Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Size: px
Start display at page:

Download "Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers"

Transcription

1 Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers

2 Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich port a given MAC address is on?

3 Learning sitches Incoming frames ith unrecognied destinations are flooded to all ports - The frame's source MAC address is associated ith the incoming sitch port» This is the learning part Incoming frames destined for recognied MAC addresses are forarded onl to the associated port Flash animation: - montcs.bloomu.edu/netorking/simulations/sitchsi mulation.sf

4 Learning Sitches - initial 0 A B 2 5 Initiall, sitches A and B do not kno ho is attached here.

5 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /1/data 2 A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4

6 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /1/data A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4

7 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /1/data 5/1/data A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 5/1/data 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4

8 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5/1/data 5 3 5/1/data 5/1/data 4

9 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 0/5/data 4

10 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 0/5/data 5 3 4

11 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 0/5/data 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 0/5/data 4 0/5/data

12 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port. 0 0/5/data 1 2 0/5/data 0/5/data A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4

13 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port. 0 5/1/data 1 2 A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4

14 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /1/data A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4

15 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5/1/data 5 3 4

16 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 5/1/data 4

17 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port. 0 1/0/data 1 2 A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4

18 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /0/data A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4

19 Learning Sitches eample 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port /0/data 2 A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4

20 Learning Sitches eample all steps 1. Node 1 builds frame to send to node Node 1 transmits frame to sitch A. 3. Sitch A floods frame to node 0, node 2, and sitch B. a. Sitch A associates MAC address 1 ith its port. 4. Sitch B floods frame to node 3, node 4, and node 5. a. Sitch B associates MAC address 1 ith its port. 5. Node 5 builds frame to send to node Node 5 transmits frame to sitch B. 7. Sitch B floods frame to node 3, node 4, and sitch A. a. Sitch B associates MAC address 5 ith its port. 8. Sitch A floods frame to node 0, node 1, and node 2. a. Sitch A associates MAC address 5 ith its port A 9. Node 1 builds another frame to send to node Node 1 transmits frame to sitch A. 11. Sitch A forards frame to its port. 12. Sitch B forards frame to its port. 13. Node 0 builds frame to send to node Node 0 transmits frame to sitch A. 15. Sitch A forards frame to its port. a. Sitch A associates MAC address 0 ith its port. B 5 3 4

21 Learning Sitches Summar Frames destined for unrecognied destinations are flooded to all ports Frames hose destinations are knon get forarded onl to the proper port - Broadcast frames alas flooded Frame source MACs are learned as the frames arrive at the sitch Dnamic process nel-connected nodes are learned henever the begin transmitting

22 Bridge Loops, Broadcast Storms, and the Spanning Tree Algorithm Dealing ith redundant pathas through the LAN

23 A Reason For Multiple Paths In this netork, the backbone and distribution sitches are doubled, for redundanc. One path should be preferred, until it becomes unavailable. Then another path should take over.

24 Topologies revisited "Core-Distribution- Access" topolog in enterprise netorks - "Fat-tree" model Higher-level links have higher bandidths "Leaf-Spine" topolog in data centers provides multiple paths beteen leaf nodes - Multiple paths can/should be used, for better performance

25 The Problem: Bridge Loops What is the proper path from PC1 to the Web Server? When started, sitches forard frames to all ports. Broadcast frames must be forarded to all other ports. This can result in frames looping endlessl beteen sitches.

26 Bridge Loops and Broadcast Storms PC1 sends an "ho-has" frame, to find the Web Server queries must be broadcast, so sitches ill flood them out

27 Broadcast Storm: 1 Access sitch floods the frame out to both Distribution sitches

28 Broadcast Storm: 2a Each Distribution sitch floods out the received frame - to both Backbone sitches - back to the other Access sitch

29 Broadcast Storm: 2b Backbone sitches and Access sitch each receive to copies of the frame - don't kno the're the same frame Each sitch must flood out both copies

30 Broadcast Storm: 3a Backbone sitches echange copies of the frames, hile flooding them to the Distribution sitches Other Access sitch floods frames back - Distribution sitches - (other

