Академический Документы
Профессиональный Документы
Культура Документы
CCNA 3 CHAPTER1 CMS \The typical hierarchical design model is broken up in to three layers: access, distribution, and core. Access Layer The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points. Distribution Layer The distribution layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs) defined at the access layer. Core Layer The core area can also connect to Internet resources. The core aggregates the traffic from all the distribution layer devices, so it must be capable of forwarding large amounts of data quickly. \Benefits of a Hierarchical Network ScalabilityHierarchical networks scale very well. The modularity of the design allows you to replicate design elements as the network grows. Redundancy Access layer switches are connected to two different distribution layer switches to ensure path redundancy. If one of the distribution layer switches fails, the access layer switch can switch to the other distribution layer switch. Performance Communication performance is enhanced by avoiding the transmission of data through lowperforming, intermediary switches. Data is sent through aggregated switch port links from the access layer to the distribution layer at near wire speed in most cases. Network Diameter Network diameter is the number of devices that a packet has to cross before it reaches its destination. Bandwidth Aggregation Bandwidth aggregation is the practice of considering the specific bandwidth requirements of each part of the hierarchy. Redundancy Redundancy is one part of creating a highly available network. Redundancy can be provided in a number of ways. Modular Switches Modular switches offer more flexibility in their configuration. Modular switches typically come with different sized chassis that allow for the installation of different numbers of modular line cards. The line cards actually contain the ports. Stackable Switches Stackable switches can be interconnected using a special backplane cable that provides highbandwidth throughput between the switches. Stack Wise allows you to interconnect up to nine switches using fully redundant backplane connections. Manageability Manageability is relatively simple on a hierarchical network. Each layer of the hierarchical design performs specific functions that are consistent throughout that layer. MaintainabilityThe modularity of hierarchical design allows for the network to scale without becoming overly complicated. \Hierarchical Network Design Principles
Topology Diagrams A topology diagram is a graphical representation of a network infrastructure. User Communities Analysis User community analysis is the process of identifying various groupings of users and their impact on network performance.
Security Security is improved and easier to manage. Access layer switches can be configured with various port security options that provide control over which devices are allowed to connect to the network.
Traffic Flow AnalysisTraffic flow analysis is the process of measuring the bandwidth usage on a network and analyzing the data for the purpose of performance tuning, capacity planning, and making hardware improvement decisions. Traffic flow analysis is done using traffic flow analysis software. Analysis Tools Many traffic flow analysis tools that automatically record traffic flow data to a database and perform a trend analysis are available.
Performance When selecting a switch for the access, distributions, or core layers, consider the ability of the switch to support the port density, forwarding rates, and bandwidth aggregation requirements of your network. Port Density Port density is the number of ports available on a single switch. Forwarding Rates Forwarding rates define the processing capabilities of a switch by rating how much data the switch can process per second. Switch product lines are classified by forwarding rates. Link AggregationLink aggregation helps to reduce these bottlenecks of traffic by allowing up to eight switch ports to be bound together for data communications, providing up to 8 Gb/s of data throughput when Gigabit Ethernet ports are used. With the addition of multiple 10 Gigabit Ethernet (10GbE) uplinks on some enterprise-layer switches, very high throughput rates can be achieved.
.. \SWITCH for factors Fixed Configuration Switches Fixed configuration switches are just as you might expect, fixed in their configuration
Multicast Communication in which a frame is sent to a specific group of devices or clients. Multicast transmission clients must be members of a logical multicast group to receive the information. \ Ethernet Frame Preamble and Start Frame Delimiter Fields The Preamble (7 bytes) and Start Frame Delimiter (SFD) (1 byte) fields are used for synchronization between the sending and receiving devices. Destination MAC Address Field The Destination MAC Address field (6 bytes) is the identifier for the intended recipient. This address is used by Layer 2 to assist a device in determining if a frame is addressed to it. The address in the frame is compared to the MAC address in the device. If there is a match, the device accepts the frame. Source MAC Address Field The Source MAC Address field (6 bytes) identifies the frame's originating NIC or interface. Switches use this address to add to their lookup tables. Length/Type Field The Length/Type field (2 bytes) defines the exact length of the frame's data field. This field is used later as part of the Frame Check Sequence (FCS) to ensure that the message was received properly. Data and Pad Fields The Data and Pad fields (46 to 1500 bytes) contain the encapsulated data from a higher layer, which is a generic Layer 3 PDU, or more commonly, an IPv4 packet. Frame Check Sequence Field The FCS field (4 bytes) detects errors in a frame. It uses a cyclic redundancy check (CRC). The sending device includes the results of a CRC in the FCS field of the frame. The receiving device receives the frame and generates a CRC to look for errors.
