You are on page 1of 39

Asia Pacific University College of Technology & Innovation

Student name Intake code Module Name and Code Project title Lecturer Name

: : : : :

Ali Reza Yassi UC2F1201

[TP025044]

IT {NC}

LAN Switching and WAN Networks (CT032-3.5-2) Individual assignment 1 SALMIAH BINTI AMIN

Date Assigned

10th April 2012

Date Completed

18th May 2012

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 1

Asia Pacific University College of Technology & Innovation Contents


Question 1: .................................................................................................................................................... 4 A) ............................................................................................................................................................... 4 Layer 2 Switching .................................................................................................................................. 4 3 functions implemented by Layer 2 switching .................................................................................... 4 Pros of Layer 2 switching ...................................................................................................................... 5 Cons of Layer 2 switching...................................................................................................................... 5 Layer 3 Switching .................................................................................................................................. 6 Pros of layer 3 switches ........................................................................................................................ 7 Cons of layer 3 switches ........................................................................................................................ 7 Evaluations ............................................................................................................................................ 8 B) ............................................................................................................................................................... 9 Layer 2 switches (Store-and-Forward) .................................................................................................. 9 Store-and-Forward Switching Operation ............................................................................................ 11 Cut-Through Switching........................................................................................................................ 12 Cut-Through Switching Operation ...................................................................................................... 13 Evaluations .......................................................................................................................................... 14 Layer 3 switches (Pure Routers).......................................................................................................... 14 Layer 3 Switching Operation ............................................................................................................... 15 Evaluations .......................................................................................................................................... 15 C) ............................................................................................................................................................. 16 How Spanning Tree works?................................................................................................................. 16 Benefits of implementing STP algorithm ............................................................................................ 18 Evaluations .......................................................................................................................................... 19 D) ............................................................................................................................................................. 20 Question 2: .................................................................................................................................................. 23 A) ............................................................................................................................................................. 23 B) ............................................................................................................................................................. 26 Virtual LAN Membership via Port Inheritance .................................................................................... 26 Virtual LAN Membership via MAC Address ........................................................................................ 27 Virtual LAN Membership built on Upper-Layer Protocol or Service ................................................... 27 Virtual LAN Membership via IP Subnet Address ................................................................................. 28

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 2

Asia Pacific University College of Technology & Innovation


Evaluations .......................................................................................................................................... 28 C) ............................................................................................................................................................. 29 VLAN Tagging ...................................................................................................................................... 29 Evaluations .......................................................................................................................................... 31 D) ............................................................................................................................................................. 32 Minimum Functionality of 802.1Q standard....................................................................................... 32 Features of 802.1Q standard .............................................................................................................. 32 Capabilities of 802.1Q standard .......................................................................................................... 33 Bibliography ................................................................................................................................................ 35 Marking Grid ............................................................................................................................................... 37 GANTT CHART ............................................................................................................................................. 38

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 3

Asia Pacific University College of Technology & Innovation

Question 1:
A)
Layer 2 Switching

Layer 2 switching is hardware built; it will be uses the host's Media Access Control as we can mention it as (MAC) address. By using the MAC address of the network interface cards of the host, layer 2 switching decides where to passed and drop frames in a Local Area Network. (Boill, 2011)
3 functions implemented by Layer 2 switching

Based on (Boill, 2011) there are three functions implemented by Layer 2 switching i) Address learning A layer 2 switch uses a MAC forward/filter table to make and maintain info of devices set in a net. The forward/filter table covers info of net address of devices for sending frames to its terminus. When a device requests to send frames to a new device, it will recover web address from forward/filter table of the switch and frontward the frames to the target. A point-to-point link will be established between the two devices so that they can share data. ii) Forward and filter decisions In this forward and filter decisions technique, the switch will scan the target hardware address of the frame when a frame is received on a switch interface indeed. At that point, the switch will match this address to the info checked within the MAC forward/filter table. When target hardware address is known in the MAC forward/filter table, the frame will be sent to the right target interface. Bandwidth will be assigned for net sectors after the frame is sent to the assigned interface, i.e. frame filtering. If the assigned hardware address is not found in the MAC forward/filter table, the frame is flushed out of all active destination interfaces. Until unless the

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 4

Asia Pacific University College of Technology & Innovation


respond is sent to the switch, no more frame will be received by the interface. Once a device replies by returning a frame, the switch adds the MAC address of the devices to the MAC forward/filter table as well. This method will allows switch creates a point-to- point connection among the 2 devices. If a server transmits a broadcast on the LAN, the switch flushes the frame out every port. Then only the responding devices will receive frames. (Froom, 2010) iii) Ensuring loop avoidance In a network link, network loops can usually happen when there are several connections among switches. Many links between switches are typically created to allow termination. To avoid network loops from happening, and to still sustain terminated connection between switches, the Spanning-Tree Protocol can be used. (Froom, 2010)

Pros of Layer 2 switching

Based on (Boill, 2011) there are six pros for layer 2 i. ii. iii. iv. v. vi. Low price Hardware-based bridging High speed Wire speed Short latency Grows bandwidth for each user

Cons of Layer 2 switching

Based on (Froom, 2010)there are three cons for layer 2

i. ii. iii.

