Networking Essentials: Interconnecting the LANs

Date: Feb 11, 2016

Return to the article

The utility of LANs led to the desire to connect two (or more) networks together. This chapter from Networking Essentials: A CompTIA Network+ N10-006 Textbook, 4th Edition introduces the concepts and issues behind interconnecting LANs.

5-1 Introduction

The framework defining the network layers for linking networks together is defined by the OSI model and was introduced in Chapter 1, “Introduction to Computer Networks,” section 1-3. The OSI model provides a framework for networking that ensures compatibility in the network hardware and software. The concepts behind the hardware technologies used to interconnect LANs are presented in sections 5-2 to 5-5. The properties of a networking bridge are defined in section 5-2. The layer 2 switch is examined in section 5-3, and the router is introduced in section 5-4. An example of interconnecting LANs is provided in section 5-5. The chapter concludes with a section on the concept of auto-negotiation, examining the advantages and disadvantages of this network configuration option.

Table 5-1 lists and identifies, by chapter section, where each of the CompTIA Network+ objectives are presented in this chapter. The chapter sections where each objective is presented are identified. At the end of each chapter section is a review with comments of the Network+ objectives presented in that section. These comments are provided to help reinforce the reader’s understanding of a particular Network+ objective. The chapter review also includes “Test Your Knowledge” questions to aid in the understanding of key concepts before the reader advances to the next section of the chapter. The end of the chapter includes a complete set of question plus sample certification type questions.

TABLE 5-1 Chapter 5 CompTIA Network+ Objectives

Domain/Objective Number

Domain/Objective Description

Section Where Objective Is Covered

1.0

Network Architecture

1.1

Explain the functions and applications of various network devices

5-3, 5-4

1.3

Install and configure the following networking services/applications

5-4

1.4

Explain the characteristics and benefits of various WAN technologies

5-4

1.7

Differentiate between network infrastructure implementations

5-2

1.8

Given a scenario, implement and configure the appropriate addressing schema

5-2, 5-3

1.9

Explain the basics of routing concepts and protocols

5-3, 5-5

2.0

Network Operations

2.6

Given a scenario, configure a switch using proper features

5-4

4.0

Troubleshooting

4.2

Given a scenario, analyze and interpret the output of troubleshooting tools

5-3

4.6

Given a scenario, troubleshoot and resolve common network issues

5-5

5.0

Industry standards, practices, and network theory

5.2

Explain the basics of network theory and concepts

5-2, 5-4, 5-6

5-2 The Network Bridge

A bridge can be used in computer networks to interconnect two LANs together and separate network segments. Recall that a segment is a section of a network separated by bridges, switches, and routers. The bridge is a layer 2 device in the OSI model, meaning that it uses the MAC address information to make decisions regarding forwarding data packets. Only the data that needs to be sent across the bridge to the adjacent network segment is forwarded. This makes it possible to isolate or segment the network data traffic. An example of using a bridge to segment two Ethernet LANs is shown in Figure 5-1. The picture shows that LAN A connects to port 1 of the bridge and LAN B connects to port 2 on the bridge, creating two segments, as shown. There are four computers in LAN A and three computers in LAN B. It is important to note that bridges are now legacy networking devices, but studying these will help you better understand the functionality of switches, especially how data traffic is sent to connected LANs.

FIGURE 5-1 Using a bridge to interconnect two Ethernet LANs.

Bridges monitor all data traffic in each of the LAN segments connected to its ports. Recall that a port is an input/output connection on a networking device. The bridges use the MAC addresses to build a bridging table of MAC addresses and port locations for hosts connected to the bridge ports. A sample bridging table is provided in Table 5-2. The table shows the stored MAC address and the port where the address was obtained.

TABLE 5-2 Bridging Table

MAC Address

Port

00-40-96-25-85-BB

1

00-40-96-25-8E-BC

1

00-60-97-61-78-5B

2

00-C0-4F-27-20-C7

2

The source MAC address is stored in the bridge table as soon as a host talks (transmits a data packet) on the LAN. For example, if computer 1 in LAN A sends a message to computer 2 (see Figure 5-1), the bridge will store the MAC addresses of both computers and record that both of these computers are connected to port 1. If computers 5 or 6 are placing data packets on the network, then the source MAC addresses for 5 and 6 are stored in the bridge table and it is recorded that these computers connect to port 2 on the bridge. The MAC addresses for computers 3 and 4 will not be added to the bridging table until each transmits a data packet.

The bridge monitors the data on its ports to check for an association between the destination MAC address of the Ethernet frames to any of the hosts connected to its ports. An association indicates that the destination MAC address for a host is connected to one of the ports on the bridge. If an association is found, the data is forwarded to that port. For example, assume that computer 1 sends a message to computer 5 (see Figure 5-1). The bridge detects an association between the destination MAC address for computer 5 and port 2. The bridge then forwards the data from computer 1 to computer 5 in LAN B via port 2.

The capability of a bridge to forward data packets only when there is an association is used to isolate data traffic in each segment. For example, assume that computer 1 and computer 2 in LAN A generate a lot of data traffic. The computers in LAN B will not see any of the data traffic as long as there is not an association between the destination MAC addresses of the Ethernet packets and any of the hosts in LAN B (computers 5, 6, and 7).

A potential problem with bridges has to do with the way broadcasts are handled. A broadcast means the message is being sent to all computers on the network; therefore, all broadcasts in a LAN will be forwarded to all hosts connected within the bridged LANs. For example, the broadcast associated with an ARP will appear on all hosts. ARP stands for Address Resolution Protocol, which is a protocol used to map an IP address to its MAC address. In the address resolution protocol, a broadcast is sent to all hosts in a LAN connected to the bridge. This is graphically shown in Figure 5-2. The bridge forwards all broadcasts; therefore, an ARP request broadcasting the message “Who has this IP address?” is sent to all hosts on the LAN. The data packets associated with ARP requests are small, but it requires computer time to process each request. Excessive amounts of broadcasts being forwarded by the bridge can lead to a broadcast storm, resulting in degraded network performance, called a network slowdown.

