Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Switching in An Enterprise Network

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 42

Switching in an

Enterprise Network

Introducing Routing and Switching in the Enterprise


Chapter 3

Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
Compare the types of switches used in an enterprise
network.
Explain how Spanning Tree Protocol prevents
switching loops.
Describe and configure VLANs on a Cisco switch.
Describe and configure trunking and Inter-VLAN
routing.
Maintain VLANs in an enterprise network.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2


Compare the Types of Switches Used in an
Enterprise Network
Switching and network segmentation
Content addressable memory (CAM)
Virtual circuits

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3


Compare the Types of Switches Used in an
Enterprise Network
Hardware-based Layer 2 switching
Software-based Layer-3 (multilayer) switching

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4


Compare the Types of Switches Used in an
Enterprise Network
Store and forward switching
Cut-through switching
Fast-forward
Fragment-free

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5


Store and forward switching

Entire frame is read and stored in memory before being sent


to the destination device.
The switch checks the cyclic redundancy check (CRC) value.
CRC value is located within the frame check sequence (FCS)
field of an Ethernet frame.
Highest amount of latency
Typically only used in environments where errors are likely to
occur, such as environments that have a high probability of
EMI.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6


Cut-through switching: Fast-forward

Fastest method of switching.


The switch forwards the frames out the destination port
as soon as it reads the destination MAC address.
This method has the lowest latency
Forwards collision fragments and damaged frames.
Best in a stable network with few errors.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7


Cut-through switching: Fragment-Free

Switch reads first 64 bytes of the frame before it begins


to forward it out the destination port.
The shortest valid Ethernet frame is 64 bytes.
Smaller frames are usually the result of a collision and
are called runts.
Checking the first 64 bytes ensures that the switch
does not forward collision fragments.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8


Current Cisco Switch

Most Cisco LAN switches rely on the store-and-forward


method for switching.
Newer technology and faster processing times,
switches are able to store and process the frames
almost as quickly as cut-through switching, without the
issue of errors.
Higher end features, such as multilayer switching,
require the use of the store-and-forward method.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9


Adaptive Cut-through Switching
Switches that can adapt their switching method to changing network
conditions.
Begin by forwarding traffic using the fast-forward method
Recognized the errors and stores an error counter in memory.
It compares the number of errors found to a predefined threshold value.
If the number of errors exceeds the threshold value the switch modifies
itself to perform store and forward switching.
If the number of errors drops back below the threshold, the switch
reverts back to fast-forward mode.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10


Compare the Types of Switches Used in an
Enterprise Network
Switch physical security
Switch access security

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11


Switch Basic Security

Physically secure the device


Use secure passwords
Enable SSH access
Monitor access and traffic
Disable http access
Disable unused ports
Enable port security
Disable Telnet

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12


Explain How Spanning Tree Protocol Prevents
Switching Loops
Redundancy in network equipment
Redundant network links
Dangers of switching loops
Broadcast storms

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13


Redundancy
Two different pathways to
a particular destination.
Examples of redundancy
in non-networking
2 roads into a town
2 bridges to cross a river
2 two doors to exit a building

If one way is blocked,


another is still available.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14


Switch Redundancy

Connecting switch with multiple links


Redundant links in a switched network reduce congestion
and support high availability and load balancing.
Disadvantages : Creates switching loops.
The broadcast frames go around and around in all
directions, causing a broadcast storm.
Broadcast storms use up all of the available bandwidth
Existing network connections to be dropped

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15


Unicast frame problem

Multiple frame transmissions


MAC database instability.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16


Multiple frame transmissions
A host sends a unicast frame to a destination host
No destination MAC address in Switch MAC table
Switch floods the frame out all ports.
In a looped network, the frame could be sent back to the initial switch
Process repeats, creating multiple copies of the frame
Destination host receives multiple copies of the frame.
This causes
wasted bandwidth
wasted CPU time
duplication of transaction traffic.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17


MAC database instability

Switches learn the wrong information about the location


of a host.
If a loop exists, one switch may associate the
destination MAC address with two separate ports.
This causes confusion and suboptimal of frame
forwarding.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18


How Spanning Tree Protocol Prevents
Switching Loops
Create a loop-free logical topology
STP is an open standard protocol
Potential loop detection and port blocking
Redundancy without switching loops

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19


How STP prevent switching loops

Forces certain interfaces into a standby or blocked


state
Leaves other interfaces in a forwarding state
Reconfigures the network by activating the appropriate
standby path, if the forwarding path becomes
unavailable

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20


Root Bridge

Primary switch or focal point in the STP topology.


