• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Designing Switched LAN Internetworks.

Extracts from this document...


Designing Switched LAN Internetworks design switched LAN internetworks: * LAN switching * Virtual LANs (VLANs) * ATM switching Evolution from Shared to Switched Networks In the past, network designers had only a limited number of hardware options when purchasing a technology for their campus networks. Hubs were for wiring closets and routers were for the data center or main telecommunications operations. The increasing power of desktop processors and the requirements of client-server and multimedia applications, however, have driven the need for greater bandwidth in traditional shared-media environments. These requirements are prompting network designers to replace hubs in their wiring closets with switches, as shown in Figure 12-1. Figure 12-1: Evolution from shared to switched internetworks. This strategy allows network managers to protect their existing wiring investments and boost network performance with dedicated bandwidth to the desktop for each user. Coinciding with the wiring closet evolution is a similar trend in the network backbone. Here, the role of Asynchronous Transfer Mode (ATM) is increasing as a result of standardizing protocols, such as LAN emulation (LANE), that enable ATM devices to coexist with existing LAN technologies. Network designers are collapsing their router backbones with ATM switches, which offer the greater backbone bandwidth required by high-throughput data services. Technologies for Building Switched LAN Internetworks With the advent of such technologies as Layer 3 switching, LAN switching, and VLANs, building campus LANs is becoming more complex than in the past. Today, the following three technologies are required to build successful campus networks: * LAN switching technologies o Ethernet switching-Provides Layer 2 switching and offers broadcast domain segmentation using VLANs. ...read more.


* Offer options to support multimedia applications and other high-demand traffic across a variety of platforms. * Provide scalability, traffic control, and security that is at least as good or better than that of today's router-based internetworks. * Provide support for embedded remote monitoring (RMON) agent. The key to achieving these benefits is to understand the role of the internetworking software infrastructure within the switched internetworks. Within today's networks, routers allow for the interconnection of disparate LAN and WAN technologies, while also implementing security filters and logical firewalls. It is these capabilities that have allowed current internetworks to scale globally while remaining stable and robust. As networks evolve toward switched internetworks, similar logical internetworking capabilities are required for stability and scalability. Although LAN and ATM switches provide great performance improvements, they also raise new internetworking challenges. Switched internetworks must integrate with existing LAN and WAN networks. Such services as VLANs, which will be deployed with switched internetworks, also have particular internetworking requirements. A true switched internetwork, therefore, is more than a collection of boxes. Rather, it consists of a system of devices integrated and supported by an intelligent internetworking software infrastructure. Presently, this network intelligence is centralized within routers. However, with the advent of switched internetworks, the intelligence will often be dispersed throughout the network, reflecting the decentralized nature of switching systems. The need for an internetworking infrastructure, however, will remain. Components of the Switched Internetworking Model A switched internetwork is composed of the following three basic components: * Physical switching platforms * A common software infrastructure * Network management tools and applications Cisco provides network designers with a complete, end-to-end solution for implementing and managing scalable, robust, switched internetworks. ...read more.


Figure 12-3: Sample LAN switch configuration. When a LAN switch first starts up and as the devices that are connected to it request services from other devices, the switch builds a table that associates the MAC address of each local device with the port number through which that device is reachable. That way, when Host A on Port 1 needs to transmit to Host B on Port 2, the LAN switch forwards frames from Port 1 to Port 2, thus sparing other hosts on Port 3 from responding to frames destined for Host B. If Host C needs to send data to Host D at the same time that Host A sends data to Host B, it can do so because the LAN switch can forward frames from Port 3 to Port 4 at the same time it forwards frames from Port 1 to Port 2. Whenever a device connected to the LAN switch sends a packet to an address that is not in the LAN switch's table (for example, to a device that is beyond the LAN switch), or whenever the device sends a broadcast or multicast packet, the LAN switch sends the packet out all ports (except for the port from which the packet originated)-a technique known as flooding. Because they work like traditional "transparent" bridges, LAN switches dissolve previously well-defined workgroup or department boundaries. A network built and designed only with LAN switches appears as a flat network topology consisting of a single broadcast domain. Consequently, these networks are liable to suffer the problems inherent in flat (or bridged) networks-that is, they do not scale well. Note, however, that LAN switches that support VLANs are more scalable than traditional bridges. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    preserve the data, making sure that many copies are saved and store in more than one office, as one office could completely diminish as a result of an earthquake for example. Explain the operation and use of an encryption technique in ensuring security of transmitted information - M3 - Task

  2. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    crime related to computers can be generated by criminals anywhere in the world. Its important people feel safe and secure while using the internet, making purchased online, feel safe from their work being copied, so the laws that are put in forced to cover these problems are Human Right Act

  1. T1, T3, and SONET Networks.

    Not all channel banks are compatible with all long-distance carriers, nor are all PBXs compatible with the T1 services of all carriers. Some channel banks can interface only with standard services and not with such advanced services as MEGACOM and MEGACOM 800.

  2. Local area networks (LANs).

    LANs are composed of various components performing specific tasks so each user can access shared resources. Generally, every component in a network is called a node. Each node is further identified by the specific task it performs. A user's node is called a terminal or a workstation.

  1. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    It is not enough just to purchase anti-virus software because it must be configured to protect all parts of the system and the best anti-virus software covers the day to day activates carried out by the user. Viruses are forever changing and new forms and strains are being discovered on a daily basis thus anti-virus software should be updated frequently.

  2. What are the advantages and disadvantages For B.m.c.s in using a LAN rather than ...

    * Managing the network requires a network manager due to the large number of tasks and problems that can occur in a network. * If the server breaks down the entire network of computers break down which can have immense problems on users and files.

  1. Computer Networks.

    Large organisations (e.g. banks, police, etc) tend to use dedicated lines because they are faster, less prone to signal problems and more secure, but the expense of leasing them means smaller organisations could not afford them. Integrated services digital network (ISDN)

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    Cable Summary Specification Cable Type Maximum length 10Base2 Thin Coaxial 185 meters 10Base5 Thick Coaxial 500 meters Star A Star topology connects the computers by single cables to a central unit, usually a hub. When a computer sends signal to other computer or resources it travels to the hub.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work