June Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2
|
|
- Zoe Gilmore
- 8 years ago
- Views:
Transcription
1 Bridge & Switch Pietro Nicoletti Piero[at]studioreti.it Bridge-Switch-Engl - P. Nicoletti: see note pag.
2 Copyright note These slides are protected by copyright and international treaties. The title and the copyrights concerning the slides (inclusive, but non only, every image, photograph, animation, video, audio, music and text) are the author s (see Page ) property. The slides can be copied and used by research institutes, schools and universities affiliated to the Ministry of Public Instruction and the Ministry of University and Scientific Research and Technology, for institutional purpose, not for profit. In this case there is not requested any authorization. Any other complete or partial use or reproduction (inclusive, but not only, reproduction on discs, networks and printers) is forbidden without written authorization of the author in advance. The information contained in these slides are believed correct at the moment of publication. They are supplied only for didactic purpose and not to be used for installation-projects, products, networks etc. However, there might be changes without notice. The authors are not responsible for the content of the slides. In any case there can not be declared conformity with the information contained in these slides. In any case this note of copyright may never be removed and must be written also in case of partial use. Bridge-Switch-Engl - P. Nicoletti: see note pag.
3 Bridge Called also MAC Bridge operate at layer use simple forwarding algorithm forwarding technique based on MAC destination address are normally used for local connections Bridge-Switch-Engl - 3 P. Nicoletti: see note pag.
4 Bridge model Upper Upper Layers BRIDGE Layers MAC MAC Relay MAC MAC Physical Physical Physical Physical Bridge-Switch-Engl - 4 P. Nicoletti: see note pag.
5 Bridge architecture Bridge Processing Port B LAN # Port A LAN # Forwarding Data Base Bridge-Switch-Engl - 5 P. Nicoletti: see note pag.
6 Forwarding Forwarding table is calculated by: backward learning looking the Source MAC address Backward learning work only over LAN with tree topology other topologies are transformed to tree topology by spanning tree algorithm Spanning tree algorithm operate periodically (any second) decide which port set to forwarding state and which port set to blocking state Bridge-Switch-Engl - 6 P. Nicoletti: see note pag.
7 Transparent Bridge IEEE standardized the bridge functions by 80.D standard The bridge 80.D work in transparent mode, for this reason are also called transparent bridge: are derived from Ethernet have a local forwarding table The main functions of the bridge are: frame forwarding Singlecast frames forwarding based on Destination MAC Address Broadcast frames are forwarded in every ports except the port where as been received stations auto-learning loop detection by spanning tree algorithm Bridge-Switch-Engl - 7 P. Nicoletti: see note pag.
8 Transparent Bridge PC PORT A PC BRIDGE PC3 PORT B PC4 Bridge-Switch-Engl - 8 P. Nicoletti: see note pag.
9 Bridge physical architecture CPU ROM Flash Memory RAM BUS Network Interface Network Interface Network Interface Network Interface Network Interface Bridge-Switch-Engl - 9 P. Nicoletti: see note pag.
10 Bridge logical architecture Higher Layer Entities Bridge Management (bribge control functions) LLC Entities MAC Service MAC Entity Bridge Protocol Entity (BLAN topology computation) MAC Relay Entity (Media Access Method Indipendent Functions) Internal Internal Sublayer Sublayer Service Service LLC Entities MAC Service MAC Entity (Media Access Method Dependent Functions) (Media Access Method Dependent Functions) LAN Port Port LAN Bridge-Switch-Engl - 0 P. Nicoletti: see note pag.
11 Bridge functions MAC Relay Entity Bridging Process Forwarding Sub-Process Spanning Tree Process Learning Sub-Process Bridge Protocol Entity Bridge-Switch-Engl - P. Nicoletti: see note pag.
12 Filtering data base Entry fields MAC address Destination port Ageing time (default expire after 300 s) Port status (depending by spanning tree protocol) Entry type dynamic Updated by learning process Max entries: K static Not updated by learning process 56 entries typically Lookup by CAM (Content Addressable Memory) Bridge-Switch-Engl - P. Nicoletti: see note pag.
13 Filtering database example filtering database show command Switch-> show cam dynamic * = Static Entry. + = Permanent Entry. # = System Entry X = Port Security Entry Dest MAC Address Ports Age a-a6-44 / c9-0-b3-0f / f8-3-c-3b / f8-3-f7-a0 / 00-0-e7-00-e3-80 / a5-84-a7-a6 / 00-0-b3-e-b4-aa / b3-e-da-da / b3-e-dc-fd /4 Stations MAC address Modular switcth: slot/port Ageing time Bridge-Switch-Engl - 3 P. Nicoletti: see note pag.
14 Bridge Forwarding Begin Frame received without error on port x Destination found in forwarding data base? N Discart Frame Y Y Direction equal to port x? N Forward Frame to correct LAN Forward Frame in all LAN except X Bridge-Switch-Engl - 4 P. Nicoletti: see note pag.
15 Bridge Learning From Bridge forwarding Source found in forwarding data base? Y Update direction and timer N Add Source to DB with timer and direction Finished Bridge-Switch-Engl - 5 P. Nicoletti: see note pag.
16 Forwarding frame to unknown destination Station b-6-50-a0 Station b Port MAC adress Ageing time LAN A Flooding b-6-50-a0 0 B LAN B 3 Stazion a-0-40-e LAN C Station b-c4-e6-aa Station a Bridge-Switch-Engl - 6 P. Nicoletti: see note pag.
17 Forwarding frame to known address destination June 006 Station b-6-50-a0 Station b Port MAC adress Ageing time LAN A B Selective forwarding to port LAN B b-6-50-a b-c4-e6-aa 0 3 Station a-0-40-e LAN C Station b-c4-e6-aa Station a Bridge-Switch-Engl - 7 P. Nicoletti: see note pag.
18 Traffic limitation Station b-6-50-a0 Station b Port MAC adress Ageing time LAN A 3 B Discarded frame LAN B b-6-50-a b-c4-e6-aa b Stazion a-0-40-e LAN C Station b-c4-e6-aa Station a Bridge-Switch-Engl - 8 P. Nicoletti: see note pag.
19 Station 5 move and Filtering Data Base update Station b-c4-e6-aa Station b-6-50-a0 Station b Port MAC adress Ageing time LAN A 3 B Discarded Frame LAN B b-6-50-a b-c4-e6-aa b Station a-0-40-e LAN C Station a Bridge-Switch-Engl - 9 P. Nicoletti: see note pag.
20 Station move and forwarding error Station b-6-50-a0 LAN A Frame for Station Forwarded on wrong port Port MAC adress Ageing time b-6-50-a0 50 B LAN B b-c4-e6-aa b Station a-0-40-e a-0-40-e 0 LAN C Station b-c4-e6-aa Station a Station b Bridge-Switch-Engl - 0 P. Nicoletti: see note pag.
21 Fault Tolerant network and Filtering Data Base Update Primary Link Sencodary Link Bridge-Switch-Engl - P. Nicoletti: see note pag.
22 LAN 6 Loop on the network Broadcast are not filtered: broadcast storm 3 LAN B Bp= C-0-A0-30 LAN 3 Bp= C B 3 LAN Bp= C B5 LAN 7 3 B3 Bp= B-5-- LAN 4 LAN 5 B4 Bp= B-AA Bridge-Switch-Engl - P. Nicoletti: see note pag.
23 Solution: cut the loops LAN Bp= C B 3 LAN 6 3 B Bp= C-0-A0-30 LAN 3 LAN Bp= C B5 LAN 7 3 B3 Bp= B-5-- LAN 4 LAN 5 B4 Bp= B-AA Bridge-Switch-Engl - 3 P. Nicoletti: see note pag.
24 Spanning Tree All bridge in the network must be IEEE 80.D spanning tree compliant The spanning tree algorithm operate with the following steps: Root Bridge election Root Port selection Designated/Blocking Port selection The spanning tree protocol use the BPDU (Bridge Protocol Data Unit) Bridge-Switch-Engl - 4 P. Nicoletti: see note pag.
25 Spanning tree protocol result June 006 LAN 6 LAN 4 Bp= C Costo 0 3 Designated Port Root Port Designated Port LAN Root Port B Bp=3768 B C-0-A0-30 Costo 0 LAN 7 Root Path Cost 0 (0 di B+ 0 di B) 3 Costo 0 3 Bp= B-AA B3 B4 Costo 0 Bp= B-5-- Costo 0 Root Path Cost 0 LAN 3 LAN 5 B5 Bp= C Costo 0 Designated Port LAN Bridge-Switch-Engl - 5 P. Nicoletti: see note pag. Root Port Designated Port Root Bridge Designated Port Root Port
26 Bridge Protocol Data Unit (BPDU) Configuration BPDU Topology Change Notification BPDU Dest. Addr. Multicast 0-80-C Source Addr. Singlecast MAC Bridge Address Length XY DSAP SSAP Control BPDU 04H 04H XID Configuration BPDU or Topology Change Notification BPDU FCS BPDU: Bridge Protocol Data Unit DSAP: Destination Service Access Point SSAP: Source Service Access Point Bridge-Switch-Engl - 6 P. Nicoletti: see note pag.
27 Configuration BPDU Root Identifier bridge identifier of root bridge Root Path Cost Cost to reach the root bridge Zero on BPDU transmitted by root bridge Bridge Identifier Port Identifier Byte Protocol Identifier: Protocol Version Identifier: 00 BPDU Type: 00 TC Flags Root Identifier TCA TCA First byte = Bridge Priority Last 6 byte = Root Bridge MAC Address Root Path Cost Bridge Identifier First byte = Bridge Priority Last 6 byte = Bridge MAC Address witch transmit BPDU Port Identifier First byte = Port Priority second byte = port number Message Age Max Age Hello Time Forward Delay Bridge-Switch-Engl - 7 P. Nicoletti: see note pag.
28 Bridge Identifier MAC Address assigned to the Bridge Priority assigned to the Bridge: bridge priority Configuration Default value to guarantee plug&play operation Became root bridge the bridge with less bridge identifier Less bridge priority determine the root bridge election If Bridge priority is the same in every bridge the lowest MAC address determine the root bridge election Bridge Identifier or Root Identifier Bridge Priority (default 3.768) Bridge MAC Address Bridge-Switch-Engl - 8 P. Nicoletti: see note pag.
29 Port Identifier Identify the port witch transmit the BPDU on connected LAN Port Priority (default 8) Port number Port Identifier Bridge-Switch-Engl - 9 P. Nicoletti: see note pag.
30 The algorithm principle Root Bridge election Is selected as root bridge the bridge with lowest Bridge Identifier Root port The port (only one) connection to the root bridge Designated Port The port that forwards frames from that LAN towards the Root A bridge may one or more designated ports Bridge-Switch-Engl - 30 P. Nicoletti: see note pag.
31 The algorithm principle: Root & Designated Port selection Rule for Root and Designated Port selection Lowest Root Path Cost In case of equal Root Path Cost the algorithm look for Lowest Bridge Identifier In case of equal Root Path Cost and equal Bridge Identifier the algorithm look for Lowest Port Identifier If there is only one port to connect a LAN that port is immediately elected as Designated Port All the active port of the root Bridge are selected as Designated Port The ports that are not been selected as root or designated go to Blocking State Bridge-Switch-Engl - 3 P. Nicoletti: see note pag.
32 Port State Listening Receive frames Do not forward frames Do not update the forwarding data base Compute received BPDU Transmit BPDU Forwarding Receive frames Forward frames Update the forwarding data base Compute received BPDU Transmit BPDU Learning Receive frames Do not forward frames Update the forwarding data base Compute received BPDU Transmit BPDU Blocking Receive frames Do not forward frames Do not update the forwarding data base Compute received BPDU DO not transmit BPDU Bridge-Switch-Engl - 3 P. Nicoletti: see note pag.
33 Port state diagram () Disabled () () () (,) Listening (3) (5) (4) Blocking (4) Learning (4) (5) Forwarding (,) (,) ) Port enabled, by management or initialization ) Port disabled, by management or failure 3) Algorithm selects as Designated or Root Port 4) Algorithm selects as Alternate Port 5) Protocol timer expiry (Forwarding Timer) Bridge-Switch-Engl - 33 P. Nicoletti: see note pag.
34 Topology Change If a bridge detect a topology change send a Topology Change Notification BPDU trough root port A bridge that receive a TCN BPDU forward that frame trough root port Root bridge answer with a Configuration BPDU with topology change bit set The bridge receiving that BPDU from root port forward a BPDU with topology change acknowledgment bit set A bridge detecting or informed about a topology change set a short time to remove the entries equal to forward delay timer Byte 3 4 Protocol Identifier: Protocol Version Identifier: 00 BPDU Type: 80 TCN Bridge-Switch-Engl - 34 P. Nicoletti: see note pag.
35 Timers values Hello time Configuration BPDU generation interval Range: - 0 seconds - Recommended: seconds Forward delay timer Delay port state change: from listening to learning, from learning to forwarding state short time to remove the entries from filtering database Range: 4-30 seconds - Recommended: 5 seconds Max age The maximum age of received protocol information before it is discarded (unblocking timer port). Range: 6-40 seconds - Recommended: 0 secondi The timers are announced by the root bridge on the configuration BPDU Bridge-Switch-Engl - 35 P. Nicoletti: see note pag.
36 Timers limit The recommended timers assure a STP convergence of 50 seconds The recommended timers assure a correct STP operation with a maximum bridge diameter up 7 bridge The maximum bridge diameter of the Bridge LAN is the maximum number of Bridges between any two points of attachment of end stations. Changing the timers may: Increase or decrease the STP convergence Increase or decrease the maximum bridge diameter Bridge-Switch-Engl - 36 P. Nicoletti: see note pag.
