Exploration lan switching_chapter2
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Exploration lan switching_chapter2

on

  • 519 views

 

Statistics

Views

Total Views
519
Views on SlideShare
519
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Graphics 2.1.1.1, 2..1.1.2, 2.1.1.3, 2.1.1.4
  • Graphics 2.1.1.1, 2..1.1.2, 2.1.1.3, 2.1.1.4
  • Graphics 2.1.1.1, 2..1.1.2, 2.1.1.3, 2.1.1.4
  • Graphics 2.1.1.1, 2..1.1.2, 2.1.1.3, 2.1.1.4
  • Graphics 2.1.1.1, 2..1.1.2, 2.1.1.3, 2.1.1.4
  • Graphics 2.1.1.1, 2..1.1.2, 2.1.1.3, 2.1.1.4
  • Graphic 2.1.2.2, 2.1.2.3
  • Graphic 2.1.2.2, 2.1.2.3
  • Graphic 2.1.2.2, 2.1.2.3
  • Graphic 2.1.3.1, 2.1.3.2 (pick some of these maybe one or 2 – whatever will fit in)
  • Graphic 2.2.1.1
  • Graphic 2.2.2.1
  • Graphic 2.2.3..1
  • Graphic 2.2.4.2
  • Graphic 2.3.1.1
  • Graphics 2.3.2.1 & 2.3.2.2
  • Graphic 2.3.3.1 & 2.3.3.2
  • Graphic 2.3.4.1
  • Graphic 2.3.5.1
  • Graphic 2.3.6.1
  • Graphic 2.3.7.1
  • Graphics 2.3.8.1 & 2.3.8.2
  • All graphics for 2.4.1 pages 1 through 4
  • Graphic 2.4.2.1 & 2.4.2.2
  • Graphics 2.4.3.1, 2.4.3.2, 2.4.3.3
  • All graphics in section 2.4.4
  • Graphic 2.4.5.1
  • Graphic 2.4.5.2
  • Graphic 2.4.6.2

Exploration lan switching_chapter2 Presentation Transcript

  • 1. Configure a Switch LAN Switching and Wireless – Chapter 2
  • 2. Objetivos
  • 3. Introducción a las LAN 802.3/Ethernet
    • Elementos claves de las redes 802.3/Ethernet
  • 4. Introducción a las LAN 802.3/Ethernet
    • Elementos claves de las redes 802.3/Ethernet
    Recordar que CSMA/CD sólo funciona en half duplex
  • 5. Introducción a las LAN 802.3/Ethernet
    • Elementos claves de las redes 802.3/Ethernet
      • Se utilizan dos tipos de parámetros duplex para las comunicaciones en una red Ethernet:
  • 6. Introducción a las LAN 802.3/Ethernet
    • Configuración del puerto del switch:
      • Los switches Cisco Catalyst cuentan con tres parámetros:
      • La opción auto establece el modo autonegociación de duplex. Cuando este modo se encuentra habilitado, los dos puertos se comunican para decidir el mejor modo de funcionamiento.
      • La opción full establece el modo full-duplex.
      • La opción half establece el modo half-duplex.
    • Nota: Al tener half-duplex en un extremo y full-duplex en el otro, pueden producirse colisiones tardías en el extremo de half-duplex
    • Al habilitar la función auto-MDIX, se puede utilizar un cable de conexión directa o cruzada para realizar la conexión con un puerto 10/100/1000 de cobre situado en el switch, independientemente del tipo de dispositivo que se encuentre en el otro extremo de la conexión.
  • 7. Introducción a las LAN 802.3/Ethernet
    • Direccionamiento MAC y Tablas de direcciones MAC de los switches
  • 8. Aspectos que se deben tener en cuenta para las redes 802.3/Ethernet
    • Dominios de broadcast
  • 9. Aspectos que se deben tener en cuenta para las redes 802.3/Ethernet
    • Latencia de la red
  • 10. Aspectos que se deben tener en cuenta para las redes 802.3/Ethernet
    • Congestión de red
    • Causas más comunes:
      • Tecnología de redes y computadoras cada vez más potentes. Pueden enviar una mayor cantidad de datos a través de la red y también procesarlos a una mayor velocidad.
      • Volumen de tráfico de la red cada vez mayor.
      • Aplicaciones con alta demanda de ancho de banda. Por ejemplo: las aplicaciones de edición, diseño de ingeniería, video a pedido (VoD), aprendizaje electrónico (e-learning) y streaming video requieren una considerable capacidad y velocidad de procesamiento.
  • 11. Aspectos que se deben tener en cuenta para las redes 802.3/Ethernet
    • Segmentación LAN
  • 12. Consideraciones de diseño de la LAN
    • Control de la latencia de la red
  • 13.
    • Describe the switch forwarding methods
    Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN
  • 14. Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN
    • Explain symmetric and asymmetric Switching
  • 15. Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN
    • Describe how memory buffering works
  • 16. Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN
    • Compare Layer 2 with Layer 3 switching
  • 17. Configure a Switch for Operation in a Network
    • Describe the Cisco IOS commands used to navigate the command-line
  • 18. Configure a Switch for Operation in a Network
    • Describe the Cisco IOS help facilities
  • 19. Configure a Switch for Operation in a Network
    • Describe the Cisco IOS commands used to access the command history
  • 20. Configure a Switch for Operation in a Network
    • Describe the boot sequence of a Cisco switch
  • 21. Configure a Switch for Operation in a Network
    • Describe how to prepare the switch to be configured
  • 22. Configure a Switch for Operation in a Network
    • Describe how to perform a basic switch configuration
  • 23. Configure a Switch for Operation in a Network
    • Describe how to verify the Cisco IOS configuration using the Show command
  • 24. Configure a Switch for Operation in a Network
    • Describe how to manage the Cisco IOS configuration files
  • 25. Configure Basic Security on a Switch
    • Describe the Cisco IOS commands used to configure password options
  • 26.
    • Describe the Cisco IOS commands used to configure a login banner
    Configure Basic Security on a Switch
  • 27.
    • Describe the how to configure Telnet and SSH on a switch
    Configure Basic Security on a Switch
  • 28.
    • Describe the key switch security attacks. The description should include, MAC address flooding, spoofing attacks, CDP attacks, and Telnet attacks
    Configure Basic Security on a Switch
  • 29.
    • Describe how network security tools are used to improve network security
    Configure Basic Security on a Switch
  • 30.
    • Describe why you need to secure ports on a switch
    Configure Basic Security on a Switch
  • 31.
    • Describe the Cisco IOS commands used to disable unused ports
    Configure Basic Security on a Switch
  • 32. Summary
    • LAN Design
    • Process that explains how a LAN is to be implemented
    • Factors to consider in LAN design include
    • Collision domains
    • Broadcast domains
    • Network latency
    • LAN segmentation
  • 33. Summary
    • Switch forwarding methods
    • Store & forward – used by Cisco Catalyst switches
    • Cut through – 2 types
    • Cut through
    • Fast forwarding
  • 34. Summary
    • Symmetric switching
    • Switching is conducted between ports that have the same bandwidth
    • Asymmetric switching
    • Switching is conducted between ports that have unlike bandwidth
  • 35. Summary
    • CISCO IOS CLI includes the following features
    • Built in help
    • Command history/options
    • Switch security
    • Password protection
    • Use of SSH for remote access
    • Port security
  • 36.