiving node.

The purpose for using LAN switching is to ease bandwidth shortages and network bottlenecks, such as between several PCs and a remote file server. The purpose for using LAN switching is to ease bandwidth shortages and network bottlenecks, such as between several PCs and a remote file server. A LAN switch is a very high-speed multiport bridge with one port for each node or segment of the LAN. A LAN switch is a very high-speed multiport bridge with one port for each node or segment of the LAN. A switch segments a LAN into microsegments creating collision free domains from one larger collision domain. A switch segments a LAN into microsegments creating collision free domains from one larger collision domain.

Switches Switches achieve this high speed transfer by reading the destination layer 2 MAC address of the packet much like a bridge does. Switches achieve this high speed transfer by reading the destination layer 2 MAC address of the packet much like a bridge does. The packet is sent to the port of the receiving station prior to the entire packet entering the switch. The packet is sent to the port of the receiving station prior to the entire packet entering the switch. This leads to low latency levels and a high rate of speed for packet forwarding. This leads to low latency levels and a high rate of speed for packet forwarding. Remember, switches are sophisticated multiport bridges. Remember, switches are sophisticated multiport bridges.

Ethernet Switching Ethernet switching increases the bandwidth available on a network. Ethernet switching increases the bandwidth available on a network. It does this by creating dedicated network segments (point-to-point connections) and connecting those segments in a virtual network within the switch. It does this by creating dedicated network segments (point-to-point connections) and connecting those segments in a virtual network within the switch. This virtual network circuit exists only when two nodes need to communicate. This virtual network circuit exists only when two nodes need to communicate. This is why it is called a virtual circuit – it exists only when needed and is established within the switch. This is why it is called a virtual circuit – it exists only when needed and is established within the switch.

Broadcast Domain Even though the LAN switch creates dedicated, collision-free domains, all hosts connected to the switch are still in the same broadcast domain. Even though the LAN switch creates dedicated, collision-free domains, all hosts connected to the switch are still in the same broadcast domain.

An Ethernet switch can learn the address of each device on the network by: An Ethernet switch can learn the address of each device on the network by: Reading the source address of each packet transmitted Reading the source address of each packet transmitted Noting the port where the frame was heard Noting the port where the frame was heard

The switch then adds this information to its forwarding database. The switch then adds this information to its forwarding database. Addresses are learned dynamically. Addresses are learned dynamically. This means that as new addresses are read they are learned and stored in content addressable memory (CAM) and stored for future use and each time an address is stored it is time stamped. This means that as new addresses are read they are learned and stored in content addressable memory (CAM) and stored for future use and each time an address is stored it is time stamped.

A symmetric switch provides switched connections between ports with the same bandwidth, such as all 10 Mbps or all 100 Mbps ports. A symmetric switch provides switched connections between ports with the same bandwidth, such as all 10 Mbps or all 100 Mbps ports. A asymmetric LAN switch provides switched connections between ports of unlike bandwidth, such as a combination of 10 Mbps and 100 Mbps ports. A asymmetric LAN switch provides switched connections between ports of unlike bandwidth, such as a combination of 10 Mbps and 100 Mbps ports.

Memory buffering in an asymmetric switch is required to allow traffic from the 100 Mbps port to be sent to a 10 Mbps port without causing too much congestion at the 10 Mbps port. Memory buffering in an asymmetric switch is required to allow traffic from the 100 Mbps port to be sent to a 10 Mbps port without causing too much congestion at the 10 Mbps port.

Forwarding Frames There are two ways to forward frames through a switch. There are two ways to forward frames through a switch. Store and Forward – the entire frame is received before any forwarding takes place. Store and Forward – the entire frame is received before any forwarding takes place. The destination and/or source addresses are read and filters are applied before the frame is forwarded. The destination and/or source addresses are read and filters are applied before the frame is forwarded. Latency occurs while the frame is being received; the latency is greater with larger frames because the entire frame takes longer to read. Latency occurs while the frame is being received; the latency is greater with larger frames because the entire frame takes longer to read. Error detection is high because of the time available to the switch to check for errors while waiting for the entire frame to be received. Error detection is high because of the time available to the switch to check for errors while waiting for the entire frame to be received. Cut-Through (Fast Forward/Fragment-Free) – the switch reads the destination MAC address and begins forwarding the frame before it is completely received. Cut-Through (Fast Forward/Fragment-Free) – the switch reads the destination MAC address and begins forwarding the frame before it is completely received. The mode decreases the latency of the transmission and has poor error detection. The mode decreases the latency of the transmission and has poor error detection.

VLANS VLANs logically segment the physical LAN infrastructure into different subnets (broadcast domains for Ethernet) so that broadcast frames are switched only between ports with the same VLAN. VLANs logically segment the physical LAN infrastructure into different subnets (broadcast domains for Ethernet) so that broadcast frames are switched only between ports with the same VLAN.

