Sunteți pe pagina 1din 43

COMPANY PROFILE

Jetking is an organization came into establishment in1947. Jetking is Indias number one Computer Hardware and Networking Institute. Birth and Evolution It took a lot of failure before mankind tasted technological success. Jetking evolved in tune with the changing face of technology. During 55 years in the field of electronic technology. Jetking successfully trained thousands of students to overcome failure for high paying careers.

1947 1962 1972 1986

Birth Pioneered Do-It-Yourself Kits in India Introduced Asia- 72, Fairchild and Wildcat transistors Became a Public Limited Company and also introduced

entertainment electronics product-T.V sets, Two-in-ones and amplifiers.

1990 1993 1994 1995 1996


1997 1998 1999 2008

Launched Jetking School of Electronics Technology Network of Jetking training centers spread all over India Opening of Jetking, Chandigarh Tie-up with Heath kit Educational System (U.S.A.) Introduced advanced courses on Pentium, Notebooks, Modems, Email/Internet, LAN 4.X Novell Education Academic Partner Representative for International Correspondence School (ICS), USA in India Added cyber technology to the curriculum ISO 9001-2000 company and Authorized Microsoft online testing centre (VUE) for MS, CISCO, MCSA, MCSE, CCNA, A+ etc.

Mr. Suresh G. Bharwani is the CHAIRMAN and MANAGING Director of Jetking Infotrain Ltd. Indias leading Computer Hardware and Networking Institute. With the vision to promote and the conviction to deliver the widespread propagation of comp- uter hardware and networking education across the nation, Mr. Bharwani was the first to set up an

training institute offering innovative courses in computer hardware in 1990. Jetkings core competency lies in providing complete training and developing hardware engineers and professionals with sound technical knowledge. It focuses on the overall development of personality of an individual with emphasis on personality development, presentation and communication skills, leadership skills etc. Jetking has established more than 125 operational centers and 250 faculties across the country and has trained over 3,50,000 students who have move onto the crave success- full career. With its alumni placed in the best of organizations in India and some abroad, Jetking,s vocational training and placement promises has helped build the career prospects of many young boys and girls. The company has been awarded the ISO 9000:2000 certification in 2008.The company has been awarded the Maharashtra IT Award for a key role in manpower activities in year 2006-07,it was felicitated with Franchise Award as Best Franchisor for the year 2007-08.Also,ranked 4th in the list of 26th hot franchises

as per outlook money magazine.


Mr. Suresh Bharwani was awarded with Pikes Peak Award by the Bob Pike Group USA for effective implementing smart lab plus for making technical training fun, faster and easier for non- technical person. Across all the sectors, industries are upgrading their information technology system. Industries ranging from plastics, chemicals, textiles and power to the

automotive and telecom sector are now IT savy. Government and public sectors are going hi-tech with EDI and computer networks. The IT industry, software companies, data centers, IT-enabled services providers are all equipped with advance IT system and networks. The increasing number of call centers, BPOs etc., have given a further boost to the hardware and networking industry. The courses in jetking comprises lecture and theory session, with a great focus on active participation through smart lab plus ,that focuses on audio visual and learning with hands-on training and equips students with an in depth domain knowledge that is technical; it also equips students with soft skills ,to face the multi-faceted challenges of corporate world. PLACEMENT: Jetking is the first and only institute that promises the 100% jobs guarantee to its students. The companies that have recruited jetkings students include: Samsung, Sun Micro system, IBM, Canon, Siement, reliance, TATA, Compaq HP invent, IT-T solutions, Videsh Sanchar Nigam Limited, D-Link, Novell, Dell, Wipro, LG, ICIC Infotech and several other MNCs.

Any student who has qualified his or her HSC/SSC examination is eligible to take up a course at jetking. The one year program Jetking certified hardware and networking professionals give 680 hours of in-depth knowledge to a student in Basic electronics and computer applications. Computer hardware and peripherals, window 2008 administrator and network administrator (soon it will be replaced with window server 2008).Apart frame technical knowledge there are personality development sessions which groom the students personality, their ability to perform better. Jetking, Indias leading hardware and networking training institute has trained over 3,00,000 students from its 125 centers spread across India. With its alumni placed in the best of organizations in India and some abroad, Jetking vocational training and placement promises has helped build the career prospects of many young boys and girls.