31 Broadcast Storm: 3b Backbone sitches have to ne copies to flood out Distribution sitches receive three or four copies, ill flood out each cop PC2 gets to copies - ignores them

32 Broadcast Storm: ad infinitum Backbone sitches keep echoing frames beteen themselves, hile receiving more copies from the Distribution sitches Distribution, Access sitches do the same

33 Broadcast Storm: result Within seconds, the netork is overhelmed ith copies of the frame No other traffic can get through Turn it all off, and start over

34 One Solution: the Spanning Tree Algorithm Algorithm b Radia Perlman Select a root sitch Determine shortest paths via the root Block (don t forard onto) ports that aren t on the shortest path Onl one path beteen leaf nodes is in use at an one time - some phsical capacit is under-used

35 Spanning Tree standards Spanning Tree Protocol (STP) , developed b Digital Equipment Corp. IEEE 802.1D part of Logical Link Control sublaer - not compatible ith DEC's STP - IEEE Rapid Spanning Tree Protocol» Faster identification of shortest paths - IEEE 802.1s Multiple Spanning Tree Protocol» used ith Virtual LANs (VLANs)

36 802.1D high points Bridges (sitches) echange Bridge Protocol Data Unit (BPDU) frames - repeated ever to seconds These contain Bridge IDs - similar to MAC address - also includes a priorit value» often a constant, and equal, default value Loest bridge ID becomes root bridge Other bridges identif shortest paths to/from the root bridge

37 Sitches and STP States 1. Blocking state - Startup state for all ports - process BPDUs to determine root port, designated ports - Also applied to ports that aren't on a shortest-path-to-root 2. Listening state - process BPDUs, verif no bridge loops; no forarding 3. Learning state - process user frames (but don't forard), update MAC address table 4. Forarding state - process user frames and forard them based on MAC address table Disable state - Sitch ports turned off b administrator

38 Spanning Tree Simulation, from Cisco Sstems This Flash animation shos three sitches negotiating the proper paths. - Web Link: montcs.bloomu.edu/netorking/simulations/ Cisco/spanning_tree1.sf

39 TRILL and SPB protocols alternatives to STP Adapt laer-3 routing algorithms to laer-2 connections Multiple pathas used simultaneousl, but no bridge loops - improved link utiliation, better performance TRILL "Transparent Interconnection of Lots of Links" - RFC 6325, developed b Radia Perlman SPB "Shortest Path Bridging" - IEEE-802.1aq, adopted March 2012

40 Cisco's vie of SPB SPBV SPB for VLANs SPBM SPB for MACs

41 Avaa Netorks SPBm and SPB headers

42 Bridge Loops Summar Redundant links beteen sitches - Fault tolerance - Can cause bridge loops Spanning Tree algorithms - STP, 802.1D turn off some sitch ports to interrupt bridge loops - RSTP finds shortest paths more quickl - MSTP VLAN support TRILL, SPB protocols - Allo use of all links for high performance

43 Finding Neighbors on the LAN three supporting protocols at Laer 2

44 Finding LAN neighbors Netork nodes can discover neighbors b broadcasting frames and listening for replies Open, proprietar protocols - LLDP specified b IEEE 802.1ab» Link-Laer Discover Protocol - CDP Cisco sitches and routers» Cisco Discover Protocol - LLTD Microsoft Windos 7 / Vista / 8 / 10» Link-Laer Topolog Discover

45 Neighbor discover protocols Laer-2 "applications" information carried directl in Ethernet frames - No IP addresses or laer-3 protocols involved

46 Running a discover protocol CDP is enabled b default on Cisco equipment - proprietar - intended for routers and sitches LLTD is Microsoft-proprietar - source code for Linu client released, but then removed again LLDP can be enabled on Cisco gear, is available on Windos 8 and 10, and can be installed on Linu and Windos 7

47 CDP Cisco sitches and routers Small netork simulated in GNS3 CDP report for router R1 - shos hat is connected, to hich port

48 LLTD Windos 7 displa of LAN The Win7 node discovered a WinXP neighbor and a Win10 neighbor The sitch/hub/gatea topolog is all virtual

