Sei sulla pagina 1di 38

NETWORKING

Introduction to networking
Networking is a practice of linking of two or more computing devices such as
PCs, printers, faxes etc., with each other Connection between two devices is
through physical media or logical media to share information, data and

resources. Networks are made with the hardware and software.

Cable/media

Fig 1:

computer network

Models of Networking
Model means the connectivity of two computers. We have many types of
networking models.

(i)

(i)

Client Server Model

(ii)

Peer to Peer Model (Workgroup Model)

(iii)

Domain Model

Client Server Model

In a Client server model we have one server and many clients. A Client can
share the resources of server, but a server cannot share the resources on clients.On
the point of view of administrator its very easy to control the network because we
combine with the server also at security point of view. It is very useful because it
uses user level security in which users have to remember only one password to
share the resources.

(ii)

Peer to Peer Model (Workgroup Model)


In Peer to Peer networking model all computers are in equal status, that is

we cannot manage centralization, administration secutity. In Peer to

Perr

networking client use operating system like Window 98, Window XP, Window 2000,
Window Vista.

(iii)

Domain Model
It is a mixture of client server and peer-to-peer model. In this clients can

share their resources as peer-to-peer but with the permission of the server as in
client server model therefore it is commonly used model because in this security is
more as we can put restriction on both server and clients.

Difference between Workgroup & Domain

Table 1

Workgroup

Domain

1. It is a peer to peer networking

1. It is a server based networking

model.

model.

2. There is no client and no server. 2. There is a centralized dedicated


All the

computers are in

equal status.

server

computer

called

domain

controller which controls all other


computers called clients.

3. This model is recommended for


small networks, upto 10 computers.
4.

There

is

no

centralized

administrated separately.

3. This model is recommended for


large networks.
4. There is centralized administration
and each PC can be administrated
and managed from the server.
5. in this model high grade OS like

5. In this model, low grade OS like

WIN 2000/2008 Server can be used.

2000/XP professional, WIN 98 etc.


can be used.
6. Users accounts

are created in

each PC and are called as Local


Users.

6. Users accounts are created on the


server side and are called Domain
Users.

Categories of network
Networks can be categorized as per geographical area to be covered by the
network. Computer network are divided into four categories includes: Local Area
Network (LAN), Campus Area Network (CAN), Metropolitan Area Network (MAN)
and Wide Area Network (WAN).

Local Area Network (LAN)


LAN is a computer network that is used to connect computers and work
station to share data and resources such as printers or faxes. LAN is
restricted to a small area such as home, office or college. Devices used in
LAN are : HUB and switch. Media for LAN is UTP cables. Figure 1.2 shows
how all work stations, server and printer are interconnected with the help of

the network device.

Fig 2: Local Area Network

Types of LAN
used for data sharing, LANS are classified into

Ethernet, Token Bus, Token Ring

and Fiber Distributed Data Interface (FDDI).Figure 3.3 shows LAN classification.
In LANs, data can be transferred using techniques like token passing. As per
techniques

Fig 3: LAN classification


Advantages of LAN
a). Provides communication in smaller networks, easy to install and
configure.
b). many users can share data or network elements at the same time which
results

in fast work.

Disadvantages of LAN
a). limited number of computers are connected in a LAN.
b). LAN cannot cover large area.
c). Network performance degrades as the number of users exceeds.

Campus Area Network (CAN)


Campus Area Network is a computer network made up of two or more LANs
within a limited area. It can cover many buildings in an area. The main
feature of CAN is that all of the computers which are connected together
have some relationship to each other e.g. different buildings in a campus can
be connected using different CAN. It will

help

to

interconnect

academic

departments,

library

and

computer

laboratories. CAN is larger than LAN but smaller than WAN.


Figure 3.4 shows a CAN network.

Fig 4:

Campus Area Network

Devices used in CAN are : HUB, Switch, Layer-3 switch, Access Point .And the
media used for CAN is Unshielded twisted pair of cables and Fiber Optics Cable.

Metropolitan Area Network (MAN)


MAN is the interconnection of networks in a city. MAN is not owned by a
single organization. It act as a high speed network to allow sharing resources
with in a

city. MAN can also be formed by connecting remote LANs

through telephone lines or radio links. MAN supports data and voice
transmission. The best example of MAN is cable T.V network.

Wide Area Network (WAN)


WAN covers a wide geographical area which include multiple computers or
LANs. It connects computer networks through public networks like, telephone
system, microwave, satellite link or leased line.
Most of the WANs use leased lines for internet access as they provide faster data
transfer. WAN helps an organization to establish network between all its

departments and offices located in the same or different cities. It also enables
communication between the organization and rest world.

Devices used in WAN is only Router

IP ADDRESSES and MAC Addresses


It is also called as logical addresses. IP is a 32 bit long and it is divided into
4 octets and dot (.) is used to separate one octet from another. It is represented
in the form of decimals. There are two versions of IP addresses:

IPv4

IPv6
Table 2

Comparison between IPv4 and IPv6

IPv4

IPv6

It is 32 bit long.

It is 128 bit long.

It is divided into 4 octets.

It

Ipv4

IPv4

is

divided

into

16

IPv6

doesnt

support

broadcasting, it performs

and unicasting.

divided

octets.

performs

broadcasting, multicasting

is

into

multicasting

and

unicasting.

classes:

A to E.

Ipv6

support

classes.

IPv4 is in decimal form.

IPv6 is in hexadecimal
form.

IP Address Classes
Address Classes

doesnt

Address

Startin

Range

Class

g Bits

First Octet

of Mask Value

Valid Hosts

(firstbyte)

Class A

1to 127

255.0.0.0

256*256*256-2=
16,777,214

Class B

10

128 to 191

255.255.0.

256*256-2=65,534

0
Class C

110

192 to 223

255.255.25 256-2
5.0

Class D

1110

224 to 239

Reserved for multicasting

Class E

1111

240 to 255

Reserved

for

development

Table 3: Address Classes


`

research

and

How to Assign IP Address to Computer


An IP address assigned to a computer may either be permanent address or
address that is assigned to a computer on a time lease or for temporary basis.
Hence, the address granted to computers is divided into two categories Dynamic IP
addresses and Static addresses.

Dynamic IP Addresses
Dynamic IP addresses are assigned to the devices that require temporary
connectivity to the network or non-permanent devices such as portable computer.
The most common protocol used for assigning Dynamic IP address is DHCP also
called Dynamic Host Configuration Protocol. The DHCP grants IP address to the
computer on lease basis.

Static IP Addresses
Static IP addresses are assigned to the device on the network whose
existence in the network remains for a longer duration. These static IP addresses
are semi-permanent IP addresses which remain allocated to a specific device for
longer time e.g. Server.

How to Configure IP Address in window 2008

Right click on My Network Places- properties

right click on working LAN card- properties

select internet protocol (TCP/IP) -properties

Tick on- Use the following IP addresses - now fill the IP address
e.g 10.0.0.1

Tick on Use the following DNS server address

Fill the preferred DNS server 10.0.0.1

Ok

Close

Now check the connectivity of computer with itself with command


Start-run-cmd-ping 10.0.0.1

MAC Addressing
MAC address is a hardware address that is embedded in the NIC card. It is also
known as hardware address or physical address. Every NIC card has a unique MAC
address assigned by IEEE.
Mac address is used to identify the nodes at lower levels of OSI model. The MAC
address operates at the data link layer of the OSI model.
MAC address is a 12 digit hexadecimal number (48 bit address). It is made
up of numbers from 0-9 or a letter from A-F. MAC address can be written in any one
of the formats:

MM:MM:MM:SS:SS:SS

MM:MM:MM:SS:SS:SS

T o identify the MAC address in window:

Click Start Run

Enter cmd in the Open text book

Type ipconfig /all

Press Enter

The 12 digit MAC address will be shown as say 00:11:11:EA:8D:F6

NETWORKING MEDIA
To do networking we need to use some type of media. There are many types of
media.
(i)

Coaxial Cable

(ii)

Fiber optic cable

(iii)

Twisted Pair of Cables

(iv) Micro- wave


(iv)

Satellite

Coaxial Cable
Coaxial cable consists of an insulated copper conductor surrounded by a tube
shaped copper braid outer copper tune and the inner conductor have the same axis
of curvature hence it called coaxial cable. It is basically of two types:
(i)

Base Band Cable (RG 59)

(ii)

Broad Band Cable (RG 58)

We used Base Band signal cable in Networking of Computers, It is so called


because it carries single frequency. Its speed is 10 Mbps and impedance is 50 .
Where as Broad Band Cables carries multiple frequencies. Connector used for
Coaxial cable is BNC(British Novel Connector) connector. ARCnet uses RG-62 coaxial
cable. It has an impedance of 93 and has a comparatively lesser attenuation,
hence yield greater distances. These cables are expensive and provide high
propagation factor.

Fiber Optical Cable


propagation factor than coaxial cable. It is a costly but more secure
transmission media.
Fiber optic cable consists of a very fine fiber made from two types of glass, one for
the inner core and the other for the outer layer. Here signal is transmitted in the
form of light. Different varieties of fiber optics is used depending on the size of the
network. Single mode fiber optics is used for networks spanning longer distance.
Fiber Optics has lower
Twisted Pair Cable

There are two wires, which are twisted with each other to avoid EMI (Electro
Magnetic Induction).these cables are easy to terminate. However they have a
slightly higher value of attenuation value and hence have limited distance covering
capacity. Connector used for Twisted Pair of Cable is (Registered Jack) RJ-45 and
RJ-11. There are two types of twisted pair of cables:

STP (Shielded Twisted Pair):


In this an extra wire which is called shielded wire is wrapped over the

inner cover which holds copper in pairs. This protection is used to protect signal
from external noise.

UTP (Unshielded Twisted Pair)


In this type of wire no shielded cover is there for extra protection from

noise.
There are different categories of UTP cables:
Categories of UTP Cables
Table 4:

Category and Speed of UTP cables

Category

Speed

CAT-1

56 Kbps

CAT-2

4 Mbps

CAT-3

10 Mbps

CAT-4

16-20 Mbps

CAT-5

100 Mbps

CAT-6

1Gbps

CAT-7

1Gbps

Ethernet Cabling
There are three types of Ethernet cables:

Straight cable

Crossover cable

Rolled cable

Straight cable
It is used when we have to connect

PC TO Switch

PC to Hub

Hub to Router

Switch to Router

Color Coding for straight Cable


TABLE 5
568A
(one end)

(other end)

568B
(one end)

(other end)

Green/white

Green/white

Orange/white

Orange/white

Green

Green

Orange

Orange

Orange/white

Orange/white

Green/white

Green/white

Blue

Blue

Blue

Blue

Blue/white

Blue/white

Blue/white

Blue/white

Orange

Orange

Green

Green

Brown/white

Brown/white

Brown/white

Brown/white

Brown

Brown

Brown

Brown

Crossover Cable
It is used when we have to connect:

PC to PC

Hub to Hub

Switch to switch

Router to Router

PC to Router

Hub to Switch

Table 6

(one end)

Color Coding for Crossover cable

(other end)

Orange/white

Green/white

Orange

Green

Green/white

Orange/white

Blue

Blue

Blue/white

Blue/white

Green

Green

Brown/white

Brown/white

Brown

Brown

Rollover Cable
Rollover cable isnt used to connect any Ethernet connections together, but
Rollover cable can be used to connect a host to a router console serial
communication (com) port.
NOTE: Straight cable and Cross cables are used for data transfer but
Rollover cables are not used for data transfer.
There are two methods for manufacturing Rollover cables:

Table 7

568A

Color Coding for Rollover Cable

568B

(one end)

(other end)

(one end)

(other end)

Green/white

Brown

Orange/white

Brown

Green

Brown/white

Orange

Brown/white

Orange/white

Orange

Green/white

Green

Blue

Blue/white

Blue

Blue/white

Blue/white

Blue

Blue/white

Blue

Orange

Orange/white

Green

Green/white

Brown/white

Green

Brown/white

Orange

Brown

Green/white

Brown

Orange/white

OSI REFERENECE MODEL

The OSI model is the very heart of networking with every layer performing a
specific task in order to facilitate data communications. In the world of
networking the first four (4) layers is the focus. They define the following:

What type and speed of LAN and WAN media to be implemented

How data is sent across the media

What type of addressing schemes will be used.

How data will be reliably sent across the network and how flow control
will be accomplished

What type of routing protocol will be implemented

Why a Layered Network Model?

Reduces complexity

Standardizes interfaces

Facilitates modular engineering

Ensures interoperable technology

Accelerates evolution

Simplifies teaching and learning

The OSI model - seven numbered layers indicate distinct functions. In the
Transmission Control Protocol/Internet Protocol (TCP/IP), the distinct
functions fit into five named layers. This separation of networking functions
is called "layering".
OSI Layer Functions:
7. APPLICATION (Network processes to applications)
The application layer provides network services to user applications.
For example, a word processing application is serviced by file transfer
services at this layer.
6. PRESENTATION (Data representation)
This layer provides data representation and code formatting. It
ensures that the data that arrives from the network can be used by
the application, and it ensures that information sent by the application
can be transmitted on the network.
5. SESSION (Interhost communication)
This layer establishes, maintains, and manages sessions between
applications.
4. TRANSPORT (End-to-end connections)
This layer segments and reassembles data into a data stream. This
layer uses the TCP protocol.
3. NETWORK (Addresses and best path)

This layer determines the best way to move data from one place to
another. The router operates at this layer. This layer uses the IP
addressing scheme.
2. DATA LINK (Access to media)
This layer provides physical transmission across the medium. It
handles error notification, network topology, and flow control. This
layer uses the Media Access Control (MAC) address.
1. PHYSICAL (Binary transmission)
This layer provides the electrical, mechanical, procedural, and
functional means for activating and maintaining the physical link
between systems. This layer uses the physical media like twisted pair,
coaxial, and fiber-optic cable.

Introduction to Switching
SWITCH
LAN Segmentation
In a collision domain, a frame sent by a device can cause collision with
a frame sent by another device in the same collision domain. Moreover, a
device can hear the frames destined for any device in the same collision
domain.
In a broadcast domain, a broadcast frame sent by a device can be
received by all other devices in the same broadcast domain.
A LAN segment or an Ethernet network segment consists of the
devices connected with a coaxial cable or a hub. The devices are in the same
collision domain.
Ethernet congestion problem
Ethernet congestion problem occurs when too many devices are
connected to the same Ethernet network segment, such that the high
network bandwidth utilization increases the possibility of collision, which
causes degradation of network performance.

LAN segmentation
LAN segmentation solves the congestion problem by breaking the
network into separate segments or collision domains using bridges, switches
or routers (but not hub s or repeaters). LAN segmentation can reduce the
number of collisions in the network and increase the total bandwidth of the
network (e.g. 10 Mbps for one segment, 20 Mbps for two segments, 30
Mbps for three segments, and so on).
80/20 rule
The 80/20 rule should be used when designing how to segment a
network, i.e. 80% or more data traffic should be on the local network
segment while 20% or less data traffic should cross network segments.

Layer 2 Switching

Layer 2 switching is hardware based, which means it uses the MAC


address from the host NIC card to filter the network traffic.

Layer 2 switch can be considered as multi port bridge.

Layer 2 switches are fast because they do not look at the network layer
header information, instead it looks at the frames hardware address
before deciding to either forward the frame or drop it.

Layer 2 Switching Provides the Following :

Hardware based bridging


Wire speed
Low latency
Low cost.

Limitations of Layer 2 Switching


With bridge the connected networks are still one large broadcast domain.
Layer 2 switch cannot break the broadcast domain, this cause performance
issue which limits the size of your network.
For this one reason the switch cannot completely replace routers in the
internetwork.
Bridging v/s LAN Switching
Layer 2 switches are just bridges with more ports, however there are some
important differences.
Bridges are software based. While switches are hardware based because
they use ASIC (Application Specific Integrated Circuit) chip that help make
filtering decisions.
LAN Switching

1. Address learning learning the MAC addresses of the connected


devices to build the bridge table.
2. Forward and filter decision forwarding and filtering frames based
on the bridge table entries and the bridge logic.
3. Loop avoidance avoiding network loop by using Spanning Tree
Protocol
A bridge or switch maintains a forwarding table (also known as bridge table
or MAC address table) which maps destination physical addresses with the
interfaces or ports to forward frames to the addresses.
A bridge or switch builds a bridge table by learning the MAC addresses of the
connected devices. When a bridge is first powered on, the bridge table is
empty. The bridge listens to the incoming frames and examines the source
MAC addresses of the frames. For example, if there is an incoming frame
with a particular source MAC address received from a particular interface,
and the bridge does not have an entry in its table for the MAC address, an
entry will be created to associate the MAC address with the interface.
The default aging time for an entry in a bridge table is 300 seconds (5
minutes). It means that an entry will be removed from the bridge table if the
bridge has not heard any message from the concerned host for 5 minutes.

ADDRESS LEARNING
How Switches Learn Addresses

Examining the Forward/Filter Process

A bridge or switch forwards or filters a frame based on the following logic:


1. If the destination MAC address of the frame is the broadcast address
(i.e.FFFF.FFFF.FFFF) or a multicast address, the frame is forwarded out
all interfaces,except the interface at which the frame is received.

2. If the destination MAC address is an unicast address and there is no


associated entry in the bridge table, the frame is forwarded out all
interfaces, except the interface at which the frame is received.
3. If there is an entry for the destination MAC address in the bridge table,
and the associated interface is not the interface at which the frame is
received, the frame is forwarded out that interface only.
4. Otherwise, drop the frame.
Broadcast and Multicast Frames

Broadcast and multicast frames do not have a destination address


specified.

The source address will always be the hardware address of the device
transmitting the frame, and the destination address will either be all
1s which is a broadcast.

With the network or subnet address specified and the host address all
1s are multicast.
eg: 255.255.255.255 (broadcast)
172.16.255.255 (multicast)
o Multicast sends the frame to a certain network or subnet and all
hosts within that network or subnet.
o broadcast of all 1s sends the frame to all networks and hosts.

There are three types of switching method:


Store-and-forward switching
The entire frame is received and the CRC is computed and verified
before forwarding the frame.
If the frame is too short (i.e. less than 64 bytes including the CRC),
too long (i.e. more than 1518 bytes including the CRC), or has CRC error, it
will be discarded.

It has the lowest error rate but the longest latency for switching.
However, for high-speed network (e.g. Fast Ethernet or Gigabit Ethernet
network), the latency is not significant.
It is the most commonly used switching method, and is supported by
most switches.
Cut-through switching (also known as Fast Forward switching )
A frame is forwarded as soon as the destination MAC address in the
header has been received (the 1st 6 bytes following the preamble).
It has the highest error rate (because a frame is forwarded without
verifying the CRC and confirming there is no collision) but the shortest
latency for switching.
Fragment-free switching ( Modified Cut-through switching )
A frame is forwarded after the first 64 bytes of the frame have been
received. Since a collision can be detected within the first 64 bytes of a
frame, fragment-free switching can detect a frame corrupted by a collision
and drop it.Therefore, fragment-free switching provides better error
checking than cut-through switching.
The error rate of fragment-free switching is above store-and-forward
switching and below cut-through switching.
The latency of fragment-free switching is shorter than store-andforward switching and longer than cut-through switching.

VLAN Operation Overview


A Virtual LAN (VLAN) is a broadcast domain created based on the functional,
security, or other requirements, instead of the physical locations of the
devices, on a switch or across switches. With VLANs, a switch can group
different interfaces into different broadcast domains. Without VLANs, all
interfaces of a switch are in the same broadcast domain; switches connected
with each other are also in the same broadcast domain, unless there is a
router in between.
Different ports of a switch can be assigned to different VLANs. A VLAN can
also span multiple switches.
The advantages of implementing VLAN are:
. It can group devices based on the requirements other than their physical
locations.
. It breaks broadcast domains and increases network throughput.
. It provides better security by separating devices into different VLANs.
. Since each VLAN is a separate broadcast domain, devices in different
VLANs
cannot listen or respond to the broadcast traffic of each other.
. Inter-VLAN communication can be controlled by configuring access control
lists on the router or Layer 3 switch connecting the VLANs.
VLANs can be configured using one of the following two methods:
Static VLAN
Assigning VLANs to switch ports based on the port numbers.It is
easier to set up and manage.
VLAN LAB
Switch# configure terminal
Switch(config)# vlan XX
Switch(config)# name XYZ
Switch(config)# interface< interface> module/number
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan <vlan-id>
Switch(config-if)# end
Example
Switch(config)#vlan ?
<1-1005> ISL VLAN IDs 1-1005
Switch(config)#vlan 20

Switch(config)#name Marketing
Switch(config)#vlan 30
Switch(config)#name Finance
Switch(config)#interface fastethernet 0/1
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 20
Switch(config-if)#end
Switch#show vlan brief
VLAN Name
Status
Ports
---- -------------------------------- --------- ------------------------------1
default
active
F0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6
Fa0/7, Fa0/8 Fa0/9, Fa0/10,
Fa0/11, Fa0/12, Fa0/13, Fa0/14,
Fa0/15, Fa0/16, Fa0/17, Fa0/18,
Fa0/19, Fa0/20, Fa0/21, Fa0/22,
Fa0/23, Fa0/24, Gig1/1, Gig1/2
20 Marketing
30 Finance
1002 fddi-default
1003 token-ring-default
1004 fddinet-default
1005 trnet-default

active
active
active
active
active
active

F0/1

Unless until the ports are not assigned to the VLAN it will not work
but will remain active to receive the ports at any time.
To delete the VLAN from the SWITCH
Switch(config)#no vlan XX
After deleting the VLAN the port assigned to the VLAN will become
Orphan. And need to reassignment again by the Admin.
Default VLANs can never be deleted, like VLAN 1, 1002,1003,1004,1005

A range of ports can be selected by single command to configure for


command configuration like vlan assignment, security and QoS on the
interface.
Switch(config)#interface range fastethernet 0/1 10
Switch(config-range-if)#Switchport mode access

Dynamic VLAN
Assigning VLANs to switch ports based on the MAC addresses of the
devices connected to the ports.
A VLAN management application is used to set up a database of MAC
addresses, and configure the switches to assign VLANs to the switch ports
dynamically based on the MAC addresses of the connected devices. The
application used by Cisco switches is called VLAN Management Policy
Server (VMPS).
Cisco switches support a separate instance of spanning tree and a
separate bridge table for each VLAN.

A VLAN = A Broadcast Domain = Logical Network (Subnet)

VLAN Operation

Each logical VLAN is like a separate physical bridge.


VLANs can span across multiple switches.
Trunks carry traffic for multiple VLANs.
Trunks use special encapsulation to distinguish between different
VLANs.
VLAN Membership Modes

VLAN Trunking

There are two different types of links in a switched network:


Access link
A link that is part of only one VLAN. Therefore, a port connecting to an
access link can be a member of only one VLAN.
Trunk link
A 100 Mbps or 1000 Mbps point-to-point link that connects switches
or routers, and carries frames of different VLANs.Therefore, a port
connecting to a trunk link can be a member of multiple VLANs. All VLANs are
configured on a trunk link by default.
VLAN Trunking, by making use of frame tagging, allows traffic from
different VLANs to transmit through the same Ethernet link (trunk link)
across switches.
VLAN Trunking identifies the VLAN from which a frame is sent by tagging the
frame with the source VLAN ID (12-bit long). This feature is known as
frame tagging or frame identification.
With frame tagging, a switch knows which ports it should forward a
broadcast frame (forward out the ports which have the same VLAN ID as the
source VLAN ID). It also knows which bridge table it should use for
forwarding an unicast frame (since a separate bridge table is used for each
VLAN).
A frame tag is added when a frame is forwarded out to a trunk link, and is
removed when the frame is forwarded out to an access link. Therefore, any
device attached to an access link is unaware of its VLAN membership.

VTP(VLAN TRUNKING PROTOCOL)


o A messaging system that advertises VLAN configuration information
o Maintains VLAN configuration consistency throughout a common
administrative domain
o Sends advertisements on trunk ports only

VTP Modes
Server
Creates VLANs
Modifies VLANs
Deletes VLANs
Sends/forwards
advertisements
Synchronizes
Saved in NVRAM
Client
Forwards
advertisements
Synchronizes
Not saved in
NVRAM
Transparent
Creates VLANs
Modifies VLANs
Deletes VLANs
Forwards
advertisements
Does not
synchronize
Saved in NVRAM

VTP

Operation
VTP advertisements are sent as multicast frames.
VTP servers and clients are synchronized to the latest revision number.
VTP advertisements are sent every 5 minutes or when there is a
change.

VTP Pruning
Increases available bandwidth by reducing unnecessary flooded traffic
Example: Station A sends broadcast, and broadcast is flooded only
toward any switch with ports assigned to the red VLAN

InterVLAN : Communication between different VLAN is called Inter


VLAN
Switch Inter VLAN(Virtual Local Area Network)
Configuration
LAB

1700A
Router>enable
Router#configuration terminal
Router(config)#hostname 1700A
1700A(config)#interface Fast Ethernet 0/0
1700A(config-if)#ip address 10.0.0.1 255.0.0.0
1700A(config-if)#no shutdown
1700A(config-if)#no ip addresses
1700A(config-if)#interface F0/0.1(sub interface creation)
1700A(config-subif)#encapsulation Dot1Q 1 (encapsulation type)
1700A(config-subif)#ip address 192.168.10.17 255.255.255.240
1700A(config-subif)#no shutdown
1700A(config-subif)#interface F0/0.2
1700A(config-subif)#encapsulation Dot1Q 2
1700A(config-subif)#ip address 192.168.10.33 255.255.255.240
1700A(config-subif)#no shutdown
1700A(config-subif)#interface F0/0.3
1700A(config-subif)#encapsulation Dot1Q 3
1700A(config-subif)#ip address 192.168.10.49 255.255.255.240
1700A(config-subif)#no shutdown
1700A(config-subif)#^Z
1700A#show ip route

3550 Switch
Switch>en
Switch#config t
Switch(config)#host name 3550
3550(config)#interface vlan 1
3550(config-if)#ip address 192.168.10.1 255.255.255.0
3550(config-if)#no shutdown
3550(config-if)#exit
3550(config)#ip default gateway 192.168.10.17
3550(config)#interface F0/1
3550(config-if)#description connection 1700A
3550(config-if)#interface F0/2
3550(config-if)#description connection 3560
3550(config-if)#exit
3550(config)#interface F0/1 (Through Router)
3550(config-if)#switch port trunk encapsulation dot1Q
3550(config-if)#switch port mode trunk
3550(config)#interface F0/2 (Through Switch)
3550(config-if)#switch port trunk encapsulation dot1Q
3550(config-if)#switch port mode trunk
3550(config-if)#exit
3550(config)#vtp mode server
3550(config)#vtp domain CCSP
3550(config-if)#^Z
3550#show interface trunk
3550#config t
3550(config)#vlan 3
3550(config-vlan)#name sales
3550(config-vlan)#^Z
3550#show vlan
3550(config)#interface F0/5
3550(config-if)#switchport mode access
3550(config-if)#switch port access vlan 3
3550(config)#interface F0/6
3550(config-if)#switchport mode access
3550(config-if)#switch port access vlan 3
3550(config-if)#^Z
3550#show vlan
3550#show interface trunk

3560 Switch
Switch>en
Switch#config t
Switch(config)#hostname 3560
3560(config)#interface F0/2
3560(config-if)#description connection to 3550
3560(config-if)#exit
3560(config)#inter vlan 1
3560(config-if)#ip address 192.168.10.2 255.255.255.0
3560(config-if)#no shutdown
3560(config-if)#exit
3560(config)#ip default gateway 192.168.10.17
3560(config)#interface F0/1
3560(config-if)#switch-port trunk encapsulation dot1Q
3560(config-if)#switch-port modetrunk
3560(config)#vtp mode client
3560(config)#vtp domain CCSP
3560(config-if)#^Z
3560#show interface trunk
3560#show vtp status
3560#config t
3560(config)#vlan 2
3560(config-vlan)#name production
3560(config-vlan)#^Z
3560#show vlan
3560(config)#interface F0/2
3560(config-if)switch-port mode access vlan 2
3560(config-if)#switch-port access vlan 2
3560(config)#interface F0/3
3560(config-if)switch-port mode access vlan 2
3560(config-if)#switch-port access vlan 2
3560(config-if)#^Z
3560#show spanning tree
3560#show interface trunk
3560#show vtp status
3560#show vlan

Potrebbero piacerti anche