Broadcast and multicast difficulties Slow merging time of the Spanning-Tree Protocol Struggle of network domain
Page 5

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Asia Pacific University College of Technology & Innovation


Layer 3 Switching

Layer 3 switch is a great performance device for network routing. A Layer 3 switch can up keeping the similar routing protocols as network routers can do indeed. Inspect incoming packets as well as make dynamic routing, both can make a decision built on the destination addresses as well as source inside. (Metzler, 2009)
2 functions implemented by Layer 3 switching

Based on (Metzler, 2009)there are two functions implemented by Layer 3 switching i) Packet Switching Layer 3 implements a transport technique of carrying the packets is named packet switching. The IP packet inside the frame has a source network layer IP address and an assigned network layer IP address indeed. The router maintains a routing table of network way it has well-read, and the router examines the network layer destination IP address. Once the router has found the destination network from the destination IP address, the router examines the routing table and determines a path survives to that network. ii) Route Processing Layer 3 switches make table lookups determining the following hop sideways the route, which in turn determines the output port over that to forward the packet or frame. The router or Layer 3 switch makes this choice grounded on the network share of the assigned address in the received packet. Throughout the routing processing, once the destination network is inaccessible, that means there are no way to the assigned network as well as there is no default network and the result is packet discarded. If the packet is capable to be sent to its assigned network, the route lookup will found the network hop to bring the packet. Throughout this route, first hop that transmit the packet will be lookup and after that the next hop will be determined to discovery the close way until the last destination is extended. Once the destination network is capable to be straight attached to the router, the port will directly attached to the network and accessible.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 6

Asia Pacific University College of Technology & Innovation


For doing this, the next phase maps the host portion of the assigned network address to the data link MAC address for the following hop or end node use the Address Resolution Protocol table It does not map the assigned network address to the router interface indeed.
Pros of layer 3 switches

Based on (Mitchell, 2010) there are some pros such as: Operation of Network Layer subnets letting isolation of network traffic inside the subnets thereby makes well security Switches maintain topology info namely routing tables Huge networks may be built up simply namely good scalability

Cons of layer 3 switches

Based on (Mitchell, 2010) there are some cons such as:

They are usually very costly Apart from a rare immunities, multivendor interoperability is not possible at the moment, vendors presently use proprietary solutions used for exchange of routing info

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 7

Asia Pacific University College of Technology & Innovation


Evaluations

Layer 2 switches are often fixed in the enterprise for high-speed connectivity among end nods at the data link layer. Layer 3 switches are a comparatively fresh phenomenon, made general by the employment press. It absolutory depends on the how large is the organization and also on speed as well as how costly it is. Embedded Switch Expertise embeds Ethernet switch structures into your hardware to upkeep great performance applications indeed. Embedded switch feature permit you link devices straight to your net, deprived of a separate Ethernet switch, aiding to decrease total cost and make simpler of system configuration. Layer 3 switching is a hybrid undeniably, base talking of a router and a switch.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 8

Asia Pacific University College of Technology & Innovation


B)
Layer 2 switches (Store-and-Forward)

Store-and-forward switching is that the LAN switch copies every complete frame inside the switch memory buffers and calculates a cyclic redundancy check (CRC) for mistakes. Cyclic redundancy check is an error-checking technique that uses a math formulation, grounded on the total of bits (1s) in the frame, to decide the received frame is error or not. If a CRC error is set up, the frame is discarded indeed. Whether the frame is errorless, the switch forwards the frame out the suitable interface port, as shown in Figure 1.

Figure 1(Store-and-Forward Switch Discarding a Frame with a Bad CRC) (CCNA, 2012)

If frame is lesser than 64 bytes in length, or if the frame is bigger than 1518 bytes in length, An Ethernet frame is discarded. As shown in Figure2.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 9

Asia Pacific University College of Technology & Innovation

Figure 2(Runts and Giants in the Switch) (CCNA, 2012)

Certain switches can be configured to carry enormous frames. If the frame does not involve some errors, and is not contain of a runt or a giant, the LAN switch looks up the assigned address in its switching, table and determines the resigning interface. It then transfers over the frame toward its intended destination.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 10

Asia Pacific University College of Technology & Innovation


Store-and-Forward Switching Operation

Store-and-forward switches collect the whole frame in internal memory and checked the frame intended for errors afore sending the frame to its destination. Store-and-forward switch process confirms a great level of error-free network traffic, as wicked data frames are discarded quite than sent across the network, as shown in Figure 3.

Figure 3(Store-and-Forward Switch Examining Every Frame for Errors afore forwarding to assigned Network Section) (CCNA, 2012)

The store-and-forward switch presented in Figure 3 checks every received frame for errors before sending it on to the frame's destination network section. If a frame has error in this review, the frame is putout and the switch will falls the frame from its buffers indeed.

