Configure a Switch

pogonotomyeyrarNetworking and Communications

Oct 26, 2013 (3 years and 7 months ago)

100 views

Configure a Switch

*

Industrial Engineering Faculty

System Information Program

2013

Computer Network / ISG2G4

*
LAN Switching and Wireless



Chapter 2 Cisco


Ethernet LAN considerations


Describe the key elements of Ethernet/802.3 networks


?

?

?

Ethernet LAN considerations


Describe the key elements of Ethernet/802.3 networks


Ethernet LAN considerations


Example

Step 1 : The Switch receives a broadcast frame from PC1 on Port 1

Ethernet LAN considerations


Example

Step 2 : The switch enters the source MAC address and the switch port that


received the frame into the MAC table

Ethernet LAN considerations


Example

Step 3 : Because the destination address is broadcast, the switch floods the


Frame to all ports, except the port on which it received the frame

Ethernet LAN considerations


Example

Step 4 : The destination device replies to the broadcast with a
unicast

frame


addressed to PC1.

Ethernet LAN considerations


Example

Step 5 : The switch enters the source MAC address of PC2 and port number


of the switch port that received the frame into the MAC table.


The destination address of the frame and its associated port is found


in the MAC table

Ethernet LAN considerations


Example

Step 6 : The switch can now forward frames between source and destination


devices without flooding, because it has entries in the table that


identify the associated port.

What Is Collision Domain And
Broadcast Domain?

Where is BC Domain and CL Domain

Illustration Collision Domain

Switch Forward Method


Switches use two main forwarding
methods for switching data between
network ports:


store
-
and
-
forward


cut
-
through switching

Comparison

store
-
and
-
forward (1/6)

store
-
and
-
forward (2/6)

store
-
and
-
forward (3/6)

store
-
and
-
forward (4/6)

store
-
and
-
forward (5/6)

store
-
and
-
forward (6/6)

cut
-
through switching (1/3)

cut
-
through switching (2/3)

cut
-
through switching (3/3)

Discussion

List the advantages and disadvantages of
both store and forward switching and cut
-
through switching.

memory buffering


Please divide the class into 2 groups


Discussion about the two types of memory
buffering are port
-
based and shared
memory


Discussion about Layer 3 Switching and
Router Comparison



memory buffering

Layer 3 Switching and Router Comparison

Basic Switch Configuration


Command Line Interface (CLI)


GUI alternatives to the CLI


managing the MAC address table

Cisco Network Assistant

http://www.cisco.com/en/US/products/ps5931/index.html

Cisco View

Cisco View

SNMP Network Management


Switch Security Issues


Much of a network professional’s time will
be spent securing the network.


Once the basic configuration is quality of
service (
QoS
) and security.


Homework


Discuss five types of security attacks :




MAC address flooding




DHCP spoofing




DHCP starvation




CDP attack




Telnet attack

MAC address flooding is a common attack (1/5)

MAC address flooding is a common attack (2/5)

MAC address flooding is a common attack (3/5)

MAC address flooding is a common attack (4/5)

MAC address flooding is a common attack (5/5)

Pengukuran level daya sinyal

Thank You

Thank you very much for your kind attention