SlideShare a Scribd company logo
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
This chapter covers the following basic switching topics as a
review to CCNA and serves as a teaser for topics covered later in
chapter:
•Hubs and switches
•Bridges and switches
•Switches of today
•Broadcast domains
•MAC addresses
•The basic Ethernet frame format
•Basic switching function
•VLANs
•The Spanning Tree Protocol
•Trunking
•Port channels
•Multilayer switching (MLS)
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
🔹 What is a Hub?
A hub is a basic networking device that connects multiple
computers or devices in a Local Area Network (LAN). It operates
at Layer 1 (Physical Layer) of the OSI model, meaning it does not
process data—it just forwards it.
🔹 How Does a Hub Work?
•When a device sends data to a hub, the hub broadcasts the data
to all connected devices.
•The intended recipient picks up the data, while the rest ignore
it.
•Hubs do not learn MAC addresses or filter traffic.
🔹 Types of Hubs
1.Passive Hub – Just forwards data without amplifying it.
2.Active Hub – Regenerates and amplifies signals before sending
them.
3.Intelligent Hub – Includes basic management features like
monitoring traffic.
🔹 Advantages of a Hub
✅ Simple & Cheap – Very easy to set up and cost-effective.
✅ Plug and Play – No configuration required.
✅ Good for Small Networks – Works for simple LANs with a
few devices.
🔹 Disadvantages of a Hub
❌ Broadcasts Data to All Devices – Causes network
congestion and security risks.
❌ Creates a Single Collision Domain – Collisions occur when
multiple devices send data simultaneously.
❌ No Traffic Filtering – No ability to optimize or manage
network performance.
❌ Limited Speed – Slower than modern network devices.
Hubs
•Legacy
•Layer 1 devices
•Multi-port repeaters
•Shared bandwidth
•Based on legacy bus topology
•CSMA/CD
•Single collision domain
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
🔹 What is a Bridge?
A bridge is a networking device that connects two separate LAN segments
and forwards traffic between them intelligently. It operates at Layer 2 (Data
Link Layer) of the OSI model and learns MAC addresses to filter and forward
traffic efficiently.
🔹 How Does a Bridge Work?
•Bridges store and analyze MAC addresses of devices in each LAN segment.
•When data is sent, the bridge checks its MAC table:
• If the destination is in the same segment, it blocks the data.
• If the destination is in a different segment, it forwards the data.
•This reduces unnecessary traffic and improves network efficiency.
🔹 Types of Bridges
1.Transparent Bridge – Most common, operates invisibly and filters traffic
based on MAC addresses.
2.Source Routing Bridge – Used in Token Ring networks, makes routing
decisions based on the sender's routing information.
3.Multiport Bridge – Connects multiple LAN segments and acts like a simple
switch.
🔹 Advantages of a Bridge
✅ Reduces Network Traffic – Filters traffic based on MAC addresses.
✅ Creates Separate Collision Domains – Improves performance.
✅ Enhances Security – Prevents unnecessary traffic from crossing
segments.
🔹 Disadvantages of a Bridge
❌ Slower Than Switches – Has to process and filter data before
forwarding.
❌ Limited Ports – Typically has only 2-4 ports (compared to switches
with 24-48 ports).
❌ Does Not Eliminate Broadcast Traffic – Broadcasts are still
forwarded.
🔹 When to Use a Bridge?
👉 To separate traffic between two LAN segments without using a
router.
👉 When you need basic filtering and traffic control but don’t need a
full switch.
👉 For legacy networks where upgrading to switches is not an option.
Switches
•Layer 2 devices
•Also operates at layer 1
•Full duplex
•Dedicated bandwidth
Switches Today
Application intelligence: This helps networks recognize many types of
applications and secure and prioritize those applications to provide
the best user experience.
Image Unified network services: Combining the best elements of
wireless and wired networking allows you to consistently connect to
any resource or person with any device. 10 Gigabit Ethernet
technology and Power over Ethernet (PoE) technology support new
applications and devices.
Image Nonstop communications: Features such as redundant
hardware, and nonstop forwarding and stateful switchover
(NSF/SSO) technology support more-reliable connections.
Image Integrated security: LAN switches provide the first line of
defense against internal network attacks and prevent unauthorized
intrusion.
Image Operational manageability: To more easily manage the network,
IT staff must be able to remotely configure and monitor network
devices from a central location.
MAC Addresses
Ethernet Frame Size
Ethernet II and IEEE 802.3 standards define:
•Minimum frame size as 64 bytes
•Maximum as 1518 bytes
“collision fragment” or “runt frame” – Frame less than 64 bytes
If size of a transmitted frame is less than the minimum or greater than the maximum,
the receiving device drops the frame
In 1998, IEEE 802.3ac standard extended the maximum allowable frame size to 1522
bytes.
Increased to accommodate a technology called Virtual Local Area Network (VLAN).
VLANs will be presented in a later course.
5.2.1.4 – MAC Address Tables on Connected Switches
For every Ethernet frame that enters a port, the switch will:
Step 1: Learn (Building the MAC address table)
Switch learns by examining the source MAC address
•If not in MAC address table, then add it along with incoming
port number
•If in MAC address table, reset 5 minute timer
PC-A sends a frame to PC-B
The fame is received by switch S1
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
Switch S1 sees if it has something to learn by examining the source MAC address
The source MAC address is not in its MAC address table
S1 adds the source MAC address 00-0A and the incoming port 1 to its MAC
address table
Step 2: Forwarding the frame (Using the MAC address table)
Switch forwards by examining the destination MAC address
•If broadcast/multicast MAC address, flood out all ports except the
port it came in on
•If unicast MAC address is in MAC address table, send it out only
that port
•If unicast MAC address is not in in MAC address table, flood out
all ports except the port it came in on (unknown unicast)
S1 can now forward the frame by examining the destination MAC
address
The destination MAC address 00-0B is not in its MAC address
table, so it floods it out all ports
This is known as an unknown unicast
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
PC-B’s NIC receives the frame.
After comparing the destination MAC address of 00-0B to it own NIC’s
MAC address it realizes they are the same and copies in the rest of
the frame.
For every Ethernet frame that enters a port, the switch will:
Step 1: Learn (Building the MAC address table)
Switch learns by examining the source MAC address
•If not in MAC address table, then add it along with incoming port
number
•If in MAC address table, reset 5 minute timer
The frame is also flooded out S1’s port 4 which is connected to switch
S2
S2 receives the frame and examines the source MAC address
Since this is new information, S2 add the source MAC address 00-0A
and the incoming port number 1 to its MAC address table
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
Step 2: Forwarding the frame (Using the MAC address table)
Switch forwards by examining the destination MAC address
•If broadcast/multicast MAC address, flood out all ports except
the port it came in on
•If unicast MAC address is in MAC address table, send it out only
that port
•If unicast MAC address is not in in MAC address table, flood out
all ports except the port it came in on (unknown unicast)
S2 can now forward the frame by examining the destination MAC
address
The destination MAC address 00-0B is not in its MAC address
table, so it floods it out all ports
Again, this is known as an unknown unicast
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
Both PC-C’s NIC and the Router’s NIC receives the frame.
Since their MAC addresses do not match the destination MAC
address they drop the rest of the frame
For every Ethernet frame that enters a port, the switch will:
Step 1: Learn (Building the MAC address table)
Switch learns by examining the source MAC address
•If not in MAC address table, then add it along with incoming port number
•If in MAC address table, reset 5 minute timer
PC-B now sends the frame to PC-A
The frame is received by switch S1
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
Switch S1 sees if it has something to learn by examining the source MAC address
The source MAC address is not in its MAC address table
S1 adds the source MAC address 00-0B and the incoming port 3 to its MAC address
table
Step 2: Forwarding the frame (Using the MAC address table)
Switch forwards by examining the destination MAC address
•If broadcast/multicast MAC address, flood out all ports except the port
it came in on
•If unicast MAC address is in MAC address table, send it out only that
port
•If unicast MAC address is not in in MAC address table, flood out all
ports except the port it came in on (unknown unicast)
S1 can now forward the frame by examining the destination MAC
address
The destination MAC address 00-0A is in its MAC address table, so it
filters the frame by sending it out only port 1
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
5.2.1.5 – Sending a Frame to the Default Gateway
Destination IP address is on a remote network.
PC-A will send the Ethernet frame to the MAC address of the default gateway
For every Ethernet frame that enters a port, the switch will:
Step 1: Learn (Building the MAC address table)
Switch learns by examining the source MAC address
•If not in MAC address table, then add it along with incoming port number
•If in MAC address table, reset 5 minute timer
Switch S1 sees if it has something to learn by examining the source MAC
address
The source MAC address is in its MAC address table, so it has nothing new to
learn
S1 refreshes the 5 minute refresh timer for this entry
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
Step 2: Forwarding the frame (Using the MAC address table)
Switch forwards by examining the destination MAC address
•If broadcast/multicast MAC address, flood out all ports except
the port it came in on
•If unicast MAC address is in MAC address table, send it out only
that port
•If unicast MAC address is not in in MAC address table, flood out
all ports except the port it came in on (unknown unicast)
S1 can now forward the frame by examining the destination MAC
address
The destination MAC address 00-0D is not in its MAC address
table, so it floods it out all ports
This is known as an unknown unicast
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
PC-B’s NIC receives the frame and ignores the rest of the frame after
determining that the destination MAC address of 00-0D does not
match it’s own MAC address of 00-0B
For every Ethernet frame that enters a port, the switch will:
Step 1: Learn (Building the MAC address table)
Switch learns by examining the source MAC address
If not in MAC address table, then add it along with incoming port number
If in MAC address table, reset 5 minute timer
The frame is also flooded out S1’s port 4 which is connected to switch S2
S2 receives the frame and examines the source MAC address
The source MAC address of 00-0A and port 1 is in its MAC address table,
so it has nothing new to learn
S2 refreshes the 5 minute refresh timer for this entry
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
Step 2: Forwarding the frame (Using the MAC address table)
Switch forwards by examining the destination MAC address
If broadcast/multicast MAC address, flood out all ports except the port it
came in on
If unicast MAC address is in MAC address table, send it out only that port
If unicast MAC address is not in in MAC address table, flood out all ports
except the port it came in on (unknown unicast)
S2 can now forward the frame by examining the destination MAC address
The destination MAC address 00-0D is not in its MAC address table, so it
floods it out all ports
Again, this is known as an unknown unicast
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
PC-C’s NIC and the Router’s NIC receives the frame.
PC-C’s MAC addresses does not match the destination
MAC address so it drops the rest of the frame
The router’s MAC address does match the destination
MAC address so it copies in the rest of the frame
The router will de-encapsulate the data from the
Ethernet frame and process the Layer 3 PDU, the IP
packet, for routing.
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
For every Ethernet frame that enters a port, the switch will:
Step 1: Learn (Building the MAC address table)
Switch learns by examining the source MAC address
If not in MAC address table, then add it along with incoming port number
If in MAC address table, reset 5 minute timer
The router now sends the frame to PC-A
The frame is received by switch S2
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
Switch S2 sees if it has something to learn by examining the source MAC address
The source MAC address is not in its MAC address table
S2 adds the source MAC address 00-0D and the incoming port 4 to its MAC address
table.
Step 2: Forwarding the frame (Using the MAC address table)
Switch forwards by examining the destination MAC address
If broadcast/multicast MAC address, flood out all ports except the port it
came in on
If unicast MAC address is in MAC address table, send it out only that port
If unicast MAC address is not in in MAC address table, flood out all ports
except the port it came in on (unknown unicast)
S2 can now forward the frame by examining the destination MAC
address
The destination MAC address 00-0A is in its MAC address table, so it
filters the frame by sending it out only port 1
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
For every Ethernet frame that enters a port, the switch will:
Step 1: Learn (Building the MAC address table)
Switch learns by examining the source MAC address
If not in MAC address table, then add it along with incoming port number
If in MAC address table, reset 5 minute timer
Switch S1 sees if it has something to learn by examining the source MAC
address.