Frame Filtering Frame filtering is a technique that examines particular information about each frame. The concept of frame filtering is very similar to that commonly used by routers. Frame filtering is a technique that examines particular information about each frame. The concept of frame filtering is very similar to that commonly used by routers. A filtering table is developed for each switch, which provides a high level of administrative control because it can examine many attributes of each frame. A filtering table is developed for each switch, which provides a high level of administrative control because it can examine many attributes of each frame.

Frame Identification Frame identification (frame tagging) uniquely assigns a user-defined ID to each frame. This technique was chosen by the IEEE standards group because of its scalability. Frame identification (frame tagging) uniquely assigns a user-defined ID to each frame. This technique was chosen by the IEEE standards group because of its scalability.

VLANs are an effective mechanism for extending firewalls from the routers to the switch fabric and protecting the network against potentially dangerous broadcast problems. VLANs are an effective mechanism for extending firewalls from the routers to the switch fabric and protecting the network against potentially dangerous broadcast problems. These firewalls are accomplished by assigning switch ports or users to specific VLAN groups both within single switches and across multiple connected switches. These firewalls are accomplished by assigning switch ports or users to specific VLAN groups both within single switches and across multiple connected switches.

VLAN Membership VLAN membership by port is a preferred method of setting up VLANs because they maximize forwarding performance. VLAN membership by port is a preferred method of setting up VLANs because they maximize forwarding performance. Dynamic VLAN functions are based on MAC addresses, logical addressing, or protocol type of the data packets. Dynamic VLAN functions are based on MAC addresses, logical addressing, or protocol type of the data packets.

Network Design The first step in designing a LAN is to establish and document the goals of the design. These goals will be particular to each organization or situation. However, general requirements tend to show up in any network design. The first step in designing a LAN is to establish and document the goals of the design. These goals will be particular to each organization or situation. However, general requirements tend to show up in any network design.

Functionality The network must work. That is, it must allow users to meet their job requirements. The network must work. That is, it must allow users to meet their job requirements. The network must provide user-to-user and user-to-application connectivity with reasonable speed and reliability. The network must provide user-to-user and user-to-application connectivity with reasonable speed and reliability.

Scalability The network must be able to grow. That is to say, the initial design should grow without any major changes to the overall design. The network must be able to grow. That is to say, the initial design should grow without any major changes to the overall design.

Adaptability The network must be designed with an eye toward future technologies, and should not include elements that would limit implementation of new technologies as they become available. The network must be designed with an eye toward future technologies, and should not include elements that would limit implementation of new technologies as they become available.

Manageability The network should be designed to facilitate network monitoring and management, on order to ensure ongoing stability or operation. The network should be designed to facilitate network monitoring and management, on order to ensure ongoing stability or operation.

After the requirements for the overall network have been gathered, an overall topology, or model, of the LAN can be developed. The major pieces of this topology design can be broken into three unique categories of the OSI model. After the requirements for the overall network have been gathered, an overall topology, or model, of the LAN can be developed. The major pieces of this topology design can be broken into three unique categories of the OSI model.

Layer 1 – Physical Layer Design Goal Design Goal Build this layer of the OSI model with speed and expansion capabilities Build this layer of the OSI model with speed and expansion capabilities

Layer 2 – Data Link Layer Design Goals Design Goals Create a concentration point within the MDFs or IDFs where end hosts can be grouped at Layer 1 to form a physical LAN segment. Create a concentration point within the MDFs or IDFs where end hosts can be grouped at Layer 1 to form a physical LAN segment. Install LAN switching devices that use microsegmentation in order to reduce the collision domain size. Install LAN switching devices that use microsegmentation in order to reduce the collision domain size. Create a point (at Layer 2) of the topology where users can be grouped into virtual workgroups (VLANs) and unique broadcast domains. Create a point (at Layer 2) of the topology where users can be grouped into virtual workgroups (VLANs) and unique broadcast domains.

Layer 3 – Network Layer Design Goals Design Goals Build a path between LAN segments that will filter the flow of data packets. Build a path between LAN segments that will filter the flow of data packets. Isolate ARP broadcasts. Isolate ARP broadcasts. Isolation of collisions between segments. Isolation of collisions between segments. Filtering of Layer 4 services between segments. Filtering of Layer 4 services between segments.

Cable Type Type of Cable Speed Max. Length Horizontal Run UTP Cat 5 10 or 100 Mbps 90 m. Vertical IDF to MDF Single mode fiber 100 Mbps 3000 m Vertical VCC in IDF to MDF Single mode fiber 100 Mbps 3000 m. Servers UTP Cat Mbps 100 m.

The success of dynamic routing depends on two basic router functions The success of dynamic routing depends on two basic router functions Maintenance of a routing table Maintenance of a routing table Timely distribution of knowledge – in the form of routing updates – to other routers Timely distribution of knowledge – in the form of routing updates – to other routers

Routing Protocol How updates are sent How updates are sent What knowledge is contained in these updates What knowledge is contained in these updates When to send this knowledge When to send this knowledge How to locate recipients of the updates How to locate recipients of the updates

Metric Value Metric values can be calculated based on a single characteristic of a patch. Metric values can be calculated based on a single characteristic of a patch. You can calculate more complex metrics by combining several characteristics. You can calculate more complex metrics by combining several characteristics. Several path characteristics are used in the calculation. Several path characteristics are used in the calculation.

Most Common Metrics Bandwidth – Data capacity of a link. For instance, normally, a 10-Mbps Ethernet link is preferable to a 64-kbps leased line. Bandwidth – Data capacity of a link. For instance, normally, a 10-Mbps Ethernet link is preferable to a 64-kbps leased line. Delay – Length of time required to move a packet from source to destination. Delay – Length of time required to move a packet from source to destination. Load – Amount of activity on a network resource such as a router or link. Load – Amount of activity on a network resource such as a router or link. Reliability – Usually refers to the error rate of each network link. Reliability – Usually refers to the error rate of each network link.

Hop Count – Number of routers a packet must pass through. Hop Count – Number of routers a packet must pass through. Ticks – Delay on a data link using IBM PC clock ticks (approximately 55 milliseconds). Ticks – Delay on a data link using IBM PC clock ticks (approximately 55 milliseconds). Cost – Arbitrary value, usually based on bandwidth, dollar expense, or other measurement, that is assigned by a network administrator. Cost – Arbitrary value, usually based on bandwidth, dollar expense, or other measurement, that is assigned by a network administrator.

Routing Protocols Most routing protocols are based on one of two routing algorithms: Most routing protocols are based on one of two routing algorithms: Distance – vector Distance – vector Link-state Link-state

Convergence The knowledge base needs to reflect an accurate, consistent view of the new topology. The knowledge base needs to reflect an accurate, consistent view of the new topology. Convergence occurs when all routers in an internet are operating with the same knowledge (i.e. all routers have the same information on all parts in the network). Convergence occurs when all routers in an internet are operating with the same knowledge (i.e. all routers have the same information on all parts in the network).

Exterior & Interior Routing Exterior routing protocols are used to communicate between autonomous systems. Exterior routing protocols are used to communicate between autonomous systems. Interior routing protocols are used within a single autonomous system. Interior routing protocols are used within a single autonomous system.

Examples of Interior IP routing protocols RIP – A distance vector routing protocol RIP – A distance vector routing protocol IGRP – Cisco’s distance vector routing protocol IGRP – Cisco’s distance vector routing protocol OSPF – A link-state routing protocol OSPF – A link-state routing protocol EIGRP – A balanced hybrid routing protocol EIGRP – A balanced hybrid routing protocol

IGRP Distance vector routing protocol developed by Cisco. Distance vector routing protocol developed by Cisco. IGRP sends routing updates at 90-second intervals that advertise networks for a particular autonomous system. IGRP sends routing updates at 90-second intervals that advertise networks for a particular autonomous system. IGRP may use a combination of variables to determine a composite metric. IGRP may use a combination of variables to determine a composite metric.

Access Lists Standard access lists, which check the source address of packets that could be routed. The result permits or denies output for an entire protocol suite, based on the network/subnet/host address. Standard access lists, which check the source address of packets that could be routed. The result permits or denies output for an entire protocol suite, based on the network/subnet/host address. Extended access lists which check for source and destination packet addresses. They also can check for specific protocols, port numbers, and other parameters. Extended access lists which check for source and destination packet addresses. They also can check for specific protocols, port numbers, and other parameters.

Access Lists Access Lists express the set of rules that give added control for packets that enter inbound interfaces or outbound interfaces of the router. Access Lists express the set of rules that give added control for packets that enter inbound interfaces or outbound interfaces of the router. Access lists do not act on packets that originate in the router itself. Access lists do not act on packets that originate in the router itself. There can be only one access list per protocol, per interface, per direction. There can be only one access list per protocol, per interface, per direction.

With Cisco IOS Release 11.2 and later you can also identify a standard or extended IP access list with an alphanumeric string (name) With Cisco IOS Release 11.2 and later you can also identify a standard or extended IP access list with an alphanumeric string (name) IP access lists use wildcard masking IP access lists use wildcard masking A wildcard mask bit 0 means “check the corresponding bit value.” A wildcard mask bit 0 means “check the corresponding bit value.” A wildcard mask bit 1 means “do not check (ignore) that corresponding bit value.” A wildcard mask bit 1 means “do not check (ignore) that corresponding bit value.”

The administrator can use the abbreviation any to represent The administrator can use the abbreviation any to represent To represent , the administrator can use the word host in front of the address To represent , the administrator can use the word host in front of the address The rules with extended access lists is to put the extended access list as close as possible to the source of the traffic denied. The rules with extended access lists is to put the extended access list as close as possible to the source of the traffic denied. Standard access lists do not specify destination addresses. The administrator would have put the standard access list as near the destination as possible. Standard access lists do not specify destination addresses. The administrator would have put the standard access list as near the destination as possible.