37 STP Configuration parameters The bridges are plug&play They may work with default configuration parameters Bridge priority Range: Default/recommended: 3768 Suggested increment (IEEE 80.t): 4096 Port priority Range: 0-40 Default/recommended: 8 Suggested increment (IEEE 80.t): 6 Port Path cost Range: Recommended (IEEE 80.D): 000/(Speed in Mb/s) Bridge-Switch-Engl - 37 P. Nicoletti: see note pag.
38 Recommended Port Path Cost by IEEE 80.D rev998 June 006 Port Recommended Recommended Accepted speed values range values range values 4Mb/s Mb/s Mb/s Mb/s Gb/s Gb/s Bridge-Switch-Engl - 38 P. Nicoletti: see note pag.
39 IEEE 80.t: new STP parameters adopted by 80.w e 80.s standards Extended Port Path Cost in a range from to Extended System Identifier Bridge Identifier o Root Identifier 4 bit bit Bridge MAC Address Bridge Priority (default 3.768) STP Instance Bridge-Switch-Engl - 39 P. Nicoletti: see note pag.
40 Path Cost IEEE 80.t & 80.w June 006 Port Recommended Recommended Accepted speed value range range values <= 00 Kb/s Mb/s Mb/s Mb/s Gb/s Gb/s Gb/s Tb/s Tb/s Bridge-Switch-Engl - 40 P. Nicoletti: see note pag.
41 Rapid Spanning Tree Protocol (RSTP) 80.w Fast convergence Spanning tree: Less than second Interoperable with STP IEEE 80.D Without fast convergence Modern solution for mission critical BLAN Operate only on point-to-point links Direct connections (no hub) June 006 Bridge-Switch-Engl - 4 P. Nicoletti: see note pag.
42 Port rules Blocking state substitute by Alternate & Backup port rules Alternate Port that offers an alternate path in the direction of the Root Bridge to that provided by the Bridge s own Root Port. Backup Acts as a backup for the path provided by a Designated Port in the direction of the leaves of the Spanning Tree. Backup Ports exist only where there are two or more connections from a given Bridge to a given LAN. Root Designated Disabled Bridge-Switch-Engl - 4 P. Nicoletti: see note pag.
43 Edge Port Edge port is a terminating that connect a end-station Edge port do not work as other port: As soon detect a Link Integrity Test go immediately to Forwarding state without Listening e Learning state A port changing state do not cause a TCN BPDU transmission trough root port Bridge-Switch-Engl - 43 P. Nicoletti: see note pag.
44 Diagrammatic conventions Legenda Graphic Symbol Bridge Identifier Port Identifier & Port Cost p, c p, c p, c p, c BBB RRR,c p, c p, c BRIDGE p, c p, c Root Identifier Root Path Cost A LAN Bridge-Switch-Engl - 44 P. Nicoletti: see note pag.
45 Diagrammatic conventions Port rule Port state Legenda Designated Edge Port Root Port Alternate Backup Disabled Discarding Learning Forwarding Forwarding Discarding Learning Forwarding Discarding Discarding Designated Designated Proposal Root Root Agreement BPDU trasmesse Bridge-Switch-Engl - 45 P. Nicoletti: see note pag.
46 The algorithm principle Same as STP Root Bridge election Root port Designated Port The port not selected as root or designated are selected as: Alternate if connected to a port on different bridge Backup if connected to a different port of the same bridge Bridge-Switch-Engl - 46 P. Nicoletti: see note pag.
47 Physical redundant star topology 4 3 A B 3 4 C F D E G I H K J M L N Bridge-Switch-Engl - 47 P. Nicoletti: see note pag.
48 RSTP active topology Root,0 4 3 A B,0 3 4 C F D E 6 333, , G I H K J M L N 555, , , ,0 4 3 Bridge-Switch-Engl - 48 P. Nicoletti: see note pag.
49 RSTP tree & port state Root A,0,0 4 3 B 3 4 C F D E 6 333, , G I H K J M L N 555, , , ,0 4 3 Bridge-Switch-Engl - 49 P. Nicoletti: see note pag.
50 Backup port example,0 4 3 Root A B,0 3 4 C F D E 6 333, , G I H K J M L N 555, , , ,0 4 3 O Bridge-Switch-Engl - 50 P. Nicoletti: see note pag.
51 Ring topology A Root,0 3 B,0 C 3 L D K 3 666,0 333,0 E 3 J F I 3 555,0 H 3 444,30 G Bridge-Switch-Engl - 5 P. Nicoletti: see note pag.
52 Fault recovery based on physical level fault detection If the switch loose a root port activate immediately the alternate port that became a new root port Fault detection and recovery based on physical layer fault Bridge-Switch-Engl - 5 P. Nicoletti: see note pag.