The source MAC address is in its MAC address table, so it has nothing new
to learn.
S1 refreshes the 5 minute refresh timer for this entry
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
Step 2: Forwarding the frame (Using the MAC address table)
Switch forwards by examining the destination MAC address
If broadcast/multicast MAC address, flood out all ports except the port it
came in on
If unicast MAC address is in MAC address table, send it out only that port
If unicast MAC address is not in in MAC address table, flood out all ports
except the port it came in on (unknown unicast)
S1 can now forward the frame by examining the destination MAC address
The destination MAC address 00-0A is in its MAC address table, so it
filters the frame by sending it out only port 1
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
5.3.2.3 – ARP Operation – ARP Request
PCA at 192.168.1.110 has an IPv4 packet to send to 192.168.1.50
Comparing its IPv4 address with the destination IPv4 address, PCA
determines this device is on the same IP network
PCA checks its ARP table for 192.168.1.50 but no match
PCA puts the IPv4 packet on hold and
creates an ARP Request with
Target IPv4 = 192.168.1.50
Target MAC – unknown
Source MAC 00-A
Destination MAC = broadcast
PCA sends the ARP request which is received by the switch
Because the destination MAC is a broadcast the switch sends it out all ports but
the incoming port
PCB compares the target IPv4 address to its own MAC address and because
it is not a match ignores the ARP request
Router R1 compares the target IPv4 address to its own MAC address and because it
is not a match ignores the ARP request.
Routers do not forward broadcasts.
The target address in the ARP request matches PCC’s IPv4 address
5.3.2.4 – ARP Operation – ARP Reply
The target address in the ARP request matches PCC’s IPv4 address
PCC sends an ARP reply to the sender of
the ARP request
This is a unicast
Sender IPv4 = 192.168.1.50
Sender MAC – 00-0C
Source MAC 00-0C
Destination MAC = 00-0A
PCA receives the ARP reply
PCC Adds the sender’s IPv4 address and MAC address to its ARP table
PCC takes the IPv4 packet off hold
PCC uses the MAC address for the destination MAC address
PCA now sends this Ethernet frame with the encapsulated IPv4 packet
out its Ethernet NIC
5.3.2.5 – ARP Role in Remote Communication
PC A at 192.168.1.110 has an IPv4 packet to send to 10.1.1.10
Comparing its IPv4 address with the destination IPv4 address, PCA
determines this device is on a different IP network
PCA must sent this packet to its default gateway 192.168.1.1
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
PC A checks its ARP table for 192.168.1.1 but no match
PC A puts the IPv4 packet on hold and
creates an ARP Request with
Target IPv4 = 192.168.1.1
Target MAC – unknown
Source MAC 00-A
Destination MAC = broadcast
PC A sends the ARP request which is received by the switch
Because the destination MAC is a broadcast the switch sends it out all
ports but the incoming port
PC B compares the target IPv4 address to its own MAC address and because it is
not a match ignores the ARP request
PC C compares the target IPv4 address to its own MAC address and
because it is not a match ignores the ARP request
The target address in the ARP request matches the router’s the IPv4 address on
its G0/0 interface
PC C sends an ARP reply to the sender of
the ARP request
This is a unicast
Sender IPv4 = 192.168.1.1
Sender MAC – 00-0D
Source MAC 00-0D
Destination MAC = 00-0A
PC A receives the ARP reply
PC C Adds the sender’s IPv4 address and MAC address to its ARP table
PC C takes the IPv4 packet off hold
PC C uses the MAC address for the destination MAC address
PC A now sends this Ethernet frame with the encapsulated IPv4 packet out its
Ethernet NIC towards the default gateway
Understanding IPv4 communications
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
•Devices can only communicate with other devices on the same subnet
•Otherwise, they must go through a router, that is on its same subnet
Switch Type Description Features Use Cases
Unmanaged
Switch
Plug-and-play
switch with no
configuration
Simple, cost-
effective,
automatic MAC
address learning
Small home
networks, basic
office setups
Managed Switch
Allows full control
over traffic and
configurations
VLAN support,
QoS, SNMP
monitoring,
security features
Enterprise
networks, data
centers, large
businesses
Smart (Lightly
Managed) Switch
Limited
management
features via a web
interface
Basic VLAN, QoS,
limited monitoring
Small to medium-
sized businesses
needing some
control
1. Based on Management Capabilities
Switch Type Description Features Use Cases
Layer 2 Switch
Operates at the
Data Link Layer
(L2), forwarding
packets based on
MAC addresses
VLAN support,
MAC filtering,
Spanning Tree
Protocol (STP)
LAN segmentation,
local traffic
handling
Layer 3 Switch
Functions like a
router, operating
at the Network
Layer (L3),
forwarding packets
based on IP
addresses
Routing between
VLANs, inter-VLAN
communication,
supports OSPF, RIP,
and static routes
Large LANs,
reducing router
dependency
2. Based on Layer Functionality
Switch Type Description Features Use Cases
Enterprise Switch
Designed for large-
scale business
networks
High-speed,
redundancy,
multiple
management
protocols
Corporate
networks,
campuses
Data Center
Switch
High-performance
switches for
handling massive
traffic loads
High bandwidth,
low latency,
redundancy
Cloud services,
large-scale data
centers
Industrial Switch
Rugged design for
harsh
environments
High durability,
extreme
temperature
support
Manufacturing
plants, outdoor
networks
Campus Switch
Used for
educational
institutions and
large office
buildings
Scalable,
centralized
management
Universities, large
office campuses
3. Based on Deployment
