Submit Search
Upload
ch08.pptx
•
Download as PPTX, PDF
•
0 likes
•
4 views
D
dajek95195
Follow
Understanding of TECH upgrades in IT
Read less
Read more
Education
Report
Share
Report
Share
1 of 22
Download now
Recommended
Ch07
Ch07
Ali Khawaja
Network virtualization
Network virtualization
Damian Parniewicz
Vlan
Vlan
Ardhendu Nandi
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer
Dheeraj Giri
vlan
vlan
Mohammadnoor Noori
Virtual LAN
Virtual LAN
Darshan Dalwadi
The Future of Internet Exchange Points - NANOG 47
The Future of Internet Exchange Points - NANOG 47
Richard Steenbergen
8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them
Auvik Networks Inc.
Recommended
Ch07
Ch07
Ali Khawaja
Network virtualization
Network virtualization
Damian Parniewicz
Vlan
Vlan
Ardhendu Nandi
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer
Dheeraj Giri
vlan
vlan
Mohammadnoor Noori
Virtual LAN
Virtual LAN
Darshan Dalwadi
The Future of Internet Exchange Points - NANOG 47
The Future of Internet Exchange Points - NANOG 47
Richard Steenbergen
8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them
Auvik Networks Inc.
Campus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB Wireless
Aniruddh Rao Kabbinale
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PROIDEA
Lan & vlan
Lan & vlan
Bharat Sanchar Nigam Limited
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
ssuser06ea42
Ch08
Ch08
Ali Khawaja
01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansi
Nader Elmansi
Virt july-2013-meetup
Virt july-2013-meetup
nvirters
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspective
Augusto Ciuffoletti
mod8-VLANs.ppt
mod8-VLANs.ppt
SAROORNAGARCMCORE
Computer Networking
Computer Networking
Ranjan K.M.
campus_design_eng1.ppt
campus_design_eng1.ppt
chali100
Ccna ch01
Ccna ch01
m_saeed90
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
eceb9198
VLAN
VLAN
ISMT College
Vlan
Vlan
Mayank Saxena
Inter vlan routing plus configuration
Inter vlan routing plus configuration
Mohammedseleim
Vlans and inter vlan routing
Vlans and inter vlan routing
Mohammedseleim
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integration
Akhilesh Dhawan
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
Waqas Ahmed Nawaz
Network virtualization seminar report
Network virtualization seminar report
SKS
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Celine George
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
SafetyChain Software
More Related Content
Similar to ch08.pptx
Campus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB Wireless
Aniruddh Rao Kabbinale
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PROIDEA
Lan & vlan
Lan & vlan
Bharat Sanchar Nigam Limited
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
ssuser06ea42
Ch08
Ch08
Ali Khawaja
01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansi
Nader Elmansi
Virt july-2013-meetup
Virt july-2013-meetup
nvirters
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspective
Augusto Ciuffoletti
mod8-VLANs.ppt
mod8-VLANs.ppt
SAROORNAGARCMCORE
Computer Networking
Computer Networking
Ranjan K.M.
campus_design_eng1.ppt
campus_design_eng1.ppt
chali100
Ccna ch01
Ccna ch01
m_saeed90
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
eceb9198
VLAN
VLAN
ISMT College
Vlan
Vlan
Mayank Saxena
Inter vlan routing plus configuration
Inter vlan routing plus configuration
Mohammedseleim
Vlans and inter vlan routing
Vlans and inter vlan routing
Mohammedseleim
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integration
Akhilesh Dhawan
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
Waqas Ahmed Nawaz
Network virtualization seminar report
Network virtualization seminar report
SKS
Similar to ch08.pptx
(20)
Campus WiFi: Case Study of IITB Wireless
Campus WiFi: Case Study of IITB Wireless
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
Lan & vlan
Lan & vlan
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
Ch08
Ch08
01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansi
Virt july-2013-meetup
Virt july-2013-meetup
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspective
mod8-VLANs.ppt
mod8-VLANs.ppt
Computer Networking
Computer Networking
campus_design_eng1.ppt
campus_design_eng1.ppt
Ccna ch01
Ccna ch01
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
VLAN
VLAN
Vlan
Vlan
Inter vlan routing plus configuration
Inter vlan routing plus configuration
Vlans and inter vlan routing
Vlans and inter vlan routing
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integration
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
Network virtualization seminar report
Network virtualization seminar report
Recently uploaded
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Celine George
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
SafetyChain Software
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
sanyamsingh5019
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Marc Dusseiller Dusjagr
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Sumit Tiwari
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
pboyjonauth
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
akmcokerachita
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
Celine George
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
manuelaromero2013
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
nomboosow
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology ( Production , Purification , and Application )
Sakshi Ghasle
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
9953056974 Low Rate Call Girls In Saket, Delhi NCR
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Celine George
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
M56BOOKSTORE PRODUCT/SERVICE
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
GeoBlogs
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Sapana Sha
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
RoyAbrique
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
KarinaGenton
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Steve Thomason
Recently uploaded
(20)
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology ( Production , Purification , and Application )
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
ch08.pptx
1.
Business Data Communications Fourteenth
Edition Jerry FitzGerald, Alan Dennis, and Alexandra Durcikova Chapter 8 Backbone Networks
2.
Learning Objectives • Understand
the Internetworking devices used in BNs • Understand the switched backbone architecture • Understand the routed backbone architecture • Understand virtual LAN architecture • Understand the best practice recommendations for backbone design • Be aware of ways to improve BN performance Copyright ©2021 John Wiley & Sons, Inc. 8-2
3.
Outline • Architectures • Switched
Backbone Networks • Routed Backbone Networks • Virtual LANs (VLANs) • Best Practices • Implications for Security and Management Copyright ©2021 John Wiley & Sons, Inc. 8-3
4.
8.1 Introduction • Backbones
used to be built with special technologies, but today most BNs use high-speed Ethernet • There are two basic components to a BN: the network cable and the hardware devices that connect other networks to the BN • Cable is usually fiber optic • Switches operate at the data link layer • Routers operate at the network layer • VLAN switches are a special combination of layer 2 switches and routers 8-4 Copyright ©2021 John Wiley & Sons, Inc.
5.
8.2 Switched Backbones •
Switched backbones are the most common type of BN used in the distribution layer • Switched BNs use a star topology with one switch at its center • There is a switch serving each LAN that is connected to the backbone switch 8-5 Copyright ©2021 John Wiley & Sons, Inc.
6.
Switched Backbones Continued •
Most organizations use switched backbones in which all network devices are physically located in the same room • Often in a rack of equipment • The room containing the rack of equipment is sometimes called the main distribution facility (MDF) or central distribution facility (CDF) • The devices are connected among themselves using very short cables called patch cables 8-6 Copyright ©2021 John Wiley & Sons, Inc.
7.
Main Distribution Facility •
With an MDF, all cables run into the MDF • If one switch becomes overloaded, it is straight-forward to unplug the cables and it into a less-busy switch • Sometimes a chassis switch is used instead of a rack • A chassis switch enables users to plug modules directly into the switch • The key advantage of chassis switches is their flexibility 8-7 Copyright ©2021 John Wiley & Sons, Inc.
8.
8.3 Routed Backbones •
Routed backbones move packets along the backbone on the basis of their network layer address • Sometimes called subnetted backbones or hierarchical backbones • Most commonly used to connect different buildings on the same enterprise campus backbone network • A routed backbone ensures that broadcast messages stay in the one network segment 8-8 Copyright ©2021 John Wiley & Sons, Inc.
9.
8.4 Virtual LANs •
Virtual LANs are networks in which computers are assigned to LAN segments by software rather than by hardware • Often, VLANs are faster and provide greater opportunities to manage the flow of traffic on the LAN and BN • The simplest example is a single-switch VLAN, which means that the VLAN operates only inside one switch • Virtual LANs can be designed so that they act as though computers are connected via hubs or switches 8-9 Copyright ©2021 John Wiley & Sons, Inc.
10.
Benefits of VLANs •
With VLANs, we can put computers in different geographic locations in the same subnet • At right, a computer in the lower left could be put on the same subnet as one in the upper right • A separate subnet from all the other computers 8-10 Copyright ©2021 John Wiley & Sons, Inc.
11.
Benefits of VLANs
Continued • A more common implementation is a multiswitch VLAN, in which several switches are used to build the VLANs • VLANs are most commonly found in building backbone networks • In this case, we can now create subnets that span buildings • This enables us to create subnets based on who you are, rather than on where you are 8-11 Copyright ©2021 John Wiley & Sons, Inc.
12.
Benefits of VLANs
Continued • Advantages 1. Their ability to manage the flow of traffic on the LAN and backbone very precisely 2. The ability to prioritize traffic • Drawbacks o Their cost and management complexity 8-12 Copyright ©2021 John Wiley & Sons, Inc.
13.
How VLANs Work •
Each computer is assigned into a specific VLAN that has a VLAN ID number • Each VLAN ID is matched to a traditional IP subnet • Each computer connected to a VLAN switch also receives a traditional IP address assigned by the VLAN switch • Computers are assigned into the VLAN based on the physical port on the switch into which they are connected • When a computer transmits an Ethernet frame, it uses traditional Ethernet and IP addresses 8-13 Copyright ©2021 John Wiley & Sons, Inc.
14.
How VLANs Work
Continued • Virtual LAN switches use Ethernet 802.1q tagging to move frames from one switch to another • When a VLAN switch receives an Ethernet frame that needs to go to a computer on another VLAN switch, it changes the Ethernet frame by inserting the VLAN ID number and a priority code into the VLAN tag field • The router is a layer 3 device, so when it receives the message, it strips off the Ethernet frame and reads the IP packet 8-14 Copyright ©2021 John Wiley & Sons, Inc.
15.
How VLANs Work
With Broadcast Messages • Each computer on a VLAN switch is assigned into a subnet with a matching VLAN ID • When a computer issues a broadcast message, the switch identifies the VLAN ID of the sending computer and then sends the frame to all other computers that have the same VLAN ID • These computers may be on the same switch or on different switches 8-15 Copyright ©2021 John Wiley & Sons, Inc.
16.
Outline • Architectures • Switched
Backbone Networks • Routed Backbone Networks • Virtual LANs (VLANs) • Best Practices • Implications for Security and Management Copyright ©2021 John Wiley & Sons, Inc. 8-16
17.
8.5 The Best
Practice Backbone Design • Today, the most effective architecture for the distribution layer in terms of cost and performance is a switched backbone • It provides the best performance at the least cost • Many large organizations are now implementing VLANs, especially those that have departments spread over multiple buildings 8-17 Copyright ©2021 John Wiley & Sons, Inc.
18.
The Best Practice
Recommendations • The best practice architecture is a switched backbone or VLAN for the distribution layer and a routed backbone for the core layer • The best practice recommendation for backbone technology is gigabit Ethernet 8-18 Copyright ©2021 John Wiley & Sons, Inc.
19.
Improving Device Performance 8-19 Copyright
©2021 John Wiley & Sons, Inc.
20.
Outline • Architectures • Switched
Backbone Networks • Routed Backbone Networks • Virtual LANs (VLANs) • Best Practices • Implications for Security and Management Copyright ©2021 John Wiley & Sons, Inc. 8-20
21.
8.7 Implications for
Cyber Security • Most routers now have software that enables the network manager to create an access control list (ACL) that specifies what traffic the router should allow through • Many routers have more sophisticated ACL software that enables the ACL to have different rules for different interfaces • VLANs are the most secure type of backbone because they enable ACL and other security measures to be applied at the switch level 8-21 Copyright ©2021 John Wiley & Sons, Inc.
22.
8.7 Implications for
Cyber Security • Network Access Control options o Authenticate devices using 802.1x o Sandbox unknown devices and redirect web requests to authentication service • Limit network access until user registers their device • Physical security of network infrastructure o Locked and alarmed doors for all network closets o Attackers might tamper with cabling • Hard to detect in common drop-ceiling environments 8-22 Copyright ©2021 John Wiley & Sons, Inc.
Download now