FIGURE 5-2 An example of using a bridge to isolate data traffic.

The MAC address entries stored in a bridge table are temporary. Each MAC address entry to the bridge table remains active as long as there is periodic data traffic activity from that host on its port. However, an entry into the table is deleted if the port becomes inactive. In other words, the entries stored into the table have a limited lifetime. An expiration timer will commence once the MAC address is entered into the bridge table. The lifetime for the entry is renewed by new data traffic by the computer, and the MAC address is reentered.

In a similar manner, all networking devices (for example, computers) contain an ARP cache, a temporary storage of MAC addresses recently contacted. This is also called the ARP table. The ARP cache holds the MAC address of a host, and this enables the message to be sent directly to the destination MAC address without the computer having to issue an ARP request for a MAC address. The following list outlines typical steps of a communication process between computer 1 and computer 2.

  1. Computer 1 checks its ARP cache to determine if it already has the MAC address of computer 2. If it does, it will skip to the final step; otherwise, it proceeds to the next step.
  2. Computer 1 generates an ARP request message for computer 2 with its own MAC and IP information included.
  3. Computer 1 then broadcasts the ARP request message on its local network.
  4. Every local network device processes the ARP request message. Those computers that are not computer 2 will discard the message.
  5. Only a match, which is computer 2, generates an ARP reply message and updates its ARP cache with computer 1 MAC and IP information.
  6. Computer 2 sends an ARP reply message directly to computer 1.
  7. Computer 1 receives the ARP reply message and updates its ARP cache with the MAC and IP of computer 2.

The ARP cache contents on a Windows computer can be viewed using the arp -a command while in the command prompt, as shown here:

Windows

Mac OS X

C:\arp -a

jmac:~mymac$ arp -a

Interface: 10.10.20.2 on Interface x1000002

C1.salsa.org (192.168.12.1) at

Internet Address

Physical Address

Type

00-08-a3-a7-78-0c on en1

10.10.20.3

00-08-a3-a7-78-0c

dynamic

[ethernet]

10.10.20.4

00-03-ba-04-ba-ef

dynamic

C3.salsa.org (192.168.12.1) at

00-08-a3-a7-78-0c on en1

[ethernet]

The ARP cache contents on a Mac OS X computer can be viewed using the arp -a command while in the terminal mode.

The following message is generated if all the ARP entries have expired:

c:\arp -a
No ARP Entries Found

The name for the type of bridge used to interconnect two LANs running the same type of protocol (for example, Ethernet) is a transparent bridge. Bridges are also used to interconnect two LANs that are operating two different networking protocols. For example, LAN A could be an Ethernet LAN and LAN B could be a token ring. This type of bridge is called a translation bridge. An example is provided in Figure 5-3. The bridge allows data from one LAN to be transferred to another. Also the MAC addressing information is standardized so the same address information is used regardless of the protocol.

FIGURE 5-3 Using a translation bridge to interconnect an Ethernet and token-ring LAN.

A common application today using a bridge is interconnecting LANs using wireless technology. The use of wireless bridges in LANs is a popular choice for interconnecting the LANs when the cost of physically connecting them is prohibitive. Wireless technology and its LAN applications were presented in Chapter 4, “Wireless Networking.”

The use of a bridge is not as common as it used to be except for wireless network applications. New networking technologies are available that provide similar capabilities to the bridge but that are much more powerful. However, the bridge still is useful and has several advantages. Table 5-3 provides a summary of the advantages and disadvantages of a networking bridge.

TABLE 5-3 Summary of the Advantages and Disadvantages of a Bridge for Interconnecting LANs

Advantages

Disadvantages

Easy to install

Works best in low-traffic areas

Does an excellent job of isolating the data traffic in two segments

Forwards broadcasts and is susceptible to broadcast storms

Relatively inexpensive

Can be used to interconnect two LANs with different protocols and hardware

Reduces collision domains (remember how the CSMA/CD protocol works)

5-3 The Network Switch

The bridge provides a method for isolating the collision domains for interconnected LANs but lacks the capability to provide a direct data connection for the hosts. The bridge forwards the data traffic to all computers connected to its port. This was shown in Figure 5-2. The networking hub provides a technology for sharing access to the network with all computers connected to its ports in the LAN but lacks the capability to isolate the data traffic and provide a direct data connection from the source to the destination computer. The increase in the number of computers being used in LANs and the increased data traffic are making bridges and hubs of limited use in larger LANs. Basically, there is too much data traffic to be shared by the entire network. What is needed is a networking device that provides a direct data connection between communicating devices. Neither the bridge nor the hub provides a direct data connection for the hosts. A technology developed to improve the efficiency of the data networks and address the need for direct data connections is the layer 2 switch.

The layer 2 switch is an improved network technology that addresses the issue of providing direct data connections, minimizing data collisions, and maximizing the use of a LAN’s bandwidth; in other words, that improves the efficiency of the data transfer in the network. The switch operates at layer 2 of the OSI model and therefore uses the MAC or Ethernet address for making decisions for forwarding data packets. The switch monitors data traffic on its ports and collects MAC address information in the same way the bridge does to build a table of MAC addresses for the devices connected to its ports. The switch has multiple ports similar to the hub and can switch in a data connection from any port to any other port, similar to the bridge. This is why the switch is sometimes called a multiport bridge. The switch minimizes traffic congestion and isolates data traffic in the LAN. Figure 5-4 provides an example of a switch being used in a LAN.

FIGURE 5-4 A switch used to interconnect hosts in a LAN.