Switch Type Description Features Use Cases
Fixed Switch
Comes with a set
number of ports,
cannot be
expanded
Cost-effective,
suitable for small
setups
Small businesses,
home networks
Modular Switch
Expandable with
additional modules
High scalability,
customizable
Large enterprises,
data centers
Stackable Switch
Can be stacked
with multiple
switches to work
as one
Increased
redundancy,
simplified
management
Medium to large
networks needing
scalability
4. Based on Network Configuration
Switch Type Description Features Use Cases
PoE (Power over
Ethernet) Switch
Provides power
along with data
over Ethernet
cables
Supports
PoE/PoE+ for
powering IP
cameras, VoIP
phones, and IoT
devices
Smart offices,
surveillance
systems
Fiber Switch
Uses fiber-optic
connections for
high-speed data
transfer
Supports SFP/SFP+
ports, low latency
Long-distance
networking, high-
speed backbones
KVM Switch
Controls multiple
computers using a
single keyboard,
video monitor,
and mouse
Multi-device
control
Data centers, IT
administrators
Ethernet Switch
Standard switch
for Ethernet
networks
Supports Fast
Ethernet, Gigabit
Ethernet, or
10GbE
General network
setups
5. Based on Connectivity & Technology
Switch Type Description Features Use Cases
Gigabit Switch
Supports speeds
up to 1 Gbps per
port
Fast data transfer,
common in
modern networks
Homes, offices,
small data centers
10G/40G/100G
Switch
Supports high-
speed networking
for demanding
applications
Low latency, high
bandwidth
Data centers, cloud
computing, high-
performance
computing (HPC)
6. Based on Performance
Based on network architecture
Feature
Edge Switch
(Access Layer)
Distribution Switch
(Aggregation
Layer)
Core Switch
(Backbone Layer)
Main Function
Connects end
devices to the
network
Aggregates traffic
from edge switches
Provides high-
speed backbone
connectivity
Layer Layer 2 (mostly)
Layer 3 (Inter-VLAN
Routing)
Layer 3 (High-
speed Routing)
Speed 1G - 10G 10G - 40G 40G - 100G+
Redundancy Low
Medium (some
redundancy
features)
High (dual power,
failover support)
Traffic Type Local user traffic
Aggregated traffic
from edge switches
High-speed core
backbone traffic
Common Users
End-users, printers,
VoIP
Departments,
office buildings
Data centers,
corporate
backbones
Comparison Table
1. Define Your Network Requirements
A. Network Size & Scale
•Small Office/Home (1-20 users): Unmanaged or Smart switches
•Medium Business (20-200 users): Managed switch with VLAN support
•Large Enterprise (200+ users): Layer 3 switch with high-speed uplinks
•Data Center: Modular or core switch with redundancy
B. Performance Needs
•Low Traffic: 1Gbps ports are sufficient
•Medium Traffic: 10Gbps uplinks for smooth connectivity
•High Traffic (Data Center, Large Enterprise): 40G or 100G switches
C. Deployment Type
•Edge/Access Layer (End Devices): Layer 2, PoE support for VoIP/WiFi
•Distribution Layer (Aggregating Traffic): Layer 3, Inter-VLAN Routing
•Core Layer (Backbone Traffic): High-speed Layer 3 switch
Key Takeaways
•For home or small business → Unmanaged or Smart Switch
•For enterprises → Managed or Layer 3 Switch
•For high-speed networks → 10G/40G/100G or Fiber Switch
•For power-hungry devices → PoE Switch
•For data centers → Modular, Stackable, or Data Center Switch
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf

More Related Content

PPTX
Switches, Routers and different routing protocols
PPTX
Lan switching technologies
PDF
CCNA 1 Chapter 5 v5.0 2014
PPTX
mao nani run saun nalang jud ni sir-Chp5.pptx
PPTX
LECTURE 02 (b).pptxnnnnnnnnnnnnnnnnnnnnn
PPT
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
PPT
Networks-part17-Bridges-RP1.pptjwhwhsjshh
PDF
Networking interview questions and answers
Switches, Routers and different routing protocols
Lan switching technologies
CCNA 1 Chapter 5 v5.0 2014
mao nani run saun nalang jud ni sir-Chp5.pptx
LECTURE 02 (b).pptxnnnnnnnnnnnnnnnnnnnnn
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networking interview questions and answers

Similar to CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf (20)

PPTX
КЛМ_Урок 5
DOCX
Cisco switching and spanning tree protocol (stp) basics
PPT
EOS Principle and description in SDH 37p.ppt
PPT
Networkdevices by Jetarvind kumar madhukar
PDF
tep 2 Display the switch MAC address .pdf
PPT
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
PDF
ITN_Module_7.pdf jnnnnnnnnnnnnnnnnnnmnnm
PPTX
Introduction to backwards learning algorithm
DOCX
Lab view the switch mac address table lab - view the switch
PPT
Expl sw chapter_02_switches_part_1
PPT
Switching and routing for the networks in computing
PPT
C C N A Day4
PPTX
Network Topologies, L1-L2 Basics, Networking Devices
PPS
Introduction to the OSI 7 layer model and Data Link Layer
PDF
A Presentation About Network Switches.pdf
PPTX
Interconnecting devies
PPTX
CCNA v6.0 ITN - Chapter 05
PPTX
chapter 5.1.pptx
PPT
layer2-network-design.ppt
PPTX
CCNA_ITN_Chp5.pptx
КЛМ_Урок 5
Cisco switching and spanning tree protocol (stp) basics
EOS Principle and description in SDH 37p.ppt
Networkdevices by Jetarvind kumar madhukar
tep 2 Display the switch MAC address .pdf
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
ITN_Module_7.pdf jnnnnnnnnnnnnnnnnnnmnnm
Introduction to backwards learning algorithm
Lab view the switch mac address table lab - view the switch
Expl sw chapter_02_switches_part_1
Switching and routing for the networks in computing
C C N A Day4
Network Topologies, L1-L2 Basics, Networking Devices
Introduction to the OSI 7 layer model and Data Link Layer
A Presentation About Network Switches.pdf
Interconnecting devies
CCNA v6.0 ITN - Chapter 05
chapter 5.1.pptx
layer2-network-design.ppt
CCNA_ITN_Chp5.pptx
Ad

Recently uploaded (20)

PDF
Challenges in Sim 2 Real. Tutorial on Simulation Environments.
