Академический Документы
Профессиональный Документы
Культура Документы
Concepts
Switching, Routing, and
Wireless Essentials v7.0
(SRWE)
Module Objectives
Module Title: Switching Concepts
Module Objective: Explain how Layer 2 switches forward data.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
2.1 Frame Forwarding
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Frame Forwarding
Switching in Networking
Two terms are associated with frames entering or
leaving an interface:
• Ingress – entering the interface
• Egress – exiting the interface
A switch forwards based on the ingress interface
and the destination MAC address.
A switch uses its MAC address table to make
forwarding decisions.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Frame Forwarding
The Switch MAC Address Table
A switch will use the destination MAC address to determine the egress interface.
Before a switch can make this decision it must learn what interface the destination is
located.
A switch builds a MAC address table, also known as a Content Addressable Memory
(CAM) table, by recording the source MAC address into the table along with the port
it was received.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Frame Forwarding
The Switch Learn and Forward Method
The switch uses a two step process:
Step 1. Learn – Examines Source Address
• Adds the source MAC if not in table
• Resets the time out setting back to 5 minutes if source is in the table
Step 2. Forward – Examines Destination Address
• If the destination MAC is in the MAC address table it is forwarded out the specified port.
• If a destination MAC is not in the table, it is flooded out all interfaces except the one it was
received.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Frame Forwarding
Switch Forwarding Methods
Switches use software on application-specific-integrated circuits (ASICs) to make
very quick decisions.
A switch will use one of two methods to make forwarding decisions after it receives a
frame:
• Store-and-forward switching - Receives the entire frame and ensures the frame
is valid. Store-and-forward switching is Cisco’s preferred switching method.
• Cut-through switching – Forwards the frame immediately after determining the
destination MAC address of an incoming frame and the egress port.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Frame Forwarding
Store-and-Forward Switching
Store-and-forward has two primary characteristics:
• Error Checking – The switch will check the Frame Check Sequence (FCS) for CRC errors.
Bad frames will be discarded.
• Buffering – The ingress interface will buffer the frame while it checks the FCS. This also
allows the switch to adjust to a potential difference in speeds between the ingress and
egress ports.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Frame Forwarding
Cut-Through Switching • Cut-through forwards the frame immediately
after determining the destination MAC.
• Fragment (Frag) Free method will check the
destination and ensure that the frame is at
least 64 Bytes. This will eliminate runts.
Concepts of Cut-Through switching:
• Is appropriate for switches needing latency
to be under 10 microseconds
• Does not check the FCS, so it can
propagate errors
• May lead to bandwidth issues if the switch
propagates too many errors
• Cannot support ports with differing speeds
going from ingress to egress
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
2.2 Switching Domains
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Switching Domains
Collision Domains
Switches eliminate collision domains and
reduce congestion.
• When there is full duplex on the link the
collision domains are eliminated.
• When there is one or more devices in
half-duplex there will now be a collision
domain.
• There will now be contention for the
bandwidth.
• Collisions are now possible.
• Most devices, including Cisco and
Microsoft use auto-negotiation as the
default setting for duplex and speed.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Switching Domains
Broadcast Domains
• A broadcast domain extends across all Layer 1
or Layer 2 devices on a LAN.
• Only a layer 3 device (router) will break the
broadcast domain, also called a MAC
broadcast domain.
• The broadcast domain consists of all devices
on the LAN that receive the broadcast traffic.
• When the layer 2 switch receives the broadcast
it will flood it out all interfaces except for the
ingress interface.
• Too many broadcasts may cause congestion
and poor network performance.
• Increasing devices at Layer 1 or layer 2 will
cause the broadcast domain to expand.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Switching Domains
Alleviated Network Congestion
Switches use the MAC address table and full-duplex to eliminate collisions and avoid
congestion.
Features of the switch that alleviate congestion are as follows:
Protocol Function
Fast Port Speeds Depending on the model, switches may have up to 100Gbps port speeds.
Fast Internal Switching This uses fast internal bus or shared memory to improve performance.
Large Frame Buffers This allows for temporary storage while processing large quantities of
frames.
High Port Density This provides many ports for devices to be connected to LAN with less cost.
This also provides for more local traffic with less congestion.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Module 3: VLANs
Switching, Routing, and
Wireless Essentials v7.0
(SRWE)
Module Objectives
Module Title: Protocols and Models
Module Objective: Explain how network protocols enable devices to access local and remote
network resources.
Topic Title Topic Objective
Overview of VLANs Explain the purpose of VLANs in a switched network.
VLANs in a Multi-Switched Explain how a switch forwards frames based on VLAN configuration
Environment in a multi-switch environment.
Configure a switch port to be assigned to a VLAN based on
VLAN Configuration
requirements.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
3.1 Overview of VLANs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Overview of VLANs
VLAN Definitions
VLANs are logical connections with other similar
devices.
Placing devices into various VLANs have the
following characteristics:
• Provides segmentation of the various groups
of devices on the same switches
• Provide organization that is more
manageable
• Broadcasts, multicasts and unicasts are
isolated in the individual VLAN
• Each VLAN will have its own unique range
of IP addressing
• Smaller broadcast domains
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Overview of VLANs
Benefits of a VLAN Design
• VLAN 1 is the default data VLAN because all interfaces are assigned to this VLAN.
Native VLAN
• This is used for trunk links only.
• All frames are tagged on an 802.1Q trunk link except for those on the native VLAN.
Management VLAN
• This is used for SSH/Telnet VTY traffic and should not be carried with end user traffic.
• Typically, the VLAN that is the SVI for the Layer 2 switch.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Overview of VLANs
Types of VLANs (Cont.)
