0% found this document useful (0 votes)
411 views84 pages

Pan African Enetwork Project Course: Bsc. (It) Subject: Lan Switching and Wireless Semester-Iv Faculty: Nitin Pandey

The document discusses LAN switching and wireless networking concepts. It covers switched LAN architecture and design principles for hierarchical networks. The benefits of using a hierarchical design include scalability, redundancy, performance, security, manageability and maintainability. Key aspects that are addressed include the functions of switches at different layers, considerations for selecting network switches, and configuring basic features and security on a switch.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
411 views84 pages

Pan African Enetwork Project Course: Bsc. (It) Subject: Lan Switching and Wireless Semester-Iv Faculty: Nitin Pandey

The document discusses LAN switching and wireless networking concepts. It covers switched LAN architecture and design principles for hierarchical networks. The benefits of using a hierarchical design include scalability, redundancy, performance, security, manageability and maintainability. Key aspects that are addressed include the functions of switches at different layers, considerations for selecting network switches, and configuring basic features and security on a switch.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 84

PAN African eNetwork

Project

Course: BSc.(IT)
Subject: LAN SWITCHING AND WIRELESS
Semester- IV

FACULTY : NITIN PANDEY

Chapter 1
Chapter 1

LAN Design

Chapter 1
Chapter 1
Switched LAN Architecture

Chapter 1
Switched LAN Architecture
When building a LAN that satisfies the needs of a
small or medium-sized business, your plan is more
likely to be successful if a hierarchical design
model is used.
Divided into discrete layers.
Each layer has a specific purpose.
Becomes modular – maintenance, performance.

Chapter 1
Chapter 1
Interfaces with end devices.
Routers, switches, bridges, wireless access points.
• Provides a means of connecting and controlling which
devices are allowed to communicate on the network.
Chapter 1
Aggregates (funnels) Access Layer traffic.
Controls traffic flow with security or routing policies.
Defines broadcast domains.
• Routing of VLANs (Virtual LANs).
Chapter 1
High speed backbone of the network.
Must be highly available and redundant.
• Must be capable of quickly forwarding large amounts of data.
• Smaller networks – collapsed model (Core and Distribution).

Chapter 1
Logical
Layout

Physical
Layout

Chapter 1
• Benefits of a Hierarchical Network
Benefits:
• Scalability
• Redundancy
• Performance
• Security
• Manageability
• Maintainability

Chapter 1
Scalability

Hierarchical Networks can be expanded easily.


Chapter 1
Redundancy

Redundancy at the core and distribution layers


ensure availability. Chapter 1
Performance

Link aggregation and high performance distribution and core


layer switches provide near-wire speed at all layers. Chapter 1
Security

Port security at the access layer and policies at the distribution


layer make the network more secure. Chapter 1
Manageability

Configurations

Additional Switch
Functionality
Rapid Recovery

Easier Troubleshooting

Consistency among switches at each layer makes


management more simple. Chapter 1
Maintainability

The modular design allows a network to scale easily without


becoming over-complicated or burdensome. Chapter 1
• Principles of Hierarchical Network Design
Just because a network is hierarchical, it doesn’t mean
it’s well designed.
• Network Diameter:
• The number of devices that a packet has to cross before it
reaches its destination.
• Bandwidth Aggregation:
• After the bandwidth requirements of the network are known,
links between specific switches can be aggregated or
combined to provide higher bandwidth.
• Redundancy:
• The practice of providing multiple paths to a destination or multiple
instances of a device.

Chapter 1
Chapter 1
Chapter 1
Chapter 1
• What is a Converged
Network?
A Converged Network is one
where voice and video
communications have been
combined on a single data
network.

Chapter 1
Chapter 1
Chapter 1
Matching Switches to
Specific LAN Functions
Traffic Flow Analysis

User Community Analysis

Data Stores and Data Servers Analysis

Topology
Switch Features Diagrams

Chapter 1
• Considerations for Network
Switches
Traffic Flow Analysis:
• The process of
measuring the
bandwidth usage
on a network and
analyzing the data.