The root bridge communicates with the other switches using
Bridge Protocol Data Units (BPDUs).
BPDUs are frames that multicast every 2 seconds to all other
switches.
BPDUs contain information such as:
Identity of the source switch
Identity of the source port
Cumulative cost of path to root bridge

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21


How Spanning Tree Protocol Prevents
Switching Loops
Determining a root bridge
Bridge ID (BID)
Root ports, designated ports, and blocked ports

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22


STP switch port states

Blocking
Listening
Learning
Forwarding
Disabled

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23


STP Stage

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24


Explain How Spanning Tree Protocol Prevents
Switching Loops
STP recalculations
Minimizing downtime
PortFast
UplinkFast
BackboneFast

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25


Explain How Spanning Tree Protocol Prevents
Switching Loops

Spanning-tree verification commands

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26


Explain How Spanning Tree Protocol Prevents
Switching Loops
Rapid Spanning Tree Protocol
Discarding
Active topology

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27


Describe and Configure VLANs on a Cisco
Switch
Virtual LANs
Logical networks
Broadcast control
Transparent to end-users

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28


Describe and Configure VLANs on a Cisco
Switch

VLAN functions
VLAN membership
Static
Dynamic

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29


Describe and Configure VLANs on a Cisco
Switch
VLAN 1: management VLAN
VLAN numbers and names
Port assignment

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30


Describe and Configure VLANs on a Cisco
Switch
VLAN verification commands
Deleting a VLAN
Removing a port from a VLAN

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 31


Describe and Configure VLANs on a Cisco
Switch
VLAN ID
Frame tagging: IEEE 802.1Q

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 32


Describe and Configure Trunking and Inter-
VLAN Routing
Trunk port characteristics
Point-to-point link
Carry multiple-VLAN traffic over single link

Support for frame tagging


Trunk modes

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 33


Describe and Configure Trunking and Inter-
VLAN Routing
Extending VLANs across switches
Configuring a native VLAN

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 34


Describe and Configure Trunking and Inter-
VLAN Routing
Connectivity between different VLANs
Subinterfaces
Router-on-a-stick

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 35


Maintain VLAN Structure on an Enterprise
Network
VLAN Trunking Protocol (VTP) purpose and goals
Management domain
VTP modes: server, client, transparent
VLAN database
Configuration revision number

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 36


Maintain VLAN Structure on an Enterprise
Network

VTP messages
Summary advertisements
Subset advertisements
Advertisement requests

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 37


Maintain VLAN Structure on an Enterprise
Network
Configuring VTP
Verifying VTP configuration

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 38


Maintain VLAN Structure on an Enterprise
Network
VLANs and IP phones
VLANs and wireless security

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 39


Maintain VLAN Structure on an Enterprise
Network
VLAN best practices
VLAN security

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 40


Summary
Switches forward traffic using store and forward or cut-through
techniques
Basic security features should be applied to switches
A VLAN is a way to group hosts on the same logical network even
though they may be physically separated
Frame tagging allows a switch to identify the source VLAN of an
Ethernet frame.
A Layer 3 device is needed to move traffic between different
VLANs.
Subinterfaces allow router interfaces to support multiple VLANs.
VLAN Trunking Protocol provides centralized control, distribution
and maintenance of VLANs.

2006 Cisco Systems, Inc. All rights reserved. Cisco Public 41


2006 Cisco Systems, Inc. All rights reserved. Cisco Public 42

You might also like