Figure 5-4 shows a switch being used in the LAN to interconnect the hosts. In this figure, the hub has been replaced with a switch. The change from a hub to a switch is relatively easy. The port connections are the same (RJ-45), and once the connections are changed and the device is powered on, the switch begins to make the direct data connections for multiple ports using layer 2 switching.

The LAN shown in Figure 5-5 contains 14 computers and 2 printers connected to 16 ports on the switch, configured in a star topology. If the computer connected to port 1 is printing a file on the laser printer (port 12), the switch will set up a direct connection between ports 1 and 12. The computer at port 14 could also be communicating with the computer at port 7, and the computer at port 6 could be printing a file on the color printer at port 16. The use of the switch enables simultaneous direct data connections for multiple pairs of hosts connected to the network. Each switch connection provides a link with minimal collisions and therefore maximum use of the LAN’s bandwidth. A link with minimal collisions is possible because only the two computers that established the link will be communicating over the channel. Recall that in the star topology each host has a direct connection to the switch. Therefore, when the link is established between the two hosts, their link is isolated from any other data traffic. However, the exception to this is when broadcast or multicast messages are sent in the LAN. In the case of a broadcast message, the message is sent to all devices connected to the LAN. A multicast message is sent to a specific group of hosts on the network.

FIGURE 5-5 A switch used to interconnect the networking devices in a LAN.

Hub–Switch Comparison

An experiment was set up to test the data handling characteristics of a hub and a switch given the same input instructions. The objective of this experiment was to show that data traffic is isolated with a switch but not with a hub. For this experiment, a LAN using a hub and a LAN using a switch were assembled. The LANs are shown in Figure 5-6(a) and (b). Each LAN contains four computers connected in a star topology. The computers are marked 1–4 for reference. The IP addresses are listed for each host.

FIGURE 5-6 (a) The LAN experiment with a hub; (b) the LAN experiment with a switch.

The Hub Experimental Results

In this experiment, computer 1 pinged computer 3. Computer 2 was used to capture the LAN data traffic using a network protocol analyzer. What are the expected results? Remember, a hub is a multiport repeater, and all data traffic input to the hub is passed on to all hosts connected to its ports. See the Ping Command Review section that follows for a brief review of the use of the ping command.

Ping Command Review

The ping command is used to verify that a network connection exists between two computers. The command format for ping is:

ping [ip address] {for this example ping 10.10.10.3}

After a link is established between the two computers, a series of echo requests and echo replies are issued by the networking devices to test the time it takes for data to pass through the link. The protocol used by the ping command is the Internet Connection Message Protocol (ICMP).

The ping command is issued to an IP address; however, delivery of this command to the computer designated by the IP address requires that a MAC address be identified for final delivery. The computer issuing the ping might not know the MAC address of the computer holding the identified IP address (no entry in the ARP cache table); therefore, an ARP request is issued. An ARP request is broadcast to all computers connected in the LAN. The computer that holds the IP address replies with its MAC address, and a direct line of communications is then established.

The data traffic collected by computer 2 when computer 1 pinged computer 3 is provided in Figure 5-7. The first line of the captured data shows the ARP request asking who has the IP address 10.10.10.3. The second line of the captured data shows the reply from 10.10.10.3 with the MAC address of 00-B0-D0-25-BF-48. The next eight lines in the captured data are the series of four echo requests and replies associated with a ping request. Even though computer 2 was not being pinged or replying to the ARP request, the data traffic was still present on computer 2’s hub port. The echo reply is from a Dell network interface card with the last six characters of the MAC address of 25-BF-48. The echo request is coming from a computer with 13-99-2E as the last six hex characters of its MAC address.

FIGURE 5-7 The captured data traffic by computer 2 for the LAN [Figure 5-6(a)] using a hub.

The Switch Experimental Results

The same experiment was repeated for the LAN shown in Figure 5-6(b), this time using a switch to interconnect the computers instead of a hub. This network consists of four computers connected in a star topology using a switch at the center of the network. The ping command was sent from computer 1 to computer 3, ping 10.10.10.3. The ARP cache for computer 1 is empty; therefore, the MAC address for computer 3 is not known by computer 1. An ARP request is issued by computer 1, and computer 3 replies. The series of echo requests and echo replies follow; however, the data traffic captured by computer 2 (Figure 5-8), shows the ARP request asking who has the IP address 10.10.10.3. This is the last of the data communications between computers 1 and 3 seen by computer 2. A direct line of communication between computers 1 and 3 is established by the switch that prevents computer 2 from seeing the data traffic from computers 1 and 3. The only data traffic seen by computer 2 in this process was the broadcast of the ARP request. This is true for any other hosts in the LAN. The results of this experiment show that the use of the switch substantially reduces data traffic in the LAN, particularly unnecessary data traffic. The experiment shows that the broadcast associated with an ARP request is seen by all computers but not the ARP replies in a LAN using a switch. This is because a direct data connection is established between the two hosts. This experiment used pings and ARPs; however, this same advantage of using a switch is true when transferring files, image downloads, file printing, and so on. The data traffic is isolated from other computers on the LAN. Remember, the switch uses MAC addresses to establish which computers are connected to its ports. The switch then extracts the destination MAC address from the Ethernet data packets to determine to which port to switch the data.

FIGURE 5-8 The data traffic captured by computer 2 for the LAN [Figure 5-6(b)] using a switch.

Managed Switches

A managed switch is simply a network switch that allows the network administrator to monitor, configure, and manage certain network features such as which computers are allowed to access the LAN via the switch. Access to the management features for the switch is password protected so that only the network administrators can gain entry. The following information describes some of the features of the managed interface for a Cisco Catalyst 2900 series switch established using the Cisco Network Assistant (CNA). This software can be downloaded from Cisco and provides an easy way to manage the features of the Cisco switches. (Note: The download requires that you have set up a Cisco user account and password. The Cisco Network Assistant provides for a centralized mode for completing various network administration tasks for switches, routers, and wireless networking equipment.)

