SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
LAYER 2 SWITCHING
By
Anil Kumar Vishwakarma
MCA,MCTS,CCNA
OVERVIEW
 Introduction
 Spanning Tree Protocol
 Spanning Tree Terms
 Spanning Tree Operations
 LAN Switch Types
 Configuring Switches
INTRODUCTION
 Switching Services
 Unlike bridges that use software to create and manage a
filter table, switches use application specific integrated
circuits (ASICs) to build and maintain their filter tables.
 A switch can be viewed as a multiport bridge.
 Three Switch Functions at Layer 2
1. Address learning: Layer 2 switches and bridges
remember the source hardware address of each frame
received on an interface, and they enter this information
into a MAC database called a forward/filter table.
2. Forward/filter decisions: When a frame is received on an
interface, the switch looks at the destination hardware
address and finds the exit interface in the MAC database.
The frame is only forwarded out the specified destination
port.
3. Loop avoidance: If multiple connections between switches
are created for redundancy purposes, network loops can
occur. Spanning Tree Protocol (STP) is used to stop
network loops while still permitting redundancy.
ADDRESS LEARNING
When a switch is first powered on, the MAC forward/filter
table is empty,
FORWARD/FILTER DECISIONS
 When a frame arrives at a switch interface, the
destination hardware address is compared to the
forward/filter MAC database.
 If the destination hardware address is known
and listed in the database, the frame is sent out
only the correct exit interface.
 The switch doesn’t transmit the frame out any
interface except for the destination interface.
 This preserves bandwidth on the other network
segments and is called frame filtering.
LOOP AVOIDANCE
 Redundant links between switches are a good idea because they help
prevent complete network failures in the event one link stops working.
 the switches will flood broadcasts endlessly throughout the nternetwork.
 This is sometimes referred to as a broadcast storm
SPANNING TREE PROTOCOL
 STP’s main task is to stop network loops from
occurring on your layer 2 network switches.
 It monitors the network to find all links, making
sure that no loops occur by shutting down any
redundant links.
 STP uses the spanning-tree algorithm (STA) to
first create a topology database, then search out
and destroy redundant links.
 With STP running, frames will be forwarded only
on the premium, STP-picked links.
SPANNING TREE TERMS
 Bridge ID: It is determined by a combination of the bridge
priority (32,768 by default on all Cisco switches) and the base
MAC address. The bridge with the lowest bridge ID becomes the
root bridge in the network.
 Root bridge: is the bridge with the best bridge ID (the lowest
bridge ID).
 Nonroot bridge: These are all bridges that are not the root
bridge. Nonroot bridges exchange BPDUs with all bridges and
update the STP topology database on all switches.
 BPDU: Bridge Protocol Data Unit (BPDU) the name of packet
that they send to one neighbor with the one that they receive
from another neighbor.
 Root port: The root port is always the link directly connected to
the root bridge, or the shortest path to the root bridge.
SPANNING TREE TERMS
 Designated port A designated port is one that has been
determined as having the best (lowest) cost. A designated
port will be marked as a forwarding port.
 Port cost Port cost determines when multiple links are
used between two switches and none are root ports. The
cost of a link is determined by the bandwidth of a link.
 Nondesignated port is one with a higher cost than the
designated port. Nondesignated ports are put in blocking
mode—they are not forwarding ports.
 Blocked port A blocked port is the port that will not
forward frames, in order to prevent loops. However, a
blocked port will always listen to frames.
SPANNING TREE OPERATIONS
1. Selecting the Root Bridge
2. Selecting the Root Port
3. Selecting the designated (Forward) port.
4. Spanning-Tree Port States
 Blocking A blocked port won’t forward frames; it
just listens to BPDUs.
 Forwarding The port sends and receives all data
frames on the bridged port.
LAN SWITCH TYPES
 LAN switch types decide how a frame is handled
when it’s received on a switch port.
 There are three switching modes:
1. Cut-through (FastForward)
2. FragmentFree (modified cut-through) the switch
checks the first 64 bytes (caused by collision) of a
frame before forwarding it for fragmentation.
3. Store-and-forward: In this mode, the complete data
frame is received on the switch’s buffer, a CRC is
run, and, if the CRC passes, the switch looks up the
destination address in the MAC filter table.
CONFIGURING SWITCHES
 Setting the Passwords
 1900 Switch
(config)#enable password level 1 kkkk -----> User mode
(config)#enable password level 15 kkkk1 -----> Enable Mode
(config)#enable secret todd2 -----> Encrypted
 2950 Switch
Switch(config)#enable password todd -----> non Encrypted
Switch(config)#enable secret todd -----> Encrypted
 Setting the Hostname
 1900 Switch
(config)#host S1900
 2950 Switch
Switch(config)#host S2950
CONFIGURING SWITCHES
Setting IP Information
 1900 Switch
S1900#config t
S1900(config)#ip address 172.16.10.16 255.255.255.0
S1900(config)#ip default-gateway 172.16.10.1
 2950 Switch
S2950#config t
S2950(config)#int vlan1
S2950(config-if)#ip address 172.16.10.17 255.255.255.0
S2950(config-if)#no shut
S2950(config-if)#exit
S2950(config)#ip default-gateway 172.16.10.1
CONFIGURING SWITCHES
Configuring Interface Descriptions
 1900 Switch
S1900#config t
S1900(config)#int e0/1
S1900(config-if)#desc Finance_VLAN
 2950 Switch
S2950#config t
S2950(config)#int f 0/1
S2950(config-if)#desc Sales Printer
CONFIGURING SWITCHES
 Erasing the Switch Configuration
 1900 Switch
Todd1900#delete nvram
 2950 Switch
Todd2950#erase startup-config
Thank You

