Tag - switches

Cisco Discovery Protocol

  1. Proprietary Cisco Layer 2 protocol that uses multicast to gather hardware and protocol information about directly connected devices.
  2. Network layer protocol and media independent.
  3. Enabled by default on all Cisco devices, but can be disabled globally:

Router(config)#nocdp run

or can be disabled on interface-by-interface basis:

Router(config-if)#nocdp enable

  • To learn the remote device’s Layer 3 address and IOS version

Router>showcdp neighbor detail

or

Router>showcdp entry *

Telnet

Telnet enables a virtual terminal connection to a remote device’s IP address using the Application layer protocol called Telnet (TCP port 23 at the Transport layer).

To Telnet from IOS, enter the keywordtelnetfollowed by the IP address or hostname. If youenter only an IP address or hostname in user or privileged EXEC, IOS automatically assumes that you are Telnetting. To Telnet to a Cisco device, the vty passwords must be set, or you receive the “Password required, but none set” error. To access Privileged EXEC in a Telnet session, you must have enable password set, or you receive the “% No password set” error.

  • To suspend the Telnet session, press Ctrl+Shift+6, x.
  • To see a list of the active sessions in the originating router, use the show sessions command.
  • To resume a suspended session, press the Enter key from user EXEC or privileged EXEC mode, or enter resume followed by the session number.
  • To close a Telnet session from the device you are Telnetted into, enter exitor logout from user EXEC or privileged EXEC mode.
  • To close a Telnet session from the originating device, enter disconnect followed by the session number.
  • To see log messages in your Telnet session, use the privileged EXEC mode command terminal monitor in the device that you are Telnetted into.

telnet

Your Cisco device can act as a DHCP server and respond to DHCP requests on a segment. To configure the Cisco device as a DHCP server, you must first enable the interface that will receivethe DHCP requests and assign an IP address to it. After the interface is enabled, you define theDHCP address pool with theip dhcp pool poolname global configuration command. Indhcp – configmode, you can define the DHCP address scope with thenetwork command followed bythe IP subnet to be assigned. You can also define additional parameters such as the default gate-way, DNS server, domain name, and length of the IP lease. To exclude IP addresses from being assigned (such as if you have statically assigned them to specific devices), use the ip dhcp excluded -address ip-addresscommand to remove the IP(s) from the scope.

To verify the devices that have been assigned IP addresses from the DHCP address scope, use the show dhcp bindings command.

Switches

Switches have the following functions:

  • Segment LANs into multiple collision domains.
  • Learn MAC addresses by examining the source MAC address of each frame received and store them in a CAM table.
  • Base their forwarding decisions based on the destination MAC address of an Ethernet frame.
  • Flood broadcast, multicast, and unknown unicast frames out all ports except the one it was received.

A switch has three methods of forwarding frames:

Store-and-forward: Latency varying transmission method that buffers the entire frame and calculates the CRC before forwarding the frame.

Cut-through: Only looks at the destination MAC address in an Ethernet frame and forwards it.

Fragment-free: Checks the first 64 bytes for frame fragments (due to collisions) before forwarding the fame.

 

Duplex Connections

  • Half-duplex interfaces have one-way communication with suboptimal throughput because they operate in a collision domain in which CSMA/CD must be enabled. When connected to a hub, they must run half duplex.
  • Full-duplex interfaces simultaneously send and receive, allowing higher throughput because CSMA/CD is disabled. Connections to other switches or devices can be full duplex.

Spanning Tree Protocol IEEE 802.1d

STP is a Layer 2 protocol that is used to prevent switching loops in networks with redundant switched paths.

TABLE STP Port States
StateFunctionTransition Time
DisabledThe interface is administratively shut downor disabled from port violation.NA
BlockingDoes not forward any user data. All ports start out in this state.Does not send, but still can receive BPDUs to react to topology changes.0 to 20 seconds
ListeningLearningBegins to transition to a forwarding state by listening and sending BPDUs.No user data sent.Begins to build MAC addresses learned on the interface. No user data sent.15 seconds15 seconds
ForwardingUser data forwarded.

 

STP elects root bridge/switch by determining which switch has the lowest Bridge ID in the topology learned from sending and receiving BPDUs. Bridge ID is a combination of Priority and MAC address.

All nonroot switches determine root port based on the fastest (lowest cumulative cost) path back to root switch. If a tie occurs, the Bridge ID followed by port priority and port number are the tie breakers.

On each segment, the switch advertising the fastest way back to the root switch is the desig­nated port for that segment.

If port is not a root or a designated port, it is blocking.

 

Port Cost Values
InterfaceCost
10Gbps2
1Gbps4
100Mbps19
10Mbps100

VTP (virtual trunking protocol)

It consistent VLAN configuration across all switches in the network.VLAN trunking over mixed networks, suck as Ethernet ATM LAN or even FDDI.

It accurate tracking and monitoring of VLANs.

Plug and play VLAN adding

Switch port have Tow modes:

  1. Access Mode:

Access mode is used for security purpose

  1. Trunk Mode:

Trunk mode is used for traffic from one switch vlan to other switch vlan.

For Example:

vtp

 

We want to make vlan configuration in switch1 and copy it to switch2 automatically. As

  • Switch1# vlan database or (vlan d)
  • Switch1(vlan)# vlan 2 name IT
  • Switch1(vlan)# vlan 3 name HR
  • Switch1(vlan)# exit
  • Switch1(conf)# int range fa 0/1 – 8
  • Switch1(conf_if)# switchport access vlan 2
  • Switch1(conf_if)# exit
  • Switch1(conf)# int range fa 0/9 – 15
  • Switch1(conf_if)# switchport access vlan 3
  • Ä  Switch(conf_if)# exit
  • Trunk port is used for sending data from one switch to other
  • Switch1(conf)# in fa 0/24
  • Ä  Switch1(conf_if)# switchport mode trunk
  • Switch1(conf_if)# exit

Now configure VTP domain on switch1 as

  • Switch1(conf)# vtp domain inara
  • Switch1(conf)# vtp mode server
  • Switch1(conf)# exit

Now on switch2 do the following configuration

  • Switch2(conf)# vtp domain inara
  • Switch2(conf)# vtp mode client
  • Switch2(conf_if)# int fa 0/24
  • Switch2(conf_if)# switchport mode trunk
  • Switch2(conf_if)#no shutdown
  • Switch2(conf_if)# exit
  • Switch2(conf)#exit
  • Switch2#show vlan

Switch Basics Step by Step

Switch:

Switch is used to send data from one system another in a network. Commonly switches are Layer1, layer2, Layer3 and Layer4. Layer1 is simply called Hub. Which work on Broadcasting and used in small network. Layer 2 switch is used for little bit large network and it control Broadcasting up to some how. Layer3 switch is known as Router.

 

Interface of Switch:

It may a simple Ethernet or Fast Ethernet. Simple Ethernet is 10mbs and fast Ethernet is 100mbps speed.

Console Port:

Console port is used to access the IOS of a switch. Rollover cable is used to access the IOS of switch from console port. One end of the cable is plugged in console port and second end cable is plugged un DB-9 connector, which is connected in COM-1 or COM-II port of the mother board in computer. Default band width of console port is 9600 Mbps, which can be changed.

 

Broad cast Domain:

It takes the data to all the points in a switch. It generate conjunction.

Collision Domain:

It senses the line and that the line is free or not. It also generates conjunction. It occurs in Layer1 Switch.

ASIC:

ASIC stand for “Application Specific Integral Circuit”. It is a chip which is used for controlling Broadcasting.

 

MAC Address Table:

MAC Address Table is used to store the addresses, port no and status of destination and sources. The data is sending in layer2 switch by MAC address table. MAC address table status is changed when the entries are dynamically and when that source and destination which not used upto 500 second the MAC address table flash out the records. When the records are enter statically so it remain constant and by this way we can restrict some one to use only the selected port.

 

A Switch performs:

  1. Learning
  2. Forwarding
  3. Filtering

 

Learning:

Learning means when data is reached from source to destination, the destination send back an Acknowledgement to source for successfully arrival. So the destination find out the source address for the MAC address table and send the ACK only to source system, it is called Learning.

 

Forwarding:

When a source “aa” send data to “bb”, and also “bb” send back ACK to source “aa” the address of both the source and destination is stored in MAC address table. When “aa” want to send more data to “bb”  the address of “bb” present in MAC address table, it only read for it and simply forward it on the address of “bb”. It is called Forwarding.

 

Filtering:

When a Hub is connected to the switch and on the Hub “kk” and “mm” are connected to it. When “kk” want to send data to “mm” so the data will be blocked on the last port of switch which is connected to the Hub, and data will only be broadcasting in Hub not to switch too. It is called Filtering.

Copyright ©2010 -  2019 Ciscoforall.com | Privacy Policy