4 Basic Switching
4 Basic Switching
Concepts
Switching, Routing, and
Wireless Essentials v7.0
(SRWE)
Switch Hardware
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Switch Hardware
Switch Platforms
There is a variety of switch platforms, form factors, and other features that must be
considered before choosing a switch. When designing a network, it is important to select
the proper hardware to meet current network requirements, as well as to allow for network
growth. Within an enterprise network, both switches and routers play a critical role in
network communication.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Switch Hardware
Switch Platforms (Cont.)
Cisco Meraki cloud-managed access
switches enable virtual stacking of switches.
They monitor and configure thousands of
switch ports over the web, without the
intervention of onsite IT staff.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Switch Hardware
Switch Form Factors
When selecting switches, network administrators must determine the switch form
factors. This includes fixed configuration, modular configuration, stackable, or non-
stackable.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Switch Hardware
Switch Form Factors (Cont.)
The thickness of the switch, which is expressed in the number of rack units, is also
important for switches that are mounted in a rack. For example, the fixed configuration
switches shown in the figure are all one rack units (1U) or 1.75 inches (44.45 mm) in height.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Switch Hardware
Port Density
The port density of a switch refers to the number of ports available on a single switch.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Scalable Networks
Design for Scalability
Scalability is the term for a network that can grow without losing availability and
reliability.
Network designers must develop strategies to enable the network to be available and to
scale effectively and easily.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Scalable Networks
Plan for Redundancy
Redundancy can prevent disruption of network services by minimizing the possibility of a
single point of failure by:
• Installing duplicate equipment
• Providing failover services for critical devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Scalable Networks
Increase Bandwidth
Link aggregation (e.g., EtherChannel) allows an administrator to increase the amount
of bandwidth between devices by creating one logical link made up of several physical
links.
• EtherChannel combines existing switch
ports into one logical link using a Port
Channel interface.
• Most configuration tasks are done on the
Port Channel interface (instead of on each
individual port) to ensure configuration
consistency on the links.
• EtherChannel can load balance between
links.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Scalable Networks
Expand the Access Layer
An increasingly popular option for extending access layer connectivity is through
wireless.
• Wireless LANs (WLANs) provides increased flexibility, reduced costs, and the ability to grow
and adapt to changing network and business requirements.
• To communicate wirelessly, end devices require a
wireless NIC to connect to a wireless router or a
wireless access point (AP).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Hierarchical Networks
Access, Distribution, and Core Layer Functions
Access Layer
• The access layer provide network access to the user.
• Access layer switches connect to distribution layer switches.
Distribution Layer
• The distribution layer implements routing, quality of service, and security.
• It aggregates large-scale wiring closet networks and limits Layer 2 broadcast domains.
• Distribution layer switches connect to access layer and core layer switches.
Core Layer
• The core layer is the network backbone and connects several layers of the network.
• The core layer provides fault isolation and high-speed backbone connectivity.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Frame Forwarding
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Frame Forwarding
Switching in Networking
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Frame Forwarding
The Switch Learn and Forward Method
The switch uses a two-step process:
Step 1. Learn – Examines Source Address
• Adds the source MAC if not in table
• Resets the time out setting back to 5 minutes if source is in the table
Step 2. Forward – Examines Destination Address
• If the destination MAC is in the MAC address table, it is forwarded out the specified
port.
• If a destination MAC is not in the table, it is flooded out all interfaces except the one it
was received – Unknown Unicast.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Frame Forwarding
Example
Switch 1 Switch 2 Switch 3
Port 1: Port 1: Port 1:
Port 2: Port 2: Port 2:
Port 3: Port 3: Port 3:
Port 4:
A B C D
E F
A -> E
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Frame Forwarding
Example – Learning + Unknown Unicast
Switch 1 Switch 2 Switch 3
Port 1: A Port 1: A Port 1: A
Port 2: Port 2: Port 2:
Port 3: Port 3: Port 3:
Port 4:
A B C D
E F
A -> E
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Frame Forwarding
Example – Learning + Simple Unicast
Switch 1 Switch 2 Switch 3
Port 1: A Port 1: A Port 1: A
Port 2: Port 2: Port 2: E
Port 3: E Port 3: Port 3:
Port 4: E
A B C D
E F
E -> A
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Frame Forwarding
Example – Layer 2 Convergence
Switch 1 Switch 2 Switch 3
Port 1: A Port 1: AB Port 1: ABCD
Port 2: B Port 2: C Port 2: E
Port 3: CDEF Port 3: D Port 3: F
Port 4: EF
A B C D
E F
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Frame Forwarding
Example – Layer 2 Convergence
Switch 1 Switch 2 Switch 3
Port 1: A Port 1: AB Port 1: ABCD
Port 2: B Port 2: C Port 2: E
Port 3: CDEF Port 3: D Port 3: F
Port 4: EF
A B C D
E F
C -> B
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Frame Forwarding
Switch Forwarding Methods
Switches use software on application-specific-integrated circuits (ASICs) to make
very quick decisions.
A switch will use one of two methods to make forwarding decisions after it receives
a frame:
• Store-and-forward switching - Receives the entire frame and ensures the
frame is valid. Store-and-forward switching is Cisco’s preferred switching method.
• Cut-through switching – Forwards the frame immediately after determining
the destination MAC address of an incoming frame and the egress port.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Frame Forwarding
Store-and-Forward Switching
Store-and-forward has two primary characteristics:
• Error Checking – The switch will check the Frame Check Sequence (FCS) for CRC errors.
Bad frames will be discarded.
• Buffering – The ingress interface will buffer the frame while it checks the FCS. This also
allows the switch to adjust to a potential difference in speeds between the ingress and
egress ports.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Frame Forwarding
Cut-Through Switching • Cut-through forwards the frame
immediately after determining the
destination MAC.
• Fragment (Frag) Free method will check the
destination and ensure that the frame is at
least 64 Bytes. This will eliminate runts.
Concepts of Cut-Through switching:
• Is appropriate for switches needing
latency to be under 10 microseconds
• Does not check the FCS, so it can
propagate errors
• May lead to bandwidth issues if the
switch propagates too many errors
• Cannot support ports with differing
speeds going from ingress to egress
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Switching Domains
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Switching Domains
Collision Domains
Switches eliminate collision domains and
reduce congestion.
• When there is full duplex on the link the
collision domains are eliminated.
• When there is one or more devices in
half-duplex there will now be a collision
domain.
• There will now be contention for the
bandwidth.
• Collisions are now possible.
• Most devices, including Cisco and
Microsoft use auto-negotiation as the
default setting for duplex and speed.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Switching Domains • A broadcast domain extends across all Layer
Broadcast Domains 1 or Layer 2 devices on a LAN.
• Only a layer 3 device (router) will break
the broadcast domain, also called a MAC
broadcast domain.
• The broadcast domain consists of all devices
on the LAN that receive the broadcast traffic.
• When the layer 2 switch receives the
broadcast it will flood it out all interfaces
except for the ingress interface.
• Too many broadcasts may cause congestion
and poor network performance.
• Increasing devices at Layer 1 or layer 2 will
cause the broadcast domain to expand.
• Solution - VLANs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28