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
network convergence problem and solutions
network convergence  problem and solutionsnetwork convergence  problem and solutions
network convergence problem and solutions
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Link State Protocol
Link State ProtocolLink State Protocol
Link State Protocol
 
OSPF Overview
OSPF OverviewOSPF Overview
OSPF Overview
 
Routing Technique Table Type by Umar danjuma maiwada.ppt
Routing Technique Table Type by Umar danjuma maiwada.pptRouting Technique Table Type by Umar danjuma maiwada.ppt
Routing Technique Table Type by Umar danjuma maiwada.ppt
 
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric VanderburgCCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
 
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
13. eigrp and ospf
13. eigrp and ospf13. eigrp and ospf
13. eigrp and ospf
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switching
 
Rip
RipRip
Rip
 
1164 Routers
1164 Routers1164 Routers
1164 Routers
 

Destaque

為什麼商家需要App行銷
為什麼商家需要App行銷為什麼商家需要App行銷
為什麼商家需要App行銷
Mike Chang
 
2014 год олимпийский
2014 год   олимпийский2014 год   олимпийский
2014 год олимпийский
annut77
 
Esdipitchstartupvillage 130530064724-phpapp01
Esdipitchstartupvillage 130530064724-phpapp01Esdipitchstartupvillage 130530064724-phpapp01
Esdipitchstartupvillage 130530064724-phpapp01
AnnaStrizhkina
 
IU9 Summer Institue 2009
IU9 Summer Institue 2009IU9 Summer Institue 2009
IU9 Summer Institue 2009
csmurphy575
 
IDS Credential 2016
IDS Credential 2016IDS Credential 2016
IDS Credential 2016
Manas Mishra
 

Destaque (20)

為什麼商家需要App行銷
為什麼商家需要App行銷為什麼商家需要App行銷
為什麼商家需要App行銷
 
Yourprezi
YourpreziYourprezi
Yourprezi
 
Copernica Marketingplan
Copernica MarketingplanCopernica Marketingplan
Copernica Marketingplan
 
Treatment of familial mediterranean fever: colchicine and beyond
Treatment of familial mediterranean fever: colchicine and beyondTreatment of familial mediterranean fever: colchicine and beyond
Treatment of familial mediterranean fever: colchicine and beyond
 
Osha_First aid kit_hackers
Osha_First aid kit_hackersOsha_First aid kit_hackers
Osha_First aid kit_hackers
 
October 17
October 17October 17
October 17
 
Micro elements
Micro elementsMicro elements
Micro elements
 
Social media, sousveillance and civil unrest in the United Kingdom
Social media, sousveillance and civil unrest in the United KingdomSocial media, sousveillance and civil unrest in the United Kingdom
Social media, sousveillance and civil unrest in the United Kingdom
 
2014 год олимпийский
2014 год   олимпийский2014 год   олимпийский
2014 год олимпийский
 
Fotoalbum nieuwjaarsbijeenkomst 2014 Zorgbelang Brabant
Fotoalbum nieuwjaarsbijeenkomst 2014 Zorgbelang BrabantFotoalbum nieuwjaarsbijeenkomst 2014 Zorgbelang Brabant
Fotoalbum nieuwjaarsbijeenkomst 2014 Zorgbelang Brabant
 