Jetking has partnered with some of the worlds most renowed names in networking to provide you with cutting edge courses and technologies. With academic partnerships with Microsoft, Comp TIA,LINUX, NOVELL, and person VUE . Jetking Chandigarh is a division of Hi-Tech point. Hi-Tech point is an ISO 9001-2000 IT company. It was established in year 1993 and run by a company of IT professionals. Jetking Chandigarh branch is considered to be the best centre among all centers. It has bagged number 1 center award consecutively for last 7 years. Here training on various fields is going on like Basic Electronic, Hardware, Networking, JCHNP Analog and Digital electronics and Hardware, RHCE, RHCSS, MNA, MCSE (Microsoft System Engineers), MCITP, MNA, CCNA (CISCO Certified Network Associate), CCNP(CISCO Certified Network Professional). Partnership with industry leaders like Microsoft and Red Hat Jetking ensure its students authentic courseware and technology.

NETWORKING

Introduction to networking
Networking is a practice of linking of two or more computing devices such as PCs, printers, faxes etc., with each other Connection between two devices is through physical media or logical media to share information, data and

resources. Networks are made with the hardware and software.

Cable/media

Fig 1:

computer network

Models of Networking
Model means the connectivity of two computers. We have many types of networking models. (i) (ii) (iii) Client Server Model Peer to Peer Model (Workgroup Model) Domain Model

(i)

Client Server Model


In a Client server model we have one server and many clients. A Client can

share the resources of server, but a server cannot share the resources on clients.On the point of view of administrator its very easy to control the network because we combine with the server also at security point of view. It is very useful because it

uses user level security in which users have to remember only one password to share the resources.

(ii)

Peer to Peer Model (Workgroup Model)


In Peer to Peer networking model all computers are in equal status, that is

we cannot manage centralization, administration secutity. In Peer to Perr networking client use operating system like Window 98, Window XP, Window 2000, Window Vista.

(iii)

Domain Model
It is a mixture of client server and peer-to-peer model. In this clients can

share their resources as peer-to-peer but with the permission of the server as in client server model therefore it is commonly used model because in this security is more as we can put restriction on both server and clients.

Difference between Workgroup & Domain

Table 1

Workgroup

Domain

1. It is a peer to peer networking model. 2. There is no client and no server. All the equal status. computers are in

1. It is a server based networking model. 2. There is a centralized dedicated server computer called domain controller which controls all other computers called clients.

3. This model is recommended for small networks, upto 10 computers. 4. There is no centralized

3. This model is recommended for large networks. 4. There is centralized administration and each PC can be administrated and managed from the server. 5. in this model high grade OS like

administrated separately.

5. In this model, low grade OS like 2000/XP professional, WIN 98 etc. can be used. 6. Users accounts Users. are created in

WIN 2000/2008 Server can be used.

6. Users accounts are created on the server side and are called Domain Users.

each PC and are called as Local

Categories of network

Networks can be categorized as per geographical area to be covered by the network. Computer network are divided into four categories includes: Local Area Network (LAN), Campus Area Network (CAN), Metropolitan Area Network (MAN) and Wide Area Network (WAN).

Local Area Network (LAN)


LAN is a computer network that is used to connect computers and work station to share data and resources such as printers or faxes. LAN is restricted to a small area such as home, office or college. Devices used in LAN are : HUB and switch. Media for LAN is UTP cables. Figure 1.2 shows how all work stations, server and printer are interconnected with the help of

the network device.

Fig 2: Local Area Network

Types of LAN
used for data sharing, LANS are classified into Ethernet, Token Bus, Token Ring and Fiber Distributed Data Interface (FDDI).Figure 3.3 shows LAN classification. In LANs, data can be transferred using techniques like token passing. As per techniques

Fig 3: LAN classification Advantages of LAN


a). Provides communication in smaller networks, easy to install and configure. b). many users can share data or network elements at the same time which results in fast work.

Disadvantages of LAN
a). limited number of computers are connected in a LAN. b). LAN cannot cover large area. c). Network performance degrades as the number of users exceeds.

Campus Area Network (CAN)


Campus Area Network is a computer network made up of two or more LANs within a limited area. It can cover many buildings in an area. The main feature of CAN is that all of the computers which are connected together have some relationship to each other e.g. different buildings in a campus can be connected using different CAN. It will

help

to

interconnect

academic

departments,

library

and

computer

laboratories. CAN is larger than LAN but smaller than WAN. Figure 3.4 shows a CAN network.

Fig 4:

Campus Area Network

Devices used in CAN are : HUB, Switch, Layer-3 switch, Access Point .And the media used for CAN is Unshielded twisted pair of cables and Fiber Optics Cable.

Metropolitan Area Network (MAN)


MAN is the interconnection of networks in a city. MAN is not owned by a single organization. It act as a high speed network to allow sharing resources with in a city. MAN can also be formed by connecting remote LANs through telephone lines or radio links. MAN supports data and voice transmission. The best example of MAN is cable T.V network.

Wide Area Network (WAN)


WAN covers a wide geographical area which include multiple computers or LANs. It connects computer networks through public networks like, telephone system, microwave, satellite link or leased line. Most of the WANs use leased lines for internet access as they provide faster data transfer. WAN helps an organization to establish network between all its

departments and offices located in the same or different cities. It also enables communication between the organization and rest world.

Devices used in WAN is only Router

IP ADDRESSES and MAC Addresses


It is also called as logical addresses. IP is a 32 bit long and it is divided into 4 octets and dot (.) is used to separate one octet from another. It is represented in the form of decimals. There are two versions of IP addresses:

IPv4 IPv6 Table 2 Comparison between IPv4 and IPv6 IPv4 IPv6 performs It is 128 bit long. It is divided doesnt into 16

It is 32 bit long. It is divided into 4 octets. Ipv4 and unicasting.

octets. IPv6 support and support broadcasting, it performs

broadcasting, multicasting

IPv4

is

divided

into

multicasting unicasting.

classes: A to E. IPv4 is in decimal form.

Ipv6 classes.

doesnt

IPv6 is in hexadecimal form.

IP Address Classes Address Classes

Address Class

Startin g Bits (firstbyte)

Range First Octet

of Mask Value

Valid Hosts

Class A

1to 127

255.0.0.0

256*256*256-2= 16,777,214

Class B

10

128 to 191

255.255.0. 0

256*256-2=65,534

Class C

110

192 to 223

255.255.25 256-2 5.0

Class D

1110

224 to 239

Reserved for multicasting

Class E

1111

240 to 255

Reserved development

for

research

and

Table 3: Address Classes `

How to Assign IP Address to Computer


An IP address assigned to a computer may either be permanent address or address that is assigned to a computer on a time lease or for temporary basis. Hence, the address granted to computers is divided into two categories Dynamic IP addresses and Static addresses.

Dynamic IP Addresses
Dynamic IP addresses are assigned to the devices that require temporary connectivity to the network or non-permanent devices such as portable computer. The most common protocol used for assigning Dynamic IP address is DHCP also called Dynamic Host Configuration Protocol. The DHCP grants IP address to the computer on lease basis.

Static IP Addresses
Static IP addresses are assigned to the device on the network whose existence in the network remains for a longer duration. These static IP addresses are semi-permanent IP addresses which remain allocated to a specific device for longer time e.g. Server.

How to Configure IP Address in window 2008


Right click on My Network Places- properties right click on working LAN card- properties select internet protocol (TCP/IP) -properties

Tick on- Use the following IP addresses - now fill the IP address e.g 10.0.0.1 Tick on Use the following DNS server address Fill the preferred DNS server 10.0.0.1 Ok Close

Now check the connectivity of computer with itself with command Start-run-cmd-ping 10.0.0.1

MAC Addressing
MAC address is a hardware address that is embedded in the NIC card. It is also known as hardware address or physical address. Every NIC card has a unique MAC address assigned by IEEE. Mac address is used to identify the nodes at lower levels of OSI model. The MAC address operates at the data link layer of the OSI model. MAC address is a 12 digit hexadecimal number (48 bit address). It is made up of numbers from 0-9 or a letter from A-F. MAC address can be written in any one of the formats: MM:MM:MM:SS:SS:SS MM:MM:MM:SS:SS:SS

T o identify the MAC address in window:

Click Start Run Enter cmd in the Open text book Type ipconfig /all Press Enter

The 12 digit MAC address will be shown as say 00:11:11:EA:8D:F6

NETWORKING MEDIA
To do networking we need to use some type of media. There are many types of media. (i) (ii) Coaxial Cable Fiber optic cable Twisted Pair of Cables Satellite

(iii) (iv)

(iv) Micro- wave

Coaxial Cable Coaxial cable consists of an insulated copper conductor surrounded by a tube shaped copper braid outer copper tune and the inner conductor have the same axis of curvature hence it called coaxial cable. It is basically of two types:

(i) (ii)

Base Band Cable (RG 59) Broad Band Cable (RG 58)

We used Base Band signal cable in Networking of Computers, It is so called because it carries single frequency. Its speed is 10 Mbps and impedance is 50 . Where as Broad Band Cables carries multiple frequencies. Connector used for Coaxial cable is BNC(British Novel Connector) connector. ARCnet uses RG-62 coaxial cable. It has an impedance of 93 and has a comparatively lesser attenuation, hence yield greater distances. These cables are expensive and provide high propagation factor.

Fiber Optical Cable propagation factor than coaxial cable. It is a costly but more secure transmission media.
Fiber optic cable consists of a very fine fiber made from two types of glass, one for the inner core and the other for the outer layer. Here signal is transmitted in the form of light. Different varieties of fiber optics is used depending on the size of the

network. Single mode fiber optics is used for networks spanning longer distance. Fiber Optics has lower Twisted Pair Cable There are two wires, which are twisted with each other to avoid EMI (Electro Magnetic Induction).these cables are easy to terminate. However they have a slightly higher value of attenuation value and hence have limited distance covering capacity. Connector used for Twisted Pair of Cable is (Registered Jack) RJ-45 and RJ-11. There are two types of twisted pair of cables:

STP (Shielded Twisted Pair): In this an extra wire which is called shielded wire is wrapped over the

inner cover which holds copper in pairs. This protection is used to protect signal from external noise.

noise.

UTP (Unshielded Twisted Pair) In this type of wire no shielded cover is there for extra protection from There are different categories of UTP cables: Categories of UTP Cables Table 4: Category and Speed of UTP cables

Category

Speed

CAT-1 CAT-2 CAT-3 CAT-4

56 Kbps 4 Mbps 10 Mbps 16-20 Mbps

CAT-5 CAT-6 CAT-7

100 Mbps 1Gbps 1Gbps

Ethernet Cabling
There are three types of Ethernet cables:

Straight cable Crossover cable Rolled cable

Straight cable
It is used when we have to connect

PC TO Switch PC to Hub Hub to Router

Switch to Router

Color Coding for straight Cable TABLE 5 568A (one end) (other end) (one end) 568B (other end)

Green/white Green Orange/white Blue Blue/white Orange Brown/white Brown

Green/white Green Orange/white Blue Blue/white Orange Brown/white Brown

Orange/white Orange Green/white Blue Blue/white Green Brown/white Brown

Orange/white Orange Green/white Blue Blue/white Green Brown/white Brown

Crossover Cable
It is used when we have to connect:

PC to PC Hub to Hub Switch to switch Router to Router PC to Router Hub to Switch

Table 6

Color Coding for Crossover cable

(one end)

(other end)

Orange/white Orange Green/white Blue Blue/white Green Brown/white Brown

Green/white Green Orange/white Blue Blue/white Green Brown/white Brown

Rollover Cable
Rollover cable isnt used to connect any Ethernet connections together, but Rollover cable can be used to connect a host to a router console serial communication (com) port. NOTE: Straight cable and Cross cables are used for data transfer but Rollover cables are not used for data transfer. There are two methods for manufacturing Rollover cables:

Table 7

Color Coding for Rollover Cable

568A

568B

(one end)

(other end)

(one end)

(other end)