49 LLDP neighbor discover from Linu

50 Neighbor Discover Protocols Summar LLTD - Proprietar, Microsoft-oriented; comple protocol - Focused on client sstems - Broadcasts frames hen map is requested CDP - Proprietar, Cisco-onl - Identifies netorking nodes (sitches, routers) - Broadcasts frames periodicall LLDP - Open standard Linu, Cisco, Windos - Identifies an sstem that supports it - Broadcasts frames periodicall

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski Internet Technolog 08. Routing Paul Kranoski Rutgers Universit Spring 06 March, 06 CS 0-06 Paul Kranoski Routing algorithm goal st hop router = source router last hop router = destination router router

More information

Implement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5

Implement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5 Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of redundancy in a converged

More information

Spanning-Tree Protocol

Spanning-Tree Protocol Spanning-Tree Protocol Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Redundancy in a converged network Spanning-Tree Protocol (STP) STP Operation

More information

Traditional network management methods have typically

Traditional network management methods have typically Advanced Configuration for the Dell PowerConnect 5316M Blade Server Chassis Switch By Surendra Bhat Saurabh Mallik Enterprises can take advantage of advanced configuration options for the Dell PowerConnect

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more

More information

Transparent Bridging and VLAN

Transparent Bridging and VLAN Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.

More information

Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP. Understanding Spanning-Tree Features CHAPTER CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol

More information

Network-Level High Availability

Network-Level High Availability This chapter describes Cisco NX-OS network high availability and includes the following sections: Information About, page 1 Licensing Requirements, page 2 Spanning Tree Protocol, page 2 Virtual Port Channels,

More information

Objectives. 1. Introduction:

Objectives. 1. Introduction: University of Jordan Faculty of Engineering & Technology Computer Engineering Department Advance Networks Laboratory 0907529 Exp.5 Spanning-Tree Protocol (STP) Objectives 1. Explain the role of redundancy

More information

The Spanning Tree Protocol

The Spanning Tree Protocol Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description

More information

Implementing Spanning Tree Protocol

Implementing Spanning Tree Protocol Transparent Bridging Implementing Spanning Tree Protocol A switch has the same characteristics as a transparent bridge., Cisco Systems, Inc. All rights reserved. 2-1, Cisco Systems, Inc. All rights reserved.

More information

EIGRP Features and Operation

EIGRP Features and Operation EIGRP Features and Operation Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol. EIGRP is a Cisco proprietary protocol. EIGRP includes the subnet mask in its route updates. And as

More information

Index. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54

Index. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54 Index Numerics 802.1p priority (QoS) 802.1Q VLAN standard 5-7 802.1w as a region 5-54 A active path 5-5 address IP 7-8 advertisement 3-3 applicable products 1-ii ARP age setting 7-10 cache 7-4 cache table

More information

Spanning Tree Protocol(STP)

Spanning Tree Protocol(STP) Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create

More information

4.5 Routing Algorithms

4.5 Routing Algorithms 4.5 ROUTING ALGORITHMS 363 to hosts enjo the securit services provided b IPsec. On the sending side, the transport laer passes a segment to IPsec. IPsec then encrpts the segment, appends additional securit

More information

Computer Networks. Routing

Computer Networks. Routing Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration?

Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration? Volume: 629 Questions Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration? A. Root switch B. Slave switch C. Non-root switch

More information

Introduction to OSPF

Introduction to OSPF Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license

More information

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+ Using NX-OS Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:

More information

Interplay between routing, forwarding

Interplay between routing, forwarding Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state

More information

Configuring STP and RSTP

Configuring STP and RSTP 7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

Manual:Interface/Bridge - MikroTik Wiki

Manual:Interface/Bridge - MikroTik Wiki 1 of 14 3/22/2015 11:57 AM Manual:Interface/Bridge From MikroTik Wiki < Manual:Interface Summary Ethernet-like networks (Ethernet, Ethernet over IP, IEEE802.11 in ap-bridge or bridge mode, WDS, VLAN) can

More information

Configuring MLD Snooping

Configuring MLD Snooping This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 5 Displaying

More information

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist

More information

Cloud networking (VITMMA02) DC network topology, Ethernet extensions

Cloud networking (VITMMA02) DC network topology, Ethernet extensions Cloud networking (VITMMA02) DC network topology, Ethernet extensions Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering and Informatics Budapest

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the

More information

JN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee

JN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee JN0-343 Q&As Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP)

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) 13 802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) Contents Overview.................................................... 13-2 How Spanning Tree Operates.................................

