Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers
|
|
- Louise Thornton
- 6 years ago
- Views:
Transcription
1 Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers
2 Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich port a given MAC address is on?
3 Learning sitches Incoming frames ith unrecognied destinations are flooded to all ports - The frame's source MAC address is associated ith the incoming sitch port» This is the learning part Incoming frames destined for recognied MAC addresses are forarded onl to the associated port Flash animation: - montcs.bloomu.edu/netorking/simulations/sitchsi mulation.sf
4 Learning Sitches - initial 0 A B 2 5 Initiall, sitches A and B do not kno ho is attached here.
5 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /1/data 2 A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4
6 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /1/data A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4
7 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /1/data 5/1/data A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 5/1/data 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4
8 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5/1/data 5 3 5/1/data 5/1/data 4
9 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 0/5/data 4
10 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 0/5/data 5 3 4
11 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 0/5/data 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 0/5/data 4 0/5/data
12 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port. 0 0/5/data 1 2 0/5/data 0/5/data A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4
13 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port. 0 5/1/data 1 2 A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4
14 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /1/data A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4
15 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5/1/data 5 3 4
16 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 5/1/data 4
17 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port. 0 1/0/data 1 2 A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4
18 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /0/data A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4
19 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /0/data 2 A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4
20 Learning Sitches eample all steps 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4
21 Learning Sitches Summar Frames destined for unrecognied destinations are flooded to all ports Frames hose destinations are knon get forarded onl to the proper port - Broadcast frames alas flooded Frame source MACs are learned as the frames arrive at the sitch Dnamic process nel-connected nodes are learned henever the begin transmitting
22 Bridge Loops, Broadcast Storms, and the Spanning Tree Algorithm Dealing ith redundant pathas through the LAN
23 A Reason For Multiple Paths In this netork, the backbone and distribution sitches are doubled, for redundanc. One path should be preferred, until it becomes unavailable. Then another path should take over.
24 Topologies revisited "Core-Distribution- Access" topolog in enterprise netorks - "Fat-tree" model Higher-level links have higher bandidths "Leaf-Spine" topolog in data centers provides multiple paths beteen leaf nodes - Multiple paths can/should be used, for better performance
25 The Problem: Bridge Loops What is the proper path from PC1 to the Web Server? When started, sitches forard frames to all ports. Broadcast frames must be forarded to all other ports. This can result in frames looping endlessl beteen sitches.
26 Bridge Loops and Broadcast Storms PC1 sends an "ho-has" frame, to find the Web Server queries must be broadcast, so sitches ill flood them out
27 Broadcast Storm: 1 Access sitch floods the frame out to both Distribution sitches
28 Broadcast Storm: 2a Each Distribution sitch floods out the received frame - to both Backbone sitches - back to the other Access sitch
29 Broadcast Storm: 2b Backbone sitches and Access sitch each receive to copies of the frame - don't kno the're the same frame Each sitch must flood out both copies
30 Broadcast Storm: 3a Backbone sitches echange copies of the frames, hile flooding them to the Distribution sitches Other Access sitch floods frames back - Distribution sitches - (other
31 Broadcast Storm: 3b Backbone sitches have to ne copies to flood out Distribution sitches receive three or four copies, ill flood out each cop PC2 gets to copies - ignores them
32 Broadcast Storm: ad infinitum Backbone sitches keep echoing frames beteen themselves, hile receiving more copies from the Distribution sitches Distribution, Access sitches do the same
33 Broadcast Storm: result Within seconds, the netork is overhelmed ith copies of the frame No other traffic can get through Turn it all off, and start over
34 One Solution: the Spanning Tree Algorithm Algorithm b Radia Perlman Select a root sitch Determine shortest paths via the root Block (don t forard onto) ports that aren t on the shortest path Onl one path beteen leaf nodes is in use at an one time - some phsical capacit is under-used
35 Spanning Tree standards Spanning Tree Protocol (STP) , developed b Digital Equipment Corp. IEEE 802.1D part of Logical Link Control sublaer - not compatible ith DEC's STP - IEEE Rapid Spanning Tree Protocol» Faster identification of shortest paths - IEEE 802.1s Multiple Spanning Tree Protocol» used ith Virtual LANs (VLANs)
