Chapter1 LAN Design
Chapter1 LAN Design
LAN Design
Module : Switched Networks
3rd Year
2021/2022
1
Part 1
LAN Characteristics
3
What is a local network ?
It is a network whose size ranges from a few meters (direct link between peripheral
equipment) to a few kilometers (with interconnection equipment).
Geographically limited (company, school, building,...)
Speeds ranging from 100 Mb/s to 10Gb/s
Widespread technology for a wired infrastructure: Ethernet
Components
4
Interconnexion Equipement
Equipment Function Illustration
Cross-over
6
Why do we need a model in a LAN?
Network Design Model
A design model is used to build networks according to certain architectural rules that enable them to meet the
current and future needs of businesses and their users.
7
3-layer hierarchical model
9
Collision / Broadcast domains (1/3)
Collision domain is a set of entities that share the same communication
medium. If two entities send data at a time T then there is a data collision and
the data must be retransmitted.
Collision domain
10
Collision / Broadcast domains (2/3)
Broadcast Domain is a logical area of a computer network where any machine
connected to the network can directly transmit to all other machines in the same
domain.
Broadcast Broadcast
Domain Domain
11
Collision / Broadcast domains (3/3)
Broadcast
Domain 1
12
Part 2
Characteristics and basic configuration of a Switch
13
Equipement characteristics
Each network equipment is composed of :
14
Configuration Modes
User EXEC Mode: it allows access to only a limited
number of basic monitoring commands.
Privileged EXEC Mode: it allows access to all
commands and features.
Global configuration mode: From global config mode,
CLI configuration changes are made that affect the operation
of the device as a whole.
Subconfiguration modes
• Line configuration mode- Used to configure console,
SSH, Telnet, or AUX access.
• Interface configuration mode- Used to configure a
switch port or router network interface.
15
Basic IOS command Structure
A network administrator must know the basic IOS command structure to be able to use
the CLI for device configuration.
A Cisco IOS device supports many commands. Each IOS command has a specific
format, or syntax, and can only be executed in the appropriate mode.
16
Configuration Files
There are two system files that store the device configuration:
• startup-config - This is the saved configuration file that is stored in NVRAM. It contains all the
commands that will be used by the device upon startup or reboot.
Note: Flash does not lose its contents when the device is powered off.
• running-config - This is stored in Random Access Memory (RAM). It reflects the current configuration.
Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile
memory. It loses all of its content when the device is powered off or restarted.
17
Switch basic configuration (1/8)
Device name
The default name should be changed to something more
descriptive. By choosing names wisely, it is easier to
remember, document, and identify network devices.
Here are some important naming guidelines for hosts:
• Start with a letter
• Contain no spaces
• End with a letter or digit
• Use only letters, digits, and dashes
• Be less than 64 characters in length
18
Switch basic configuration(2/8)
Disable DNS translation process
• By default, any single word entered on an IOS device that is not recognized as a valid command is
treated as a hostname. The device will try to translate that word to an IP address in a process that
can last about a minute.
• This can be annoying and this is why this feature is often turned off, especially in the lab
environments.
• If you don’t need to have a DNS server configured for your router, you can use the no ip domain-
lookup command to disable the DNS translation process.
Switch
19
Switch basic configuration(3/8)
Passwords (1/2)
Network devices, including home wireless routers, should always have passwords
configured to limit administrative access.
All networking devices should limit administrative access by securing:
• privileged EXEC mode
• Console access
• Remote Telnet access with passwords.
In addition, all plaintext passwords should be encrypted.
Console Access Telnet Access
20
Switch basic configuration (4/8)
Passwords (2/2)
Pour disposer d'un accès administrateur à toutes les commandes IOS, y compris la
configuration d’un équipement, vous devez obtenir un accès privilégié en mode
d'exécution.
Deux manière de configurer le mot de passe d’accès privilégié
• « enable password password »
• « enable secret password »
L’option « secret » permet l’hachage du mot de passe avec l’algorithme MD5 et son
enregistrement sous forme de cryptogramme le mot de passe créé.
21
Switch basic configuration (5/8)
Banner Message
22
Switch basic configuration (6/8)
Switch management interface
To prepare a switch for remote management access, the switch must be configured
with an IP address and a subnet mask.
Since the switch is a Layer 2 device, none of its interfaces can be configures with an
IP address Configure a virtual management interface (SVI).
By default this interface is the VLAN 1 interface,
The configuration of this interface includes:
• Assigning the IP address
1
• Activating it with the command
"no shutdown" 1
23
Switch basic configuration (7/8)
Default Gateway
The default gateway is essential for the switch to communicate with other networks.
The default gateway is the IP address of the router that delimits the broadcast domain
to which the switch belongs.
The configuration is done with the command “ip default-gateway”
24
Switch basic configuration (8/8)
Saving configurations
If a configuration change is made, the running-config file will be modified. On
the other hand, the startup-config file will not be modified.