More information

Chapter 4 Configuring Switching

Chapter 4 Configuring Switching Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines

More information

Figure 7-1 Unicast Static FDB window

Figure 7-1 Unicast Static FDB window 7. Layer 2 Features FDB VLAN Spanning Tree Loopback Detection Link Aggregation L2 Multicast Control LLDP FDB Static FDB Unicast Static FDB This window is used to view and configure the static unicast forwarding

More information

Maintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking

Maintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking Maintaining Specific VLAN Identification Specifically developed for multi-vlan interswitch communications Places a unique identifier in each frame Functions at Layer 2 2003, Cisco Systems, Inc. All rights

More information

End-to-end path: route

End-to-end path: route Multi-hop Wireless Netorks CMU CS 15-829: Internet-Scale Sensor Sstems Overvie: Large-Scale Wireless Sstems Small-Scale: Ho to build single-hop ireless LAN; ho to make TCP perform ell over it Large-Scale:

More information

Configuring MLD Snooping

Configuring MLD Snooping This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 6 Displaying

More information

Network+ Guide to Networks 7 th Edition

Network+ Guide to Networks 7 th Edition Network+ Guide to Networks 7 th Edition Chapter 10 Network Segmentation and Virtualization 2016 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in

More information

Layer 2 Engineering Spanning Tree

Layer 2 Engineering Spanning Tree Layer 2 Engineering Spanning Tree Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

CS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee

CS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee Lecture (06) STP (I) By: Dr. Ahmed ElShafee CS IT Problem statement If your network consists of layer 2 switches that allow computers connect and exchange data, you will need to consider the design that

More information

Configuring Optional Spanning-Tree Features

Configuring Optional Spanning-Tree Features CHAPTER 20 This chapter describes how to configure optional spanning-tree features on the Catalyst 3750-E or 3560-E switch. You can configure all of these features when your switch is running the per-vlan

More information

VLANs Level 3 Unit 9 Computer Networks

VLANs Level 3 Unit 9 Computer Networks VLANs Some Requirements of LANs Need to split up broadcast domains to make good use of bandwidth People in different departments may need to be grouped together for access to servers Security: restrict

More information

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges

More information

Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding

Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding Roting: Otlook Flooding Flooding Link-State: complete, global knoledge Distance-Vector: iteratie, distribted calclation Goal: To distribte a packet in the hole netork (i.e. to realie a netork-ide broadcast)

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 9 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN membership modes, VLAN configuration

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER 7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN

More information

Chapter 3 Reading Organizer

Chapter 3 Reading Organizer Name Date Chapter 3 Reading Organizer After completion of this chapter, you should be able to: 3.1 Compare the types of switches used in an enterprise network. Explain how Spanning Tree Protocol prevents

More information

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Hubs. twisted pair. hub. 5: DataLink Layer 5-1 Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 1 Two notes on routing algorithm Do not believe ou can understand an routing protocol, e.g.,

More information

Troubleshooting Transparent Bridging Environments

Troubleshooting Transparent Bridging Environments CHAPTER Troubleshooting Transparent Bridging Environments Transparent bridges were first developed at Digital Equipment Corporation (Digital) in the early 1980s and are now very popular in Ethernet/IEEE

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets? Nguyen The Nhat - Take Exam Exam questions Time remaining: 00: 00: 51 1. Which command will give the user TECH privileged-mode access after authentication with the server? username name privilege level

More information

RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING

RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING 1 RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING Donald E. Eastlake 3 rd donald.eastlake@stellarswitches.com CONTENTS Introduction Ethernet and Spanning Tree RBridge Features TRILL Encapsulation

More information

CSE 461: Bridging LANs. Last Topic

CSE 461: Bridging LANs. Last Topic CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access

More information

Spanning Tree Protocol

Spanning Tree Protocol For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1

More information

NetWare Link-Services Protocol

NetWare Link-Services Protocol 44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell

More information

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Spanning Tree Protocol is a bridge protocol that enables a learning bridge to dynamically work around loops in a network topology by creating

More information

RBRIDGES/TRILL. Donald Eastlake 3 rd Stellar Switches AND IS-IS.

RBRIDGES/TRILL. Donald Eastlake 3 rd Stellar Switches AND IS-IS. RBRIDGES/TRILL AND IS-IS 1 Donald Eastlake 3 rd donald.eastlake@stellarswitches.com, +1-508-333-2270 Stellar Switches CAVEATS The base protocol specification may change: It is currently in TRILL WG Last

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information

More information

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-3-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers

More information

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard. CHAPTER 18 This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the IE 3010 switch. Note The multiple spanning-tree (MST) implementation is based on

More information

11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions:

11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions: Chapter 5: outline 5. introduction 5.2 routing protocols link state distance vector 5.3 intra-as routing in the Internet 5.4 inter-as routing: BGP 5.5 The SDN control 5.6 ICMP: The Internet Control Message

More information

Chapter 5: STP. * What is STP? How does STP work?

Chapter 5: STP. * What is STP? How does STP work? Chapter 5: STP * What is STP? How does STP work? * What would be the worst case scenario that could happen to a redundant path switched network with the STP is disabled? When multiple paths exist between

More information

PASS4TEST IT 인증시험덤프전문사이트

PASS4TEST IT 인증시험덤프전문사이트 PASS4TEST IT 인증시험덤프전문사이트 http://www.pass4test.net 일년동안무료업데이트 Exam : 640-802 Title : Cisco Certified Network Associate(CCNA) Vendors : Cisco Version : DEMO 1 / 10 Get Latest & Valid 640-802 Exam's Question

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

Spanning-Tree Protocol

Spanning-Tree Protocol Spanning-Tree Protocol Agenda» What Problem is Solved by STP?» Understanding STP Root Bridge Election» BPDU Details and Pathcost» Understanding STP Root and Designated Port Election» Understanding and

More information

Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling CHAPTER 8 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the same security,

More information

Bridging and Switching. Karst Koymans. Monday, February 17, 2014

Bridging and Switching. Karst Koymans. Monday, February 17, 2014 .. Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 3.7, 2014/02/19 19:50:51) Monday, February 17, 2014 Karst Koymans (UvA) Layer 2 Monday, February 17,

More information

Configuring Transparent Bridging

Configuring Transparent Bridging Configuring Transparent Bridging Document ID: 10676 Contents Introduction Before You Begin Conventions Prerequisites Components Used Bridging Transparent Bridging Configuration Examples Example 1: Simple

More information

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling 9 CHAPTER Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the

More information

Computer Networking. December 2004 CEN CN

Computer Networking. December 2004 CEN CN Computer Networking CEN CN 1 Layer 2 - Bridge Frame Header Data Bridge Trailer Data Link Layer Physical Layer More complex than repeat, it requires hardware and software Bridges have diminished because

More information

Lecture 9: Switched Ethernet Features: STP and VLANs

Lecture 9: Switched Ethernet Features: STP and VLANs Lecture 9: Switched Ethernet Features: STP and VLANs Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Ethernet Switch Features The following features

More information

4th Slide Set Computer Networks

4th Slide Set Computer Networks Prof. Dr. Christian Baun 4th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/29 4th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

Chapter 6 Connecting Device

Chapter 6 Connecting Device Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks

More information

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by

More information

Understanding Issues Related to Inter VLAN Bridging

Understanding Issues Related to Inter VLAN Bridging Understanding Issues Related to Inter VLAN Bridging Document ID: 11072 Contents Introduction Prerequisites Requirements Components Used Conventions Spanning Tree Topology Concerns Recommended Use of Hierarchical

More information

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w) Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 10 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership

More information

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4

More information

The fundamentals of Ethernet!

The fundamentals of Ethernet! Building Ethernet Connectivity Services for Provider Networks" " Eduard Bonada i Cruells" Tesi Doctoral UPF / 2012 Dirigida per Dra. Dolors Sala i Batlle Departament de Tecnologies de la Informació i les

More information

VLAN Configuration. Understanding VLANs CHAPTER

VLAN Configuration. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership

More information

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 18.4, 2018/11/16 13:23:04) Friday, November 16, 2018 Bridge loops Two bridges

More information

Cisco CCNA (ICND1, ICND2) Bootcamp

Cisco CCNA (ICND1, ICND2) Bootcamp Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills

More information

Layer 2. Bridging and Switching. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.4, 2017/02/15 12:07:08)

Layer 2. Bridging and Switching. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.4, 2017/02/15 12:07:08) Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 16.4, 2017/02/15 12:07:08) Friday, February 17, 2017 Karst Koymans (UvA) Layer 2 Friday, February 17,

More information

A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah).

A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah). Volume: 245 Questions Question No: 1 Which of the following statements best describes ARPANET? A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara,

More information

4 Spanning Tree Protokoll 802.1D-2004

4 Spanning Tree Protokoll 802.1D-2004 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 82.1D-24 Prof. Dr. Andreas Steffen Institute for Information Technologies and Applications Steffen/Stettler, 6.1.213, 4-SpanningTree.pptx 1 What happens

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol CHAPTER 7 This chapter descibes how to configure Spanning Tree Protocol (STP) on the Cisco wireless mobile interface card (WMIC). Note For complete syntax and usage information for the commands used in

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 16 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 2950 or Catalyst 2955 switch. It includes information

More information

1 GSW Bridging and Switching

1 GSW Bridging and Switching 1 Sandwiched between the physical and media access layers of local area networking (such as Ethernet) and the routeing of the Internet layer of the IP protocol, lies the thorny subject of bridges. Bridges

More information

Data Communications. Connecting Devices

Data Communications. Connecting Devices Data Communications Connecting Devices Connecting Devices Networks do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, or segments of LANs, we use

More information

SPANNING TREE PROTOCOL GUIDE FOR ARAKNIS NETWORKS EQUIPMENT

SPANNING TREE PROTOCOL GUIDE FOR ARAKNIS NETWORKS EQUIPMENT Contents (Click to Navigate) SPANNING TREE PROTOCOL GUIDE FOR ARAKNIS NETWORKS EQUIPMENT 1 - Find, Fix, and Prevent STP Issues 2 2 - How STP Works 3 3 - Araknis Equipment & STP 4 4 - DirecTV STP Issues

More information

CCNA Routing and Switching Study Guide Chapters 1 & 15: Enhanced Switching

CCNA Routing and Switching Study Guide Chapters 1 & 15: Enhanced Switching CCNA Routing and Switching Study Guide Chapters 1 & 15: Enhanced Switching Instructor & Todd Lammle Chapter 15 Objectives The ICND2 topics covered in this chapter include: 2 Chapter 15 Objectives (con

More information

Improving Reliability in Ethernet Control Networks

Improving Reliability in Ethernet Control Networks Tech Tips Improving Reliability in Ethernet Control Networks SUMMARY The proliferation of Ethernet-enabled devices on the factory floor from PLCs to modules all the way down to sensors in support of the

More information

Configuring BPDU tunneling

Configuring BPDU tunneling Contents Configuring BPDU tunneling 1 Introduction to BPDU tunneling 1 Background 1 BPDU Tunneling implementation 2 Configuring BPDU tunneling 3 Configuration prerequisites 3 Enabling BPDU tunneling for

More information

Troubleshooting Transparent Bridging Environments

Troubleshooting Transparent Bridging Environments Troubleshooting Transparent Bridging Environments Document ID: 10543 This information from the Internetwork Troubleshooting Guide was first posted on CCO here. As a service to our customers, selected chapters

More information

Arhitecturi și Protocoale de Comunicații (APC) Rețele locale (I)

Arhitecturi și Protocoale de Comunicații (APC) Rețele locale (I) Arhitecturi și Protocoale de Comunicații (APC) Rețele locale (I) Outline Shared media LANs Classes of (MAC) protocols, standards. CSMA/CD (Ethernet). Bridged/Switched LANs Types of bridges, standards.

More information

Network Layer: Routing

Network Layer: Routing Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership

More information