36 802.1D high points Bridges (sitches) echange Bridge Protocol Data Unit (BPDU) frames - repeated ever to seconds These contain Bridge IDs - similar to MAC address - also includes a priorit value» often a constant, and equal, default value Loest bridge ID becomes root bridge Other bridges identif shortest paths to/from the root bridge
37 Sitches and STP States 1. Blocking state - Startup state for all ports - process BPDUs to determine root port, designated ports - Also applied to ports that aren't on a shortest-path-to-root 2. Listening state - process BPDUs, verif no bridge loops; no forarding 3. Learning state - process user frames (but don't forard), update MAC address table 4. Forarding state - process user frames and forard them based on MAC address table Disable state - Sitch ports turned off b administrator
38 Spanning Tree Simulation, from Cisco Sstems This Flash animation shos three sitches negotiating the proper paths. - Web Link: montcs.bloomu.edu/netorking/simulations/ Cisco/spanning_tree1.sf
39 TRILL and SPB protocols alternatives to STP Adapt laer-3 routing algorithms to laer-2 connections Multiple pathas used simultaneousl, but no bridge loops - improved link utiliation, better performance TRILL "Transparent Interconnection of Lots of Links" - RFC 6325, developed b Radia Perlman SPB "Shortest Path Bridging" - IEEE-802.1aq, adopted March 2012
40 Cisco's vie of SPB SPBV SPB for VLANs SPBM SPB for MACs
41 Avaa Netorks SPBm and SPB headers
42 Bridge Loops Summar Redundant links beteen sitches - Fault tolerance - Can cause bridge loops Spanning Tree algorithms - STP, 802.1D turn off some sitch ports to interrupt bridge loops - RSTP finds shortest paths more quickl - MSTP VLAN support TRILL, SPB protocols - Allo use of all links for high performance
43 Finding Neighbors on the LAN three supporting protocols at Laer 2
44 Finding LAN neighbors Netork nodes can discover neighbors b broadcasting frames and listening for replies Open, proprietar protocols - LLDP specified b IEEE 802.1ab» Link-Laer Discover Protocol - CDP Cisco sitches and routers» Cisco Discover Protocol - LLTD Microsoft Windos 7 / Vista / 8 / 10» Link-Laer Topolog Discover
45 Neighbor discover protocols Laer-2 "applications" information carried directl in Ethernet frames - No IP addresses or laer-3 protocols involved
46 Running a discover protocol CDP is enabled b default on Cisco equipment - proprietar - intended for routers and sitches LLTD is Microsoft-proprietar - source code for Linu client released, but then removed again LLDP can be enabled on Cisco gear, is available on Windos 8 and 10, and can be installed on Linu and Windos 7
47 CDP Cisco sitches and routers Small netork simulated in GNS3 CDP report for router R1 - shos hat is connected, to hich port
48 LLTD Windos 7 displa of LAN The Win7 node discovered a WinXP neighbor and a Win10 neighbor The sitch/hub/gatea topolog is all virtual
49 LLDP neighbor discover from Linu
50 Neighbor Discover Protocols Summar LLTD - Proprietar, Microsoft-oriented; comple protocol - Focused on client sstems - Broadcasts frames hen map is requested CDP - Proprietar, Cisco-onl - Identifies netorking nodes (sitches, routers) - Broadcasts frames periodicall LLDP - Open standard Linu, Cisco, Windos - Identifies an sstem that supports it - Broadcasts frames periodicall
Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski
Internet Technolog 08. Routing Paul Kranoski Rutgers Universit Spring 06 March, 06 CS 0-06 Paul Kranoski Routing algorithm goal st hop router = source router last hop router = destination router router
More informationImplement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5
Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of redundancy in a converged
More informationSpanning-Tree Protocol
Spanning-Tree Protocol Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Redundancy in a converged network Spanning-Tree Protocol (STP) STP Operation
More informationTraditional network management methods have typically
Advanced Configuration for the Dell PowerConnect 5316M Blade Server Chassis Switch By Surendra Bhat Saurabh Mallik Enterprises can take advantage of advanced configuration options for the Dell PowerConnect
More informationChapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1
Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationCampus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs
Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more
More informationTransparent Bridging and VLAN
Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.
More informationConfiguring STP. Understanding Spanning-Tree Features CHAPTER
CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol
More informationNetwork-Level High Availability
This chapter describes Cisco NX-OS network high availability and includes the following sections: Information About, page 1 Licensing Requirements, page 2 Spanning Tree Protocol, page 2 Virtual Port Channels,
More informationObjectives. 1. Introduction:
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Advance Networks Laboratory 0907529 Exp.5 Spanning-Tree Protocol (STP) Objectives 1. Explain the role of redundancy
More informationThe Spanning Tree Protocol
Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description
More informationImplementing Spanning Tree Protocol
Transparent Bridging Implementing Spanning Tree Protocol A switch has the same characteristics as a transparent bridge., Cisco Systems, Inc. All rights reserved. 2-1, Cisco Systems, Inc. All rights reserved.
More informationEIGRP Features and Operation
EIGRP Features and Operation Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol. EIGRP is a Cisco proprietary protocol. EIGRP includes the subnet mask in its route updates. And as
More informationIndex. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54
Index Numerics 802.1p priority (QoS) 802.1Q VLAN standard 5-7 802.1w as a region 5-54 A active path 5-5 address IP 7-8 advertisement 3-3 applicable products 1-ii ARP age setting 7-10 cache 7-4 cache table
More informationSpanning Tree Protocol(STP)
Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create
More information4.5 Routing Algorithms
4.5 ROUTING ALGORITHMS 363 to hosts enjo the securit services provided b IPsec. On the sending side, the transport laer passes a segment to IPsec. IPsec then encrpts the segment, appends additional securit
More informationComputer Networks. Routing
Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding
More informationChapter 4: Network Layer
Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,
More informationQuestion No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration?
Volume: 629 Questions Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration? A. Root switch B. Slave switch C. Non-root switch
More informationIntroduction to OSPF
Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license
More informationConfiguring Rapid PVST+ Using NX-OS
Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:
More informationInterplay between routing, forwarding
Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state
More informationConfiguring STP and RSTP
7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains
More informationConfiguring Rapid PVST+
This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco
More informationManual:Interface/Bridge - MikroTik Wiki
1 of 14 3/22/2015 11:57 AM Manual:Interface/Bridge From MikroTik Wiki < Manual:Interface Summary Ethernet-like networks (Ethernet, Ethernet over IP, IEEE802.11 in ap-bridge or bridge mode, WDS, VLAN) can
More informationConfiguring MLD Snooping
This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 5 Displaying
More information3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)
3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist
More informationCloud networking (VITMMA02) DC network topology, Ethernet extensions
Cloud networking (VITMMA02) DC network topology, Ethernet extensions Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering and Informatics Budapest
More informationConfiguring Rapid PVST+
This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the
More informationJN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee
JN0-343 Q&As Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee
More information802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP)
13 802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) Contents Overview.................................................... 13-2 How Spanning Tree Operates.................................
More informationChapter 4 Configuring Switching
Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined
More informationNetwork layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction
Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines
More informationFigure 7-1 Unicast Static FDB window
7. Layer 2 Features FDB VLAN Spanning Tree Loopback Detection Link Aggregation L2 Multicast Control LLDP FDB Static FDB Unicast Static FDB This window is used to view and configure the static unicast forwarding
More informationMaintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking
Maintaining Specific VLAN Identification Specifically developed for multi-vlan interswitch communications Places a unique identifier in each frame Functions at Layer 2 2003, Cisco Systems, Inc. All rights
More informationEnd-to-end path: route
Multi-hop Wireless Netorks CMU CS 15-829: Internet-Scale Sensor Sstems Overvie: Large-Scale Wireless Sstems Small-Scale: Ho to build single-hop ireless LAN; ho to make TCP perform ell over it Large-Scale:
More informationConfiguring MLD Snooping
This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 6 Displaying
More informationNetwork+ Guide to Networks 7 th Edition
Network+ Guide to Networks 7 th Edition Chapter 10 Network Segmentation and Virtualization 2016 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in
More informationLayer 2 Engineering Spanning Tree
Layer 2 Engineering Spanning Tree Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationCS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee
Lecture (06) STP (I) By: Dr. Ahmed ElShafee CS IT Problem statement If your network consists of layer 2 switches that allow computers connect and exchange data, you will need to consider the design that
More informationConfiguring Optional Spanning-Tree Features
CHAPTER 20 This chapter describes how to configure optional spanning-tree features on the Catalyst 3750-E or 3560-E switch. You can configure all of these features when your switch is running the per-vlan
More informationVLANs Level 3 Unit 9 Computer Networks
VLANs Some Requirements of LANs Need to split up broadcast domains to make good use of bandwidth People in different departments may need to be grouped together for access to servers Security: restrict
More informationDD2490 p Layer 2 networking. Olof Hagsand KTH CSC
DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges
More informationFlooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding
Roting: Otlook Flooding Flooding Link-State: complete, global knoledge Distance-Vector: iteratie, distribted calclation Goal: To distribte a packet in the hole netork (i.e. to realie a netork-ide broadcast)
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 9 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN membership modes, VLAN configuration
More informationConfiguring VLANs. Understanding VLANs CHAPTER
7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN
More informationChapter 3 Reading Organizer
Name Date Chapter 3 Reading Organizer After completion of this chapter, you should be able to: 3.1 Compare the types of switches used in an enterprise network. Explain how Spanning Tree Protocol prevents
More informationHubs. twisted pair. hub. 5: DataLink Layer 5-1
Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 1 Two notes on routing algorithm Do not believe ou can understand an routing protocol, e.g.,
More informationTroubleshooting Transparent Bridging Environments
CHAPTER Troubleshooting Transparent Bridging Environments Transparent bridges were first developed at Digital Equipment Corporation (Digital) in the early 1980s and are now very popular in Ethernet/IEEE
More informationOverview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.