Esdipitchstartupvillage 130530064724-phpapp01
Esdipitchstartupvillage 130530064724-phpapp01Esdipitchstartupvillage 130530064724-phpapp01
Esdipitchstartupvillage 130530064724-phpapp01
 
Ntr 300 pp
Ntr 300 ppNtr 300 pp
Ntr 300 pp
 
Planning my preliminary task
Planning my preliminary taskPlanning my preliminary task
Planning my preliminary task
 
Elevate Landscape May 2016
Elevate Landscape May 2016Elevate Landscape May 2016
Elevate Landscape May 2016
 
AD4026 BI Sesión 04
AD4026 BI Sesión 04AD4026 BI Sesión 04
AD4026 BI Sesión 04
 
IU9 Summer Institue 2009
IU9 Summer Institue 2009IU9 Summer Institue 2009
IU9 Summer Institue 2009
 
Kontit pomppimaan3
Kontit pomppimaan3Kontit pomppimaan3
Kontit pomppimaan3
 
Elverano
ElveranoElverano
Elverano
 
IDS Credential 2016
IDS Credential 2016IDS Credential 2016
IDS Credential 2016
 
AQUABELL Mediterranean Fly, 1986, £39,950 For Sale Brochure. Presented By yac...
AQUABELL Mediterranean Fly, 1986, £39,950 For Sale Brochure. Presented By yac...AQUABELL Mediterranean Fly, 1986, £39,950 For Sale Brochure. Presented By yac...
AQUABELL Mediterranean Fly, 1986, £39,950 For Sale Brochure. Presented By yac...
 

Semelhante a Day 4 LAYER 2 SWITCHING

Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Mike McLain
 
Ccna free chapter
Ccna free chapterCcna free chapter
Ccna free chapter
kvs062003
 
Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011
Dân Chơi
 
Lec1 lan switching
Lec1 lan switchingLec1 lan switching
Lec1 lan switching
karthiketrx
 
Spaning Tree Protocol
Spaning Tree ProtocolSpaning Tree Protocol
Spaning Tree Protocol
Atakan ATAK
 
Ch5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelessCh5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wireless
kratos2424
 

Semelhante a Day 4 LAYER 2 SWITCHING (20)

C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
 
Bridging.ppt
Bridging.pptBridging.ppt
Bridging.ppt
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna free chapter
Ccna free chapterCcna free chapter
Ccna free chapter
 
Switching
SwitchingSwitching
Switching
 
Stp defined
Stp definedStp defined
Stp defined
 
Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
 
Quick Guide Layer 2 Switching
Quick Guide   Layer 2 SwitchingQuick Guide   Layer 2 Switching
Quick Guide Layer 2 Switching
 
Lec1 lan switching
Lec1 lan switchingLec1 lan switching
Lec1 lan switching
 
Spaning Tree Protocol
Spaning Tree ProtocolSpaning Tree Protocol
Spaning Tree Protocol
 
Ch5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelessCh5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wireless
 
6.switching vla ns
6.switching vla ns6.switching vla ns
6.switching vla ns
 
ccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdfccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdf
 

Mais de anilinvns

VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
anilinvns
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
anilinvns
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOS
anilinvns
 
Disk management server
Disk management serverDisk management server
Disk management server
anilinvns
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basics
anilinvns
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 

Mais de anilinvns (17)

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenance
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OS
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOS
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANS
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOS
 
Wds
WdsWds
Wds
 
Disk management server
Disk management serverDisk management server
Disk management server
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basics
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Day 4 LAYER 2 SWITCHING