53 Fault detection and flush entry Local flush entries The bridge flush immediately the entries that have a faulty port as destination port Local flush entries on bridge ports at end of faulty link A bridge that change an Alternate Port to a Root Port send a Topology Change Notification (TCN) BPDU trough root port A bridge that receive a TCN BPDU: Flush the entries on every ports except the port were the TCN as been received Forward TCN on every ports in forwarding state except the port were the TCN as been received Bridge-Switch-Engl - 53 P. Nicoletti: see note pag.
54 Flush entry example: initial configuration,0,0,0 333,0 444,0,0 333,0 444,0 555,0 666,0 555,0 666,0 777,30 Tree represantation 777,30 Bridge-Switch-Engl - 54 P. Nicoletti: see note pag.
55 Flush entry: step The link fails, and both 555 and 777 notice. It can be seen that all the Ports indicated will need to be flushed.,0 333,0,0 444,0 555,0 666,0 Legenda Addresses learnt on these Ports need to be flushed. Addresses learnt on these Ports have been flushed. TCN transmitted in the direction of the arrow 777,30 Bridge-Switch-Engl - 55 P. Nicoletti: see note pag.
56 Flush entry: step 555 and 777 flush addresses for their failed Ports. 777 change the port state from alternate to root 777 sends a TCN message (an RSTP BPDU with TC set).,0 333,0,0 444,0 555,0 666,0 Legenda Addresses learnt on these Ports need to be flushed. 777,30 Addresses learnt on these Ports have been flushed. TCN transmitted in the direction of the arrow Bridge-Switch-Engl - 56 P. Nicoletti: see note pag.
57 Flush entry: step receives the TCN message, flushes addresses on all other Ports, and forwards a TCN.,0 333,0 3 4,0 444,0 555,0 666,0 3 Legenda Addresses learnt on these Ports need to be flushed. Addresses learnt on these Ports have been flushed. TCN transmitted in the direction of the arrow 777,30 Bridge-Switch-Engl - 57 P. Nicoletti: see note pag.
58 Flush entry: step receives the TCN message, flushes, and forwards the TCN to and 555.,0 3, , ,0 555,0 666,0 Legenda Addresses learnt on these Ports need to be flushed. 777,30 Addresses learnt on these Ports have been flushed. TCN transmitted in the direction of the arrow Bridge-Switch-Engl - 58 P. Nicoletti: see note pag.
59 Flush entry: step 5 receives the TCN, flushes and sends TCN messages on all other Ports.,0 3,0 3 Receipt of the TCN will cause and 444 to flush their Ports. 333,0 444, ,0 666,0 Legenda Addresses learnt on these Ports need to be flushed. 777,30 Addresses learnt on these Ports have been flushed. TCN transmitted in the direction of the arrow Bridge-Switch-Engl - 59 P. Nicoletti: see note pag.
60 DSAP SSAP Length DSAP SSAP Multicast 0-80-C Singlecast Bridge Address Control June 006 XY 04H 04H XID Configuration message Proposal Port role Unknown Alternate/Backup Root Designated = STP = RSTP Agreement RSTP Configuration BPDU Byte Protocol Identifier Protocol Ver. Identifier 00 BPDU Type 00 TC Flags TCA Root Identifier First bytes = Bridge Priority Lasti 6 bytes = Root Bridge MAC Address Root Path Cost Bridge Identifier First bytes = Bridge Priority Last 6 byte = Bridge MAC Address witch transmit BPDU Port Identifier First byte = Port Priority Second byte = port number Message Age Max Age Hello Time Forward Delay Bridge-Switch-Engl - 60 P. Nicoletti: see note pag
61 Ring topology and fast recovery Fault on the ring If the bridge have an alternate port change immediately the state from alternate to root state Recovery based physical layer If the bridge don t have an alternate port propose it self as Root Bridge Recovery based on new protocol handshaking Fast BPDU Proposal and Agreement type handshaking Sync & Agree operations Port receiving BPDU with Designated Proposal flag execute a Sync operation Discard all packet received on non-edge ports Port discarding packet (Sync) go immediately on Forwarding State when receive a BPDU with Designated Agreement flag Bridge-Switch-Engl - 6 P. Nicoletti: see note pag.
62 Ring topology fault: step,0 3 4 B 333,0 4 3,0 3 4 B 333,0 4 3 A C fault C,0 3 D 444,0 3 4,0 3 D 444,0 3 4 E F E F Bridge-Switch-Engl - 6 P. Nicoletti: see note pag.