Voice VLAN
• A separate VLAN is required because Voice
traffic requires:
• Assured bandwidth
• High QoS priority
• Ability to avoid congestion
• Delay less that 150 ms from source to
destination
• The entire network must be designed to
support voice.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
3.2 VLANs in a
Multi-Switched Environment
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
VLANs in a Multi-Switched Environment
Defining VLAN Trunks
A trunk is a point-to-point link between
two network devices.
Cisco trunk functions:
• Allow more than one VLAN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
VLANs in a Multi-Switched Environment
Networks without VLANs
Without VLANs, all devices connected to the switches will receive all unicast, multicast, and
broadcast traffic.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
VLANs in a Multi-Switched Environment
Networks with VLANs
With VLANs, unicast, multicast, and broadcast traffic is confined to a VLAN. Without a Layer
3 device to connect the VLANs, devices in different VLANs cannot communicate.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
VLANs in a Multi-Switched Environment
VLAN Identification with a Tag
• The IEEE 802.1Q header is 4 Bytes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
VLANs in a Multi-Switched Environment
Native VLANs and 802.1Q Tagging
802.1Q trunk basics:
• Tagging is typically done on all VLANs.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
VLANs in a Multi-Switched Environment
Voice VLAN Tagging
The VoIP phone is a three port switch:
• The switch will use CDP to inform the phone of the Voice
VLAN.
• The phone will tag its own traffic (Voice) and can set Cost
of Service (CoS). CoS is QoS for layer 2.
• The phone may or may not tag frames from the PC.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
VLANs in a Multi-Switched Environment
Voice VLAN Verification Example
The show interfaces fa0/18 switchport command can show us both data and voice
VLANs assigned to the interface.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
3.3 VLAN Configuration
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
VLAN Configuration
VLAN Ranges on Catalyst Switches
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
VLAN Configuration
VLAN Creation Example
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
VLAN Configuration
VLAN Port Assignment Commands
Once the VLAN is created, we can then assign it to the correct interfaces.
Task Command
Enter global configuration mode. Switch# configure terminal
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
VLAN Configuration
VLAN Port Assignment Example
We can assign the VLAN to the port
interface.
• Once the device is assigned the
VLAN, then the end device will need
the IP address information for that
VLAN
Prompt Command
• Here, Student PC receives S1# Configure terminal
172.17.20.22
S1(config)# Interface fa0/18
S1(config-if)# Switchport mode access
S1(config-if)# Switchport access vlan 20
S1(config-if)# end
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
VLAN Configuration
Data and Voice VLANs
An access port may only be
assigned to one data VLAN.
However it may also be assigned to
one Voice VLAN for when a phone
and an end device are off of the
same switchport.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
VLAN Configuration
Data and Voice VLAN Example
• We will want to create and name both Voice
and Data VLANs.
• In addition to assigning the data VLAN, we
will also assign the Voice VLAN and turn on
QoS for the voice traffic to the interface.
• The newer catalyst switch will automatically
create the VLAN, if it does not already exist,
when it is assigned to an interface.
Note: QoS is beyond the scope of this course.
Here we do show the use of the mls qos trust
[cos | device cisco-phone | dscp | ip-
precedence] command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
VLAN Configuration
Verify VLAN Information
Use the show vlan command. The
complete syntax is:
show vlan [brief | id vlan-id | name
vlan-name | summary]
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
VLAN Configuration
Delete VLANs
Delete VLANs with the no vlan vlan-id command.
Caution: Before deleting a VLAN, reassign all member ports to a different VLAN.
• Delete all VLANs with the delete flash:vlan.dat or delete vlan.dat commands.
Note: To restore to factory default – unplug all data cables, erase the startup-configuration
and delete the vlan.dat file, then reload the device.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
3.4 VLAN Trunks
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
VLAN Trunks
Trunk Configuration Commands
Configure and verify VLAN trunks. Trunks are layer 2 and carry traffic for all VLANs.
• Encapsulation is dot1q
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
VLAN Trunks
Reset the Trunk to the Default State
• Reset the default trunk settings with
the no command.
• All VLANs allowed to pass traffic
• Native VLAN = VLAN 1
• Verify the default settings with a
sh int fa0/1 switchport command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
VLAN Trunks
Reset the Trunk to the Default State (Cont.)
Reset the trunk to an access mode with the
switchport mode access command:
• Is set to an access interface administratively
• Is set as an access interface operationally
(functioning)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
3.5 Dynamic Trunking Protocol
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Dynamic Trunking Protocol
Introduction to DTP
Dynamic Trunking Protocol (DTP) is a proprietary Cisco protocol.
DTP characteristics are as follows:
• On by default on Catalyst 2960 and 2950 switches
• Dynamic-auto is default on the 2960 and 2950 switches
• May be turned off with the nonegotiate command
• May be turned back on by setting the interface to dynamic-auto
• Setting a switch to a static trunk or static access will avoid negotiation issues with the
switchport mode trunk or the switchport mode access commands.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Dynamic Trunking Protocol
Negotiated Interface Modes
The switchport mode command has additional options.
Use the switchport nonegotiate interface configuration command to stop DTP negotiation.
Option Description
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Dynamic Trunking Protocol
Results of a DTP Configuration
Dynamic
Dynamic Auto Trunk Access
Desirable
Dynamic Auto Access Trunk Trunk Access
Dynamic
Trunk Trunk Trunk Access
Desirable
Limited
Trunk Trunk Trunk Trunk
connectivity
Limited
Access Access Access Access
connectivity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Dynamic Trunking Protocol
Verify DTP Mode
The default DTP configuration is
dependent on the Cisco IOS version and
platform.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51