PDF
Physics class 12thstep down transformer project.pdf
PDF
What are dimensions of the Volvo ECR235cl.pdf
PDF
Volvo ecr88 battery location Service Repair Manual.pdf
PDF
higher edu open stores 12.5.24 (1).pdf forreal
PPTX
Robot_ppt_YRG[1] [Read-Only]bestppt.pptx
PDF
How much does a e145 excavator weight.pdf
PDF
Volvo ecr58 plus Service Manual Download
PPT
Kaizen for Beginners and how to implement Kaizen
PPTX
capstoneoooooooooooooooooooooooooooooooooo
PDF
Diagnose and Repair Transmission Sound Issues in Volkswagen Vehicles
PDF
Volvo EC290C NL EC290CNL excavator weight.pdf
PDF
Volvo ecr88 problems Manual Download.pdf
PDF
Delivers.ai: 2020–2026 Autonomous Journey
PDF
Honda Dealership SNS Evaluation pdf/ppts
PDF
Volvo ecr88 lifting capacity Service Repair Manual.pdf
PDF
Caterpillar Cat 329D LN Excavator (Prefix EBM) Service Repair Manual Instant ...
PDF
Volvo EC300D L EC300DL excavator weight Manuals.pdf
PPTX
Materi Kuliah Umum Prof. Hsien Tsai Wu.pptx
PPTX
1. introduction-to-bvcjdhjdfffffffffffffffffffffffffffffffffffmicroprocessors...
Challenges in Sim 2 Real. Tutorial on Simulation Environments.
Physics class 12thstep down transformer project.pdf
What are dimensions of the Volvo ECR235cl.pdf
Volvo ecr88 battery location Service Repair Manual.pdf
higher edu open stores 12.5.24 (1).pdf forreal
Robot_ppt_YRG[1] [Read-Only]bestppt.pptx
How much does a e145 excavator weight.pdf
Volvo ecr58 plus Service Manual Download
Kaizen for Beginners and how to implement Kaizen
capstoneoooooooooooooooooooooooooooooooooo
Diagnose and Repair Transmission Sound Issues in Volkswagen Vehicles
Volvo EC290C NL EC290CNL excavator weight.pdf
Volvo ecr88 problems Manual Download.pdf
Delivers.ai: 2020–2026 Autonomous Journey
Honda Dealership SNS Evaluation pdf/ppts
Volvo ecr88 lifting capacity Service Repair Manual.pdf
Caterpillar Cat 329D LN Excavator (Prefix EBM) Service Repair Manual Instant ...
Volvo EC300D L EC300DL excavator weight Manuals.pdf
Materi Kuliah Umum Prof. Hsien Tsai Wu.pptx
1. introduction-to-bvcjdhjdfffffffffffffffffffffffffffffffffffmicroprocessors...
Ad

CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf

  • 2. This chapter covers the following basic switching topics as a review to CCNA and serves as a teaser for topics covered later in chapter: •Hubs and switches •Bridges and switches •Switches of today •Broadcast domains •MAC addresses •The basic Ethernet frame format •Basic switching function •VLANs •The Spanning Tree Protocol •Trunking •Port channels •Multilayer switching (MLS)
  • 4. 🔹 What is a Hub? A hub is a basic networking device that connects multiple computers or devices in a Local Area Network (LAN). It operates at Layer 1 (Physical Layer) of the OSI model, meaning it does not process data—it just forwards it. 🔹 How Does a Hub Work? •When a device sends data to a hub, the hub broadcasts the data to all connected devices. •The intended recipient picks up the data, while the rest ignore it. •Hubs do not learn MAC addresses or filter traffic. 🔹 Types of Hubs 1.Passive Hub – Just forwards data without amplifying it. 2.Active Hub – Regenerates and amplifies signals before sending them. 3.Intelligent Hub – Includes basic management features like monitoring traffic.
  • 5. 🔹 Advantages of a Hub ✅ Simple & Cheap – Very easy to set up and cost-effective. ✅ Plug and Play – No configuration required. ✅ Good for Small Networks – Works for simple LANs with a few devices. 🔹 Disadvantages of a Hub ❌ Broadcasts Data to All Devices – Causes network congestion and security risks. ❌ Creates a Single Collision Domain – Collisions occur when multiple devices send data simultaneously. ❌ No Traffic Filtering – No ability to optimize or manage network performance. ❌ Limited Speed – Slower than modern network devices.
  • 6. Hubs •Legacy •Layer 1 devices •Multi-port repeaters •Shared bandwidth •Based on legacy bus topology •CSMA/CD •Single collision domain
  • 8. 🔹 What is a Bridge? A bridge is a networking device that connects two separate LAN segments and forwards traffic between them intelligently. It operates at Layer 2 (Data Link Layer) of the OSI model and learns MAC addresses to filter and forward traffic efficiently. 🔹 How Does a Bridge Work? •Bridges store and analyze MAC addresses of devices in each LAN segment. •When data is sent, the bridge checks its MAC table: • If the destination is in the same segment, it blocks the data. • If the destination is in a different segment, it forwards the data. •This reduces unnecessary traffic and improves network efficiency. 🔹 Types of Bridges 1.Transparent Bridge – Most common, operates invisibly and filters traffic based on MAC addresses. 2.Source Routing Bridge – Used in Token Ring networks, makes routing decisions based on the sender's routing information. 3.Multiport Bridge – Connects multiple LAN segments and acts like a simple switch.