The start-up menu for a Cisco Catalyst 2960 switch obtained via the CNA is provided in Figure 5-9. The image is showing the current setup for the switch. The assigned IP address for the switch is 192.168.1.1, and a router and a switch are interconnected with the switch. The steps for setting the IP address for an interface on the switch are presented later in this section.

FIGURE 5-9 The start-up menu of a Cisco Catalyst switch using the Cisco Network Administrator software.

The current connections to the ports on the switch can be viewed by clicking the stacked switch icon at the top of the screen as shown in Figure 5-10. The image of the switch port connections shows ports 1, 2, and 3 are brighter, indicating that there are networking devices connected to the ports. The MAC addresses of the devices connected to the switch ports can be displayed by clicking the MAC address button under the Configure button as shown in Figure 5-11. Four MAC addresses are assigned to port 1, one MAC address is assigned to port 2, and one MAC address is assigned to port 3. Multiple networking devices can be connected to a port if the devices are first connected to another switch or hub and the output of the switch or hub is connected to one switch port. An example showing four devices connected through a hub to port 1 on the switch is shown in Figure 5-12. The output interface information for the MAC Addresses table shows the following information in Figure 5-11:

FIGURE 5-10 The highlighted ports showing the current connections and the location of the stacked switches icon.

FIGURE 5-11 The menu listing the MAC addresses currently connected to the switch.

FIGURE 5-12 An example of a hub connected to a switch port, with four computers connected to the hub.

Notice that the Dynamic Address tab is highlighted. This indicates that this is a listing of the MAC addresses that have been assigned dynamically. Dynamic assignment means that the MAC address was assigned to a port when a host was connected. There is also a tab for Static Addresses. Static addressing indicates that the MAC address has been manually assigned to an interface, and the port assignment does not expire. The Secure tab shows what switch ports have been secured. A secure address means that a MAC address has been assigned to a port, and the port will automatically disable itself if a device with a different MAC address connects to the secured port.

The FastEthernet 0/1, FastEthernet 0/2, FastEthernet 0/3 notation indicates the [Interface Type Slot#/Interface#] on the switch, and FastEthernet indicates that this interface supports 100Mbps and 10Mbps data rate connections.

The “Aging Time” is listed to be 300 seconds. Aging time is the length of time a MAC address remains assigned to a port. The assignment of the MAC address will be removed if there is no data activity within this time. If the computer with the assigned MAC address initiates new data activity, the aging time counter is restarted, and the MAC address remains assigned to the port. The management window shows a switch setting for enabling “Aging.” This switch is used to turn off the aging counter so that a MAC address assignment on a port never expires.

The IP address on a switch interface can be configured using the Cisco Network Assistant software by clicking Configure > Device Properties > IP Addresses. This opens the IP Addresses menu shown in Figure 5-13. Click the area where the IP address should be entered. This opens a text box for entering the IP address. Enter the IP address and click OK to save the IP address.

FIGURE 5-13 Configuring an IP address on an interface.

The benefits of using a network switch are many in a modern computer network. These benefits include less network congestion, faster data transfers, and excellent manageability. It has been shown that a network switch can be used to replace the network hub, and the advantage is that data traffic within a LAN is isolated. The term for this is isolating the collision domains, which is breaking the network into segments. A segment is a portion of the network where the data traffic from one part of the network is isolated from the other networking devices. A direct benefit of isolating collision domains is that there will be an increase in the data transfer speed and throughput. This is due to the fact that the LAN bandwidth is not being shared and chances of data collisions are minimized. As a result, the LAN will exhibit faster data transfers and latency within the LAN will be significantly reduced. Reduced latency means that the data packets will arrive at the destination more quickly.

Switches learn the MAC addresses of the connected networking by extracting the MAC address information from the headers of Ethernet data packet headers of transmitted data packets. The switch will map the extracted MAC address to the port where the data packet came in. This information is stored in Content Addressable Memory (CAM). CAM is a table of MAC address and port mapping used by the switch to identify connected networking devices. The extracted MAC addresses are then used by the switch to map a direct communication between two network devices connected to its ports. The MAC address and port information remain in CAM as long as the device connected to the switch port remains active. A timestamp establishes the time when the mapping of the MAC address to a switch port is established. However, switches limit the amount of time address and port information are stored in CAM. This is called aging time. The mapping information will be deleted from the switch’s CAM if there is no activity during this set time. This technique keeps the mapping information stored in CAM up-to-date.

What happens if the destination MAC address is not stored in CAM? In this case, the packet is transmitted out all switch ports except for the port where the packet was received. This is called flooding.

It has been shown that switches minimize the collision domain due to the fact that a direct switch connection is made between networking devices. However, it is important to remember that switches do not reduce the broadcast domain. In a broadcast domain, any network broadcast sent over the network will be seen by all networking devices in the same network. Broadcasts within a LAN will be passed by switches. Refer to the discussion of Figure 5-7 and 5-8 for an example.

Two modes used in a switch to forward frames: store-and-forward and cut-through.

Multilayer Switches

Newer switch technologies are available to help further improve the performance of computer networks. The term used to describe these switches is multilayer switches (MLS). An example is a layer 3 switch. Layer 3 switches still work at layer 2 but additionally work at the network layer (layer 3) of the OSI model and use IP addressing for making decisions to route a data packet in the best direction. The major difference is that the packet switching in basic routers is handled by a programmed microprocessor. The layer 3 switch uses application-specific integrated circuits (ASICs) hardware to handle the packet switching. The advantage of using hardware to handle the packet switching is a significant reduction in processing time (software versus hardware). In fact, the processing time of layer 3 switches can be as fast as the input data rate. This is called wire speed routing, where the data packets are processed as fast as they are arriving. Multilayer switches can also work at the upper layers of the OSI model. An example is a layer 4 switch that processes data packets at the transport layer of the OSI model.

5-4 The Router

The router is the most powerful networking device used today to interconnect LANs. The router is a layer 3 device in the OSI model, which means the router uses the network address (layer 3 addressing) to make routing decisions regarding forwarding data packets. Remember from Chapter 1, section 3, that the OSI model separates network responsibilities into different layers. In the OSI model, the layer 3 or network layer responsibilities include handling of the network address. The network address is also called a logical address, rather than being a physical address such as the MAC address. The physical address is the hardware or MAC address embedded into the network interface card. The logical address describes the IP address location of the network and the address location of the host in the network.

Essentially, the router is configured to know how to route data packets entering or exiting the LAN. This differs from the bridge and the layer 2 switch, which use the Ethernet address for making decisions regarding forwarding data packets and only know how to forward data to hosts physically connected to their ports.

Routers are used to interconnect LANs in a campus network. Routers can be used to interconnect networks that use the same protocol (for example, Ethernet), or they can be used to interconnect LANs that are using different layer 2 technologies such as an Ethernet and token ring. Routers also make it possible to interconnect to LANs around the country and the world and interconnect to many different networking protocols.

Routers have multiple port connections for connecting to the LANs, and by definition a router must have a minimum of three ports. The common symbol used to represent a router in a networking drawing is provided in Figure 5-14. The arrows pointing in and out indicate that data enters and exits the routers through multiple ports. The router ports are bidirectional, meaning that data can enter and exit the same router port. Often the router ports are called the router interface, the physical connection where the router connects to the network.

FIGURE 5-14 The network symbol for a router.

The Router Interface: Cisco 2800 Series

Figure 5-15 shows the rear panel view (interface side) of a Cisco 2800 series router.

FIGURE 5-15 The rear panel view of a Cisco 2800 series router.

The following describes the function of each interface:

The Router Interface—Cisco 2600 Series

Figure 5-16 shows the rear panel view (interface side) of a Cisco 2600 series router.

FIGURE 5-16 The rear panel view of a Cisco 2600 series router.

The following describes the function of each interface to the network:

A media converter is used to convert the 15-pin AUI port to the 8-pin RJ-45 connector. Figure 5-17 shows an example of an AUI to RJ-45 media converter. Media converters are commonly used in computer networks to adapt layer 1 or physical layer technologies from one technology to another. For example:

FIGURE 5-17 A CentreCom 210TS AUI to RJ-45 media converter.

Figure 5-18 shows a Cisco 7200 series router, which provides adaptable interfaces for connecting to many physical layer technologies such as FastEthernet, gigabit Ethernet, ATM, and FDDI.

FIGURE 5-18 A Cisco 7200 series router (courtesy of Cisco Systems).

5-5 Interconnecting LANs with the Router

The previous section introduced the function of a router in a network. A router routes data based on the destination network address or logical address rather than the physical address used by layer 2 devices, such as the switch and the bridge. Information exchanged with bridges and layer 2 switches requires that the MAC address for the hosts be known. Routed networks such as most enterprise and campus networks use IP addressing for managing the data movement. Enterprise network is a term used to describe the network used by a large company. The use of the network or logical address on computers allows the information to be sent from a LAN to a destination without requiring that the computer know the MAC address of the destination computer. Remember, delivery of data packets is based on knowing the MAC address of the destination.

An overview of the router interface was presented in section 5-4. The router interface provides a way to access the router for configuration either locally or remotely. Interfaces are provided for making serial connections to the router and to other devices that require a serial communications link. For example, interfaces to wide area networking devices require a serial interface. RJ-45 ports are provided on the router interface for connecting the router to a LAN. Older routers can require the use of an AUI port to establish an Ethernet connection to a UTP cable. This port provides a 10Mbps data connection to Ethernet (10Mbps) networks. The RJ-45 connection is used to connect both Ethernet (10Mbps), FastEthernet (100Mbps), Gigabit Ethernet (1000Mbps), and 10 Gigabit Ethernet (10G) to a LAN. The RJ-45 connection can also support gigabit and 10G Ethernet, but high-speed data networks can also use a fiber connection.

This section introduces the information needed to design, manage, and configure campus networks. An example of a small interconnected LAN is provided in Figure 5-19. This example shows four Ethernet LANs interconnected using three routers. The LANs are configured in a star topology using switches at the center of the LAN. The LANs are labeled LAN A, LAN B, LAN C, and LAN D. The routers are labeled RouterA, RouterB, and RouterC (router naming protocols are discussed in Chapter 7, “Introduction to Router Configuration”). Connection of the routers to the LANs is provided by the router’s FastEthernet port (FA0/0, FA0/1, FA0/2, . . . ). Look for the FA label in Figure 5-19.

FIGURE 5-19 A small interconnected LAN.

The interconnections for the routers and the LANs are summarized as follows:

The serial ports (S0/0, S0/1, S0/2,...) are not being used to interconnect the routers in this sample campus network. The serial interfaces are typically used to interconnect LANs that connect through a data communications carrier such as a telephone company (Telco).

The network configuration provided in Figure 5-19 enables data packets to be sent and received from any host on the network after the routers in the network have been properly configured. For example, computer A1 in LAN A could be sending data to computer D1 in LAN D. This requires that the IP address for computer D1 is known by the user sending the data from computer A1. The data from computer A1 will first travel to the switch where the data is passed to RouterA via the FA0/0 FastEthernet data port. RouterA will examine the network address of the data packet and use configured routing instructions stored in routing tables to decide where to forward the data. RouterA determines that an available path to RouterC is via the FA0/2 FastEthernet port connection. The data is then sent directly to RouterC. RouterC determines that the data packet should be forwarded to the FA0/0 port to reach computer D1 in LAN D. The data is then sent to D1. Alternatively, RouterA could have sent the data to RouterC through RouterB via Router A’s FA0/1 FastEthernet port. Path selection for data packets is examined in Chapter 9, “Routing Protocols.”

Delivery of the information over the network was made possible by the use of an IP address and routing tables. Routing tables keep track of the routes used for forwarding data to its destination. RouterA used its routing table to determine a network data path so computer A1’s data could reach computer D1 in LAN D. RouterA determines that a path to the network where computer D1 is located can be obtained via RouterA’s FA0/2 FastEthernet port to the FA0/2 FastEthernet port on RouterC. RouterC determines that computer D1 is on LAN D, which connects to RouterC’s FA0/0 FastEthernet port. An ARP request is issued by RouterC to determine the MAC address of computer D1. The MAC address is then used for final delivery of the data to computer D1.

If RouterA determines that the network path to RouterC is down, RouterA can route the data packet to RouterC through RouterB. After RouterB receives the data packet from RouterA, it uses its routing tables to determine where to forward the data packet. RouterB determines that the data needs to be sent to RouterC, and it uses the FA0/3 FastEthernet port to forward the data.

Gateway Address

The term gateway is used to describe the address of the networking device that enables the hosts in a LAN to connect to networks and hosts outside the LAN. For example, for all hosts in LAN A, the gateway address will be 10.10.10.250. This address is configured on the host computer. Any IP packets with a destination outside the LAN will be sent to the gateway address.

Network Segments

The network segment defines the networking link between two LANs. There is a segment associated with each connection of an internetworking device (for example, router—hub, router—switch, router—router). For example, the IP address for the network segment connecting LAN A to the router is 10.10.20.0. All hosts connected to this segment must contain a 10.10.20.x because a subnet mask of 255.255.255.0 is being used. Subnet masking is fully explained in Chapter 6.

Routers use the information about the network segments to determine where to forward data packets. For example, the network segments that connect to RouterA include

The computers in LAN A will have a 10.10.20.x address. All the computers in this network must contain a 10.10.20.x IP address. For example, computer A1 in LAN A will have the assigned IP address of 10.10.20.1 and a gateway address of 10.10.20.250. The computers in LAN B are located in the 10.10.10.0 network. This means that all the computers in this network must contain a 10.10.10.x IP address. The x part of the IP address is assigned for each host. The gateway address for the hosts in LAN B is 10.10.10.250.

5-6 Configuring the Network Interface—Auto-Negotiation

Most modern networking internetworking technologies (for example, hubs, switches, bridges, and routers) now incorporate the auto-negotiation protocol. The protocol enables the Ethernet equipment to automate many of the installation steps. This includes automatically configuring the operating speeds (for example, 10/100/1000Mbps) and the selection of full- or half-duplex operation for the data link. The auto-negotiation protocol is defined in the IEEE Ethernet standard 802.3x for FastEthernet.

The auto-negotiation protocol uses a fast link pulse (FLP) to carry the information between each end of a data link. Figure 5-20 shows a data link. The data rate for the fast link pulses is 10Mbps, the same as for 10BASE-T. The link pulses were designed to operate over the limited bandwidth supported by CAT3 cabling. Therefore, even if a link is negotiated, there is no guarantee that the negotiated data rate will work over the link. Other tests on the cable link must be used to certify that the cable can carry the negotiated data link configuration (refer to Chapter 2, “Physical Layer Cabling: Twisted Pair”).

FIGURE 5-20 The two ends of a data link negotiating the operating parameters.

Auto-Negotiation Steps

Each link partner shares or advertises its data link capabilities with the other link partner. The two link partners then use the advertised capabilities to establish the fastest possible data link rate for both links. In the example of the link partners shown in Figure 5-22, computer 1 advertises that its interface supports 10Mbps. The switch advertises that it supports both 10Mbps and 100Mbps. The network interfaces on each link partner are set for auto-negotiation; therefore, the 10Mbps operating mode is selected. This is the fastest data rate that can be used in this data link. The data rate is limited by the 10Mbps capabilities of the computer’s network interface.

Full-Duplex/Half-Duplex

Modern network interfaces for computer networks have the capability of running the data over the links in either full- or half-duplex mode. As noted previously, full-duplex means that the communications device can transmit and receive at the same time. Half-duplex means the communications device can transmit or receive, but not at the same time.

In full-duplex operation (10/100Mbps), the media must have separate transmit and receive data paths. This is provided for in CAT6/5e/5 cable with pairs 1–2 (transmit) and pairs 3–6 (receive). Full-duplex with gigabit and 10 gigabit data rates require the use of all four wire pairs (1–2, 3–6, 4–5, 7–8). An important note is that the full-duplex mode in computer network links is only for point-to-point links. This means that there can only be two end stations on the link. The CSMA/CD protocol is turned off; therefore, there can’t be another networking device competing for use of the link. An example of networking devices that can run full-duplex are computers connected to a switch. The switch can be configured to run the full-duplex mode. This also requires that each end station on the link must be configurable to run full-duplex mode.

In half-duplex operation, the link uses the CSMA/CD protocol. This means only one device talks at a time, and while the one device is talking, the other networking devices “listen” to the network traffic. Figure 5-21(a) and (b) shows examples of networks configured for full- and half-duplex mode. In full-duplex operation [Figure 5-21(a)], CSMA/CD is turned off and computers 1, 2, and the switch are transmitting and receiving at the same time. In half-duplex mode [Figure 5-21(b)], CSMA/CD is turned on, computer 1 is transmitting, and computer 2 is “listening” or receiving the data transmission.

FIGURE 5-21 (a) Computer 1 transmits and receives at the same time; (b) computer 1 transmits; others listen.

Figure 5-22(a) and (b) provides an example of the port management features available with the Cisco switch using the Cisco Network Administrator software. The settings for the speed are shown in Figure 5-22(a). An example of setting the switch for auto, half-, and full-duplex are shown in Figure 5-22(b). The auto setting is for auto-negotiate.

FIGURE 5-22 An example of the port management options available with a Cisco switch: (a) 100Mbps auto-negotiation; (b) 10Mbps half-/full-duplex option.

Table 5-4 provides a summary of the advantages and disadvantages of the auto-negotiation protocol.

TABLE 5-4 Summary of the Auto-negotiation Protocol

Advantages

Disadvantages

Useful in LANs that have multiple users with multiple connection capabilities.

Not recommended for fixed data links such as the backbone in a network.

The auto-negotiation feature can maximize the data links’ throughput.

A failed negotiation on a functioning link can cause a link failure.

Summary

This chapter has established how LANs are interconnected. The need for careful documentation was addressed in this chapter. The importance of this will become more relevant as the complexity in network topics increases from chapter to chapter. Internetworking hardware such as bridges, switches, and routers were discussed and examples of using these technologies presented.

A technique for internetworking the LANs using routers has been presented. In addition, the purpose of a router and its hardware interface has been defined. The use of switches and hubs to connect to the routers has been demonstrated. The purpose of a gateway has been explained and demonstrated. The concept of a network segment has been examined.

The concepts the student should understand from this chapter are the following:

Questions and Problems

Section 5-2

  1. What is a bridge?

     

  2. Define a segment.

     

  3. What information is stored in a bridge table?

     

  4. What is an association on a bridge, and how is it used?

     

  5. What are excessive amounts of broadcasts on a network called?

     

  6. Which command is used on a computer to view the contents of the ARP cache?

     

  7. An empty ARP cache indicates what?

     

  8. Why do entries into the bridging table have a limited lifetime?

     

  9. Which of the following are advantages of using a bridge to interconnect LANs?

    1. Works best in low traffic areas
    2. Relatively inexpensive
    3. Can be used to route data traffic
    4. Easy to install
    5. Reduces collision domains

Section 5-3

  1. The network switch operates at which layer of the OSI model?

     

  2. Another name for a switch is

    1. multiport repeater
    2. multiport bridge
    3. multiport router
    4. multiport hub
  3. How does a switch provide a link with minimal collisions?

     

  4. The link for a switch connection is isolated from other data traffic except for what type of messages?

     

  5. Explain what data traffic is sent across a network when a computer pings another computer and a hub is used to interconnect the computers.

     

  6. Explain what data traffic is seen by computer 3 when computer 1 pings computer 2 in a LAN. A switch is used to interconnect the computers.

     

  7. Explain the concept of dynamic assignment on a switch.

     

  8. Define aging time on a switch.

     

  9. Explain how a switch learns MAC addresses, and where a switch stores the address.

     

  10. What happens if a MAC address is not stored in CAM on a switch?

     

  11. Which two modes are used by a switch to forward frames?

     

  12. Which switch mode offers minimum latency?

     

  13. What is error threshold, and which mode is it associated with?

     

  14. Explain the difference in store-and-forward and the cut-through mode on a switch.

     

     

  15. How does a layer 3 switch differ from a layer 2 switch?

     

     

  16. What is meant by the term wire-speed routing?

     

Section 5-4

  1. A router uses the network address on a data packet for what purpose?

     

  2. What is the logical address?

     

  3. The physical connection where a router connects to the network is called the

    1. router port
    2. network port
    3. network interface
    4. router interface
  4. The connection to the router’s console input is typically which of the following?

    1. RS-232
    2. RJ-45
    3. DB9
    4. RJ-11
  5. AUI stands for

    1. Auxiliary Unit Input
    2. Attachment Unit Interconnect
    3. Auxiliary Unit Interface
    4. Attachment Unit Interface
  6. The AUI port on a router connects to which networking protocol?

    1. 100BASE-T
    2. 10BASE-T
    3. Token Ring
    4. Ethernet

Section 5-5

  1. Define enterprise network.

     

  2. The router interface most commonly used to interconnect LANs in a campus network is

    1. serial
    2. console port
    3. Ethernet
    4. ATM
  3. Serial interfaces on a router are typically used to

    1. interconnect routers
    2. interconnect hubs
    3. connect to communication carriers
    4. connect to auxiliary ports
  4. The designation E0 indicates

    1. Ethernet port 0
    2. Ethernet input
    3. External port 0
    4. Exit port 0
  5. Routing tables on a router keep track of

    1. port assignments
    2. MAC address assignments
    3. gateway addresses of LANs
    4. routes to use for forwarding data to its destination
  6. The convention used for naming of the serial port 0 on a router is

    1. S0
    2. System 0
    3. Serial interface 0
    4. Serial AUI 0
  7. Define the term gateway.

     

Section 5-6

  1. What is the purpose of the fast link pulse?

     

  2. Define full-duplex.

     

  3. Define half-duplex.

     

  4. Which of the following is a disadvantage of the auto-negotiation protocol?

    1. Only useful in LANs that have multiple connection capabilities.
    2. A failed negotiation on a functioning link can cause a link failure.
    3. It’s recommended for use in critical network data paths.
    4. It works at 10Mbps.

Critical Thinking

  1. Describe how a network administrator uses the OSI model to isolate a network problem.

     

  2. Why is auto-negotiation not recommended for use in critical network data paths?

     

  3. What would happen if the local network devices do not have local ARP cache?

     

Certification Questions

  1. Which of the following best defines a bridging table?

    1. A list of MAC addresses and port locations for hosts connected to the bridge ports
    2. A list of IP addresses and port locations for hosts connected to the bridge ports
    3. A list of IP addresses and port locations for hosts connected to the hub ports
    4. A list of MAC addresses and port locations for hosts connected to the hub ports
  2. Which of the following best defines aging time?

    1. The length of time a MAC address remains assigned to a port
    2. The length of time an IP address remains assigned to a port
    3. The length of time a MAC address remains assigned to a hub
    4. The length of time an IP address remains assigned to a hub
  3. Dynamic assignment on a switch implies which of the following? (Select all that apply.)

