SlideShare a Scribd company logo
CCNA4.com

Quick Guide - Layer 2 Switching
LAYER 2 SWITCHING

- Switching breaks up a large collision domain into smaller ones. Switches operate at the Data
Link Layer via the use of MAC addresses.
- Spanning Tree Protocol -- eliminates loops in a Layer-2 switched network.
- Collapsed backbone (pre-switch design) -- all hosts needed to go via the backbone to reach
any network services.
- Switches use ASICs (Application Specific Integrated Circuits) to build and maintain their
filter tables.
- Switches are faster than routers because they only look at MAC addresses. There is no
modification to the data packet.
- Bridges are software based, while switches are hardware based. Bridges can only have one
Spanning Tree instance per bridge, switches can have many. Bridges can only have up to 16
ports.
- Important Layer-2 switch functions:
- Address learning -- the source MAC address of each received frame is placed in a
forward/filter table.
- Forward/filter decisions -- after the destination MAC address is found in the table, a packet
is sent through the appropriate exit interface.
- Loop avoidance -- with the help of STP (Spanning Tree Protocol).
- If no loop avoidance scheme is in place, broadcast storms are possible.
- Thrashing -- when a switch is so busy updating the MAC table that is fails to forward a
frame.
- Spanning Tree Protocol -- DEC (now known as Compaq) created the original version of
STP. Later, IEEE introduced 802.1d, which is what all Cisco switches use. 802.1d is not
compatible with the DEC version.
- STP uses the spanning-tree algorithm (STA) to create a topology database, and then find and
destroy redundant links.
- Spanning Tree terms:
- Spanning Tree Protocol -- a bridge protocol that uses the STA to find redundant links and
create a topology database.
- Root Bridge -- this is the bridge with the lowest Bridge ID -- all decisions are made from the
perspective of this bridge.
- Bridge Protocol Data Unit (BPDU) -- switches exchange control information in BPDUs.
- Bridge ID -- 8 bytes long -- a combination of the bridge priority (32768 by default on all
switches) and the base MAC addresses. The lowest Bridge ID becomes the root bridge.
- Non-root Bridge.
- Root port -- a link directly connected to the root bridge, or the shortest path to the root
bridge. If more than 1 port, bandwidth is checked. The lowest cost port becomes a root port.
- Designated port -- a forwarding port (can be a root port too) -- if a bridge has 2 ports and it
is not a root bridge, one of the ports is root, and the other is designated (forwarding).
- Port Cost -- determined by the bandwidth of a link.
- Non-designated port -- can be blocking or forwarding.
- Forwarding port.
- Blocked port -- a port that will not forward frames in order to prevent loops.
- BPDUs are sent every 2 seconds.
- Calculating STP cost -- new and original values:
- 10Gbps -- new cost 2, originally 1.
- 1Gbps -- new cost 4, originally 1.
- 100Mbps -- new cost 19, originally 10.

CCNA4.com
CCNA4.com
- 10Mbps -- new cost 100, originally 100.
- The 1900 series switches still use the original cost specifications.
- Spanning Tree Port States:
- Blocking -- a blocked port does not forward frames. It just listens to BPDUs.
- Listening -- the port listens to BPDUs.
- Learning -- the port learns MAC addresses and builds a filter table, but does not forward
frames.
- Forwarding -- the port sends and receives all data.
- Switch ports are most often in either blocking or forwarding state, unless a change to the
network has just been made.
- Convergence -- the time it takes for a port to switch from blocking to forwarding mode, or
vice versa -- usually 50 seconds. No data is forwarded during this time. It is NOT
recommended to change the default STP timers.
- A root bridge ALWAYS has every port in forwarding mode.
- Switching Modes:
- Cut-Through -- the switch looks up the destination MAC address in the MAC filter table and
starts forwarding the frame immediately -- before the frame is over -- 13 bytes into the frame.
This method is fastest, but has no error checking.
- FragmentFree (Modified Cut-Through) -- the switch reads 64 bytes from the frame (waits
for the collision window to pass) and then forwards the frame. This is the default method for
1900 series switches. The first 64 bytes is where almost all errors happen.
- Store-and-Forward -- a complete frame is received, a CRC is run (invalid CRC is either <>
1518 bytes). This is the slowest method, but with the most error checking. Catalyst 5000
switches use this method, and the setting CANNOT be modified.