A disadvantage to the store-and-forward switching technique is one of performance, for the switch has to store the whole data frame afore inspection for errors and sending. These error

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 11

Asia Pacific University College of Technology & Innovation


inspection consequences in high switch latency. If many switches are linked, with the data being tested at every switch point, entire network performance can downward as a result.
Cut-Through Switching

By cut-through switching, the LAN switch replicas into its memory just the destination MAC address, which is placed in the main 6 bytes of the frame follow the preamble indeed. The switch looking for the destination MAC address in its switching table and then determines the outgoing interface port and passed the frame on to its destination over and done with the chosen switch port. A cut-through switch going down delay since the switch begins to forward the frame once it reads the destination MAC address and defines the outgoing switch port, as showed in Figure 4.

Figure 4(Cut-Through Switch Inspecting Each Frame Header before passing to Destination Network Section) (CCNA, 2012)

The cut-through switch illustrated in Figure 4 ,Checks each received frame's coming first to determine the destination afore passing on to the frame's destination network section. Frames that has errors or do not have, are passed in cut-through switching operations, passing the error

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 12

Asia Pacific University College of Technology & Innovation


discovery of the frame to the intended recipient as well. If the receiving switch find out that frame has error, the frame is put out on the place that the frame is consequently discarded as of the network. Cut-through switching was established to cut the delay in the switch processing frames as they reach at the switch and are passed to the destination switch port. The switch forwards the frame that is in front into its port buffer. The switch passed the frame out the right interface port to the frame's intended destination, whenever the destination MAC address is founded by the switch. Cut-through switching cuts latency in the switch, though, the switch still pass the wicked frame, if the frame was corrupted in transit. The destination accepts this wicked frame, tests the frame's CRC, and will discards the frame, forcing the source to send it again. This procedure wastes bandwidth and, if it happens frequently, network operators face to substantial slowdown on the network.

Cut-Through Switching Operation

Cut-through switches do not do slightly error inspection of the frame as the switch search only for the frame's destination MAC address and pass the frame outside the suitable switch port. Cutthrough consequences in low switch latency in deed. The disadvantage, though, is that not good data frames and good frames are lead to frames destinations. This might not sound bad at first that you looking throw it because all network cards do frame checking by default to confirm decent data is received.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 13

Asia Pacific University College of Technology & Innovation


Evaluations

Presents switches do not hurt the network latency that elder one (legacy) labored as a result showed. This minimizes the result switch latency drives on your traffic indeed. Nowadays switches are improved suited for a store-and-forward situation. In contrast in store-and-forward with cut-through, store-and-forward switching stops error frames from being passed across the network and offers for quality of facility handling network traffic flow.
Layer 3 switches (Pure Routers)

Until now, this question has focused on the data link layer [Layer 2] of the Open System Interconnection model. When bridge knowledge was first advanced, it was not applied to prepare wire-speed bridges with huge amount of high-speed ports as of the industrial price involved. With developed knowledge, numerous functions previously executed in software were relocated into the hardware, growing performance and allowing industrialists to build equitably valued wire-speed switches. (Cisco, 2011)

Bridges and switches work at the OSI Layer 2 but routers work at the network layer OSI Layer 3. Routers offered functionality beyond that provide by bridges or switches. As an outcome, though, routers entail more complexity. Similar to early bridges, routers were sometimes implemented in software, run on a different goal processing platform including a personal computer (laptop) by 2 network interface cards (NICs) and software to route data among both NIC, as showed in Figure 5. (Cisco, 2011)

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 14

Asia Pacific University College of Technology & Innovation

Figure 5(Cisco layer 3 switch models) (Cisco, 2011)

In the beginning routing contain of a PC and two NIC cards, not different like 2 persons having a discussion, but find a third person to do so. The workstation may send its traffic thru the wire, and the routing computer may take it on 1 NIC, define that the traffic must be sent out the other network interface cards, and then resend the traffic out of this other network interface cards.
Layer 3 Switching Operation

The fundamental difference between a Layer 3 switch and a router is that Layer 3 switches have improved hardware forwarding data traffic faster than Layer 2 switches. Though, Layer 3 switches make choices concerning how to transmit traffic at Layer 3, same as a router does.
Evaluations

Layer 2 switch is extra term for a bridge, a Layer 3 switch is extra term for a router. This is not same that say a Layer 3 switch and a router run in the same method. Layer 3 switches make choices rely on the port-level IP addresses, but routers make choices rely on a map of the Layer 3 network (kept in a routing table).in addition, based on company size and the purpose of using network vendors would try to implement the best one built on what companies exactly needs. (Cisco, 2012)

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 15

Asia Pacific University College of Technology & Innovation

Figure 6(Multicast Traffic Flows and Router Functions) (Cisco, 2012)

C)
The Spanning Tree (STP) is a networking standard. The determination of STP is to stop loops in the LAN and to choice the wildest and fastest network links, if there are terminated links in the network. STP wills failover to the alternate link, if link in the network goes down. If this sentence likes what a routing protocol prepares then you are in the right thinking. Routing protocols aid devices route among WAN networks at Layer 3. ST could be termed a Layer 2 routing protocol for a LAN as it performs the similar purposes but for an Ethernet network, regardless of IP addresses. ST has some similar functions for the data-link layer (Layer 2) but is not an IP routing protocol.
How Spanning Tree works?