63 Ring topology fault and new Root proposal,0 3 4 B 333,0 4 3,0 3 4 B 333,0 4 3 fault C fault C,0 3 Root Bridge? D BPDU as root bridge with flag Designated Proposal 444,0 3 4 E F,0 3 D 444,0 3 4 E F Sync operation Bridge-Switch-Engl - 63 P. Nicoletti: see note pag.
64 Ring topology fault: Sync Operation,0 3 4 B 333,0 4 3,0 3 4 B 333,0 4 3 fault,30 3 D BPDU containing new route to the root bridge with Flag Designated Proposal C 444,0 3 4 E BPDU flag Root Proposal F fault,30 3 BPDU flag Root Agreement D BPDU with Designated Agreement flag set C 444,0 3 4 E F Bridge-Switch-Engl - 64 P. Nicoletti: see note pag.
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
More informationIEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
More informationEthernet/IEEE 802.3 evolution
Ethernet/IEEE 802.3 evolution Pietro Nicoletti www.studioreti.it 8023-Evolution-Engl - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties.
More informationThe ABCs of Spanning Tree Protocol
The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,
More informationCHAPTER 10 LAN REDUNDANCY. Scaling Networks
CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy
More informationObjectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network
Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Objectives Explain the role of redundancy in a converged network Summarize how STP works to eliminate Layer 2 loops in a converged
More informationWiMAX and 802.16 Standards
WiMAX and 802.16 Standards Pietro Nicoletti piero[at]studioreti.it Wimax-Eng - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title
More informationAbstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.
Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application
More informationAlliedWare Plus OS How To Configure interoperation between PVST+ and RSTP or MSTP
AlliedWare Plus OS How To Configure interoperation between PVST+ and RSTP or MSTP Introduction Spanning trees that protect networks from loops can provide better traffic load balancing if traffic in different
More informationManagement Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
More information- Spanning Tree Protocol -
1 Switching Loops - Spanning Tree Protocol - A Layer-2 switch belongs to only one broadcast domain, and will forward both broadcasts and multicasts out every port but the originating port. When a switching
More informationSwitching in an Enterprise Network
Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationBridgewalling - Using Netfilter in Bridge Mode
Bridgewalling - Using Netfilter in Bridge Mode Ralf Spenneberg, ralf@spenneberg.net Revision : 1.5 Abstract Firewalling using packet filters is usually performed by a router. The packet filtering software
More informationFundamentals of Switching
1 CCNA 640-801 Exam Notes - Fundamentals of Switching CCNA 640-801 Exam Notes Fundamentals of Switching 1. LAN Segmentation 1.1 In a collision domain, a frame sent by a device can cause collision with
More informationFast Fault Recovery in Switched Networks for Carrying IP Telephony Traffic
Technical report, IDE1002, February 2010 Fast Fault Recovery in Switched Networks for Carrying IP Telephony Traffic Master s Thesis in Computer Network Engineering ALI AKBAR EISAZADEH & NORA ESPAHBODI
More informationZarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
More informationA New Approach to Developing High-Availability Server
A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University jyu@cs.depaul.edu ABSTRACT This paper
More informationHARTING Ha-VIS Management Software
HARTING Ha-VIS Management Software People Power Partnership HARTING Management Software Network Management Automation IT - with mcon Switches from HARTING With the Ha-VIS mcon families, HARTING has expanded
More informationFlow control on IEEE 802.3x switch
Flow control on IEEE 802.3x switch Mario Baldi Politecnico di Torino mario.baldi[at]polito.it staff.polito.it/mario.baldi Pietro Nicoletti Studio Reti piero[at]studioreti.it www.studioreti.it Based on
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More information16-PORT POWER OVER ETHERNET WEB SMART SWITCH
16-PORT POWER OVER ETHERNET WEB SMART SWITCH User s Manual (DN-95312) - 0 - Content Web Smart Switch Configure login ---------------------------------- 2 Administrator Authentication Configuration ---------------------------------------------
More informationEthernet (LAN switching)
Ethernet ( switching) 1 Outline Interconnection devices Bridges/ switches vs. Routers Bridges Learning Bridges Transparent bridges 2 1 Bridges/ switches Interconnect multiple, possibly with different type
More informationCOMPUTER NETWORKS - LAN Interconnection
LAN interconnection Telecommunication s Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS - LAN interconnection- 1 Copyright Quest opera è protetta dalla licenza Creative
More informationConfiguration of Cisco Routers. Mario Baldi
Configuration of Cisco Routers Basics Static Routing Mario Baldi Politecnico di Torino mario.baldi[at]polito.it http://staff.polito.it/mario.baldi ConfRoutEn - 1 M. Baldi: see page 2 Copyright Notice This
More informationRESILIENT NETWORK DESIGN
Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, igregr@fit.vutbr.cz Campus Best Practices - Resilient network design Campus
More informationFulvio Risso Politecnico di Torino