  • 9. 🔹 Advantages of a Bridge ✅ Reduces Network Traffic – Filters traffic based on MAC addresses. ✅ Creates Separate Collision Domains – Improves performance. ✅ Enhances Security – Prevents unnecessary traffic from crossing segments. 🔹 Disadvantages of a Bridge ❌ Slower Than Switches – Has to process and filter data before forwarding. ❌ Limited Ports – Typically has only 2-4 ports (compared to switches with 24-48 ports). ❌ Does Not Eliminate Broadcast Traffic – Broadcasts are still forwarded. 🔹 When to Use a Bridge? 👉 To separate traffic between two LAN segments without using a router. 👉 When you need basic filtering and traffic control but don’t need a full switch. 👉 For legacy networks where upgrading to switches is not an option.
  • 10. Switches •Layer 2 devices •Also operates at layer 1 •Full duplex •Dedicated bandwidth
  • 11. Switches Today Application intelligence: This helps networks recognize many types of applications and secure and prioritize those applications to provide the best user experience. Image Unified network services: Combining the best elements of wireless and wired networking allows you to consistently connect to any resource or person with any device. 10 Gigabit Ethernet technology and Power over Ethernet (PoE) technology support new applications and devices. Image Nonstop communications: Features such as redundant hardware, and nonstop forwarding and stateful switchover (NSF/SSO) technology support more-reliable connections. Image Integrated security: LAN switches provide the first line of defense against internal network attacks and prevent unauthorized intrusion. Image Operational manageability: To more easily manage the network, IT staff must be able to remotely configure and monitor network devices from a central location.
  • 14. Ethernet II and IEEE 802.3 standards define: •Minimum frame size as 64 bytes •Maximum as 1518 bytes “collision fragment” or “runt frame” – Frame less than 64 bytes If size of a transmitted frame is less than the minimum or greater than the maximum, the receiving device drops the frame In 1998, IEEE 802.3ac standard extended the maximum allowable frame size to 1522 bytes. Increased to accommodate a technology called Virtual Local Area Network (VLAN). VLANs will be presented in a later course.
  • 15. 5.2.1.4 – MAC Address Tables on Connected Switches For every Ethernet frame that enters a port, the switch will: Step 1: Learn (Building the MAC address table) Switch learns by examining the source MAC address •If not in MAC address table, then add it along with incoming port number •If in MAC address table, reset 5 minute timer PC-A sends a frame to PC-B The fame is received by switch S1
  • 17. Switch S1 sees if it has something to learn by examining the source MAC address The source MAC address is not in its MAC address table S1 adds the source MAC address 00-0A and the incoming port 1 to its MAC address table
  • 18. Step 2: Forwarding the frame (Using the MAC address table) Switch forwards by examining the destination MAC address •If broadcast/multicast MAC address, flood out all ports except the port it came in on •If unicast MAC address is in MAC address table, send it out only that port •If unicast MAC address is not in in MAC address table, flood out all ports except the port it came in on (unknown unicast) S1 can now forward the frame by examining the destination MAC address The destination MAC address 00-0B is not in its MAC address table, so it floods it out all ports This is known as an unknown unicast
  • 20. PC-B’s NIC receives the frame. After comparing the destination MAC address of 00-0B to it own NIC’s MAC address it realizes they are the same and copies in the rest of the frame.
  • 21. For every Ethernet frame that enters a port, the switch will: Step 1: Learn (Building the MAC address table) Switch learns by examining the source MAC address •If not in MAC address table, then add it along with incoming port number •If in MAC address table, reset 5 minute timer The frame is also flooded out S1’s port 4 which is connected to switch S2 S2 receives the frame and examines the source MAC address Since this is new information, S2 add the source MAC address 00-0A and the incoming port number 1 to its MAC address table
  • 23. Step 2: Forwarding the frame (Using the MAC address table) Switch forwards by examining the destination MAC address •If broadcast/multicast MAC address, flood out all ports except the port it came in on •If unicast MAC address is in MAC address table, send it out only that port •If unicast MAC address is not in in MAC address table, flood out all ports except the port it came in on (unknown unicast) S2 can now forward the frame by examining the destination MAC address The destination MAC address 00-0B is not in its MAC address table, so it floods it out all ports Again, this is known as an unknown unicast
  • 25. Both PC-C’s NIC and the Router’s NIC receives the frame. Since their MAC addresses do not match the destination MAC address they drop the rest of the frame
  • 26. For every Ethernet frame that enters a port, the switch will: Step 1: Learn (Building the MAC address table) Switch learns by examining the source MAC address •If not in MAC address table, then add it along with incoming port number •If in MAC address table, reset 5 minute timer PC-B now sends the frame to PC-A The frame is received by switch S1
  • 28. Switch S1 sees if it has something to learn by examining the source MAC address The source MAC address is not in its MAC address table S1 adds the source MAC address 00-0B and the incoming port 3 to its MAC address table
  • 29. Step 2: Forwarding the frame (Using the MAC address table) Switch forwards by examining the destination MAC address •If broadcast/multicast MAC address, flood out all ports except the port it came in on •If unicast MAC address is in MAC address table, send it out only that port •If unicast MAC address is not in in MAC address table, flood out all ports except the port it came in on (unknown unicast) S1 can now forward the frame by examining the destination MAC address The destination MAC address 00-0A is in its MAC address table, so it filters the frame by sending it out only port 1
  • 31. 5.2.1.5 – Sending a Frame to the Default Gateway Destination IP address is on a remote network. PC-A will send the Ethernet frame to the MAC address of the default gateway For every Ethernet frame that enters a port, the switch will: Step 1: Learn (Building the MAC address table) Switch learns by examining the source MAC address •If not in MAC address table, then add it along with incoming port number •If in MAC address table, reset 5 minute timer Switch S1 sees if it has something to learn by examining the source MAC address The source MAC address is in its MAC address table, so it has nothing new to learn S1 refreshes the 5 minute refresh timer for this entry
  • 33. Step 2: Forwarding the frame (Using the MAC address table) Switch forwards by examining the destination MAC address •If broadcast/multicast MAC address, flood out all ports except the port it came in on •If unicast MAC address is in MAC address table, send it out only that port •If unicast MAC address is not in in MAC address table, flood out all ports except the port it came in on (unknown unicast) S1 can now forward the frame by examining the destination MAC address The destination MAC address 00-0D is not in its MAC address table, so it floods it out all ports This is known as an unknown unicast
  • 35. PC-B’s NIC receives the frame and ignores the rest of the frame after determining that the destination MAC address of 00-0D does not match it’s own MAC address of 00-0B
  • 36. For every Ethernet frame that enters a port, the switch will: Step 1: Learn (Building the MAC address table) Switch learns by examining the source MAC address If not in MAC address table, then add it along with incoming port number If in MAC address table, reset 5 minute timer The frame is also flooded out S1’s port 4 which is connected to switch S2 S2 receives the frame and examines the source MAC address The source MAC address of 00-0A and port 1 is in its MAC address table, so it has nothing new to learn S2 refreshes the 5 minute refresh timer for this entry
  • 38. Step 2: Forwarding the frame (Using the MAC address table) Switch forwards by examining the destination MAC address If broadcast/multicast MAC address, flood out all ports except the port it came in on If unicast MAC address is in MAC address table, send it out only that port If unicast MAC address is not in in MAC address table, flood out all ports except the port it came in on (unknown unicast) S2 can now forward the frame by examining the destination MAC address The destination MAC address 00-0D is not in its MAC address table, so it floods it out all ports Again, this is known as an unknown unicast
  • 40. PC-C’s NIC and the Router’s NIC receives the frame. PC-C’s MAC addresses does not match the destination MAC address so it drops the rest of the frame The router’s MAC address does match the destination MAC address so it copies in the rest of the frame The router will de-encapsulate the data from the Ethernet frame and process the Layer 3 PDU, the IP packet, for routing.
  • 42. For every Ethernet frame that enters a port, the switch will: Step 1: Learn (Building the MAC address table) Switch learns by examining the source MAC address If not in MAC address table, then add it along with incoming port number If in MAC address table, reset 5 minute timer The router now sends the frame to PC-A The frame is received by switch S2
  • 44. Switch S2 sees if it has something to learn by examining the source MAC address The source MAC address is not in its MAC address table S2 adds the source MAC address 00-0D and the incoming port 4 to its MAC address table.
  • 45. Step 2: Forwarding the frame (Using the MAC address table) Switch forwards by examining the destination MAC address If broadcast/multicast MAC address, flood out all ports except the port it came in on If unicast MAC address is in MAC address table, send it out only that port If unicast MAC address is not in in MAC address table, flood out all ports except the port it came in on (unknown unicast) S2 can now forward the frame by examining the destination MAC address The destination MAC address 00-0A is in its MAC address table, so it filters the frame by sending it out only port 1
  • 47. For every Ethernet frame that enters a port, the switch will: Step 1: Learn (Building the MAC address table) Switch learns by examining the source MAC address If not in MAC address table, then add it along with incoming port number If in MAC address table, reset 5 minute timer Switch S1 sees if it has something to learn by examining the source MAC address. The source MAC address is in its MAC address table, so it has nothing new to learn. S1 refreshes the 5 minute refresh timer for this entry
  • 49. Step 2: Forwarding the frame (Using the MAC address table) Switch forwards by examining the destination MAC address If broadcast/multicast MAC address, flood out all ports except the port it came in on If unicast MAC address is in MAC address table, send it out only that port If unicast MAC address is not in in MAC address table, flood out all ports except the port it came in on (unknown unicast) S1 can now forward the frame by examining the destination MAC address The destination MAC address 00-0A is in its MAC address table, so it filters the frame by sending it out only port 1
  • 51. 5.3.2.3 – ARP Operation – ARP Request PCA at 192.168.1.110 has an IPv4 packet to send to 192.168.1.50 Comparing its IPv4 address with the destination IPv4 address, PCA determines this device is on the same IP network
  • 52. PCA checks its ARP table for 192.168.1.50 but no match
  • 53. PCA puts the IPv4 packet on hold and creates an ARP Request with Target IPv4 = 192.168.1.50 Target MAC – unknown Source MAC 00-A Destination MAC = broadcast
  • 54. PCA sends the ARP request which is received by the switch Because the destination MAC is a broadcast the switch sends it out all ports but the incoming port
  • 55. PCB compares the target IPv4 address to its own MAC address and because it is not a match ignores the ARP request
  • 56. Router R1 compares the target IPv4 address to its own MAC address and because it is not a match ignores the ARP request. Routers do not forward broadcasts.
