© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Switched Networks Routing and Switching.

Slides:



Advertisements
Presentaciones similares
Telling Time.
Advertisements

The Spanish Subjunctive: An Introduction (El subjuntivo español: una introducción) Quiero que Ud. pase por el Control de Agricultura.
Notes #18 Numbers 31 and higher Standard 1.2
Subject pronouns In order to use verbs, you will need to learn about subject pronouns. A subject pronoun replaces the name or title of a person or thing.
Sistemas de Información Agosto-Diciembre 2007 Sesión # 3.
Los verbos reflexivos Objective:
Nina Jackson, Presenter.  IMSCI is research based writing instruction.  IMSCI uses the gradual release of responsibility model to teach writing.  Scaffolds.
WWW. WIRELESS WIFI Wireless-Fidelity Es un mecanismo de conexión de dispositivos electrónicos de forma inalámbrica.
¿Qué haces en la escuela? Question words, objects, yo-go’s.
Standard and objective Notes # 16   Standard 1.2: Students understand and interpret written and spoken language on a variety of topics  Objective: Students.
In Lección 1, you learned how to conjugate and use the verb ser (to be). You will now learn a second verb which means to be, the verb estar. Although.
Time Telling time is rather easy. You only need to know the numbers up to 59 to be able to tell the time.
The Future Tense -original PowerPoint created by Mrs. Shirley of North Intermediate High School in Broken Arrow, OK.
Copyright © 2008 Vista Higher Learning. All rights reserved In Lección 1, you learned how to conjugate and use the verb ser (to be). You will now.
Objetivo: to identify phrases that express someone must do something. Ahora: List 3 adverbs and where are they placed in a sentence.
©2008 The McGraw-Hill Companies, Inc. All rights reserved. Digital Electronics Principles & Applications Seventh Edition Chapter 2 Numbers We Use in Digital.
Un juego de adivinanzas: ¿Dónde está el tesoro? A1B1C1D1E1F1 A4B4C4D4E4F4 A2B2C2D2E2F2 A5B5C5D5E5F5 A3B3C3D3E3F3 A6B6C6D6E6F6 Inténtalo de nuevo Inténtalo.
SCAFFOLDING & DIFFERENTIATION
English Language II (2). English Language I (2) Warm-up.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Capítulo 1: Introducción a las redes conmutadas Routing And Switching.
Input Devices. An input device is a piece of equipment used for entering data or controlling a computer, for example, a mouse, a keyboard, a scanner,
© Copyright Showeet.com E XAMPLE 1 A BSTRACT 3D P APER I NFOGRAPHICS Your own text goes here.
1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature,
¿Qué son los verbos irregulares?
header Oscar Fernando Jerez Rey
Description Sentences
Notes #20 Notes #20 There are three basic ways to ask questions in Spanish. Can you guess what they are by looking at the photos and photo captions on.
Para conectarse a Internet
In Lección 1, you learned how to conjugate and use the verb ser (to be). You will now learn a second verb which means to be, the verb estar. Although.
In Lección 1, you learned how to conjugate and use the verb ser (to be). You will now learn a second verb which means to be, the verb estar. Although.
Double Object Pronouns
PREGUNTAS: Questions and Question Words
JUGAR to play a sport or a game
Getting to know you more!
Introduction & Agenda Introduction to Microchip Device Blocksets Introduction to MATLAB Plug-In in MPLAB®IDE Creating a SIMULINK model with Microchip.
First Grade Dual High Frequency Words
In Lección 1, you learned how to conjugate and use the verb ser (to be). You will now learn a second verb which means to be, the verb estar. Although.
¿Qué hora es?.
GRAPHIC MATERIALS 1. GRAPHIC MATERIALS. GRAPHIC MATERIALS 1. GRAPHIC MATERIALS.
Page 1 CITS Active Directory Implementation UMass Dartmouth.
© 2017 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: EIGRP Tuning and Troubleshooting Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Rational Tool Overview. Introduction Requirements-Driven Software Development with Rational Analyst Studio. Tafadzwa Nzara Analysis & Design Consultant.
Quasimodo: Tienes que hacer parte D de la tarea..
In Lección 1, you learned how to conjugate and use the verb ser (to be). You will now learn a second verb which means to be, the verb estar. Although.
The verbs tener (to have) and venir (to come) are among the most frequently used in Spanish. Because most of their forms are irregular, you will have.
Notes #19 Numbers Standard 1.2
©2014 by Vista Higher Learning, Inc. All rights reserved The verb ir (to go) is irregular in the present tense. Note that, except for the yo form.
In Lección 2, you learned how to express preferences with gustar
Telling time in Spanish
How to Conjugate… SPANISH VERBS.
UNIVERSIDAD TECNICA DE MACHALA UNIDAD ACADEMICA DE CIENCIAS EMPRESARIALES CARRERA DE ECONOMIA ESTUDENTS: FIRST CONDITIONAL SENTENCES TEACHER: - Calvache.
An Animated PowerPoint Template. This 2007 PowerPoint contains video animation, but does not support text over video. The PowerPoint 2010 version includes.
DIGITAL SECURITY ? HOW TO IMPROVE. WHAT IS DIGITAL SECURITY? Digital security is the protection of your digital identity. Protects and keeps things like.
A PowerPoint Template Your Presentation Name. This text is a placeholder Main Content Page Layout 2 Copyright 2009.
Introduction to CAN. What is CAN and what are some of its features? Serial communication Multi-Master Protocol Compact –Twisted Pair Bus line 1 Megabit.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
In Lección 1, you learned how to conjugate and use the verb ser (to be). You will now learn a second verb which means to be, the verb estar. Although.
The verbs tener (to have) and venir (to come) are among the most frequently used in Spanish. Because most of their forms are irregular, you will have.
Description Sentences
Gustar, Interesar, Aburrir
Development of the concert programme
Connectivity MODELS OF NETWORK COMPUTING Centralized computing Distributed computing Collaborative or cooperative computing.
Juliana Carmona Esteban Cano
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: DHCP Routing and Switching Essentials v6.0.
In Lección 2, you learned how to express preferences with gustar
Globalization Politics and the preservation of nation state.
Las Preguntas (the questions) Tengo una pregunta… Sí, Juan habla mucho con el profesor en clase. No, Juan no habla mucho en clase. s vo s vo Forming.
Transcripción de la presentación:

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Switched Networks Routing and Switching

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter Introduction 1.1 LAN Design 1.2 Switched Environment 1.3 Summary

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 1: Objectives Upon completion of this chapter, you will be able to:  Describe convergence of data, voice, and video in the context of switched networks.  Describe a switched network in a small-to-medium-sized business.  Explain the process of frame forwarding in a switched network.  Compare a collision domain to a broadcast domain.

Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Converged Networks Growing Complexity of Networks  Our digital world is changing.  Information must be accessed from anywhere in the world.  Networks must be secure, reliable, and highly available.

Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Converged Networks Elements of a Converged Network  Collaboration is a requirement.  To support collaboration, networks employ converged solutions.  Data services include voice systems, IP phones, voice gateways, video support, and video conferencing.  Call control, voice messaging, mobility, and automated attendant are also common features.

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Converged Networks Benefits of a Converged Network  Multiple types of traffic; only one network to manage.  Substantial savings over installation and management of separate voice, video, and data networks.  Integrates IT management.

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Converged Networks Borderless Switched Networks  The Cisco Borderless Network is a network architecture that allows organizations to connect anyone, anywhere, anytime, and on any device securely, reliably, and seamlessly.  Cisco Borderless Network is designed to address IT and business challenges, such as supporting the converged network and changing work patterns.

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Converged Networks Hierarchy in the Borderless Switched Network Borderless switched network design guidelines are built upon the following principles:  Hierarchical  Modularity  Resiliency  Flexibility

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Converged Networks Core, Distribution, Access

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switched Networks Role of Switched Networks  Switching technologies are crucial to network design.  Switching allow traffic to be sent only where it is needed in most cases, using fast methods.  A switched LAN:  Allows more flexibility  Allows more traffic management  Supports quality of service, additional security, wireless, IP telephony, and mobility services

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switched Networks Form Factor Fixed Platform

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switched Networks Form Factor (cont.) Modular Platform

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switched Networks Form Factor (cont.) Stackable Platform

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Frame Forwarding Switching as a General Concept  A switch makes a decision based on ingress and a destination port.  A LAN switch keeps a table that it uses to determine how to forward traffic through the switch.  Cisco LAN switches forward Ethernet frames based on the destination MAC address of the frames.

Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Frame Forwarding Dynamically Populating a Switch MAC Address Table  A switch must first learn which devices exist on each port before it can transmit a frame.  It builds a table called a MAC address or content addressable memory (CAM) table.  The mapping device port is stored in the CAM table.  CAM is a special type of memory used in high-speed searching applications.  The information in the MAC address table used to send frames.  When a switch receives an incoming frame with a MAC address that is not found in the CAM table, it floods it to all ports, but the one that received the frame.

Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Frame Forwarding Switch Forwarding Methods Add a header

Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Frame Forwarding Store-and-Forward Switching  Allows the switch to:  Check for errors (via FCS check)  Perform automatic buffering  Slower forwarding process

Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Frame Forwarding Store-and-Forward Switching (cont.)

Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Frame Forwarding Cut-Through Switching  Allows the switch to start forwarding in about 10 microseconds  No FCS check  No automatic buffering

Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Frame Forwarding Cut-Through Switching (cont.)

Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switching Domains Collision Domains A collision domain is the segment where devices must compete to communicate.  All ports of a hub belong to the same collision domain.  Every port of a switch is a collision domain on its own.  A switch break the segment into smaller collision domains, easing device competition.

Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switching Domains Broadcast Domains A broadcast domain is the extend of the network where a broadcast frame can be heard.  Switches forward broadcast frames to all ports; therefore, switches do not break broadcast domains.  All ports of a switch, with its default configuration, belong to the same broadcast domain.  If two or more switches are connected, broadcasts are forwarded to all ports of all switches, except for the port that originally received the broadcast.

Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switching Domains Alleviating Network Congestion Switches help alleviating network congestion by:  Facilitating the segmentation of a LAN into separate collision domains  Providing full-duplex communication between devices  Taking advantage of their high-port density  Buffering large frames  Employing high-speed ports  Taking advantage of their fast internal switching process  Having a low, per-port cost

Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 1: Summary In this chapter, you learned:  The trend in networks is towards convergence using a single set of wires and devices to handle voice, video, and data transmission.  There has been a dramatic shift in the way businesses operate.  There are no physical offices or geographic boundaries constraints. Resources must now be seamlessly available anytime and anywhere.  The Cisco Borderless Network architecture enables different elements, from access switches to wireless access points, to work together and allow users to access resources from any place at any time.

Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 1: Summary (cont.)  The traditional, three-layer hierarchical design model divides the network into core, distribution, and access layers, and allows each portion of the network to be optimized for specific functionality.  It provides modularity, resiliency, and flexibility, which provides a foundation that allows network designers to overlay security, mobility, and unified communication features.  Switches use either store-and-forward or cut-through switching.  Every port on a switch forms a separate collision domain allowing for extremely high-speed, full-duplex communication.  Switch ports do not block broadcasts and connecting switches can extend the size of the broadcast domain, often resulting in degraded network performance.

Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential