You are on page 1of 6
Chapter 2 Network Configuration Designing ‘@Layer 2 Switch Layer 2 Switoh 2.2.3 Layer 2 Switch (1) Basic function ‘The devices in an ordinary 10 Mbps Ethernet network share a bandwidth of 10 Mbps. Consequently, if either two end systems connected to the network are transmitting and receiving data, the other end systems are held in the wait state. Layer 2 switches are devised to allow the cnd systems to share the 10 Mbps bandwidth, A layer 2 switch has logically two or more internal buses. Even when. communication between preceding end systems is in progress using one of ils buses, the remaining end systems can initiate communications using the other buses. To recognize the MAC address of the end systems connected to its ports, layer 2 switch creates and manages an address table by reading the source MAC addresses in the packets that are sent through the ports. It uses the address table to transmit the packets only to the pertinent port. Since the ports of the layer 2 switch serve as the similar purposes as a bridge, it also supports the ordinary spanning tree function, Some layer 2 switches support the transmission speed conversion function and virtual LAN function in addition to the basic bridge functions. All Rights Reseived, Copyright (6) 2005, Hitachi lagormation ‘Academy Co, Lid ‘Chapter 2 Network Configuration Designing ‘Switching systems ‘System Delay within the LAN Multispeed Error Frame ‘Switch Communication Processing Larger (1,200 ay Possible Discard error frames ‘Store and forward (Daetaaiiar” [Sacra lEthernet a Seis lope Date Fos Smailer (404s) Impossible Relay error frames: ccuttrough pn tn ress, Intermediate Impossible Discard only runts Fragment free ————— “s vanains [SREP meme | ya jacrare Ake ippe (2) Switching systems “The layer 2 switch supports the following three packet switching systems: @® Store and forward The layer 2 switch stores each received packet in a buffer and checks the destination MAC address before forwarding the packet. The store and forward system can perform error checks and speed conversion but entails the greater delay in the layer 2 switch. ® Cutthrough system The layer 2 switch checks only the header area (destination MAC’address) in the received packet when forwarding, The Cutthrough system entails smaller layer 2 switch intemal delay but supports neither error checking nor speed conversion. ® Fragment free system ‘The layer 2 switch stores the first 645 bytes of each received packet ine buffer, checks for a runt (minimum frame length) packet, and checks the destination MAC address before forwarding. The packet is checked for a runt packet before being forwarded. The fragment free system can perform no speed conversion. 217 All Rights Reserved, Copyright (2) 205, itachi Infomation ‘Academy Con Lid Chapter 2 Network Configuration Designing ‘Address table Layer 2 switch Current time = 12: 05 Addrass table Por_| MAG! Entry time 1 [oe 12:00 Z| b | 12:05 (Timeout value: 10 minutes! Port number: 1, 2 MAG address: a, b (3) Address table The layer 2 switch distributes packets according to the MAC address stored in the packets, Consequently, a table of MAC addresses and corresponding ports is fequited. This table is called the address table. It is automatically filled as packets are received in the layer 2 switch according to the source MAC address. This system is called the address learning function. ‘The address table can accommodate two or mote MAC addresses for ai single port. As a number of MAC addresses are likely to be entered in the address table, itis necessary to size of the address table. The size of the address table varies from product to product. The entries in the address table keep the time at which they are entered. When a certain amount of time (timeout value) elapses since the entry time, the corresponding entry is automatically deleted. This timeout value can be set by the user using the parameter called Aging Timer or time to live (IEEE802.3d recommends a value of 300 seconds). ‘Ali Rights Rescrved, Copyright (6) 2003, Hitachi tafonmuti, ‘Acaderay Ca.,Tid Chapter 2 Network Configuration Designing Cascade connection @|_Layor 2 switch @ [_Layer2 switch | [Layer2 switch |@ @ |_Layer 2 switch Layer 2 switch | © @|_Layer2 switeh Layer 2 switch | @ LI =. z (4) Cascade connection When layer 2 switches are to be cascaded, they are connected using the port that is dedicated to cascade connection or cross-cables. The number of layer 2 switches that can be cascaded is determined by the spanning tree limitation, For a spanning tree based network configuration, up to 7 stages of layer 2 switches can be cascaded by default (when the IBEE802.1d recommended value is used). There is no limit to the number of cascadable layer 2 switches, Networks traffic concentrates at the cascade junctions. Possible countermeasures against traffic concentration include the following: D sing high-speed ports (100 Mbps or Gbps) ®Running two or more ports in parallel (ting aggregation function) 2-19. All Rights Reserved, Copyright (c) 2003, Hituchi iaformution ‘Academy Co, Tad Chapter 2 Network Configuration Designing Virtual LAN function @ Conventional system @Using the virtual LAN function "Subnet 4 ee “) [J | Subnett gg i= (5) VLAN (Virtual LAN, TEEE802.10) Generally, you can build only a single network with one LAN switch. VLAN provides a feature to create two or more networks by logically defining the areas that can be communicated with a LAN switch. VLAN, for example, can group specific ports to realize subnets. Since these are accomplished by setting up a LAN switch, no physical relocations of PCs is required when PCs need to be relocated; all that is required is to reconfigure the port groups. Since the broadcast domain is divided, the traffic on a certain virtual LAN exerts no influence on the other virtwal LANs. 2-20 AIL Rights Reserved, Copyright(c) 2003, Hitachi information ‘Academy Co.,Ltd Chapter 2 Network Configuration Designing Grouping methods Description Feature Virival LANs are detined on |Setings are changed when WSs a port basis. lor PCs are relocated. Viral LANS are defined on [No setting changes are required jconfiguration a MAG address basis. ‘when WSs or PGs are relocated. ‘Configuration using | Viral LANs are defined [Using the IP address for the network layer | using IP address and other | configuring virtual LANs makes address information. management easier. [Configuration using | Virtual LANs are defined for [Useful when the traffic is to be the protocot ‘each protocol type, ‘controlled according to the protocol. (©) Methods of grouping virtual LANs There are four methods of grouping virtual LANs. @ Port based configuration Virtual LANs are defined for each port of the LAN switch. @® MAC address based configuration Virtual LANs are defined for éach MAC address of the LAN switch. @ Network layet address based configuration Virtual LANs are defined on the basis of a network layer address (IP address, IPX address, etc.). ® Configuration using the protocol Virtual LANs are defined for each protocol type (IP, IPX, AppleTalk, etc). 221 LA Rights Reserved, Copyioht () 2003, Hac Information Academy Co. Lid

You might also like