LAN Switching & Wireless Networks
LAN Switching & Wireless Networks
Carrier Sense
Multiple Access
Collision Detection
JAM Signal
Random Backoff
Key Elements of Ethernet/802.3 Networks:
CSMA/CD
• Ethernet signals are transmitted to every host
connected to the LAN using a special set of rules to
determine which station can access the network. The
set of rules that Ethernet uses is based on the IEEE
carrier sense multiple access/collision detect (CSMA/
CD) technology.
• Carrier Sense
• Multiple Access
• Collision Detection
• Jamming Signal and Random Backoff
Key Elements of Ethernet/802.3 Networks:
Communication
Key Elements of Ethernet/802.3 Networks:
Communication
• Examples of unicast transmissions include HTTP, SMTP,
FTP, and Telnet.
• An example of a broadcast transmission is the address
resolution query that the address resolution protocol (ARP)
sends to all computers on a LAN.
• An example of multicast transmission is the video and
voice transmissions associated with a network-based,
collaborative business meeting.
Key Elements of Ethernet/802.3 Networks:
Ethernet Frame
Ethernet Frame
Half Duplex
Full Duplex
Key Elements of Ethernet/802.3 Networks:
Switch Port Settings
1
2
3 4
5 6
Key Elements of Ethernet/802.3 Networks:
Switch MAC Table
The following six steps describe the process used to populate the MAC address
table on a switch:
• The switch receives a broadcast frame from PC1 on Port 1, as seen in
Figure.
• The switch enters the source MAC address and the switch port that received
the frame into the address table.
• Because the destination address is a broadcast, the switch floods the frame
to all ports, except the port on which it received the frame.
• The destination device replies to the broadcast with a unicast frame
addressed to PC1.
• The switch enters the source MAC address of PC2 and the port number of
the switch port that received the frame into the address table. The
destination address of the frame and its associated port are found in the
MAC address table.
• The switch can now forward frames between source and destination devices
without flooding, because it has entries in the address table that identify the
associated ports.
Design Considerations for Ethernet networks:
Transfer Capacity
• Differences between bandwidth, throughput and goodput:
1. Bandwidth (Theoretical): The capacity of a medium to carry data
in a given amount of time.
ü Usually measured in kbps or Mbps.
2. Throughput (Practical): is the measure of the transfer of bits
across the media over a given period of time.
ü Throughput <= Bandwidth.
ü Number of devices affect the throughput.
3. Goodput (Qualitative): is the measure of usable data transferred
over a given period of time.
ü Application level throughput.
ü Goodput = Throughput - traffic overhead for establishing
sessions, acknowledgements, and encapsulation.
Design Considerations for Ethernet networks
Switch Forwarding Methods
2. Cut-Through (Fast-forward switching or Fragment-free switching)
Fast-forward switching offers low latency, and the destination
network adapter discards the faulty packet upon receipt.
- In fregment free the switch stores the first 64 bytes of the frame
before forwarding.
Switch Forwarding Methods
Symmetric and Asymmetric
Switching
Switching may be classified as symmetric or asymmetric based on the
way in which bandwidth is allocated to the switch ports.
Server switch port??
Symmetric and Asymmetric
Switching
Symmetric and Asymmetric
Switching
Memory Buffering
• The switch uses a buffering technique to store and forward
frames and when the destination port is busy.
• The switch stores the data in the memory buffer.
• The memory buffer can be a port-based memory or shared
memory.
Layer 3 Switching
• Layer 3 switches are superfast routers that do Layer 3
forwarding in hardware.
What is difference between layer 3
Switch and Router?
Just Refresh
Store-and-forward or Cut-Through?
Asymmetric or Symmetric?
Port-based or Shared?
Shared or port-based?
http://h20229.www2.hp.com/news/about/index.html
GUI-based Alternatives to the CLI
• Backing Up Configuration
1. switch#copy system:running-config tftp:[[[//location]/directory]/
filename]
2. or switch#copy nvram:startup-config tftp:[[[//location]/directory]/
filename].
Ex: S1# copy running-config tftp://192.168.1.1/abdo-config
• Restoring Configuration
1. Switch#copy tftp:[[[//location]/directory]/filename]
system:running-config
2. or switch#copy tftp:[[[//location]/directory]/filename]
nvram:startup-config.
Configuring Passwords
• Enable
§ FCI(config)# enable password cisco
§ FCI(config-line)# enable secret cisco
• Console The
No
§ FCI(config)# line console 0 command
§ FCI(config-line)# password cisco
§ FCI(config-line)# login
• Telnet
§ FCI(config)# line vty 0 14
§ FCI(config-line)# password cisco
§ FCI(config-line)# login
Configuring Passwords
• Homework
What is difference between enable password and enable
secret command?
What is service password-encryption command?
What is no service password-encryption command?
Password Recovery