This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across
More information3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?
Nguyen The Nhat - Take Exam Exam questions Time remaining: 00: 00: 51 1. Which command will give the user TECH privileged-mode access after authentication with the server? username name privilege level
More informationRBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING
1 RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING Donald E. Eastlake 3 rd donald.eastlake@stellarswitches.com CONTENTS Introduction Ethernet and Spanning Tree RBridge Features TRILL Encapsulation
More informationCSE 461: Bridging LANs. Last Topic
CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access
More informationSpanning Tree Protocol
For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1
More informationNetWare Link-Services Protocol
44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell
More informationCopyright 2014 CertificationKits LLC. All Rights Reserved. 2
Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Spanning Tree Protocol is a bridge protocol that enables a learning bridge to dynamically work around loops in a network topology by creating
More informationRBRIDGES/TRILL. Donald Eastlake 3 rd Stellar Switches AND IS-IS.
RBRIDGES/TRILL AND IS-IS 1 Donald Eastlake 3 rd donald.eastlake@stellarswitches.com, +1-508-333-2270 Stellar Switches CAVEATS The base protocol specification may change: It is currently in TRILL WG Last
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information
More informationCCNA 3 (v v6.0) Chapter 3 Exam Answers % Full
CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-3-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers
More informationThe multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.
CHAPTER 18 This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the IE 3010 switch. Note The multiple spanning-tree (MST) implementation is based on
More information11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions:
Chapter 5: outline 5. introduction 5.2 routing protocols link state distance vector 5.3 intra-as routing in the Internet 5.4 inter-as routing: BGP 5.5 The SDN control 5.6 ICMP: The Internet Control Message
More informationChapter 5: STP. * What is STP? How does STP work?
Chapter 5: STP * What is STP? How does STP work? * What would be the worst case scenario that could happen to a redundant path switched network with the STP is disabled? When multiple paths exist between
More informationPASS4TEST IT 인증시험덤프전문사이트
PASS4TEST IT 인증시험덤프전문사이트 http://www.pass4test.net 일년동안무료업데이트 Exam : 640-802 Title : Cisco Certified Network Associate(CCNA) Vendors : Cisco Version : DEMO 1 / 10 Get Latest & Valid 640-802 Exam's Question
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationSpanning-Tree Protocol
Spanning-Tree Protocol Agenda» What Problem is Solved by STP?» Understanding STP Root Bridge Election» BPDU Details and Pathcost» Understanding STP Root and Designated Port Election» Understanding and
More informationConfiguring IEEE 802.1Q and Layer 2 Protocol Tunneling
CHAPTER 8 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the same security,
More informationBridging and Switching. Karst Koymans. Monday, February 17, 2014
.. Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 3.7, 2014/02/19 19:50:51) Monday, February 17, 2014 Karst Koymans (UvA) Layer 2 Monday, February 17,
More informationConfiguring Transparent Bridging
Configuring Transparent Bridging Document ID: 10676 Contents Introduction Before You Begin Conventions Prerequisites Components Used Bridging Transparent Bridging Configuration Examples Example 1: Simple
More informationConfiguring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling
9 CHAPTER Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the
More informationComputer Networking. December 2004 CEN CN
Computer Networking CEN CN 1 Layer 2 - Bridge Frame Header Data Bridge Trailer Data Link Layer Physical Layer More complex than repeat, it requires hardware and software Bridges have diminished because
More informationLecture 9: Switched Ethernet Features: STP and VLANs
Lecture 9: Switched Ethernet Features: STP and VLANs Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Ethernet Switch Features The following features
More information4th Slide Set Computer Networks
Prof. Dr. Christian Baun 4th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/29 4th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences
More informationChapter 6 Connecting Device
Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks
More informationHUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date
HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by
More informationUnderstanding Issues Related to Inter VLAN Bridging
Understanding Issues Related to Inter VLAN Bridging Document ID: 11072 Contents Introduction Prerequisites Requirements Components Used Conventions Spanning Tree Topology Concerns Recommended Use of Hierarchical
More informationRedundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)
Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 10 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More informationCommunication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4
More informationThe fundamentals of Ethernet!