STP workout by first using an algorithm to discover redundant links in the LAN and choosing the greatest pathways. Its first aim is to put all links in both Forwarding and Blocking. Finally, the links devoid of a redundant link and the greatest links with a redundant link has been in

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 16

Asia Pacific University College of Technology & Innovation


forwarding state. The redundant links those were not good as the particular links has been in blocking state indeed. STP has not ability to use multiple links to the similar destination. Here is no load sharing feature with ST. Every redundant link that is not as chosen is blocked (fundamentally shut down) until the main link goes down first. Since STP is a complex protocol, this item would not cover every probable feature. (Davis, 2009) The 4 principles STP uses to choose if an interface would be in forwarding state are: (Corporation, 2004)

Figure 7(STA principles) (Corporation, 2004)

When these steps are comprehensive, every port which is neither a root port as well as designated port is blocked. As shown in below:

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 17

Asia Pacific University College of Technology & Innovation

Figure 8(STP implementing) (Marks, 2009)

Benefits of implementing STP algorithm

STP has 3 core characteristics that are beneficial to a local area networks operation: i. Redundancy

Spanning tree protocol offers redundancy to wholly devices in the network. The word redundancy means that every connection has some backups that can use again in the event of difficulties with the main connection. This is accomplished in the Spanning tree protocol by confirming that every device has a pathway to multiple switches. Though there are multiple pathways for every device to send data, just 1 path is active at a one time. In the moment that the active pathways face to an error, additional pathway will be opened. This lets the device to have

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 18

Asia Pacific University College of Technology & Innovation


continuous access to whole of the network even thou in the event of network connectivity difficulties along 1 or extra lines. (Enne, 2011)

ii.

Loop Prevention

The configuration of the spanning tree protocol, when in a paper diagram, looks like a tree with a variability of branches. This configuration, the goal for the protocol's term, is the purpose it is so effective at preventing loops. A loop occurs when there is more than 1 obtainable path among devices. These can consequence in duplicate data in the data-forwarding process. Spanning tree protocol, though, only lets a single active path among devices at a time, which stops the creation of loops in the network. (Balanis, 2007)

iii.

Root Switch

The establishment of a root switch aids to eliminate loops and cut network traffic. A LAN using spanning tree protocol has a number of switches however only 1 root switch. A switch is a piece of networking kit, also identified as a bridge, which links segments of a network to other. The root switch of a spanning tree protocol network is elected as the outcome of data collecting by all switches in the network and purpose of the logical center of the network relatively than the physical center. The root switch has the shortest pathway to the widely of network devices. The other switches then compute the straight pathway to the root switch and fixed all other paths as backups as well. (Balanis, 2007)

Evaluations

Any organizations that have a layer 2 switched networks can have spanning tree on. Though if there is not redundancy in the network and if only just a single forwarding pathway you could stop it, but it is not logical doing so as you have pleasing end users that can loop the network and

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 19

Asia Pacific University College of Technology & Innovation


bring it crushing to a halt in under a minute. Although this method is not using on the huge organization but depend on the size of the company and the situation it can be used.

D)
Building 1 500 nodes, of which 300 are to be attached to Micro LAN and 200 are to receive dedicated switch ports 5 UNIX servers and 10 MICROSOFT WINDOWS servers providing NFS services Internet router/network address translator 1 backbone switch providing 30 fast Ethernet interfaces

Mention that all ports are not in use. Evaluate amount of 24 - Ports Workgroup switch is: 200 user/20 ports = 10 10 Workgroup switch required.

Evaluate number of 24 Ports Shared Hub: 300 user/20 ports = 15 15 Shared Hub required.

Via using 5 Intermediate Distribution Frame (IDF) switches, every IDF switch is involved with two Workgroup switch and three Shared Hub as well. Unused ports left= 30 5 10 5 1=9 There are nine unused ports on the backbone Core Switch.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 20

Asia Pacific University College of Technology & Innovation


Building 2 Houses 500 end users with dedicated switch ports 20 server-type devices, including one mainframe A single large backbone switch with 40 fast Ethernet interfaces will be deployed 1 FDDI interface to the supercomputer

Mention that all ports are not in use. .Evaluate amount of 24 - Ports Workgroup switch: 500 user/ 20 ports = 25 25 Workgroup switch required. By using 2 Intermediate Distribution Frame (IDF) switches, one IDF switch withattached 12 Workgroup Switch and another with 13 Workgroup switch. Unused ports left = 40 2 20=18 There are 17 unused ports on the backbone Core Switch.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 21

Asia Pacific University College of Technology & Innovation

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 22

Asia Pacific University College of Technology & Innovation Question 2:


A)
Virtual Local Area Network (VLAN) is a logical local area network that spreads beyond a single traditional LAN to a set of LAN parts, known exact configurations. As a Virtual Local Area Network is a logical entity, it is making and configuration is ended completely in software. How is a Virtual Local Area Network Identified? As a Virtual Local Area Network is a software concept, identifiers and configurations for a VLAN need be correctly prepared for it to function as probable. Frame coloring is the method used to confirm that VLAN members are correctly identified. By frame coloring, packets are specified the proper VLAN ID at their source so that they may be correctly processed as they pass over the network. Then it allows switching and routing engines to make the appropriate choices as defined in the VLAN configuration indeed.