                                                                                   By badboy




CCNA4.com

More Related Content

What's hot

Spanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat SheetSpanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat Sheet
Prasanna Shanmugasundaram
 
Spannig tree
Spannig treeSpannig tree
Spannig tree
1 2d
 
Alp Stp
Alp StpAlp Stp
Alp Stp
Alp isik
 
Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011
Dân Chơi
 
Stp
StpStp
Attacking the spanning tree protocol
Attacking the spanning tree protocolAttacking the spanning tree protocol
Attacking the spanning tree protocol
Asmadzakirah
 
Protocolo Spanning Tree
Protocolo Spanning TreeProtocolo Spanning Tree
Protocolo Spanning Tree
Alberto Jimenez
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
Manoj Gharate
 
RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)
Netwax Lab
 
Methods of Switching
Methods of SwitchingMethods of Switching
Methods of Switching
NetProtocol Xpert
 
Difference b/w STP RSTP PVST & MSTP
Difference b/w STP RSTP PVST & MSTPDifference b/w STP RSTP PVST & MSTP
Difference b/w STP RSTP PVST & MSTP
Netwax Lab
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
NetProtocol Xpert
 
Bridge Protocol Data Unit (BPDU) Frame Format
Bridge Protocol Data Unit (BPDU) Frame FormatBridge Protocol Data Unit (BPDU) Frame Format
Bridge Protocol Data Unit (BPDU) Frame Format
NetProtocol Xpert
 
Day 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHINGDay 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHING
anilinvns
 
STP Protection
STP ProtectionSTP Protection
STP Protection
Netwax Lab
 
Controlling stepper motor using serial communication with computer
Controlling stepper motor using serial communication with computerControlling stepper motor using serial communication with computer
Controlling stepper motor using serial communication with computer
noumanahmed90
 
Ch5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelessCh5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wireless
kratos2424
 
newtwork opnet app project
newtwork opnet app project newtwork opnet app project
newtwork opnet app project
Mohamed Elagnaf
 
Understanding stp-rstp-convergence
Understanding stp-rstp-convergenceUnderstanding stp-rstp-convergence
Understanding stp-rstp-convergence
Hazhir Yadegari
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
Peter R. Egli
 

What's hot (20)

Spanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat SheetSpanning Tree Protocol Cheat Sheet
Spanning Tree Protocol Cheat Sheet
 
Spannig tree
Spannig treeSpannig tree
Spannig tree
 
Alp Stp
Alp StpAlp Stp
Alp Stp
 
Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011
 
Stp
StpStp
Stp
 
Attacking the spanning tree protocol
Attacking the spanning tree protocolAttacking the spanning tree protocol
Attacking the spanning tree protocol
 
Protocolo Spanning Tree
Protocolo Spanning TreeProtocolo Spanning Tree
Protocolo Spanning Tree
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
 
RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)
 
Methods of Switching
Methods of SwitchingMethods of Switching
Methods of Switching
 
Difference b/w STP RSTP PVST & MSTP
Difference b/w STP RSTP PVST & MSTPDifference b/w STP RSTP PVST & MSTP
Difference b/w STP RSTP PVST & MSTP
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
 
Bridge Protocol Data Unit (BPDU) Frame Format
Bridge Protocol Data Unit (BPDU) Frame FormatBridge Protocol Data Unit (BPDU) Frame Format
Bridge Protocol Data Unit (BPDU) Frame Format
 
Day 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHINGDay 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHING
 
STP Protection
STP ProtectionSTP Protection
STP Protection
 
Controlling stepper motor using serial communication with computer
Controlling stepper motor using serial communication with computerControlling stepper motor using serial communication with computer
Controlling stepper motor using serial communication with computer
 
Ch5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelessCh5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wireless
 
newtwork opnet app project
newtwork opnet app project newtwork opnet app project
newtwork opnet app project
 
Understanding stp-rstp-convergence
Understanding stp-rstp-convergenceUnderstanding stp-rstp-convergence
Understanding stp-rstp-convergence
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 

Similar to Quick Guide Layer 2 Switching

Lec1 lan switching
Lec1 lan switchingLec1 lan switching
Lec1 lan switching
karthiketrx
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Mike McLain
 