Building Ethernet Connectivity Services for Provider Networks" " Eduard Bonada i Cruells" Tesi Doctoral UPF / 2012 Dirigida per Dra. Dolors Sala i Batlle Departament de Tecnologies de la Informació i les
More informationVLAN Configuration. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership
More informationTable of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP
Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 18.4, 2018/11/16 13:23:04) Friday, November 16, 2018 Bridge loops Two bridges
More informationCisco CCNA (ICND1, ICND2) Bootcamp
Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills
More informationLayer 2. Bridging and Switching. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.4, 2017/02/15 12:07:08)
Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 16.4, 2017/02/15 12:07:08) Friday, February 17, 2017 Karst Koymans (UvA) Layer 2 Friday, February 17,
More informationA. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah).
Volume: 245 Questions Question No: 1 Which of the following statements best describes ARPANET? A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara,
More information4 Spanning Tree Protokoll 802.1D-2004
Computernetze 1 (CN1) 4 Spanning Tree Protokoll 82.1D-24 Prof. Dr. Andreas Steffen Institute for Information Technologies and Applications Steffen/Stettler, 6.1.213, 4-SpanningTree.pptx 1 What happens
More informationConfiguring Spanning Tree Protocol
CHAPTER 7 This chapter descibes how to configure Spanning Tree Protocol (STP) on the Cisco wireless mobile interface card (WMIC). Note For complete syntax and usage information for the commands used in
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 16 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 2950 or Catalyst 2955 switch. It includes information
More information1 GSW Bridging and Switching
1 Sandwiched between the physical and media access layers of local area networking (such as Ethernet) and the routeing of the Internet layer of the IP protocol, lies the thorny subject of bridges. Bridges
More informationData Communications. Connecting Devices
Data Communications Connecting Devices Connecting Devices Networks do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, or segments of LANs, we use
More informationSPANNING TREE PROTOCOL GUIDE FOR ARAKNIS NETWORKS EQUIPMENT
Contents (Click to Navigate) SPANNING TREE PROTOCOL GUIDE FOR ARAKNIS NETWORKS EQUIPMENT 1 - Find, Fix, and Prevent STP Issues 2 2 - How STP Works 3 3 - Araknis Equipment & STP 4 4 - DirecTV STP Issues
More informationCCNA Routing and Switching Study Guide Chapters 1 & 15: Enhanced Switching
CCNA Routing and Switching Study Guide Chapters 1 & 15: Enhanced Switching Instructor & Todd Lammle Chapter 15 Objectives The ICND2 topics covered in this chapter include: 2 Chapter 15 Objectives (con
More informationImproving Reliability in Ethernet Control Networks
Tech Tips Improving Reliability in Ethernet Control Networks SUMMARY The proliferation of Ethernet-enabled devices on the factory floor from PLCs to modules all the way down to sensors in support of the
More informationConfiguring BPDU tunneling
Contents Configuring BPDU tunneling 1 Introduction to BPDU tunneling 1 Background 1 BPDU Tunneling implementation 2 Configuring BPDU tunneling 3 Configuration prerequisites 3 Enabling BPDU tunneling for
More informationTroubleshooting Transparent Bridging Environments
Troubleshooting Transparent Bridging Environments Document ID: 10543 This information from the Internetwork Troubleshooting Guide was first posted on CCO here. As a service to our customers, selected chapters
More informationArhitecturi și Protocoale de Comunicații (APC) Rețele locale (I)
Arhitecturi și Protocoale de Comunicații (APC) Rețele locale (I) Outline Shared media LANs Classes of (MAC) protocols, standards. CSMA/CD (Ethernet). Bridged/Switched LANs Types of bridges, standards.
More informationNetwork Layer: Routing
Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More information