Figure 9(sample network using VLAN) (DAVIS, 2008)

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 23

Asia Pacific University College of Technology & Innovation


There are some reasons to implementing VLANs. To review, VLAN design reasons are: (Tyson, 2011) (Lammle, 2008)

I. II. III. IV. V.

Increased performance Improved manageability Network tuning and simplification of software configurations Physical topology independence Increased security options

Increased performance Switched networks by nature would growth performance over shared media device in use nowadays, mainly by decreasing the size of collision domains indeed. Combination of users into logical networks wills too growth performance by preventive broadcast traffic to operators performing alike functions or within separate workgroups. Furthermore, minus traffic will need to be routed as well the latency added by routers will be summarized. (Tyson, 2011)

Improved manageability VLANs offer flexible, easy, less pricey method to adjust logical groups in changing environments. VLANs make big networks further manageable by letting centralized configuration of devices positioned in physically diverse locations indeed. (Tyson, 2011)

Network tuning and simplification of software configurations Virtual Local Area Network will let LAN administrators to "fine tune" their networks by logically combination workers. Software configurations can be completed uniform across machineries with the consolidation of a section's resources into a particular subnet.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 24

Asia Pacific University College of Technology & Innovation


Subnet masks, IP addresses, and local network protocols will be more dependable across the whole VLAN. Low implementations of local server resources such as BOOTP and DHCP will be wanted in this area. These facilities can be more effectually organized when they can span buildings within a Virtual Local Area Network. (Lammle, 2008)

Physical topology independence Virtual Local Area Network provides independence from the physical topology of the network by letting physically diverse workgroups to be logically linked within a unique broadcast domain. If the physical setup is now in place, it is then simple to add ports in new locations to current Virtual Local Area Network if a department expands. These tasks can take place in advance of the move, making it easier to move devices with their current structures from one location to another. The used ports can be "decommissioned" for upcoming use, or reused by the section for new workers on the Virtual Local Area Network. (Lammle, 2008)

Increased security options Virtual Local Area Network has the capability to offer added security not accessible in a shared media network environment. Naturally, a switched network brings frames only to the intended receivers, and broadcast frames lone to other members of the Virtual Local Area Network. This lets the network administrator to segment users necessitating access to sensitive info into distinct Virtual Local Area Network from the rest of the overall user communal regardless of physical location. Furthermore, observing of a port with a traffic analyzer will only vision the traffic related with that specific port, making discreet observing of network traffic more problematic. It should be mention that the enhanced security that is stated above is not to be deliberated complete safeguard in contradiction of security infringements. What this offers is an extra

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 25

Asia Pacific University College of Technology & Innovation


safeguard counter to "casual" but unwanted attempts to vision network traffic indeed. (Lammle, 2008)

B)
Virtual LANs membership describes how collections of MAC layer end users are associated with a particular Virtual LANs or VLANs. There are several ways for this process, going from simple port link to difficult protocol-based link.
Virtual LAN Membership via Port Inheritance

The first technique to make Virtual LAN is identified as port inheritance. This technique runs by port switching in the Virtual LANs. Each user on that port would be linked with that Virtual LAN by heritage from the switch port. For instance, in a bridge with four ports, ports 1, 2, and 6 belong to Virtual LAN 2and port4 belongs to Virtual LAN 1.

PORT VLAN

1 2

2 2
Figure 10(ports to dissimilar Virtual LANs)

4 1

6 2

This technique of VLAN Membership is most suitable in combining together physical areas of a network indeed. By way of linked the VLAN with switched ports, the VLAN too linked with the physical areas those switch ports

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 26

Asia Pacific University College of Technology & Innovation


Virtual LAN Membership via MAC Address

The next level of virtual LAN association is built on end-user MAC address. Every device that connected to network has its own MAC address and those devices are allocated to Virtual LAN s affording to their MAC address. Additionally, they can track MAC addresses to choose membership indeed. MAC addresses 00-70-7F-60-4391 Virtual LAN 2 00-52-C6-82-416e 1 00-70-5F-92-9e22 2 00-50-C4-12-615e 1

Figure 11(MAC address to dissimilar Virtual LANs)

This way is most appropriate in condition that end-users move around the network. With linking their MAC address to a set of Virtual LAN s, the users computer can move wherever in the network and still keep its membership as well.

Virtual LAN Membership built on Upper-Layer Protocol or Service

The next way of Virtual LAN membership is built on upper-layer protocols and services indeed. This sort of Virtual LAN will be used to logically collect the broadcast traffic of a specific protocol or service. In a network, all users might only access a specific protocol otherwise services broadcast or else multicast traffic. Then, this sort of Virtual LAN is used for combining those users who just access a specific protocol or maybe services broadcast or else multicast traffic. Protocol Virtual LAN IP 1 IPX 2 IP/IPX 3

Figure 12(protocol to dissimilar Virtual LANs)

This kind of Virtual LAN is most beneficial for broadcast as well as multicast control on the switched LANs indeed. By making dissimilar Virtual LANs for particular protocols, users using those protocols are acceptable to see the broadcasts of that Virtual LAN; however, users not the

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 27

Asia Pacific University College of Technology & Innovation


Virtual LAN are banned from looking that protocol. Via isolating a protocol to just the users using that protocol, the switched LAN is capable to scale up to greatly bigger sizes.

Virtual LAN Membership via IP Subnet Address

VLAN membership is ground of the Layer 3 header. The IP address subnet is another way that Virtual LAN membership can be built on. IP subnet Virtual LAN 193.20.160.1 1 235.12.189.1 3 20.123.21.3 2 435.12.0.1 5

Figure 13(IP subnet addresses to dissimilar Virtual LANs)

Though Virtual LAN membership is built on Layer 3 info, but this subject is not related with network routing and should not make mistake with the concept of router functions. In this technique, IP addresses are used just as a guiding to determine membership in Virtual LANs. At Layer 3 Virtual LANs, workers can move their stations minus of reconfiguring their network addresses. The only problematic is that it usually takes more time to forward packets using Layer 3 infos instead of using MAC addresses.
Evaluations

Switching structural design is perfect for the creation of Virtual LAN s. The main Virtual LAN s was configured manually. Then, as the machinery became better assumed and more general, more advanced methods were hired. Many sellers are implementing some or all of these methods. For instance, in some organizations, the more progressive techniques count on IP protocols, but networks that use individually IP as well as non-routable protocols, might need to use the MAC-based technique.at all, these methods is obviously depends on the size of company that how many nodes have.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 28

Asia Pacific University College of Technology & Innovation


C)
VLAN Tagging

VLAN Tagging, furthermore identified as Frame Tagging, is a technique developed by Cisco to aid find packets travelling over trunk links. Once an Ethernet frame traverses a trunk link, an exceptional VLAN tag is new added to the frame and sent thru the trunk link as well. At the moment that it reaches at the end of the trunk link the tag is detached and the frame is sent to the right access link port conferring to the switch's table and that makes the receiving end is unaware of any VLAN infos. (Jakson, 2010) The figure below shows the process defined above:

Figure 14(VLAN tags) (Jakson, 2010)

The diagram shows 2, 3500 series Catalyst switches as well as 1, Cisco 3745 router connected by the Trunk Links. The Trunk Links let frames from wholly Virtual LAN s to travel thru the

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 29

Asia Pacific University College of Technology & Innovation


network backbone and extent their destination irrespective of the Virtual LAN the frame belongs as well. Besides, the terminals are connected straight to Access Links. Over, when we mention a port Trunk Link or Access Link, we are telling it created on the system it has been configured. This is for a port can be configured equally an Access Link (in the situation where it's 100Mbits or wilder). Frame tags would be separated to two points including explicit or implicit. An explicit frame tag contains of an extra field or fields added to current packets, makes them as be appropriate as one or more Virtual LAN s. An implicit frame tag is a current field in the origin a packet that classifies its membership in Virtual LAN s as shown in the diagrams below.

Figure 15(Virtual LAN tags) (Leifer, 2009)

Preamble

SFD

Destination Address

Source Address

Length

Data field

CRC

Figure 16(Virtual LAN tags Structure of implicit)

Preamble

SFD

Destination Address

Source Address

Explicit TAG

Data field

CRC

Figure 17(Virtual LAN tags Structure of explicit)

An implicit tagging is presented in Figure 14. An implicit tag is well-mention as the switch with inside characteristic of the original packet to recognize its Virtual LAN. Certain of the fields that could be used as implicit tags are the source addresses. (Rabinovitch, 2008)

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 30

Asia Pacific University College of Technology & Innovation


Because it is hard to be utilized, lots of vendors denied implementing implicit tagging. However, it also can be used to reduce the option of huge packets and usually increases the overall effectiveness of the switches forwarding logic, as no packet change is necessary. (Rabinovitch, 2008) An explicit tagging is shown in Figure 15. It displays change on the original packet by addition an explicit tag in its configuration. This sort of tagging is completed for packets that cannot provision the notion of an implicit tag. Lots of vendors just implement explicit tags on wholly packets. Via using this way, the more compound exploration of implicit tags is not required. (Rabinovitch, 2008) The drawback of explicit tagging is that explicit tag would be add to the size of the original packet and might be reason for oversized packet to be created on inters witch links. If this occur, there is no assurance that the packet can be sent. So cause of it, some vendors has no more attention on use of the explicit tagging to any multicast as well as broadcast. (Rabinovitch, 2008)

Evaluations

Traveling VLAN data over many subnets and routers needs a particular process named VLAN tagging. The action of VLAN tagging only adds additional info in the packet header of Ethernet frames and routers identify in what way pass along the data. This technique is usually used in huge networks, or with VLANs that span across extensive geographic location. Some of businesses just can and need such a technique for their organizations.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 31

Asia Pacific University College of Technology & Innovation


D)
Minimum Functionality of 802.1Q standard

The IEEE's 802.1Q standard was advanced to address the difficulty of how to breakdown enormous networks into minor parts and the result will show that broadcast and multicast traffic would not take more bandwidth than needed. The standard also aids deliver a developed level of security among parts of internal networks. The IEEE's 802.1Q standard delivers a set of functions which define as let the standard to be interoperability with additional vendors 802.1Q switches as well. This restricted scope of implementing a simple model of VLAN proficient switches fails to deliver complete VLAN implementation machinery in practical network indeed. The 802.1Q specification launches a standard technique for inserting VLAN membership infos into Ethernet frames indeed. (Greene, 2001)
Features of 802.1Q standard

The all-purpose aims of the 802.1Q standard are basically to describe architecture for Virtual LAN s and the protocols and function necessities of an 802.1Q Virtual LAN switch. The definite condition is founded on other IEEE 802.1 standards for instance transparent bridging and STP algorithm indeed. 802.1Q standard presented the idea of a virtual bridged network or Virtual LAN and describes an operative model of VLAN-capable switch for operation of IEEE 802.1Q Virtual LAN.802.1Q Virtual LANs have the abilities for classify end classifications or switch neighbors using GARP VLAN Registration Protocol, New Ingress and Egress Rule, as well as its distribution mechanism that would be discuses in below. Each one of these 3 parts lets the switch has the ability to make logical bridged LANs on the over shared switch fabric indeed. (Greene, 2001)

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 32

Asia Pacific University College of Technology & Innovation


Capabilities of 802.1Q standard

GARP Virtual LAN Registration Protocol (GVRP) GARP Virtual LAN Registration Protocol is commonly used to backing multiple switch topologies ad Virtual -aware end stations. This protocol is a signing way used to find Virtual LAN association to peer switches in the network indeed. In switched Virtual LANs, GVRP is used to find its abilities for conferring switches over the STP or GVRP end system to assign the switch port. For communication among the end system as well as the 802.1Q standard switch, GVRP is used to record end stations with backing to a Virtual LAN port ID and lets the switch to pass the received packets by that VID to the port thru the end user indeed. GVRP need be used for statement among switches to find which Virtual LAN is to be sent up or down the STP link. Every switch needs register thru others switch contained by Virtual LANs, so that the packets can be carried to the switch by those VIDs respectively. (D, 2008) Distribution Mechanism 802.1Q standard delivers a tagging based distribution mechanism to let multi switching Virtual LA networks. The tagging mechanism standardization is the most important and difficulty subjects in the standard indeed. 802.1Q has state some frame formats for tagging. As the frame formats for Ethernet, FDDI as well as Token ring are not similar to each other. In the case of explicit, there are 2 main elements: (TCI) that would be defining as a Tag Control Information field as well as (TPID) that define as a Tag Protocol ID. TPID is using now in the current Ethernet II and Ethernet SNAP headers to recognize the packet that can identify as tagged packet. (D, 2008) There are 3 fields in Tag Control Information. The first one would be define as priority field. 802.1Q standard backings of tagging of packets for not just Virtual LAN ID but moreover to established packet prioritization indeed. 3 bits of the 2 byte Tag Control Information are assigned for priority. Then, it provides the network an overall of 8 levels of prioritization, which can planned to vendor particular queuing and priority mechanisms as well.

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 33

Asia Pacific University College of Technology & Innovation


Specify the address format of the packet would be the following bit of using. The final twelve bits of the Tag Control Information are the VID, demonstrating the Virtual LAN this packet linked with. By using of GVRP mechanisms for classifying the Virtual LAN that exists among switches, the tagging mechanisms can identify the packet by marking it as a member of a specific Virtual LAN.