    1. MAC addresses are assigned to a port when a host is connected.
    2. IP addresses are assigned to a port when a host is connected.
    3. MAC addresses are assigned to a switch when a host is connected.
    4. IP addresses are assigned to a switch when a host is connected.
  4. Which of the following terms is used to describe that a MAC address has been manually assigned?

    1. Dynamic assignment
    2. ARP assignment
    3. DHCP assignment
    4. Static assignment
  5. What is the purpose of the secure tab on a switch?

    1. The switchport will use port discovery to assign a MAC address to the port.
    2. The switchport will automatically disable itself if a device with a different MAC address connects to the port.
    3. The switchport will use a different MAC address than the one connected to the port.
    4. This enables the switch to select what networking devices have a selectable IP address.
  6. What is the length of time an IP address is assigned to a switchport called?

    1. Delay time
    2. Enable time
    3. Aging time
    4. Access time
  7. Which of the following is a table of MAC addresses and port mapping used by the switch to identify connected network devices?

    1. CAM
    2. ARP
    3. ARP-A
    4. ipconfig /all
  8. Which of the following best defines store-and-forward relative to switch operation?

    1. The frame is stored in CAM and the forward to the source for confirmation.
    2. The frame is stored in CAM and the forward to the destination for confirmation.
    3. The header is received before forwarding it to the destination.
    4. The entire frame is received before a decision is made regarding forwarding to its destination.
  9. In which switch mode is the data packet forwarded to the destination as soon as the MAC address has been read?

    1. Store-and-forward
    2. Adaptive fast-forward
    3. Cut-through
    4. Fast-forward
  10. Which switch mode offers the minimum switch latency?

    1. Cut-through
    2. Fast-forward
    3. Store-and-forward
    4. Adaptive cut-through

800 East 96th Street, Indianapolis, Indiana 46240

vceplus-200-125    | boson-200-125    | training-cissp    | actualtests-cissp    | techexams-cissp    | gratisexams-300-075    | pearsonitcertification-210-260    | examsboost-210-260    | examsforall-210-260    | dumps4free-210-260    | reddit-210-260    | cisexams-352-001    | itexamfox-352-001    | passguaranteed-352-001    | passeasily-352-001    | freeccnastudyguide-200-120    | gocertify-200-120    | passcerty-200-120    | certifyguide-70-980    | dumpscollection-70-980    | examcollection-70-534    | cbtnuggets-210-065    | examfiles-400-051    | passitdump-400-051    | pearsonitcertification-70-462    | anderseide-70-347    | thomas-70-533    | research-1V0-605    | topix-102-400    | certdepot-EX200    | pearsonit-640-916    | itproguru-70-533    | reddit-100-105    | channel9-70-346    | anderseide-70-346    | theiia-IIA-CIA-PART3    | certificationHP-hp0-s41    | pearsonitcertification-640-916    | anderMicrosoft-70-534    | cathMicrosoft-70-462    | examcollection-cca-500    | techexams-gcih    | mslearn-70-346    | measureup-70-486    | pass4sure-hp0-s41    | iiba-640-916    | itsecurity-sscp    | cbtnuggets-300-320    | blogged-70-486    | pass4sure-IIA-CIA-PART1    | cbtnuggets-100-101    | developerhandbook-70-486    | lpicisco-101    | mylearn-1V0-605    | tomsitpro-cism    | gnosis-101    | channel9Mic-70-534    | ipass-IIA-CIA-PART1    | forcerts-70-417    | tests-sy0-401    | ipasstheciaexam-IIA-CIA-PART3    | mostcisco-300-135    | buildazure-70-533    | cloudera-cca-500    | pdf4cert-2v0-621    | f5cisco-101    | gocertify-1z0-062    | quora-640-916    | micrcosoft-70-480    | brain2pass-70-417    | examcompass-sy0-401    | global-EX200    | iassc-ICGB    | vceplus-300-115    | quizlet-810-403    | cbtnuggets-70-697    | educationOracle-1Z0-434    | channel9-70-534    | officialcerts-400-051    | examsboost-IIA-CIA-PART1    | networktut-300-135    | teststarter-300-206    | pluralsight-70-486    | coding-70-486    | freeccna-100-101    | digitaltut-300-101    | iiba-CBAP    | virtuallymikebrown-640-916    | isaca-cism    | whizlabs-pmp    | techexams-70-980    | ciscopress-300-115    | techtarget-cism    | pearsonitcertification-300-070    | testking-2v0-621    | isacaNew-cism    | simplilearn-pmi-rmp    | simplilearn-pmp    | educationOracle-1z0-809    | education-1z0-809    | teachertube-1Z0-434    | villanovau-CBAP    | quora-300-206    | certifyguide-300-208    | cbtnuggets-100-105    | flydumps-70-417    | gratisexams-1V0-605    | ituonline-1z0-062    | techexams-cas-002    | simplilearn-70-534    | pluralsight-70-697    | theiia-IIA-CIA-PART1    | itexamtips-400-051    | pearsonitcertification-EX200    | pluralsight-70-480    | learn-hp0-s42    | giac-gpen    | mindhub-102-400    | coursesmsu-CBAP    | examsforall-2v0-621    | developerhandbook-70-487    | root-EX200    | coderanch-1z0-809    | getfreedumps-1z0-062    | comptia-cas-002    | quora-1z0-809    | boson-300-135    | killtest-2v0-621    | learncia-IIA-CIA-PART3    | computer-gcih    | universitycloudera-cca-500    | itexamrun-70-410    | certificationHPv2-hp0-s41    | certskills-100-105    | skipitnow-70-417    | gocertify-sy0-401    | prep4sure-70-417    | simplilearn-cisa    |
http://www.pmsas.pr.gov.br/wp-content/    | http://www.pmsas.pr.gov.br/wp-content/    |