  • 57. The target address in the ARP request matches PCC’s IPv4 address
  • 58. 5.3.2.4 – ARP Operation – ARP Reply The target address in the ARP request matches PCC’s IPv4 address
  • 59. PCC sends an ARP reply to the sender of the ARP request This is a unicast Sender IPv4 = 192.168.1.50 Sender MAC – 00-0C Source MAC 00-0C Destination MAC = 00-0A
  • 60. PCA receives the ARP reply
  • 61. PCC Adds the sender’s IPv4 address and MAC address to its ARP table
  • 62. PCC takes the IPv4 packet off hold PCC uses the MAC address for the destination MAC address
  • 63. PCA now sends this Ethernet frame with the encapsulated IPv4 packet out its Ethernet NIC
  • 64. 5.3.2.5 – ARP Role in Remote Communication PC A at 192.168.1.110 has an IPv4 packet to send to 10.1.1.10 Comparing its IPv4 address with the destination IPv4 address, PCA determines this device is on a different IP network PCA must sent this packet to its default gateway 192.168.1.1
  • 66. PC A checks its ARP table for 192.168.1.1 but no match
  • 67. PC A puts the IPv4 packet on hold and creates an ARP Request with Target IPv4 = 192.168.1.1 Target MAC – unknown Source MAC 00-A Destination MAC = broadcast
  • 68. PC A sends the ARP request which is received by the switch Because the destination MAC is a broadcast the switch sends it out all ports but the incoming port
  • 69. PC B compares the target IPv4 address to its own MAC address and because it is not a match ignores the ARP request
  • 70. PC C compares the target IPv4 address to its own MAC address and because it is not a match ignores the ARP request
  • 71. The target address in the ARP request matches the router’s the IPv4 address on its G0/0 interface
  • 72. PC C sends an ARP reply to the sender of the ARP request This is a unicast Sender IPv4 = 192.168.1.1 Sender MAC – 00-0D Source MAC 00-0D Destination MAC = 00-0A
  • 73. PC A receives the ARP reply
  • 74. PC C Adds the sender’s IPv4 address and MAC address to its ARP table
  • 75. PC C takes the IPv4 packet off hold PC C uses the MAC address for the destination MAC address
  • 76. PC A now sends this Ethernet frame with the encapsulated IPv4 packet out its Ethernet NIC towards the default gateway
  • 80. •Devices can only communicate with other devices on the same subnet •Otherwise, they must go through a router, that is on its same subnet
  • 81. Switch Type Description Features Use Cases Unmanaged Switch Plug-and-play switch with no configuration Simple, cost- effective, automatic MAC address learning Small home networks, basic office setups Managed Switch Allows full control over traffic and configurations VLAN support, QoS, SNMP monitoring, security features Enterprise networks, data centers, large businesses Smart (Lightly Managed) Switch Limited management features via a web interface Basic VLAN, QoS, limited monitoring Small to medium- sized businesses needing some control 1. Based on Management Capabilities
  • 82. Switch Type Description Features Use Cases Layer 2 Switch Operates at the Data Link Layer (L2), forwarding packets based on MAC addresses VLAN support, MAC filtering, Spanning Tree Protocol (STP) LAN segmentation, local traffic handling Layer 3 Switch Functions like a router, operating at the Network Layer (L3), forwarding packets based on IP addresses Routing between VLANs, inter-VLAN communication, supports OSPF, RIP, and static routes Large LANs, reducing router dependency 2. Based on Layer Functionality
  • 83. Switch Type Description Features Use Cases Enterprise Switch Designed for large- scale business networks High-speed, redundancy, multiple management protocols Corporate networks, campuses Data Center Switch High-performance switches for handling massive traffic loads High bandwidth, low latency, redundancy Cloud services, large-scale data centers Industrial Switch Rugged design for harsh environments High durability, extreme temperature support Manufacturing plants, outdoor networks Campus Switch Used for educational institutions and large office buildings Scalable, centralized management Universities, large office campuses 3. Based on Deployment
  • 84. Switch Type Description Features Use Cases Fixed Switch Comes with a set number of ports, cannot be expanded Cost-effective, suitable for small setups Small businesses, home networks Modular Switch Expandable with additional modules High scalability, customizable Large enterprises, data centers Stackable Switch Can be stacked with multiple switches to work as one Increased redundancy, simplified management Medium to large networks needing scalability 4. Based on Network Configuration
  • 85. Switch Type Description Features Use Cases PoE (Power over Ethernet) Switch Provides power along with data over Ethernet cables Supports PoE/PoE+ for powering IP cameras, VoIP phones, and IoT devices Smart offices, surveillance systems Fiber Switch Uses fiber-optic connections for high-speed data transfer Supports SFP/SFP+ ports, low latency Long-distance networking, high- speed backbones KVM Switch Controls multiple computers using a single keyboard, video monitor, and mouse Multi-device control Data centers, IT administrators Ethernet Switch Standard switch for Ethernet networks Supports Fast Ethernet, Gigabit Ethernet, or 10GbE General network setups 5. Based on Connectivity & Technology
  • 86. Switch Type Description Features Use Cases Gigabit Switch Supports speeds up to 1 Gbps per port Fast data transfer, common in modern networks Homes, offices, small data centers 10G/40G/100G Switch Supports high- speed networking for demanding applications Low latency, high bandwidth Data centers, cloud computing, high- performance computing (HPC) 6. Based on Performance
  • 87. Based on network architecture Feature Edge Switch (Access Layer) Distribution Switch (Aggregation Layer) Core Switch (Backbone Layer) Main Function Connects end devices to the network Aggregates traffic from edge switches Provides high- speed backbone connectivity Layer Layer 2 (mostly) Layer 3 (Inter-VLAN Routing) Layer 3 (High- speed Routing) Speed 1G - 10G 10G - 40G 40G - 100G+ Redundancy Low Medium (some redundancy features) High (dual power, failover support) Traffic Type Local user traffic Aggregated traffic from edge switches High-speed core backbone traffic Common Users End-users, printers, VoIP Departments, office buildings Data centers, corporate backbones Comparison Table
  • 88. 1. Define Your Network Requirements A. Network Size & Scale •Small Office/Home (1-20 users): Unmanaged or Smart switches •Medium Business (20-200 users): Managed switch with VLAN support •Large Enterprise (200+ users): Layer 3 switch with high-speed uplinks •Data Center: Modular or core switch with redundancy B. Performance Needs •Low Traffic: 1Gbps ports are sufficient •Medium Traffic: 10Gbps uplinks for smooth connectivity •High Traffic (Data Center, Large Enterprise): 40G or 100G switches C. Deployment Type •Edge/Access Layer (End Devices): Layer 2, PoE support for VoIP/WiFi •Distribution Layer (Aggregating Traffic): Layer 3, Inter-VLAN Routing •Core Layer (Backbone Traffic): High-speed Layer 3 switch
  • 89. Key Takeaways •For home or small business → Unmanaged or Smart Switch •For enterprises → Managed or Layer 3 Switch •For high-speed networks → 10G/40G/100G or Fiber Switch •For power-hungry devices → PoE Switch •For data centers → Modular, Stackable, or Data Center Switch