LAYER 2 SWITCHING
LAYER 2 SWITCHINGLAYER 2 SWITCHING
LAYER 2 SWITCHING
anilinvns
 
SRWE_Module_5-STP Concepts.pptx
SRWE_Module_5-STP Concepts.pptxSRWE_Module_5-STP Concepts.pptx
SRWE_Module_5-STP Concepts.pptx
SaqibAli696638
 
Ccna free chapter
Ccna free chapterCcna free chapter
Ccna free chapter
kvs062003
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
danishrafiq
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
Ccna day4Ccna day4
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
Reetesh Gupta
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
Sachin Morya
 
Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12
CYBERINTELLIGENTS
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
darulquthni
 
Stp defined
Stp definedStp defined
Stp defined
Azeem Ayaz
 
Switching
SwitchingSwitching
ENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptxENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptx
ManuelRojas960410
 
Dc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switchingDc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switching
Syaiful Ahdan
 
ccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdfccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdf
cisco49
 
Switching
SwitchingSwitching
Switching
Netwax Lab
 
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshhNetworks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshh
VijayKaran7
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1
aghacrom
 

Similar to Quick Guide Layer 2 Switching (20)

Lec1 lan switching
Lec1 lan switchingLec1 lan switching
Lec1 lan switching
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
 
LAYER 2 SWITCHING
LAYER 2 SWITCHINGLAYER 2 SWITCHING
LAYER 2 SWITCHING
 
SRWE_Module_5-STP Concepts.pptx
SRWE_Module_5-STP Concepts.pptxSRWE_Module_5-STP Concepts.pptx
SRWE_Module_5-STP Concepts.pptx
 
Ccna free chapter
Ccna free chapterCcna free chapter
Ccna free chapter
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
 
Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
 
Stp defined
Stp definedStp defined
Stp defined
 
Switching
SwitchingSwitching
Switching
 
ENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptxENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptx
 
Dc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switchingDc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switching
 
ccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdfccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdf
 
Switching
SwitchingSwitching
Switching
 
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshhNetworks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshh
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1
 

More from CCNAResources

Iscw Cram Sheet
Iscw Cram SheetIscw Cram Sheet
Iscw Cram Sheet
CCNAResources
 
Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)
CCNAResources
 
Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study Guide
CCNAResources
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
CCNAResources
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
CCNAResources
 
Subneting And Summarization
Subneting And  SummarizationSubneting And  Summarization
Subneting And Summarization
CCNAResources
 
Subneting And Summarization
Subneting And SummarizationSubneting And Summarization
Subneting And Summarization
CCNAResources
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
CCNAResources
 
Quick Guide VLANs
Quick Guide   VLANsQuick Guide   VLANs
Quick Guide VLANs
CCNAResources
 
Quick Guide Ip Routing
Quick Guide   Ip RoutingQuick Guide   Ip Routing
Quick Guide Ip Routing
CCNAResources
 
Ccna Wireless Resources
Ccna Wireless ResourcesCcna Wireless Resources
Ccna Wireless Resources
CCNAResources
 
Ccna Quick Notes –VLANs
Ccna Quick Notes –VLANsCcna Quick Notes –VLANs
Ccna Quick Notes –VLANs
CCNAResources
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
CCNAResources
 
Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)
CCNAResources
 
Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)
CCNAResources
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
CCNAResources
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)
CCNAResources
 

More from CCNAResources (17)

Iscw Cram Sheet
Iscw Cram SheetIscw Cram Sheet
Iscw Cram Sheet
 
Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)
 
Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study Guide
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
 
Subneting And Summarization
Subneting And  SummarizationSubneting And  Summarization
Subneting And Summarization
 
Subneting And Summarization
Subneting And SummarizationSubneting And Summarization
Subneting And Summarization
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
 
Quick Guide VLANs
Quick Guide   VLANsQuick Guide   VLANs
Quick Guide VLANs
 
Quick Guide Ip Routing
Quick Guide   Ip RoutingQuick Guide   Ip Routing
Quick Guide Ip Routing
 
Ccna Wireless Resources
Ccna Wireless ResourcesCcna Wireless Resources
Ccna Wireless Resources
 
Ccna Quick Notes –VLANs
Ccna Quick Notes –VLANsCcna Quick Notes –VLANs
Ccna Quick Notes –VLANs
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
 
Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)
 
Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Quick Guide Layer 2 Switching

  • 1. CCNA4.com Quick Guide - Layer 2 Switching LAYER 2 SWITCHING - Switching breaks up a large collision domain into smaller ones. Switches operate at the Data Link Layer via the use of MAC addresses. - Spanning Tree Protocol -- eliminates loops in a Layer-2 switched network. - Collapsed backbone (pre-switch design) -- all hosts needed to go via the backbone to reach any network services. - Switches use ASICs (Application Specific Integrated Circuits) to build and maintain their filter tables. - Switches are faster than routers because they only look at MAC addresses. There is no modification to the data packet. - Bridges are software based, while switches are hardware based. Bridges can only have one Spanning Tree instance per bridge, switches can have many. Bridges can only have up to 16 ports. - Important Layer-2 switch functions: - Address learning -- the source MAC address of each received frame is placed in a forward/filter table. - Forward/filter decisions -- after the destination MAC address is found in the table, a packet is sent through the appropriate exit interface. - Loop avoidance -- with the help of STP (Spanning Tree Protocol). - If no loop avoidance scheme is in place, broadcast storms are possible. - Thrashing -- when a switch is so busy updating the MAC table that is fails to forward a frame. - Spanning Tree Protocol -- DEC (now known as Compaq) created the original version of STP. Later, IEEE introduced 802.1d, which is what all Cisco switches use. 802.1d is not compatible with the DEC version. - STP uses the spanning-tree algorithm (STA) to create a topology database, and then find and destroy redundant links. - Spanning Tree terms: - Spanning Tree Protocol -- a bridge protocol that uses the STA to find redundant links and create a topology database. - Root Bridge -- this is the bridge with the lowest Bridge ID -- all decisions are made from the perspective of this bridge. - Bridge Protocol Data Unit (BPDU) -- switches exchange control information in BPDUs. - Bridge ID -- 8 bytes long -- a combination of the bridge priority (32768 by default on all switches) and the base MAC addresses. The lowest Bridge ID becomes the root bridge. - Non-root Bridge. - Root port -- a link directly connected to the root bridge, or the shortest path to the root bridge. If more than 1 port, bandwidth is checked. The lowest cost port becomes a root port. - Designated port -- a forwarding port (can be a root port too) -- if a bridge has 2 ports and it is not a root bridge, one of the ports is root, and the other is designated (forwarding). - Port Cost -- determined by the bandwidth of a link. - Non-designated port -- can be blocking or forwarding. - Forwarding port. - Blocked port -- a port that will not forward frames in order to prevent loops. - BPDUs are sent every 2 seconds. - Calculating STP cost -- new and original values: - 10Gbps -- new cost 2, originally 1. - 1Gbps -- new cost 4, originally 1. - 100Mbps -- new cost 19, originally 10. CCNA4.com
  • 2. CCNA4.com - 10Mbps -- new cost 100, originally 100. - The 1900 series switches still use the original cost specifications. - Spanning Tree Port States: - Blocking -- a blocked port does not forward frames. It just listens to BPDUs. - Listening -- the port listens to BPDUs. - Learning -- the port learns MAC addresses and builds a filter table, but does not forward frames. - Forwarding -- the port sends and receives all data. - Switch ports are most often in either blocking or forwarding state, unless a change to the network has just been made. - Convergence -- the time it takes for a port to switch from blocking to forwarding mode, or vice versa -- usually 50 seconds. No data is forwarded during this time. It is NOT recommended to change the default STP timers. - A root bridge ALWAYS has every port in forwarding mode. - Switching Modes: - Cut-Through -- the switch looks up the destination MAC address in the MAC filter table and starts forwarding the frame immediately -- before the frame is over -- 13 bytes into the frame. This method is fastest, but has no error checking. - FragmentFree (Modified Cut-Through) -- the switch reads 64 bytes from the frame (waits for the collision window to pass) and then forwards the frame. This is the default method for 1900 series switches. The first 64 bytes is where almost all errors happen. - Store-and-Forward -- a complete frame is received, a CRC is run (invalid CRC is either <> 1518 bytes). This is the slowest method, but with the most error checking. Catalyst 5000 switches use this method, and the setting CANNOT be modified. By badboy CCNA4.com