To modify the startup configuration, it will be necessary to save the current
configuration (running-config) as the initial configuration (in the startup-config).
Consequently, any modification made and not saved will be cancelled the next
time the switch is started.
25
Part 3
Switching Concepts
26
Switch MAC Address Table (1/3)
The switch MAC address table associates a physical port with a MAC address. It makes it
possible to identify the various hosts connected to the network by specifying the port number of
the switch to which connected host.
0260-8c01-1111 0260-ec02-2222
MAC Address Port number
0260-8c01-1111 1 0260-ab12-3333
0260-ec02-2222 2
0260-ab12-3333 3 2
1 3
0260-ef13-4444 4
0260-e718-5555 5 5 4
Self-learning is the process of automatically filling in the MAC Address Table, using the source
MAC addresses in the header of the frames received by the switch.
If a switch receives traffic from a host A to a host B, it consults its MAC table:
• If B exists in its MAC table then the traffic is directed to the corresponding port
• Otherwise
1. Registration of the port corresponding to host A
2. Broadcast of the frame to all active ports except the ingress port (that of A)
28
Switch MAC Address Table (3/3)
Example : Self-learning A B E F
MAC Address
Table 1 3
C D G H
Port
@MAC
number 2 4
T0 A 1
T0 : A communicates with B ==> A registered in the MAC table with port number
T1 B 1 1 and the frame is sent on ports 2,3,4
T1 : B communicates with A ==> B registered in the MAC table with port
number 1 and the frame is sent on port 1
T2 C 2
T2 : C communicates with F ==> C registered in the MAC table with port number
2 and the frame is sent on ports 1,3,4
T3 H 4 T3 : H communicates with C ==> H registered in the MAC table with port number 4
and the frame is sent on port 2
29
How the switch works
2- Frame delimitation and address identification
1- Frame Receiving
Pc2
Pc1
Source
P4 Pc3
P5
Destination identification
P1
3- Switching table consulting
P3 @ MAC N° port
P2 Destinatio
Pc1 P4
Pc5 n
Pc2 P5
Pc4 Destinatio
Pc3 P1
Pc4 P2
n port
A switch will use one of two methods to make forwarding decisions after it receives a
frame:
• Store-and-forward switching - Receives the entire frame and ensures the frame is valid. Store-
and-forward switching is Cisco’s preferred switching method.
• Cut-through switching – Forwards the frame immediately after determining the destination MAC
address of an incoming frame and the egress port.
31
Store and Forward Switching
32
Cut-Through Switching
Cut-through forwards the frame immediately
after determining the destination MAC.
Fragment (Frag) Free method will check the
destination and ensure that the frame is at
least 64 Bytes. This will eliminate runts.
Concepts of Cut-Through switching:
• Is appropriate for switches needing latency to be
under 10 microseconds
• Does not check the FCS, so it can propagate
errors
• May lead to bandwidth issues if the switch
propagates too many errors
• Cannot support ports with differing speeds going
from ingress to egress
33
Manipulating MAC address table (1/2)
The command that displays the MAC address table of a switch is:
34
Manipulating MAC address table(2/2)
The command to add a static entry to the MAC address table is:
S1(config)# mac-address-table static <adresse_MAC> vlan <ID_vlan> interface
<ID_interface>
The command to remove the dynamic entries is :
S1# clear mac-address-table dynamic
The command to delete a static entry is :
S1(config)# no mac-address-table static <adresse_MAC> vlan <ID_vlan>
interface <ID_interface>
35
Part 4
Switch Port Security
36
Enabling Switch Port Security (1/3)
In order to secure the network, only authorized machines
should be allowed to access it.
The switch ports must therefore be secured:
• By administratively shutting down all unused ports
• By limiting access to other ports to a set of authorized MAC
addresses.
37
Enabling Switch Port Security (2/3)
Port Security (1/2)
Port security limits the number of valid MAC addresses allowed to transmit data through a
switch port.
If port security is enabled on a port and an unknown MAC address sends data, the switch has
a security violation.
The switch can be configured to learn about MAC addresses on a secure port in one of three
ways:
• Static : The administrator manually configures a static MAC address(es).
• Dynamic : When the switchport port-security command is entered, the current source MAC for the
device connected to the port is automatically secured but is not added to the running configuration.
If the switch is rebooted, the port will have to re-learn the device’s MAC address.
• Sticky : The administrator can enable the switch to dynamically learn the MAC address and “stick”
them to the running configuration
Saving the running configuration will commit the dynamically learned MAC address to NVRAM.
38
Enabling Switch Port Security (3/3)
Port Security (2/2)
If a machine with an unauthorized MAC address uses the switch's port, it is a port security
violation.
39
Port Security Configuration
Specifying the
number of allowed
Action in case of MAC addresses
violation (default = 1)
(default = shutdown)
switchport port-security violation protect
40
Observing the security configuration
Extract from the running config file
Protect
41
End chapter 1
42