  • 1. LAYER 2 SWITCHING By Anil Kumar Vishwakarma MCA,MCTS,CCNA
  • 2.
  • 3. OVERVIEW  Introduction  Spanning Tree Protocol  Spanning Tree Terms  Spanning Tree Operations  LAN Switch Types  Configuring Switches
  • 4. INTRODUCTION  Switching Services  Unlike bridges that use software to create and manage a filter table, switches use application specific integrated circuits (ASICs) to build and maintain their filter tables.  A switch can be viewed as a multiport bridge.  Three Switch Functions at Layer 2 1. Address learning: Layer 2 switches and bridges remember the source hardware address of each frame received on an interface, and they enter this information into a MAC database called a forward/filter table. 2. Forward/filter decisions: When a frame is received on an interface, the switch looks at the destination hardware address and finds the exit interface in the MAC database. The frame is only forwarded out the specified destination port. 3. Loop avoidance: If multiple connections between switches are created for redundancy purposes, network loops can occur. Spanning Tree Protocol (STP) is used to stop network loops while still permitting redundancy.
  • 5. ADDRESS LEARNING When a switch is first powered on, the MAC forward/filter table is empty,
  • 6. FORWARD/FILTER DECISIONS  When a frame arrives at a switch interface, the destination hardware address is compared to the forward/filter MAC database.  If the destination hardware address is known and listed in the database, the frame is sent out only the correct exit interface.  The switch doesn’t transmit the frame out any interface except for the destination interface.  This preserves bandwidth on the other network segments and is called frame filtering.
  • 7. LOOP AVOIDANCE  Redundant links between switches are a good idea because they help prevent complete network failures in the event one link stops working.  the switches will flood broadcasts endlessly throughout the nternetwork.  This is sometimes referred to as a broadcast storm
  • 8. SPANNING TREE PROTOCOL  STP’s main task is to stop network loops from occurring on your layer 2 network switches.  It monitors the network to find all links, making sure that no loops occur by shutting down any redundant links.  STP uses the spanning-tree algorithm (STA) to first create a topology database, then search out and destroy redundant links.  With STP running, frames will be forwarded only on the premium, STP-picked links.
  • 9. SPANNING TREE TERMS  Bridge ID: It is determined by a combination of the bridge priority (32,768 by default on all Cisco switches) and the base MAC address. The bridge with the lowest bridge ID becomes the root bridge in the network.  Root bridge: is the bridge with the best bridge ID (the lowest bridge ID).  Nonroot bridge: These are all bridges that are not the root bridge. Nonroot bridges exchange BPDUs with all bridges and update the STP topology database on all switches.  BPDU: Bridge Protocol Data Unit (BPDU) the name of packet that they send to one neighbor with the one that they receive from another neighbor.  Root port: The root port is always the link directly connected to the root bridge, or the shortest path to the root bridge.
  • 10. SPANNING TREE TERMS  Designated port A designated port is one that has been determined as having the best (lowest) cost. A designated port will be marked as a forwarding port.  Port cost Port cost determines when multiple links are used between two switches and none are root ports. The cost of a link is determined by the bandwidth of a link.  Nondesignated port is one with a higher cost than the designated port. Nondesignated ports are put in blocking mode—they are not forwarding ports.  Blocked port A blocked port is the port that will not forward frames, in order to prevent loops. However, a blocked port will always listen to frames.
  • 11. SPANNING TREE OPERATIONS 1. Selecting the Root Bridge 2. Selecting the Root Port 3. Selecting the designated (Forward) port. 4. Spanning-Tree Port States  Blocking A blocked port won’t forward frames; it just listens to BPDUs.  Forwarding The port sends and receives all data frames on the bridged port.
  • 12. LAN SWITCH TYPES  LAN switch types decide how a frame is handled when it’s received on a switch port.  There are three switching modes: 1. Cut-through (FastForward) 2. FragmentFree (modified cut-through) the switch checks the first 64 bytes (caused by collision) of a frame before forwarding it for fragmentation. 3. Store-and-forward: In this mode, the complete data frame is received on the switch’s buffer, a CRC is run, and, if the CRC passes, the switch looks up the destination address in the MAC filter table.
  • 13. CONFIGURING SWITCHES  Setting the Passwords  1900 Switch (config)#enable password level 1 kkkk -----> User mode (config)#enable password level 15 kkkk1 -----> Enable Mode (config)#enable secret todd2 -----> Encrypted  2950 Switch Switch(config)#enable password todd -----> non Encrypted Switch(config)#enable secret todd -----> Encrypted  Setting the Hostname  1900 Switch (config)#host S1900  2950 Switch Switch(config)#host S2950
  • 14. CONFIGURING SWITCHES Setting IP Information  1900 Switch S1900#config t S1900(config)#ip address 172.16.10.16 255.255.255.0 S1900(config)#ip default-gateway 172.16.10.1  2950 Switch S2950#config t S2950(config)#int vlan1 S2950(config-if)#ip address 172.16.10.17 255.255.255.0 S2950(config-if)#no shut S2950(config-if)#exit S2950(config)#ip default-gateway 172.16.10.1
  • 15. CONFIGURING SWITCHES Configuring Interface Descriptions  1900 Switch S1900#config t S1900(config)#int e0/1 S1900(config-if)#desc Finance_VLAN  2950 Switch S2950#config t S2950(config)#int f 0/1 S2950(config-if)#desc Sales Printer
  • 16. CONFIGURING SWITCHES  Erasing the Switch Configuration  1900 Switch Todd1900#delete nvram  2950 Switch Todd2950#erase startup-config