Quality of Service in IEEE 802 LANs Fulvio Risso Politecnico di Torino 1 Based on chapter 8 of M. Baldi, P. Nicoletti, Switched LAN, MG McGraw-Hill, 2002, ISBN 88-386-3426-2 3426 2 and on an existing presentation
More informationHow To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (
You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL
More informationRedundant Serial-to-Ethernet Data Connections for Mission-critical Devices
Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager daniel.lai@moxa.com The popularity of serial-to-ethernet technology has increased steadily since
More informationRedundancy and load balancing at L3 in Local. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Copyright notice This set of transparencies, hereinafter referred to as slides, is protected by copyright
More informationCourse Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
More informationLayer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
More informationCommunication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de
More informationHigh-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
More informationENTERASYS WEBVIEW WEB-BASED MANAGEMENT FOR THE VH-2402S/VH-2402S2 WEB MANAGEMENT GUIDE
ENTERASYS WEBVIEW WEB-BASED MANAGEMENT FOR THE VH-2402S/VH-2402S2 WEB MANAGEMENT GUIDE 9033821 Notice NOTICE Enterasys Networks reserves the right to make changes in specifications and other information
More informationCCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
More informationCORPORATE NETWORKING
CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Typical example of Ethernet local networks Mostly based
More informationExhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
More informationAPPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW
PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,
More informationService Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationVirtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain
Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/
More informationInfrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch
Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater
More informationMulti-layer switch hardware commutation across various layers. Mario Baldi. Politecnico di Torino. http://staff.polito.it/mario.
Multi-layer switch hardware commutation across various layers Mario Baldi Politecnico di Torino http://staff.polito.it/mario.baldi Based on chapter 10 of: M. Baldi, P. Nicoletti, Switched LAN, McGraw-Hill,
More informationRoute Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
More informationChapter 1 Reading Organizer
Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small
More informationUsing Industrial Ethernet Networks for PROFInet
Using Industrial Ethernet Networks for PROFInet Can I use ordinary Ethernet Switches for PROFInet? Yes and No Profinet communications use IEEE 802.3 Ethernet packets Profinet can be used for many different
More informationCONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist
CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11
More informationHowstuffworks "How LAN Switches Work" Click here to go back to the normal view!
Page 1 of 17 Search ComputerStuff AutoStuff ElectronicsStuff ScienceStuff HomeStuff EntertainmentStuff MoneyStuff TravelStuff Main > Computer > Hardware Click here to go back to the normal view! How LAN
More informationPort Trunking. Contents
13 Port Trunking Contents Overview.................................................... 13-2 Port Trunk Features and Operation........................... 13-4 Trunk Configuration Methods................................
More informationRedundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Problem: the router is a single point of failure H1 H2 H3 VLAN4 H4 VLAN4 Corporate LAN Corporate LAN R1 R2
More informationhp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
More informationIP SAN Best Practices
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
More informationChapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
More informationResiliency in Ethernet Based Transport Networks
Resiliency in Ethernet Based Transport Networks Kari Seppänen Kari.Seppanen@vtt.fi Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol
More informationApplication Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
More informationRedundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Default gateway redundancy (1) H1 DG: R1 H2 DG: R1 H3 DG: R1 R1 R2 ISP1 ISP2 Internet 3 Default gateway redundancy
More informationSystems Integration Track: Network Topology
Systems Integration Track: Network Topology Author Jim W. Hammond Technical Consultant, GarrettCom Keywords: Ring, Topology, RSTP, Ethernet, Network, VLAN Industrial networks, like most large networks,
More informationHow To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
More informationALL8894WMP. User s Manual. 8-Port 10/100/1000Mbps with 4-port PoE. Web Management Switch
ALL8894WMP 8-Port 10/100/1000Mbps with 4-port PoE Web Management Switch User s Manual Content Content I Introduction..3 Product Overview.3 Web Management Feature.3 Specification..4 Mechanical...4 Performance...5
More informationWSG24POE Switch. User Manual
WSG24POE Switch User Manual Version: 01/01/2011 Introduction! 4 Product Overview! 4 Specifications! 5 Package Contents! 5 Hardware Description! 6 Physical Dimensions/ Weight! 6 Front Panel! 6 LED Indicators!
More informationCisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationSimulation of High Availability Internet Service Provider s Network
Abdullah Jameel Mahdi 1 and Anas Ali Hussain 2 1 Information and Communication department, Information Engineering Collage, Al-Nahrin University 2 Computer department, Engineering Collage, Al-Nahrin University
More informationConfiguring EtherChannels
CHAPTER 12 This chapter describes how to configure EtherChannels on the Cisco 7600 series router Layer 2 or Layer 3 LAN ports. For complete syntax and usage information for the commands used in this chapter,
More informationConfiguring LACP (802.3ad) Between a Catalyst 6500/6000 and a Catalyst 4500/4000
Configuring LACP (802.3ad) Between a Catalyst 6500/6000 and a Catalyst 4500/4000 Document ID: 19642 Contents Introduction Before You Begin Conventions Prerequisites Components Used Background Theory Difference
More informationCHAPTER 6 DESIGNING A NETWORK TOPOLOGY
CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine
More informationLAN Topologies C H A P T E R. Unicast
C H A P T E R 2 LAN Topologies The application in use, such as multimedia, database updates, e-mail, or file and print sharing, generally determines the type of data transmission. LAN transmissions fit
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationGigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF
Gigabit Ethernet MAC (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF 1. INTRODUCTION This document serves as a product info for the Gigabit Ethernet MAC from Hitek Systems. The core supports
More informationCisco Networking Academy CCNP Multilayer Switching
CCNP3 v5 - Chapter 5 Cisco Networking Academy CCNP Multilayer Switching Implementing High Availability in a Campus Environment Routing issues Hosts rely on a router to find the best path Issues with established
More informationPort Trunking. Contents
12 Port Trunking Contents Overview..................................................... 12-2................................... 12-2 Port Connections and Configuration.......................... 12-3 Link
More informationPerformance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
More informationMLAG on Linux - Lessons Learned. Scott Emery, Wilson Kok Cumulus Networks Inc.
MLAG on Linux - Lessons Learned Scott Emery, Wilson Kok Cumulus Networks Inc. Agenda MLAG introduction and use cases Lessons learned MLAG control plane model MLAG data plane Linux kernel requirements Other
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationVocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch
Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging
More informationCommand Line Interface
bridge addressdatabase add Adding a Statically Configured Address to an Address Forwarding Database You can add a statically configured address to a forwarding database using the add command on the addressdatabase
More informationH3C SR8800 RPR Technology White Paper
H3C 00 RPR Technology White Paper Keywords: RPR, IP ring network Abstract: Resilient Packet Ring (RPR) is an international standard for establishing IP ring networks, offering a highly efficient and reliable
More informationTorii-HLMAC: Torii-HLMAC: Fat Tree Data Center Architecture Elisa Rojas elisa.rojas@uah.es University of Alcala (Spain)
Torii-HLMAC: Torii-HLMAC: Fat Tree Data Center Architecture Elisa Rojas elisa.rojas@uah.es University of Alcala (Spain) April 2013 1 Outline Introduction Protocol description Tree-based Multiple Addresses
More informationIP and Ethernet Communication Technologies and Topologies for IED networks
IP and Ethernet Communication Technologies and Topologies for IED networks Authors Navindra Yadav Principal Engineer, Cisco Systems, Inc. nyadav@cisco.com Eruch Kapadia Sr. Solutions Architect/Technical
More informationApplication Note 132. Introduction. Voice Video and Data Communications using a 2-Port Switch and Generic Bus Interface KSZ8842-16MQL/MVL
Application Note 132 Voice Video and Data Communications using a 2-Port Switch and Generic Bus Interface KSZ42-16MQL/MVL Introduction The IP-Telephony market is booming, due to the ease of use of the technology
More informationDell PowerVault MD Series Storage Arrays: IP SAN Best Practices
Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationLecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN
Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationNetworking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
More informationInternet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
More informationConfiguring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationData Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationUnit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
More informationBLADE PVST+ Spanning Tree and Interoperability with Cisco
BLADE PVST+ Spanning Tree and Interoperability with Cisco Technical Brief Industry-standard PVST+ Spanning Tree Protocol with Cisco interoperability Introduction...1 Spanning Tree Protocol (IEEE 802.1d)...1
More informationUser Manual 24 Port PoE 10/100/1000M with 4 Combo Gigabit SFP Open Slot Web Smart Switch
User Manual 24 Port PoE 10/100/1000M with 4 Combo Gigabit SFP Open Slot Web Smart Switch FCC Warning This Equipment has been tested and found to comply with the limits for a Class-A digital device, pursuant
More informationB&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network
Determinism is the assurance that control/communication will occur in a set period of time. Ethernet was nondeterministic at first, and not widely used for industrial purposes. Ethernet switches designed
More informationLevel 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More information2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More informationEasy Smart Configuration Utility
Easy Smart Configuration Utility REV1.1.0 1910010977 CONTENTS Chapter 1 About this Guide...1 1.1 Intended Readers... 1 1.2 Conventions... 1 1.3 Overview of This Guide... 1 Chapter 2 Getting Started...4
More information