\ MAC Address Organizational Unique Identifier The OUI is the first part of a MAC address. It is 24 bits long and identifies the manufacturer of the NIC card. The IEEE regulates the assignment of OUI numbers. Vendor Assignment Number The vendor-assigned part of the MAC address is 24 bits long and uniquely identifies the Ethernet hardware. It can be a BIA or modified by software indicated by the local bit. \Duplex Settings Half Duplex Half-duplex communication relies on unidirectional data flow where sending and receiving data are not performed at the same time. This is similar to how walkie-talkies or two-way radios function in that only one person can talk at any one time. Full Duplex Full-duplex connections require a switch that supports full duplex or a direct connection between two nodes that each support full duplex. \ Switch Port Settings Auto - option sets autonegotiation of duplex mode. With autonegotiation enabled, the two ports communicate to decide the Full - option sets full-duplex mode. Half - option sets half-duplex mode. auto-MDIX
Additionally, you used to be required to use certain cable types (cross-over, straight-through) when connecting between specific devices, switch-to-switch or switch-torouter. auto-MDIX feature is enabled, the switch detects the required cable type for copper Ethernet connections and configures the interfaces accordingly. \Switch Packet Forwarding Methods
Store-and-Forward Switching
In store-and-forward switching, when the switch receives the frame, it stores the data in buffers until the complete frame has been received. During the storage process, the switch analyzes the frame for information about its destination. In this process, the switch also performs an error check using the Cyclic Redundancy Check (CRC) trailer portion of the Ethernet frame.
Cut-through Switching In cut-through switching, the switch acts upon the data as soon as it is received, even if the transmission is not complete. -Fast-forward switching: Fast-forward switching offers the lowest level of latency. Fast-forward switching immediately forwards a packet after reading the destination address. -Fragment-free switching: In fragment-free switching, the switch stores the first 64 bytes of the frame before forwarding. Fragment-free switching can be viewed as a compromise between store-andforward switching and cut-through switching. \Symmetric and Asymmetric Switching Asymmetric switching Enables more bandwidth to be dedicated to a server switch port to prevent a bottleneck. Symmetric On a symmetric switch all ports are of the same bandwidth. Symmetric switching is optimized for a reasonably distributed traffic load, such as in a peerto-peer desktop environment. \Port Based and Shared Memory Buffering Port-based Memory Buffering In port-based memory buffering, frames are stored in queues that are linked to specific incoming ports. Shared Memory Buffering Shared memory buffering deposits all frames into a common memory buffer that all the ports on the switch share.
\ Ethernet Communications Unicast Communication in which a frame is sent from one host and addressed to one specific destination. In unicast transmission, there is just one sender and one receiver. Unicast transmission is the predominant form of transmission on LANs and within the Internet. Broadcast Communication in which a frame is sent from one address to all other addresses. In this case, there is just one sender, but the information is sent to all connected receivers. Broadcast transmission is essential when sending the same message to all devices on the LAN.
VTP Frame Details VTP frame structure in more detail. Keep in mind that a VTP frame encapsulated as an 802.1Q frame is not static. The contents of the VTP message determines which fields are present. The receiving VTP-enabled switch looks for specific fields and values in the 802.1Q frame to know what to process. Destination MAC addressThis address is set to 01-00-0C-CC-CC-CC, which is the reserved multicast address for all VTP messages.
VTP frames contain the following information for each configured VLAN: -VLAN IDs (IEEE 802.1Q) -VLAN name -VLAN type -VLAN state -Additional VLAN configuration information specific to the VLAN type VTP Revision Number The configuration revision number is a 32-bit number that indicates the level of revision for a VTP frame. The default configuration number for a switch is zero. Each time a VLAN is added or removed, the configuration revision number is incremented. Each VTP device tracks the VTP configuration revision number that is assigned to it. \VTP Advertisements Summary Advertisements The summary advertisement contains the VTP domain name, the current revision number, and other VTP configuration details. Summary advertisements are sent: -Every 5 minutes by a VTP server or client to inform neighboring VTP-enabled switches of the current VTP configuration revision number for its VTP domain -Immediately after a configuration has been made
Request Advertisements When a request advertisement is sent to a VTP server in the same VTP domain, the VTP server responds by sending a summary advertisement and then a subset advertisement. Request advertisements are sent if: -The VTP domain name has been changed The switch receives a summary advertisement with a higher configuration revision number than its own -A subset advertisement message is missed for some reason The switch has been reset \ VTP Advertisements Details Summary Advertisements Summary advertisements comprise the majority of VTP advertisement traffic. Subset Advertisements The fields found in a subset advertisement are briefly described. The fields in the VLAN-info are not described. Request Advertisements The fields found in a request advertisement are briefly described.