PAN African eNetwork
Project
Course: BSc.(IT)
Subject: LAN SWITCHING AND WIRELESS
Semester- IV
FACULTY : NITIN PANDEY
Chapter 1
Chapter 1
LAN Design
Chapter 1
Chapter 1
Switched LAN Architecture
Chapter 1
Switched LAN Architecture
When building a LAN that satisfies the needs of a
small or medium-sized business, your plan is more
likely to be successful if a hierarchical design
model is used.
Divided into discrete layers.
Each layer has a specific purpose.
Becomes modular – maintenance, performance.
Chapter 1
Chapter 1
Interfaces with end devices.
Routers, switches, bridges, wireless access points.
• Provides a means of connecting and controlling which
devices are allowed to communicate on the network.
Chapter 1
Aggregates (funnels) Access Layer traffic.
Controls traffic flow with security or routing policies.
Defines broadcast domains.
• Routing of VLANs (Virtual LANs).
Chapter 1
High speed backbone of the network.
Must be highly available and redundant.
• Must be capable of quickly forwarding large amounts of data.
• Smaller networks – collapsed model (Core and Distribution).
Chapter 1
Logical
Layout
Physical
Layout
Chapter 1
• Benefits of a Hierarchical Network
Benefits:
• Scalability
• Redundancy
• Performance
• Security
• Manageability
• Maintainability
Chapter 1
Scalability
Hierarchical Networks can be expanded easily.
Chapter 1
Redundancy
Redundancy at the core and distribution layers
ensure availability. Chapter 1
Performance
Link aggregation and high performance distribution and core
layer switches provide near-wire speed at all layers. Chapter 1
Security
Port security at the access layer and policies at the distribution
layer make the network more secure. Chapter 1
Manageability
Configurations
Additional Switch
Functionality
Rapid Recovery
Easier Troubleshooting
Consistency among switches at each layer makes
management more simple. Chapter 1
Maintainability
The modular design allows a network to scale easily without
becoming over-complicated or burdensome. Chapter 1
• Principles of Hierarchical Network Design
Just because a network is hierarchical, it doesn’t mean
it’s well designed.
• Network Diameter:
• The number of devices that a packet has to cross before it
reaches its destination.
• Bandwidth Aggregation:
• After the bandwidth requirements of the network are known,
links between specific switches can be aggregated or
combined to provide higher bandwidth.
• Redundancy:
• The practice of providing multiple paths to a destination or multiple
instances of a device.
Chapter 1
Chapter 1
Chapter 1
Chapter 1
• What is a Converged
Network?
A Converged Network is one
where voice and video
communications have been
combined on a single data
network.
Chapter 1
Chapter 1
Chapter 1
Matching Switches to
Specific LAN Functions
Traffic Flow Analysis
User Community Analysis
Data Stores and Data Servers Analysis
Topology
Switch Features Diagrams
Chapter 1
• Considerations for Network
Switches
Traffic Flow Analysis:
• The process of
measuring the
bandwidth usage
on a network and
analyzing the data.
• Performance tuning.
• Capacity planning.
• Hardware
improvement
decisions.
Chapter 1
Chapter 1
Chapter 1
Chapter 1
• Switch Features
Switch Form Factors:
• When selecting a switch, you need to decide
between
• Fixed configuration or modular configuration.
• Stackable or non-stackable.
• The switch form factor (physical size) is important
depending upon where the switch will be installed.
• Wiring closet with limited space.
• Computer room with free standing racks.
• Shelf in a central area.
Chapter 1
.
Chapter 1
• Switch Performance
Port Density:
• Port density is the number of ports available on a
single switch.
Chapter 1
24 Port
48 Port
Very high density.
Catalyst 6500 - 1,000 Ports
Chapter 1
• Switch Performance
Forwarding Rate:
• Defines the processing capabilities of a switch by rating
how much data the switch can process per second.
• If the switch forwarding rate is too low, it cannot
accommodate full wire-speed communication across all
of its switch ports.
• A 48 port Gigabit switch is capable of switching
48 Gigabits of traffic.
Chapter 1
• Switch Performance
Link Aggregation:
• As part of bandwidth aggregation, you should
determine if there are enough ports on a switch to
aggregate to support the required bandwidth.
Chapter 1
Chapter 1
• Switch Performance
Power over Ethernet (PoE):
• Allows the switch to deliver power to a device over
the existing Ethernet cabling.
Chapter 1
Adds considerable cost to the switch.
Chapter 1
Chapter 1
• Switch Features – Hierarchical Network
Access Layer Switch Features:
Distribution Layer Switch Features:
Core Layer Switch Features:
Chapter 1
Port Security Link Aggregation
VLANs
FastEthernet/Gigabit
PoE
Quality of Service (QoS)
Chapter 1
Layer 3 Support
Link Aggregation
High Forwarding Rate
Gigabit/10 Gigabit
Redundant Components
Quality of Service (QoS)
Security Policies
Chapter 1
Layer 3 Support
Link Aggregation
Very High Forwarding Rate
Gigabit/10 Gigabit
Redundant Components
Quality of Service (QoS)
Chapter 1
• Switches – Small and Medium Business (SMB)
Cisco has seven switch product lines. Each product line offers different
characteristics and features, allowing you to find the right switch to
meet the functional requirements of your network.