Green/white Green Orange/white Blue Blue/white Orange Brown/white Brown

Brown Brown/white Orange Blue/white Blue Orange/white Green Green/white

Orange/white Orange Green/white Blue Blue/white Green Brown/white Brown

Brown Brown/white Green Blue/white Blue Green/white Orange Orange/white

OSI REFERENECE MODEL

The OSI model is the very heart of networking with every layer performing a specific task in order to facilitate data communications. In the world of networking the first four (4) layers is the focus. They define the following: What type and speed of LAN and WAN media to be implemented How data is sent across the media What type of addressing schemes will be used. How data will be reliably sent across the network and how flow control will be accomplished What type of routing protocol will be implemented

Why a Layered Network Model? Reduces complexity Standardizes interfaces Facilitates modular engineering Ensures interoperable technology Accelerates evolution Simplifies teaching and learning The OSI model - seven numbered layers indicate distinct functions. In the Transmission Control Protocol/Internet Protocol (TCP/IP), the distinct functions fit into five named layers. This separation of networking functions is called "layering". OSI Layer Functions: 7. APPLICATION (Network processes to applications) The application layer provides network services to user applications. For example, a word processing application is serviced by file transfer services at this layer. 6. PRESENTATION (Data representation) This layer provides data representation and code formatting. It ensures that the data that arrives from the network can be used by the application, and it ensures that information sent by the application can be transmitted on the network. 5. SESSION (Interhost communication) This layer establishes, maintains, and manages sessions between applications. 4. TRANSPORT (End-to-end connections) This layer segments and reassembles data into a data stream. This layer uses the TCP protocol. 3. NETWORK (Addresses and best path) This layer determines the best way to move data from one place to another. The router operates at this layer. This layer uses the IP addressing scheme. 2. DATA LINK (Access to media) This layer provides physical transmission across the medium. It handles error notification, network topology, and flow control. This layer uses the Media Access Control (MAC) address. 1. PHYSICAL (Binary transmission) This layer provides the electrical, mechanical, procedural, and functional means for activating and maintaining the physical link between systems. This layer uses the physical media like twisted pair, coaxial, and fiber-optic cable.

Introduction to Switching
SWITCH LAN Segmentation In a collision domain, a frame sent by a device can cause collision with a frame sent by another device in the same collision domain. Moreover, a device can hear the frames destined for any device in the same collision domain. In a broadcast domain, a broadcast frame sent by a device can be received by all other devices in the same broadcast domain. A LAN segment or an Ethernet network segment consists of the devices connected with a coaxial cable or a hub. The devices are in the same collision domain. Ethernet congestion problem Ethernet congestion problem occurs when too many devices are connected to the same Ethernet network segment, such that the high network bandwidth utilization increases the possibility of collision, which causes degradation of network performance.

LAN segmentation LAN segmentation solves the congestion problem by breaking the network into separate segments or collision domains using bridges, switches or routers (but not hub s or repeaters). LAN segmentation can reduce the number of collisions in the network and increase the total bandwidth of the network (e.g. 10 Mbps for one segment, 20 Mbps for two segments, 30 Mbps for three segments, and so on). 80/20 rule The 80/20 rule should be used when designing how to segment a network, i.e. 80% or more data traffic should be on the local network segment while 20% or less data traffic should cross network segments.

Layer 2 Switching Layer 2 switching is hardware based, which means it uses the MAC address from the host NIC card to filter the network traffic. Layer 2 switch can be considered as multi port bridge.

Layer 2 switches are fast because they do not look at the network layer header information, instead it looks at the frames hardware address before deciding to either forward the frame or drop it. Layer 2 Switching Provides the Following : Hardware based bridging Wire speed Low latency Low cost.

Limitations of Layer 2 Switching With bridge the connected networks are still one large broadcast domain. Layer 2 switch cannot break the broadcast domain, this cause performance issue which limits the size of your network. For this one reason the switch cannot completely replace routers in the internetwork. Bridging v/s LAN Switching Layer 2 switches are just bridges with more ports, however there are some important differences. Bridges are software based. While switches are hardware based because they use ASIC (Application Specific Integrated Circuit) chip that help make filtering decisions. LAN Switching

1. Address learning learning the MAC addresses of the connected devices to build the bridge table. 2. Forward and filter decision forwarding and filtering frames based on the bridge table entries and the bridge logic. 3. Loop avoidance avoiding network loop by using Spanning Tree Protocol A bridge or switch maintains a forwarding table (also known as bridge table or MAC address table) which maps destination physical addresses with the interfaces or ports to forward frames to the addresses. A bridge or switch builds a bridge table by learning the MAC addresses of the connected devices. When a bridge is first powered on, the bridge table is empty. The bridge listens to the incoming frames and examines the source MAC addresses of the frames. For example, if there is an incoming frame with a particular source MAC address received from a particular interface, and the bridge does not have an entry in its table for the MAC address, an entry will be created to associate the MAC address with the interface. The default aging time for an entry in a bridge table is 300 seconds (5 minutes). It means that an entry will be removed from the bridge table if the bridge has not heard any message from the concerned host for 5 minutes.

ADDRESS LEARNING How Switches Learn Addresses

Examining the Forward/Filter Process

A bridge or switch forwards or filters a frame based on the following logic: 1. If the destination MAC address of the frame is the broadcast address (i.e.FFFF.FFFF.FFFF) or a multicast address, the frame is forwarded out all interfaces,except the interface at which the frame is received.

2. If the destination MAC address is an unicast address and there is no associated entry in the bridge table, the frame is forwarded out all interfaces, except the interface at which the frame is received. 3. If there is an entry for the destination MAC address in the bridge table, and the associated interface is not the interface at which the frame is received, the frame is forwarded out that interface only. 4. Otherwise, drop the frame. Broadcast and Multicast Frames Broadcast and multicast frames do not have a destination address specified. The source address will always be the hardware address of the device transmitting the frame, and the destination address will either be all 1s which is a broadcast. With the network or subnet address specified and the host address all 1s are multicast. eg: 255.255.255.255 (broadcast) 172.16.255.255 (multicast) o Multicast sends the frame to a certain network or subnet and all hosts within that network or subnet. o broadcast of all 1s sends the frame to all networks and hosts.

There are three types of switching method: Store-and-forward switching The entire frame is received and the CRC is computed and verified before forwarding the frame.

If the frame is too short (i.e. less than 64 bytes including the CRC), too long (i.e. more than 1518 bytes including the CRC), or has CRC error, it will be discarded. It has the lowest error rate but the longest latency for switching. However, for high-speed network (e.g. Fast Ethernet or Gigabit Ethernet network), the latency is not significant. It is the most commonly used switching method, and is supported by most switches. Cut-through switching (also known as Fast Forward switching ) A frame is forwarded as soon as the destination MAC address in the header has been received (the 1st 6 bytes following the preamble). It has the highest error rate (because a frame is forwarded without verifying the CRC and confirming there is no collision) but the shortest latency for switching. Fragment-free switching ( Modified Cut-through switching ) A frame is forwarded after the first 64 bytes of the frame have been received. Since a collision can be detected within the first 64 bytes of a frame, fragment-free switching can detect a frame corrupted by a collision and drop it.Therefore, fragment-free switching provides better error checking than cut-through switching. The error rate of fragment-free switching is above store-and-forward switching and below cut-through switching. The latency of fragment-free switching is shorter than store-andforward switching and longer than cut-through switching.

VLAN Operation Overview


A Virtual LAN (VLAN) is a broadcast domain created based on the functional, security, or other requirements, instead of the physical locations of the devices, on a switch or across switches. With VLANs, a switch can group different interfaces into different broadcast domains. Without VLANs, all interfaces of a switch are in the same broadcast domain; switches connected with each other are also in the same broadcast domain, unless there is a router in between. Different ports of a switch can be assigned to different VLANs. A VLAN can also span multiple switches. The advantages of implementing VLAN are: . It can group devices based on the requirements other than their physical locations. . It breaks broadcast domains and increases network throughput. . It provides better security by separating devices into different VLANs. . Since each VLAN is a separate broadcast domain, devices in different VLANs cannot listen or respond to the broadcast traffic of each other. . Inter-VLAN communication can be controlled by configuring access control lists on the router or Layer 3 switch connecting the VLANs. VLANs can be configured using one of the following two methods: Static VLAN Assigning VLANs to switch ports based on the port numbers.It is easier to set up and manage. VLAN LAB Switch# configure terminal Switch(config)# vlan XX Switch(config)# name XYZ Switch(config)# interface< interface> module/number Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan <vlan-id> Switch(config-if)# end Example

Switch(config)#vlan ? <1-1005> ISL VLAN IDs 1-1005 Switch(config)#vlan 20 Switch(config)#name Marketing Switch(config)#vlan 30 Switch(config)#name Finance Switch(config)#interface fastethernet 0/1 Switch(config-if)#switchport mode access Switch(config-if)#switchport access vlan 20 Switch(config-if)#end Switch#show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------1 default active F0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6 Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12, Fa0/13, Fa0/14, Fa0/15, Fa0/16, Fa0/17, Fa0/18, Fa0/19, Fa0/20, Fa0/21, Fa0/22, Fa0/23, Fa0/24, Gig1/1, Gig1/2 20 Marketing 30 Finance 1002 fddi-default 1003 token-ring-default 1004 fddinet-default 1005 trnet-default active active active active active active F0/1

Unless until the ports are not assigned to the VLAN it will not work but will remain active to receive the ports at any time . To delete the VLAN from the SWITCH Switch(config)#no vlan XX After deleting the VLAN the port assigned to the VLAN will become Orphan. And need to reassignment again by the Admin.

Default VLANs can never be deleted, like VLAN 1, 1002,1003,1004,1005 A range of ports can be selected by single command to configure for command configuration like vlan assignment, security and QoS on the interface. Switch(config)#interface range fastethernet 0/1 10 Switch(config-range-if)#Switchport mode access

Dynamic VLAN Assigning VLANs to switch ports based on the MAC addresses of the devices connected to the ports. A VLAN management application is used to set up a database of MAC addresses, and configure the switches to assign VLANs to the switch ports dynamically based on the MAC addresses of the connected devices. The application used by Cisco switches is called VLAN Management Policy Server (VMPS). Cisco switches support a separate instance of spanning tree and a separate bridge table for each VLAN.

A VLAN = A Broadcast Domain = Logical Network (Subnet)

VLAN Operation

Each logical VLAN is like a separate physical bridge. VLANs can span across multiple switches. Trunks carry traffic for multiple VLANs. Trunks use special encapsulation to distinguish between different VLANs. VLAN Membership Modes

VLAN Trunking

There are two different types of links in a switched network: Access link A link that is part of only one VLAN. Therefore, a port connecting to an access link can be a member of only one VLAN. Trunk link A 100 Mbps or 1000 Mbps point-to-point link that connects switches or routers, and carries frames of different VLANs.Therefore, a port connecting to a trunk link can be a member of multiple VLANs. All VLANs are configured on a trunk link by default. VLAN Trunking, by making use of frame tagging, allows traffic from different VLANs to transmit through the same Ethernet link (trunk link) across switches. VLAN Trunking identifies the VLAN from which a frame is sent by tagging the frame with the source VLAN ID (12-bit long). This feature is known as frame tagging or frame identification. With frame tagging, a switch knows which ports it should forward a broadcast frame (forward out the ports which have the same VLAN ID as the source VLAN ID). It also knows which bridge table it should use for forwarding an unicast frame (since a separate bridge table is used for each VLAN). A frame tag is added when a frame is forwarded out to a trunk link, and is removed when the frame is forwarded out to an access link. Therefore, any device attached to an access link is unaware of its VLAN membership .

VTP(VLAN TRUNKING PROTOCOL) o A messaging system that advertises VLAN configuration information o Maintains VLAN configuration consistency throughout a common administrative domain o Sends advertisements on trunk ports only

VTP Modes Server Creates VLANs Modifies VLANs Deletes VLANs Sends/forwards advertisements Synchronizes Saved in NVRAM Client Forwards advertisements Synchronizes Not saved in NVRAM Transparent Creates VLANs Modifies VLANs Deletes VLANs Forwards advertisements Does not synchronize

Saved in NVRAM VTP Operation VTP advertisements are sent as multicast frames. VTP servers and clients are synchronized to the latest revision number. VTP advertisements are sent every 5 minutes or when there is a change.

VTP Pruning Increases available bandwidth by reducing unnecessary flooded traffic Example: Station A sends broadcast, and broadcast is flooded only toward any switch with ports assigned to the red VLAN

InterVLAN : Communication between different VLAN is called Inter VLAN Switch Inter VLAN(Virtual Local Area Network) Configuration LAB

1700A Router>enable Router#configuration terminal Router(config)#hostname 1700A 1700A(config)#interface Fast Ethernet 0/0 1700A(config-if)#ip address 10.0.0.1 255.0.0.0 1700A(config-if)#no shutdown 1700A(config-if)#no ip addresses 1700A(config-if)#interface F0/0.1(sub interface creation)

1700A(config-subif)#encapsulation Dot1Q 1 (encapsulation type) 1700A(config-subif)#ip address 192.168.10.17 255.255.255.240 1700A(config-subif)#no shutdown 1700A(config-subif)#interface F0/0.2 1700A(config-subif)#encapsulation Dot1Q 2 1700A(config-subif)#ip address 192.168.10.33 255.255.255.240 1700A(config-subif)#no shutdown 1700A(config-subif)#interface F0/0.3 1700A(config-subif)#encapsulation Dot1Q 3 1700A(config-subif)#ip address 192.168.10.49 255.255.255.240 1700A(config-subif)#no shutdown 1700A(config-subif)#^Z 1700A#show ip route 3550 Switch Switch>en Switch#config t Switch(config)#host name 3550 3550(config)#interface vlan 1 3550(config-if)#ip address 192.168.10.1 255.255.255.0 3550(config-if)#no shutdown 3550(config-if)#exit 3550(config)#ip default gateway 192.168.10.17 3550(config)#interface F0/1 3550(config-if)#description connection 1700A 3550(config-if)#interface F0/2 3550(config-if)#description connection 3560 3550(config-if)#exit 3550(config)#interface F0/1 (Through Router) 3550(config-if)#switch port trunk encapsulation dot1Q 3550(config-if)#switch port mode trunk 3550(config)#interface F0/2 (Through Switch) 3550(config-if)#switch port trunk encapsulation dot1Q 3550(config-if)#switch port mode trunk 3550(config-if)#exit 3550(config)#vtp mode server 3550(config)#vtp domain CCSP 3550(config-if)#^Z 3550#show interface trunk 3550#config t 3550(config)#vlan 3 3550(config-vlan)#name sales 3550(config-vlan)#^Z

3550#show vlan 3550(config)#interface F0/5 3550(config-if)#switchport mode access 3550(config-if)#switch port access vlan 3 3550(config)#interface F0/6 3550(config-if)#switchport mode access 3550(config-if)#switch port access vlan 3 3550(config-if)#^Z 3550#show vlan 3550#show interface trunk

3560 Switch Switch>en Switch#config t Switch(config)#hostname 3560 3560(config)#interface F0/2 3560(config-if)#description connection to 3550 3560(config-if)#exit 3560(config)#inter vlan 1 3560(config-if)#ip address 192.168.10.2 255.255.255.0 3560(config-if)#no shutdown 3560(config-if)#exit 3560(config)#ip default gateway 192.168.10.17 3560(config)#interface F0/1 3560(config-if)#switch-port trunk encapsulation dot1Q 3560(config-if)#switch-port modetrunk 3560(config)#vtp mode client 3560(config)#vtp domain CCSP 3560(config-if)#^Z 3560#show interface trunk 3560#show vtp status 3560#config t 3560(config)#vlan 2 3560(config-vlan)#name production 3560(config-vlan)#^Z 3560#show vlan 3560(config)#interface F0/2 3560(config-if)switch-port mode access vlan 2 3560(config-if)#switch-port access vlan 2 3560(config)#interface F0/3 3560(config-if)switch-port mode access vlan 2

3560(config-if)#switch-port access vlan 2 3560(config-if)#^Z 3560#show spanning tree 3560#show interface trunk 3560#show vtp status 3560#show vlan

S-ar putea să vă placă și