• Performance tuning.
• Capacity planning.
• Hardware
improvement
decisions.

Chapter 1
Chapter 1
Chapter 1
Chapter 1
• Switch Features
Switch Form Factors:
• When selecting a switch, you need to decide
between
• Fixed configuration or modular configuration.
• Stackable or non-stackable.
• The switch form factor (physical size) is important
depending upon where the switch will be installed.
• Wiring closet with limited space.
• Computer room with free standing racks.
• Shelf in a central area.

Chapter 1
.

Chapter 1
• Switch Performance
Port Density:
• Port density is the number of ports available on a
single switch.

Chapter 1
24 Port

48 Port

Very high density.


Catalyst 6500 - 1,000 Ports
Chapter 1
• Switch Performance
Forwarding Rate:
• Defines the processing capabilities of a switch by rating
how much data the switch can process per second.
• If the switch forwarding rate is too low, it cannot
accommodate full wire-speed communication across all
of its switch ports.
• A 48 port Gigabit switch is capable of switching
48 Gigabits of traffic.

Chapter 1
• Switch Performance
Link Aggregation:
• As part of bandwidth aggregation, you should
determine if there are enough ports on a switch to
aggregate to support the required bandwidth.

Chapter 1
Chapter 1
• Switch Performance
Power over Ethernet (PoE):
• Allows the switch to deliver power to a device over
the existing Ethernet cabling.

Chapter 1
Adds considerable cost to the switch.
Chapter 1
Chapter 1
• Switch Features – Hierarchical Network

Access Layer Switch Features:


Distribution Layer Switch Features:
Core Layer Switch Features:

Chapter 1
Port Security Link Aggregation

VLANs
FastEthernet/Gigabit
PoE

Quality of Service (QoS)

Chapter 1
Layer 3 Support
Link Aggregation
High Forwarding Rate

Gigabit/10 Gigabit
Redundant Components

Quality of Service (QoS)


Security Policies

Chapter 1
Layer 3 Support
Link Aggregation
Very High Forwarding Rate

Gigabit/10 Gigabit
Redundant Components

Quality of Service (QoS)

Chapter 1
• Switches – Small and Medium Business (SMB)
Cisco has seven switch product lines. Each product line offers different
characteristics and features, allowing you to find the right switch to
meet the functional requirements of your network.
The Cisco switch product lines are:
• Catalyst Express 500
• Catalyst 2960
• Catalyst 3560
• Catalyst 3750
• Catalyst 4500
• Catalyst 4900
• Catalyst 6500

Chapter 1
Chapter 1
Chapter 1
Configure a Switch

LAN Switching and Wireless – Chapter 2

Chapter 1
Objectives

Summarize the operation of Ethernet as defined for


100/1000 Mbps LANs in the IEEE 802.3 standard.
Explain the functions that enable a switch to forward
Ethernet frames in a LAN.
Configure a switch for operation in a network designed to
support voice, video, and data transmissions.
Configure basic security on a switch that will operate in a
network designed to support voice, video, and data
transmissions.

Chapter 1
Chapter 1
Chapter 1
Describe the LAN design considerations to reduce
network latency

Chapter 1
Explain the Functions that Enable a Switch to
Forward Ethernet Frames in a LAN
Describe the switch forwarding methods

Chapter 1
Explain symmetric and asymmetric Switching

Chapter 1
Describe how memory buffering works

Chapter 1
Compare Layer 2 with Layer 3 switching

Chapter 1
Configure a Switch for Operation in a Network
Describe the Cisco IOS commands used to navigate the
command-line

Chapter 1
Describe the Cisco IOS help facilities

Chapter 1
Describe the Cisco IOS commands used to access the
command history

Chapter 1
Describe the boot sequence of a Cisco switch

Chapter 1
Describe how to prepare the switch to be configured

Chapter 1
Describe how to perform a basic switch configuration

Chapter 1
Describe how to verify the Cisco IOS configuration using
the Show command

Chapter 1
Describe how to manage the Cisco IOS configuration
files

Chapter 1
Configure Basic Security on a Switch

Describe the Cisco IOS commands used to configure


password options

Chapter 1
Describe the Cisco IOS commands used to configure a
login banner

Chapter 1
Describe the how to configure Telnet and SSH on a
switch

Chapter 1
Describe the key switch security attacks. The description
should include, MAC address flooding, spoofing attacks,
CDP attacks, and Telnet attacks

Chapter 1
Describe how network security tools are used to improve
network security

Chapter 1
Describe why you need to secure ports on a switch

Chapter 1
Describe the Cisco IOS commands used to disable
unused ports

Chapter 1
• Summary
LAN Design
Process that explains how a LAN is to be
implemented
Factors to consider in LAN design include
Collision domains
Broadcast domains
Network latency
LAN segmentation

Chapter 1
Switch forwarding methods
Store & forward – used by Cisco Catalyst switches
Cut through – 2 types
Cut through
Fast forwarding
Symmetric switching
Switching is conducted between ports that have the
same bandwidth
Asymmetric switching
Switching is conducted between ports that have unlike
bandwidth

Chapter 1
CISCO IOS CLI includes the following features
Built in help
Command history/options
Switch security
Password protection
Use of SSH for remote access
Port security

Chapter 1
1. Which three options correctly associate a layer of
hierarchical design model with it’s function? (choose
three)
a) Core- interface for end devices.
b) Distribution – traffic control & security policy.
c) Access- interface for end devices.
d) Distribution- high speed backbone.
e) Core- high speed backbone.
f) Access- implementation of security policies.

Chapter 1
2. With respect to network design what is convergence?

a) Implementation of standard equipment for LAN design.


b) Implementation of a core distribution access design
model for all side in an enterprise.
c) A point in the network where all traffic “converges”
before transmission to the destination ,normally the core
switch.
d) Combining conventional data with voice & video on a
common network.

Chapter 1
3. What factor may complicate user communities
analysis?

a) Application changes may radically affect predicted data


growth.
b) Server to server traffic may skew user port usage data.
c) Application usage is not always bound by department or
physical location.
d) Different organization application may share data
stores.

Chapter 1
4. What would be the port capacity of a single port on a 48-
port gigabit Ethernet switch ?

a) 48 gbps
b) 10 mbps
c) 1000 mbps
d) 100 mbps

Chapter 1
5. A switch that uses MAC addresses to forward frame
operates at which layer of OSI model ?

a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4

Chapter 1
6. What function is performed by Cisco access level
switch ?

a) Inter Vlan support.


b) Routing.
c) Providing POE.
d) Link aggregation.

Chapter 1
7. What does pressing Ctrl-P on the command line do?

a) Begin context checking.


b) Access symbolic translation .
c) Access the command history buffer .
d) Initiate command prompting.

Chapter 1
8. Which two tasks does auto negotiation in an Ethernet
network accomplish ?(choose two)

a) Sets the link speed.


b) Sets IP address.
c) Sets links duplex speed.
d) Sets Mac address assignment on switchport.
e) Sets the ring speed.

Chapter 1
9. Which term describes the time delay between a frame
being sent from a source device & received on a
destination device?

a) Bandwidth.
b) Latency.
c) Attenuation.
d) Time –to-live.
e) Frame checksum.

Chapter 1
10. What advantage does SSH offer over telnet when
remotely connecting to a device?

a) Encryption.
b) Username & Password authentication.
c) Connection oriented services.
d) More connection lines.

Chapter 1
THANK YOU
Please forward your query

To : [email protected]
Cc: [email protected]

Chapter 1

You might also like