The Cisco switch product lines are:
• Catalyst Express 500
• Catalyst 2960
• Catalyst 3560
• Catalyst 3750
• Catalyst 4500
• Catalyst 4900
• Catalyst 6500
Chapter 1
Chapter 1
Chapter 1
Configure a Switch
LAN Switching and Wireless – Chapter 2
Chapter 1
Objectives
Summarize the operation of Ethernet as defined for
100/1000 Mbps LANs in the IEEE 802.3 standard.
Explain the functions that enable a switch to forward
Ethernet frames in a LAN.
Configure a switch for operation in a network designed to
support voice, video, and data transmissions.
Configure basic security on a switch that will operate in a
network designed to support voice, video, and data
transmissions.
Chapter 1
Chapter 1
Chapter 1
Describe the LAN design considerations to reduce
network latency
Chapter 1
Explain the Functions that Enable a Switch to
Forward Ethernet Frames in a LAN
Describe the switch forwarding methods
Chapter 1
Explain symmetric and asymmetric Switching
Chapter 1
Describe how memory buffering works
Chapter 1
Compare Layer 2 with Layer 3 switching
Chapter 1
Configure a Switch for Operation in a Network
Describe the Cisco IOS commands used to navigate the
command-line
Chapter 1
Describe the Cisco IOS help facilities
Chapter 1
Describe the Cisco IOS commands used to access the
command history
Chapter 1
Describe the boot sequence of a Cisco switch
Chapter 1
Describe how to prepare the switch to be configured
Chapter 1
Describe how to perform a basic switch configuration
Chapter 1
Describe how to verify the Cisco IOS configuration using
the Show command
Chapter 1
Describe how to manage the Cisco IOS configuration
files
Chapter 1
Configure Basic Security on a Switch
Describe the Cisco IOS commands used to configure
password options
Chapter 1
Describe the Cisco IOS commands used to configure a
login banner
Chapter 1
Describe the how to configure Telnet and SSH on a
switch
Chapter 1
Describe the key switch security attacks. The description
should include, MAC address flooding, spoofing attacks,
CDP attacks, and Telnet attacks
Chapter 1
Describe how network security tools are used to improve
network security
Chapter 1
Describe why you need to secure ports on a switch
Chapter 1
Describe the Cisco IOS commands used to disable
unused ports
Chapter 1
• Summary
LAN Design
Process that explains how a LAN is to be
implemented
Factors to consider in LAN design include
Collision domains
Broadcast domains
Network latency
LAN segmentation
Chapter 1
Switch forwarding methods
Store & forward – used by Cisco Catalyst switches
Cut through – 2 types
Cut through
Fast forwarding
Symmetric switching
Switching is conducted between ports that have the
same bandwidth
Asymmetric switching
Switching is conducted between ports that have unlike
bandwidth
Chapter 1
CISCO IOS CLI includes the following features
Built in help
Command history/options
Switch security
Password protection
Use of SSH for remote access
Port security
Chapter 1
1. Which three options correctly associate a layer of
hierarchical design model with it’s function? (choose
three)
a) Core- interface for end devices.
b) Distribution – traffic control & security policy.
c) Access- interface for end devices.
d) Distribution- high speed backbone.
e) Core- high speed backbone.
f) Access- implementation of security policies.
Chapter 1
2. With respect to network design what is convergence?
a) Implementation of standard equipment for LAN design.
b) Implementation of a core distribution access design
model for all side in an enterprise.
c) A point in the network where all traffic “converges”
before transmission to the destination ,normally the core
switch.
d) Combining conventional data with voice & video on a
common network.
Chapter 1
3. What factor may complicate user communities
analysis?
a) Application changes may radically affect predicted data
growth.
b) Server to server traffic may skew user port usage data.
c) Application usage is not always bound by department or
physical location.
d) Different organization application may share data
stores.
Chapter 1
4. What would be the port capacity of a single port on a 48-
port gigabit Ethernet switch ?
a) 48 gbps
b) 10 mbps
c) 1000 mbps
d) 100 mbps
Chapter 1
5. A switch that uses MAC addresses to forward frame
operates at which layer of OSI model ?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
Chapter 1
6. What function is performed by Cisco access level
switch ?
a) Inter Vlan support.
b) Routing.
c) Providing POE.
d) Link aggregation.
Chapter 1
7. What does pressing Ctrl-P on the command line do?
a) Begin context checking.
b) Access symbolic translation .
c) Access the command history buffer .
d) Initiate command prompting.
Chapter 1
8. Which two tasks does auto negotiation in an Ethernet
network accomplish ?(choose two)
a) Sets the link speed.
b) Sets IP address.
c) Sets links duplex speed.
d) Sets Mac address assignment on switchport.
e) Sets the ring speed.
Chapter 1
9. Which term describes the time delay between a frame
being sent from a source device & received on a
destination device?
a) Bandwidth.
b) Latency.
c) Attenuation.
d) Time –to-live.
e) Frame checksum.
Chapter 1
10. What advantage does SSH offer over telnet when
remotely connecting to a device?
a) Encryption.
b) Username & Password authentication.
c) Connection oriented services.
d) More connection lines.
Chapter 1
THANK YOU
Please forward your query
To : [email protected]
Cc: [email protected]
Chapter 1