New Ingress and Egress Rules An 802.1Q standard capable bridge can able to correctly deliver packets to an indicated Virtual LAN. Some modification is completed grounded on the new ingress and egress rules including as the bridges are only devices with several interface and certain forwarding logic, their forwarding logic can be modified by the Virtual LAN switch to found out the idea of having several independent broadcast domains reachable by one bridge. These rules would be used to delimit the usage of inbound and outbound of the packets as in802.1Q standard. (D, 2008)

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 34

Asia Pacific University College of Technology & Innovation Bibliography


Balanis, C.A., 2007. Introduction to Smart Antennas. first edition ed. Arizona,usa: Morgan&Claypool. Boill, J., 2011. Layer 2 Switching. [Online] Available at: http://netcert.tripod.com/ccna/switches/2switch.html [Accessed 16 April 2012]. CCNA, 2012. Layer 2 Switching Methods (LAN). [Online] Available at: http://www.ccnaprep.com/layer_2_switching_methods.htm [Accessed 23 March 2012]. Cisco, 2011. Cisco layer 3 switch models. [Online] Available at: http://www.cisco2950.info/cisco-layer-3switch-models/ [Accessed 13 March 2012]. Cisco, 2012. High Availability Campus Network Design--Routed Access Layer using EIGRP or OSPF. [Online] Available at: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/routed-ex.html [Accessed 28 March 2012]. Corporation, M., 2004. Spanning Tree Algorithm Functionality. [Online] Available at: http://msdn.microsoft.com/en-us/library/ms918737.aspx [Accessed 14 April 2012]. D, k., 2008. Designing and supporting computer networks. indianapolis: cisco prees. DAVIS, D., 2008. FREE VIDEO: How to Configure VLAN s in the Cisco IOS. [Online] Available at: http://happyrouter.com/free-video-how-to-configure-vlan-in-the-cisco-ios [Accessed 13 April 2012]. Davis, D., 2009. Preventing network loops with Spanning-Tree Protocol (STP) 802.1d. [Online] Available at: http://www.petri.co.il/csc_preventing_network_loops_with_stp_8021d.htm [Accessed 22 April 2012]. Enne, v., 2011. The Advantages of Spanning Tree Protocol. [Online] Available at: http://www.ehow.com/list_6157099_advantages-spanning-tree-protocol.html [Accessed 1 May 2012]. Froom, R., 2010. Implementing Cisco IP Switched Networks (Switch) Foundation Learning Guide. Indianapolis,USA: Cisco Press. Greene, D., 2001. 802.1Q VLANs for better bandwidth. [Online] Available at: http://www.networkworld.com/news/tech/2001/0305tech.html [Accessed 20 April 2012]. Hucaby, D., 2012. VLANs and Trunking. [Online] Available at: http://www.ciscopress.com/articles/article.asp?p=29803&seqNum=5 [Accessed 22 April 2012]. J.Roese, 1998. Switched LANs. In Imnplementation, Operation, Maintanance. Boston: International ThomsonComputer Press. Jakson, A., 2010. VLAN Tagging - Understanding VLANs Ethernet Frames. [Online] Available at: http://www.firewall.cx/networking-topics/vlan-networks/219-vlan-tagging.html [Accessed 17 April 2012].

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 35

Asia Pacific University College of Technology & Innovation


Lammle, T., 2008. CCNA: Cisco Certified Network Associate: Fast Pass. First edition ed. Indianapolis: Wily Publisher. Leifer, D., 2009. Visitor Networks. [Online] Available at: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_5-3/visitor_networks.html [Accessed 17 April 2012]. Marks, J., 2009. Spanning Tree. [Online] Available at: http://bogpeople.com/networking/SpanningTree/ [Accessed 29 April 2012]. Metzler, J., 2009. Layer 3 Switching: A Guide for It Professionals. First edition ed. Chicago: Prentice Hall PTR. Mitchell, B., 2010. Wireless / Networking. [Online] Available at: http://compnetworking.about.com/od/hardwarenetworkgear/f/layer3switches.htm [Accessed 17 April 2012]. Rabinovitch, E., 2008. Migrating to VLAN: Tips, Tools and Standards. [Online] Available at: http://www.uniforum.org/web/pubs/uninews/970701/feature2.html [Accessed 19 April 2012]. Tyson, J., 2011. How LAN Switches Work. [Online] Available at: http://computer.howstuffworks.com/lanswitch16.htm [Accessed 19 April 2012].

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 36

Asia Pacific University College of Technology & Innovation Marking Grid

Student name: Ali Reza Yassi Student Id.:TP025066 Intake code: UC2F1201 IT{NC} Question 1
a) - Functionality, Pros & Cons of Layer 2 switches and Layer 3 switches (Max. 10 marks) b) - Functionality diagram of Layer 2 and 3 switches (Max. 15 marks)

Marks

c) - Description of Spanning Tree algorithm and benefits of implementing spanning tree algorithm (Max. 9 marks) d) - Designing medium-sized switched LAN: Building 1, Building 2 and connecting two buildings (Max. 21 marks)

Question 2
a) Justification for implementing VLANs (Max. 10 marks) b) Four methods of associating end-users with VLANs (Max. 8 marks) c) Advantages and Disadvantages of VLAN tagging (Max. 8 marks) d) Description of functionality, features & capabilities of 802.1Q (Max. 9 marks) Referencing/Citations and Documentation (Max. 10 marks)

TOTAL:

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 37

Asia Pacific University College of Technology & Innovation GANTT CHART

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 38

Asia Pacific University College of Technology & Innovation

LAN Switching & WAN Networks (LSWN) -CT032-3-2

Page 39

You might also like