SlideShare uma empresa Scribd logo
1 de 27
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Instructor Materials
Chapter 4: Introduction to
Switched Networks
CCNA Routing and Switching
Routing & Switching Essentials v6.0
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4: Activities
What activities are associated with this chapter?
Page # Activity Type Activity Name Optional?
4.0.1.2 Class Activity Sent or Received Instructions Optional
4.1.1.6 Activity Identify Switched Network Terminology -
4.1.2.3 Activity Identify Switch Hardware -
4.2.1.2 Video Demonstration MAC Address Tables on Connected Switches -
4.2.1.6 Activity Frame Forwarding Methods -
4.2.1.7 Activity Switch It! -
4.3.1.1 Class Activity It’s Network Access Time Optional
The password used in the Packet Tracer activities in this chapter is: PT_ccna5
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13
Chapter 4: Switched
Networks
Routing and Switching Essentials v6.0
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4 - Sections & Objectives
4.1 LAN Design
• Explain how switched networks support small to medium-sized businesses.
• Explain how data, voice, and video are converged in a switched network.
• Describe a switched network in a small to medium-sized business.
4.2 The Switched Environment
• Explain how Layer 2 switches forward data in a small to medium-sized LAN.
• Explain how frames are forwarded in a switched network.
• Compare a collision domain to a broadcast domain.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
4.1 LAN Design
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Growing Complexity of Networks
 Our digital world is
changing.
 Information must be
accessed from
anywhere in the
world.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Elements of a Converged Network
 To support collaboration, networks
employ converged solutions.
 Data services include voice systems, IP
phones, voice gateways, video support,
and video conferencing.
 Call control, voice messaging, mobility,
and automated attendant are also
common features.
 Multiple types of traffic; only one network
to manage.
 Substantial savings over installation and
management of separate voice, video,
and data networks.
 Integrates IT management.
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Cisco Borderless Networks
 A network architecture
that allows organizations
to connect anyone,
anywhere, anytime, and
on any device securely,
reliably, and seamlessly.
 Designed to address IT
and business challenges,
such as supporting the
converged network and
changing work patterns.
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Hierarchy in the Borderless Switched Network
Borderless switched network
design guidelines are built
upon the following principles:
 Hierarchical
 Modularity
 Resiliency
 Flexibility
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Access, Distribution, and Core Layers
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switched Networks
Role of Switched Networks
 Switching technologies are
crucial to network design.
 Switching allows traffic to
be sent only where it is
needed in most cases,
using fast methods.
 A switched LAN:
 Allows more flexibility
 Allows more traffic
management
 Supports quality of service,
additional security, wireless,
IP telephony, and mobility
services
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switched Networks
Form Factors
Fixed
Configuration
Switches
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switched Networks
Form Factors
Modular
Platform
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switched Networks
Form Factors
Stackable
Configuration
Switches
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25
4.2 The Switched Environment
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Switching as a General Concept in Networking and
Telecommunications
 A switch makes a decision based on ingress and a destination port.
 A LAN switch keeps a table that it uses to determine how to forward
traffic through the switch.
 Cisco LAN switches forward Ethernet frames based on the
destination MAC address of the frames.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Dynamically Populating a Switch MAC Address
Table
 A switch must first learn which devices exist on each port before it
can transmit a frame.
 As a switch learns the relationship of ports to devices, it builds a table
called a MAC address or content addressable memory (CAM) table.
 CAM is a special type of memory used in high-speed searching
applications.
 The information in the MAC address table is used to send frames.
 When a switch receives an incoming frame with a MAC address that
is not found in the CAM table, it floods it to all ports, except the one
that received the frame.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Switch Forwarding Methods
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Store-and-Forward Switching
 Allows the switch to:
 Check for errors
(via FCS check)
 Perform automatic
buffering
 Slower forwarding
process
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Cut-Through Switching
 Allows the switch to
start forwarding in
about 10
microseconds
 No FCS check
 No automatic
buffering
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Domains
Collision Domains
Ethernet switch port:
 Operating in half
duplex, each segment
is in its own collision
domain.
 Operating in full duplex
eliminates collisions.
 By default, will auto-
negotiate full duplex
when the adjacent
device can also
operate in full duplex.
Collision domain - Segment where devices compete to communicate.
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Domains
Broadcast Domains
A broadcast domain is the extent of the network where a broadcast
frame can be heard.
 Switches forward broadcast frames to all ports; therefore, switches
do not break broadcast domains.
 All ports of a switch, with its default configuration, belong to the same
broadcast domain.
 If two or more switches are connected, broadcasts are forwarded to
all ports of all switches, except for the port that originally received the
broadcast.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Domains
Alleviating Network Congestion
Switches help alleviate network congestion by:
 Facilitating the segmentation of a LAN into separate collision
domains.
 Providing full-duplex communication between devices.
 Taking advantage of their high-port density.
 Buffering large frames.
 Employing high-speed ports.
 Taking advantage of their fast internal switching process.
 Having a low, per-port cost.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34
4.3 Chapter Summary
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 The trend in networks is towards convergence using a single set of wires and devices to
handle voice, video, and data transmission.
 There has been a dramatic shift in the way businesses operate.
 There are no physical offices or geographic boundaries constraints. Resources must now
be seamlessly available anytime and anywhere.
 The Cisco Borderless Network architecture enables different elements, from access
switches to wireless access points, to work together and allow users to access resources
from any place, at any time.
 The traditional, three-layer hierarchical design model divides the network into core,
distribution, and access layers, and allows each portion of the network to be optimized for
specific functionality.
 It provides modularity, resiliency, and flexibility, which provides a foundation that allows
network designers to overlay security, mobility, and unified communication features.
 Switches use either store-and-forward or cut-through switching.
 Every port on a switch forms a separate collision domain allowing for extremely high-
speed, full-duplex communication.
 Switch ports do not block broadcasts and connecting switches can extend the size of the
broadcast domain, often resulting in degraded network performance.
Chapter Summary
Summary
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Mais conteúdo relacionado

Mais procurados

CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3Andy Juan Sarango Veliz
 
CCNA4 Verson6 Chapter5
CCNA4 Verson6 Chapter5CCNA4 Verson6 Chapter5
CCNA4 Verson6 Chapter5Chaing Ravuth
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 
CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6Chaing Ravuth
 
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7Chaing Ravuth
 
CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5Chaing Ravuth
 
CCNA4 Verson6 Chapter4
CCNA4 Verson6 Chapter4CCNA4 Verson6 Chapter4
CCNA4 Verson6 Chapter4Chaing Ravuth
 
CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2Chaing Ravuth
 
CCNA4 Verson6 Chapter6
CCNA4 Verson6 Chapter6CCNA4 Verson6 Chapter6
CCNA4 Verson6 Chapter6Chaing Ravuth
 
CCNP Switching Chapter 8
CCNP Switching Chapter 8CCNP Switching Chapter 8
CCNP Switching Chapter 8Chaing Ravuth
 
CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9Chaing Ravuth
 
CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8Chaing Ravuth
 
CCNP Switching Chapter 6
CCNP Switching Chapter 6CCNP Switching Chapter 6
CCNP Switching Chapter 6Chaing Ravuth
 
CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3Chaing Ravuth
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2Chaing Ravuth
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1Andy Juan Sarango Veliz
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4Chaing Ravuth
 

Mais procurados (20)

CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3
 
CCNA4 Verson6 Chapter5
CCNA4 Verson6 Chapter5CCNA4 Verson6 Chapter5
CCNA4 Verson6 Chapter5
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6
 
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
 
CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5
 
CCNA4 Verson6 Chapter4
CCNA4 Verson6 Chapter4CCNA4 Verson6 Chapter4
CCNA4 Verson6 Chapter4
 
CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2
 
CCNA4 Verson6 Chapter6
CCNA4 Verson6 Chapter6CCNA4 Verson6 Chapter6
CCNA4 Verson6 Chapter6
 
CCNP Switching Chapter 8
CCNP Switching Chapter 8CCNP Switching Chapter 8
CCNP Switching Chapter 8
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 
CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9
 
CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8
 
CCNP Switching Chapter 6
CCNP Switching Chapter 6CCNP Switching Chapter 6
CCNP Switching Chapter 6
 
CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3CCNA3 Verson6 Chapter3
CCNA3 Verson6 Chapter3
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4
 

Semelhante a CCNA2 Verson6 Chapter4

Chapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networksChapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networksteknetir
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4Waqas Ahmed Nawaz
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksYaser Rahmati
 
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01Lema John Michael
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalKPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalFisal Anwari
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
 
introduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERintroduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERhasby if
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalCamTESOL2015
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxParthaDas754073
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessbebe tampan
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Hamza Malik
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 

Semelhante a CCNA2 Verson6 Chapter4 (20)

Chapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networksChapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networks
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
 
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalKPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_final
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
introduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERintroduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTER
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptxCCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptx
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 

Mais de Chaing Ravuth

CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10Chaing Ravuth
 
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8Chaing Ravuth
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7Chaing Ravuth
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3Chaing Ravuth
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3Chaing Ravuth
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2Chaing Ravuth
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1Chaing Ravuth
 

Mais de Chaing Ravuth (12)

CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
 
CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6
 
CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5
 
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4
 
CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10
 
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 

Último

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 

Último (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 

CCNA2 Verson6 Chapter4

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Instructor Materials Chapter 4: Introduction to Switched Networks CCNA Routing and Switching Routing & Switching Essentials v6.0
  • 2. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4: Activities What activities are associated with this chapter? Page # Activity Type Activity Name Optional? 4.0.1.2 Class Activity Sent or Received Instructions Optional 4.1.1.6 Activity Identify Switched Network Terminology - 4.1.2.3 Activity Identify Switch Hardware - 4.2.1.2 Video Demonstration MAC Address Tables on Connected Switches - 4.2.1.6 Activity Frame Forwarding Methods - 4.2.1.7 Activity Switch It! - 4.3.1.1 Class Activity It’s Network Access Time Optional The password used in the Packet Tracer activities in this chapter is: PT_ccna5
  • 3. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13 Chapter 4: Switched Networks Routing and Switching Essentials v6.0
  • 4. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4 - Sections & Objectives 4.1 LAN Design • Explain how switched networks support small to medium-sized businesses. • Explain how data, voice, and video are converged in a switched network. • Describe a switched network in a small to medium-sized business. 4.2 The Switched Environment • Explain how Layer 2 switches forward data in a small to medium-sized LAN. • Explain how frames are forwarded in a switched network. • Compare a collision domain to a broadcast domain.
  • 5. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15 4.1 LAN Design
  • 6. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Growing Complexity of Networks  Our digital world is changing.  Information must be accessed from anywhere in the world.
  • 7. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Elements of a Converged Network  To support collaboration, networks employ converged solutions.  Data services include voice systems, IP phones, voice gateways, video support, and video conferencing.  Call control, voice messaging, mobility, and automated attendant are also common features.  Multiple types of traffic; only one network to manage.  Substantial savings over installation and management of separate voice, video, and data networks.  Integrates IT management.
  • 8. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Cisco Borderless Networks  A network architecture that allows organizations to connect anyone, anywhere, anytime, and on any device securely, reliably, and seamlessly.  Designed to address IT and business challenges, such as supporting the converged network and changing work patterns.
  • 9. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Hierarchy in the Borderless Switched Network Borderless switched network design guidelines are built upon the following principles:  Hierarchical  Modularity  Resiliency  Flexibility
  • 10. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Access, Distribution, and Core Layers
  • 11. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switched Networks Role of Switched Networks  Switching technologies are crucial to network design.  Switching allows traffic to be sent only where it is needed in most cases, using fast methods.  A switched LAN:  Allows more flexibility  Allows more traffic management  Supports quality of service, additional security, wireless, IP telephony, and mobility services
  • 12. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switched Networks Form Factors Fixed Configuration Switches
  • 13. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switched Networks Form Factors Modular Platform
  • 14. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switched Networks Form Factors Stackable Configuration Switches
  • 15. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25 4.2 The Switched Environment
  • 16. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Switching as a General Concept in Networking and Telecommunications  A switch makes a decision based on ingress and a destination port.  A LAN switch keeps a table that it uses to determine how to forward traffic through the switch.  Cisco LAN switches forward Ethernet frames based on the destination MAC address of the frames.
  • 17. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Dynamically Populating a Switch MAC Address Table  A switch must first learn which devices exist on each port before it can transmit a frame.  As a switch learns the relationship of ports to devices, it builds a table called a MAC address or content addressable memory (CAM) table.  CAM is a special type of memory used in high-speed searching applications.  The information in the MAC address table is used to send frames.  When a switch receives an incoming frame with a MAC address that is not found in the CAM table, it floods it to all ports, except the one that received the frame.
  • 18. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Switch Forwarding Methods
  • 19. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Store-and-Forward Switching  Allows the switch to:  Check for errors (via FCS check)  Perform automatic buffering  Slower forwarding process
  • 20. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Cut-Through Switching  Allows the switch to start forwarding in about 10 microseconds  No FCS check  No automatic buffering
  • 21. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Domains Collision Domains Ethernet switch port:  Operating in half duplex, each segment is in its own collision domain.  Operating in full duplex eliminates collisions.  By default, will auto- negotiate full duplex when the adjacent device can also operate in full duplex. Collision domain - Segment where devices compete to communicate.
  • 22. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Domains Broadcast Domains A broadcast domain is the extent of the network where a broadcast frame can be heard.  Switches forward broadcast frames to all ports; therefore, switches do not break broadcast domains.  All ports of a switch, with its default configuration, belong to the same broadcast domain.  If two or more switches are connected, broadcasts are forwarded to all ports of all switches, except for the port that originally received the broadcast.
  • 23. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Domains Alleviating Network Congestion Switches help alleviate network congestion by:  Facilitating the segmentation of a LAN into separate collision domains.  Providing full-duplex communication between devices.  Taking advantage of their high-port density.  Buffering large frames.  Employing high-speed ports.  Taking advantage of their fast internal switching process.  Having a low, per-port cost.
  • 24. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34 4.3 Chapter Summary
  • 25. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  The trend in networks is towards convergence using a single set of wires and devices to handle voice, video, and data transmission.  There has been a dramatic shift in the way businesses operate.  There are no physical offices or geographic boundaries constraints. Resources must now be seamlessly available anytime and anywhere.  The Cisco Borderless Network architecture enables different elements, from access switches to wireless access points, to work together and allow users to access resources from any place, at any time.  The traditional, three-layer hierarchical design model divides the network into core, distribution, and access layers, and allows each portion of the network to be optimized for specific functionality.  It provides modularity, resiliency, and flexibility, which provides a foundation that allows network designers to overlay security, mobility, and unified communication features.  Switches use either store-and-forward or cut-through switching.  Every port on a switch forms a separate collision domain allowing for extremely high- speed, full-duplex communication.  Switch ports do not block broadcasts and connecting switches can extend the size of the broadcast domain, often resulting in degraded network performance. Chapter Summary Summary
  • 26. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 27. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential