Concepts:Chapter 5, IP Review
|
Bit position: | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
Value of Position (if a 1 is in it): | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |
Like decimal numbers, binary and hex numbers use a positional value scheme. Each digit in a number is worth that digit times the value of the position it occupies. For example, in the decimal number 725, the 7 is worth 7 times 100, the 2 is worth 2 times 10, and the 5 is worth 5 times 1.
Binary is easier, since the only digits we can use are 1s and 0s. The largest number that can be stored in one byte is 255. This is the sum of the values of all the the positions in the byte. Converting a binary number to decimal is simple: add the values of all the positions that hold a one. The only trick is to have a clear memory of the value of each position. They are all powers of two. Start on the right with 1, and double the value for the each new position, moving to the left: 1, 2, 4, 8, 16, 32, 64, and 128.
When you convert a decimal number to binary, do a series of subtraction problems, one for each position in the byte, starting from the left. For example, let's convert 175 to binary.
Bit position: | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |
Conversion of 175 (above) | 1 | 0 | 1 | 0 | 1 | 1 | 1 | 1 |
The IP protocol stack was invented with networking in mind. IP addresses contain two parts: one to identify the address of the network a host is on, and the other part to identify the host itself. Every network is assigned an address which, according to the original design, could be one, two, or three bytes, depending on the class of the network (A, B, or C). The remaining byte or bytes are typically used for hosts on networks. (It gets more complex, but this is how we start.)
There are five address classes you need to know. The first three classes can be described by the number of bytes assigned to the network portion of their addresses:
Class D and E addresses use portions of the fourth byte as well for network addressing. You may wish to know that only class A, B, and C addresses are for general use. Class D addresses are for multicasting (messages to groups of machines), and class E addresses are for experimental use.
One way to recognize the class of a given address is to know the range of possible addresses in each class. The five classes of addresses are defined as limited to specific ranges of values of the first byte. The numeric ranges are hard to remember until you see a chart that explains what the ranges have to do with the binary version of the first octet (byte).
Remember the basics of binary notation: a byte has eight bits. Each bit is a digit in a binary number. Since we can only use 1s and 0s in binary notation, we either have (1) or don't have (0) the number of units represented by a position in the binary number.
Bit position: | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
Value of Position (if a 1 is in it): | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |
Reading from left to right, if the first bit (position 7, above) of the first octet (another word for a byte) is a zero, that octet must represent a number less than 128. This defines a class A address: the first octet must be 127 or less. Consider it this way:
What good does it do to know the class of a network? That brings us
back to a subnet mask. If I tell a device that its address is
10.25.31.46, it does not know which part
of that address identifies the network until I tell it the subnet mask
to use.
A subnet mask is like a pattern or filter. It tells hosts on a network which bits in an address are network address bits and which bits are host address bits. It does it by the use of 1s and 0s. Consider the table below that shows you three simple masks:
Class A | 255.0.0.0 | 11111111.00000000.00000000.00000000 |
Class B | 255.255.0.0 | 11111111.11111111.00000000.00000000 |
Class C | 255.255.255.0 | 11111111.11111111.11111111.00000000 |
Network devices read a mask to learn how to interpret addresses. A mask is always a series of 1s followed by a series of 0s. It is never a jumble. Address positions marked by 1s in a mask are considered network address positions. Address positions marked by 0s in a mask are considered host address positions.
Another way of saying this is that certain address bits are
considered to be network address bits and the rest are
considered host address bits. The actual method used involves
Boolean math, but understanding it is not critical to understanding or
using the concept. When a device reads an actual IP address, the rule
from the subnet mask is applied, and the device understands which bits
are the net address and which are the host address.
If you need another metaphor, think about this one. A router
on a class C network might receive traffic bound for
device 204.112.44.16. When received, that address would look like this:
11001100011100000010110000010000
(No dots, remember?)
A subnet mask is like a filter that only
shows a portion of an address to a device. Routers
only care about the network portion of an address.
Imagine a pair of glasses that has one red
lens and one blue lens.
Imagine that the subnet mask colors all the bits of an incoming address
so that the network bits are red and the host bits are blue. On a class
C network, the subnet mask is 255.255.255.0, so the address would look
like this:
11001100011100000010110000010000
The router would look at the address through a filter that
would show it only the network address portion. This would be like
looking through the blue lens, hiding the host
portion of the address.
11001100011100000010110000010000
If this traffic were received by a device that cared only
about the host portion of the address, it would be
like looking through the red lens.
11001100011100000010110000010000
Subnet masks are also used when we subdivide a network, creating subnets. More on that shortly.
In my example above, the host was assigned 10.25.31.46 as its address. If it uses a class A mask, that means it is on network 10.0.0.0. If it uses a class B mask, that means it is on network 10.25.0.0. If it uses a class C mask, that means it is on network 10.25.31.0.
Why is it important to know what the network address
is? Because we need to know whether we are sending to a machine on our own
network or some other network. If it is on another
network, we need to send the packets to a router, a
device whose job is to connect
two or more networks together. There may be more than one
router on our network. Whether there is or not, a standard piece of
information to give to a device is the address of its
default gateway, the router on its network that
gets all packets bound for other
networks.
Let's assume for a minute that the mask we gave to the host in the example above was 255.255.0.0. This means that the address of the network this host is on is 10.25.0.0. The text mentions that the default gateway on a network is usually given the first address, which would be 10.25.0.1 in this case.
By the way, why isn't the first address on that network 10.25.0.0? That's the network's address, which is never assigned to a host. One way to remember that is that all the host bits are set to 0, which would not identify any machine. Another address never assigned to a host is the broadcast address for the network. The broadcast address is computed by taking the network address and turning on all host bits (making them all 1s). How do I know which are the host bits? Go back and look at the subnet mask again. In this example the third and fourth bytes are the host bits. That makes this network's broadcast address 10.25.255.255,
Remember when I told you that some networks would work just fine using only OSI layers 1 and 2? That's because you only need to know MAC addresses to reach another machine on your own network. What if you don't know their MAC addresses? You can get MAC addresses for local network devices by sending a broadcast request for them using ARP, Address Resolution Protocol. The ARP broadcast is sent to all local network devices, but it asks for the MAC address of a device that has a specific IP address, typically the one in a message you are trying to pass on. That's what routers do when a message arrives for a device on the router's network.
Routers pass signals from one network to another. Routers use software addresses instead of hardware addresses. This makes them independent of protocols used at lower layers. Almost. Example: a transmission is sent from a host on network 10.25.0.0 to a host on network 10.28.0.0. It could travel along several different routes. What happens is like this:
Layer | Source info | Destination info |
Network layer | Sender's IP | Receiver's IP |
Data Link layer |
Layer | Source info | Destination info |
Network layer | Sender's IP | Receiver's IP |
Data Link layer | Sender's MAC | Default Gateway MAC |
Layer | Source info | Destination info |
Network layer | Sender's IP | Receiver's IP |
Data Link layer | Default Gateway MAC | Next router's MAC |
Layer | Source info | Destination info |
Network layer | Sender's IP | Receiver's IP |
Data Link layer | Final router's MAC | Receiver's MAC |
Back to subnet masks for a bit. They are useful to know, but
they are a bit bulky. There is another
way to pass along subnet mask information. What if I was told
that a message was meant for the address 10.28.33.44/16? What's the /16 part for? That's CIDR notation. Classless InterDomain Routing
information tells you the subnet mask that an address uses. /16 means that the network the
address refers to uses 16 network bits,
which is the same thing as saying it has a subnet mask of 255.255.0.0, which is the same as
11111111.11111111.00000000.00000000, but not nearly as boring, or
nearly as prone to error.
Class A | 255.0.0.0 | 11111111.00000000.00000000.00000000 | CIDR is /8 |
Class B | 255.255.0.0 | 11111111.11111111.00000000.00000000 | CIDR is /16 |
Class C | 255.255.255.0 | 11111111.11111111.11111111.00000000 | CIDR is /24 |
IP address ranges in
the various classes are assigned by the Internet Assigned Numbers
Authority (IANA). Ranges of
addresses assigned within a given class are called class licenses. Once upon a time,
this was done by one person. Now, IANA doles out licenses to Regional Internet Registries (RIRs), who assign them to ISPs (Internet Service Providers).
There is a question on tests about how many hosts you can have on a given network. Class C networks are a good example. Each class C network has 255 host addresses, but you can't assign the first address or the last address to a host. The first address has all host bits set to 0, which makes it the address of the network. The last address has all host bits set to 1, which makes it the IP broadcast address for that network. This is true within any class license: two addresses are not assignable to hosts.
Regarding class D and class E addresses: Class D and E addresses use portions of the fourth byte, as well as the first three, for network addressing. You may wish to know that only class A, B, and C addresses are for general use. Class D addresses are for multicasting (messages to groups of machines), and class E addresses are for experimental use. What's multicasting? When you send a message to all hosts on a network, that's a broadcast. When you send a message to one host on a network, that's a unicast. When you send a message to an address that is shared by several computers, that is a multicast. When they were frequently used, bridges on a network would be assigned their own addresses and a multicast address that they shared, so that they could easily send messages to each other. Routers do this as well.
In addition to not assigning a network address or a broadcast address to hosts, there are some special addresses that are reserved. The list below shows some specific addresses that have special meanings:
IANA has designated some address ranges as private or unregistered addresses. They are also called nonroutable addresses:
Class | Private Addresses Begin |
Private Addresses End |
Class A | 10.0.0.0 | 10.255.255.255 |
Class B | 172.16.0.0 | 172.31.255.255 |
Class C | 192.168.0.0 | 192.168.255.255 |
Any address beginning with a 10, for example, is assumed to be a private address. This is the format used in many networks, because it provides lots of addresses for hosts, and lots of room for subnets. (We will discuss this next.)
Within any organization, addresses in these ranges may be used without registering the addresses with IANA. Each address you use within your network must still be unique in your network. The problem is that there is no guarantee whatsoever that any address I use in my organization is not already in use in your organization, which makes direct networking between our networks unreliable, if not impossible.
The magic part: To access the Internet, traffic from a private address network passes through a router that acts as a proxy server, providing a shared connection with a registered address. That router has both a private address on your network, and a registered public address that lets it communicate with other networks. The proxy server shares its public address with the devices on your network, allowing them to send signals to other networks through it. The service that does this sharing of the address is called Network Address Translation (NAT).
Subnetting is the next topic of note. You create subnets by subdividing a network, breaking it into useful subdivisions. Subnetting works by borrowing bits from the host portion of an address, and using those bits to identify subsections of your network. The use of borrowed bits only works because of subnet masks.
By borrowing one bit, two subnets are theoretically
possible. However, as a general rule, subnet numbers using all 1s or
all 0s are not used, so borrowing one bit will usually not yield any
usable subnet addresses. This is why the traditional
formula for number of usable subnets is:
2N - 2 = number of subnets (where N is the
number of bits borrowed).
This limitation can be overcome with Cisco routers. The router
command to accomplish it is IP subnet-zero. This
command allows us to borrow one bit, so this would eliminate the need
to subtract 2 from the number of possible subnets. When you are given
an exam question, assume that the formula requires you to subtract 2 unless it
says otherwise, often in some obscure way.
Assume we borrow two bits. In the table below, you see what the new subnet mask would be for each of the three useful classes. Borrowed bits are shown in red in the resulting subnet mask numbers below:
Decimal Mask | Binary Mask | |
Class A | 255.192.0.0 | 11111111.11000000.00000000.00000000 |
Class B | 255.255.192.0 | 11111111.11111111.11000000.00000000 |
Class C | 255.255.255.192 | 11111111.11111111.11111111.11000000 |
Note that the subnet masks above do not match the standard masks we learned. The standard masks are called classful masks, because they match the intended use of class address schemes. The masks above are classless, because they do not match any network class.
Be aware that routers on the Internet only use the network bits of an address for routing. Routers connecting subnets within a network must use the network, subnet, and host bits for routing.
Regarding the topic of assigning subnet addresses:
You must strike a balance between how many subnets
you need and how many hosts you may put on each subnet. If the
network administrator has decided to borrow 3 bits from the host byte
for subnets on a class C network, this leaves 5 bits for host
addresses. To calculate how many usable subnets are obtained when
borrowing a specific number of bits, use this formula:
2N - 2 = number of subnets (where N is the
number of bits borrowed).
To calculate the number of hosts that are possible for
each subnet, you actually do the same calculation, except that for the
value of N, you use the TOTAL number of host bits still
available in the address.
For instance, if this were a class B network, and you were borrowing
3 bits from the third byte for subnet addresses, the remaining 5
bits in the third byte and the 8 bits in the fourth byte would
give you 13 as the value of N, with regard to host bits. Some
methods call the exponent M when calculating the possible hosts, but
the math is the same. DO subtract 2 in this case, because you cannot
have all host bits as 0s (this is the subnet address) or all host bits
as 1s (this is the broadcast address for the subnet).
For this example, the number of subnets would be 2N - 2 = 23
- 2 = 6
The number of hosts would be 2N - 2 = 213 -
2 = 8190
Assume we have a class C network whose address is 210.199.10.0. A class C network is born with the classful subnet mask of 255.255.255.0. If we borrow two bits from the host portion of the address, we make the subnet mask 255.255.255.192 (because 128 + 64 = 192).
The next step is to calculate the actual subnet addresses, that is, the addresses of the subnets themselves. The method is this:
255.255.255.192 | 11111111.11111111.11111111.11000000 |
210.199.10.0 | 11010010.11000111.00001010.00000000 |
210.199.10.64 | 11010010.11000111.00001010.01000000 |
210.199.10.128 | 11010010.11000111.00001010.10000000 |
210.199.10.192 | 11010010.11000111.00001010.11000000 |
These are not masks, nor are they host addresses. They
are the addresses of the possible subnetworks.
Subnet addresses using all 0s or all 1s in the subnet address
section are possible only if your routers support them. If you were
not to use that command, there would be two fewer possible subnets.
You must be able to calculate the number of possible subnets and possible hosts per subnet. You must also be able to state the addresses of the possible subnets. We have just covered this. You are further required to calculate the broadcast address of each subnet, and the range of host addresses on each.
The broadcast address of each subnet
is actually one less than the address of the
next subnet. For the last subnet, it is the broadcast address
of the network. For example, the broadcast address for subnet
210.199.10.0 above is 210.199.10.63. Why? Because this is the same
address with all host bits turned on (host bits shown in purple):
11010010.11000111.00001010.00111111
This is easily seen in binary, but also easily calculated in decimal.
So for each subnet, the broadcast address is easily obtained.
Subnet | Broadcast address |
210.199.10.0 | 210.199.10.63 |
210.199.10.64 | 210.199.10.127 |
210.199.10.128 | 210.199.10.191 |
210.199.10.192 | 210.199.10.255 |
Once you have this information, you can derive the host address range for each subnet: it is the range of numbers between the subnet address and its broadcast address.
Subnet | Broadcast address | Host address range |
210.199.10.0 | 210.199.10.63 | 210.199.10.1-62 |
210.199.10.64 | 210.199.10.127 | 210.199.10.65-126 |
210.199.10.128 | 210.199.10.191 | 210.199.10.129-190 |
210.199.10.192 | 210.199.10.255 | 210.199.10.193-254 |
An objective for the class is to understand supernetting. The text does not address the topic in this chapter. If you understand that subnetting is borrowing host bits to subdivide a network, you may find it easy to understand that supernetting is borrowing network bits to combine contiguous networks.
Supernets exist because of the growth of networks. The concept was invented to allow the use of larger numbers of hosts on a network than are allowed by standard IPv4 addressing rules. Another text states that supernets were invented to "extend the 32-bit IP address lifetime". This is also true.
All available class A and class B licenses for network addresses have been assigned. If you get a class C address, your network can only have about 254 hosts on it. This is not enough for some users.
Supernets combine multiple, sequential class C network addresses into single logical networks. The networks used will fall into the range 192 through 223. This is the opposite of subnetting, so it should be logical that you begin the opposite way: you borrow bits from the network portion of the IP address in order to use them as host bits. Every bit you borrow for use as a host bit doubles the theoretical number of hosts for your network. A phrase used to describe the combining of addresses into a supernet is address aggregation.
Supernets have rules that are different from subnets:
In an IP network, each device needs a unique IP address. Assignment of these addresses takes some planning. First, there are two major approaches:
Static assignment is summarized in the graphic on page
171. Hosts need to be given an IP
address, a subnet mask,
and a default gateway address.
It is a good idea to give them a DNS
server address. Note that this
address does not need to be on the same network as the other two
addresses. You may have to do this in a simulation for a certification
test, so you should know how to open the Windows Network and Sharing
Center, open the Status dialog of the Local Area Connection, open the
Properties of that connection, and the Properties of the IPv4 stack.
Dynamic Host Configuration Protocol (DHCP) service allows us to dynamically assign IP addresses to hosts on an IP network. You need to understand that, as far as IP is concerned, "host" means any device on the network. It can also set the subnet mask, the default gateway, and the DNS server. Three methods for assigning addresses:
It is good to know what you may see if a DHCP server fails. Automatic Private IP Addressing (APIPA) could be described as an error condition, if you are using DHCP on your Windows-based network. The first clue may be that a workstation cannot reach the Internet, because APIPA does not set a default gateway. What it does is to set a private IP address instead of one that matches your network scheme. It will be in the range 169.254.0.0 - 169.254.255.254. APIPA is meant to be a fallback method of assigning addresses. It will result in communications failures if some of your workstations have APIPA addresses, and others have DHCP assigned addresses. The two groups will essentially be on two different networks. APIPA addressing can only happen if DHCP fails, and if your workstations are configured to use APIPA as a fallback solution.
If a Windows workstation is configured for DHCP, but has an address in the APIPA range, try opening a command line interface and entering two commands:
ipconfig -release
ipconfig -renew
The first command tells the computer to let go of the lease it has (or thinks it has). The second command tells the computer to start a DHCP discover, offer, request, acknowledge sequence. These commands will have no effect if your DHCP server is not running, or is not reachable.
You shouls also know the Linux/UNIX/OS X version of these commands:
sudo ifconfig eth0 down
sudo ifconfig eth0 up
You may not need to type sudo.
Chapter 6
The
text material from TestOut begins with the idea that switches can be
either managed or unmanaged.
The
tables below describe a straight-through cable, a crossover cable, and
a rollover (rolled) cable.
Pin | Color | Color | Signal | Circuit | ||
---|---|---|---|---|---|---|
1 | Orange/White |
|
TX data + | Orange Circuit | ||
2 | Orange | Orange | TX data - | Orange Circuit | ||
3 | Green/White |
|
RX data + | Green Circuit | ||
4 | Blue | Blue | unused | Blue Circuit | ||
5 | Blue/White |
|
unused | Blue Circuit | ||
6 | Green | Green | RX data - | Green Circuit | ||
7 | Brown/White |
|
unused | Brown Circuit | ||
8 | Brown | Brown | unused | Brown Circuit |
Straight-through
(standard) cable If you are making a straight-through cable (to run from a workstation to a hub or switch) connect both ends as listed above and shown on the right. Insert the wires into the RJ-45 connector, then crimp with the crimping tool. (There will be no spaces between the wires when they are inserted into the RJ-45 connector. Space is used here to make the color pattern more readable.) |
End 1 | |
End 2 | ||
Crossover cable If making a crossover cable (to run directly from one NIC to another) swap the orange and green circuits on one end only: put orange/white on 3, orange on 6, green/white on 1, and green on 2. Insert the wires as shown on the right, then crimp. (This second configuration is actually EIA/TIA 568A. Some people use this arrangement on both ends of their straight-through cables, and that works fine. TestOut uses the 568A standard, but I typically see cables wire by the 568B standard instead.) |
End 1 | |
End 2 | ||
Rollover cable Now, for something completely different, if you are making a rollover cable (to run from a workstation to an older Cisco router), prepare the cable like a standard cable, both ends in the same configuration. Before crimping the second end, roll the cable (or the RJ-45 connector) over, 180 degrees. The will make pin 1 on one end of the cable connect to pin 8 on the other end, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5. If you don't want to think about rolling anything over, insert the wires as shown on the right, then crimp. This cable is used with an adapter to connect to a Cisco router's console port. |
End 1 | |
End 2 |
Crimping
is simple, but it is not easy until you have practiced doing it. The
TestOut material is correct, but incomplete. All wires in a cable are
crimped to a connector, not just select wires. The illustrations above
show how to load the wires into a connector better than the ones
online.
The material online discusses passwords for Cisco equipment. There are three kinds of passwords to know about. The console password is needed to log on to a switch or router by a direct connection to its console port. The VTY password is needed to connect to the device through a remote software like Telnet or SSH. The EXEC mode is used once you are actually connected to the management software of the device. It has two passwords, the enable password and the enable secret password. You should review the material on these passwords before doing the lab on them.
Switches need IP addresses if you are going to configure them to do Layer 3 switching. Know that you can manually configure and IP address for a switch, which will override and assignment by a DHCP server, and may potentially be in conflict with another DHCP assignment to another device.
TestOut discusses some material on VLANs, Virtual LANs are logical subdivisions of a network, and you can make them using switches. Creating VLANs can allow you to separate users who would otherwise be in the same LAN, without having to separate them with routers. You are going to use switches anyway, so this approach does not lead to greater expense. The idea is that you can control what VLAN each port on a switch connects to. Before you adopt this as a general principle, however, realize that not all LANs are locked down to this degree. It is sometimes good to let there be some flexibility, and to use other, simpler means to keep intruders off your network.
Review the commands to set up and configure VLANs on a switch. You should know about two kinds of links (ports) on switches in VLAN networks:
As you might imagine, frames in a VLAN environment need to carry information about which VLAN the frame is meant for. Otherwise the switches could not decide whether to pass the frame to the next switch, or to a host on that switch. This information is called a frame tag, a VLAN ID, or acolor. In the image below, I have used colors to illustrate the idea. The two boxes are switches. Each host is using an access link to its switch, and I have indicated two VLANs with light blue and light red patch cables. The green line between the two switches symbolizes a trunk link between them.
If a frame is sent from the host on the upper left to the host just to the right, that frame is tagged as being on the light red VLAN. (Both sender and receiver are on the light red VLAN, and are connected to the blue switch.) The blue switch receives the frame, and notes that it is for a host connected to it, on the same VLAN as the sender. The VLAN information is stripped off, and the frame is delivered to the addressee.
If the same host sends a frame to the host at the upper right of the image, it is still sending to another host on the light red VLAN. However, when the blue switch receives the frame, it notes that the addressee is not connected to it. The frame is sent across the trunk link to the red switch, and the VLAN tag is left on the frame. The red switch receives the frame, and notes that it is addressed to a host connected to it with an access link. The switch confirms that the frame is for a host on the same VLAN as the sender, the VLAN tag is removed, and the red switch delivers the frame to the addressee.
TestOut mentions two trunking protocols that you may
encounter. Neither
is proprietary:
Under VTP, switches can operate in three modes:
In a large network, frames may find redundant connections to various parts of the network, which may lead to those frames being passed around the network forever. This kind of a problem is called a loop, and it is typically called a bridging loop or a switching loop depending on the kind of equipment that is creating the problem.
To avoid the bridging/switching loop problem, IEEE (Institute of Electrical and Electronics Engineers) standard 802.1d gives us the spanning tree protocol. This says that in each redundant pair of bridges, one is the designated bridge, and the other is the backup bridge. (For the purposes of this discussion, assume switches and bridges are equivalent.) Bridges communicate with bridge protocol data units (BPDUs) to determine which is the designated bridge, and when the backup bridge must take over. The network should be diagrammed like a tree. One bridge is chosen to be the root bridge, which sends configuration messages to designated bridges.
The root bridge is chosen by its bridge ID, which is an eight byte (16 hex digits) number composed of two bytes assigned by the administrator and allsix bytes
from the MAC address of the port adapter (NIC). The portion assignable
by the administrator is referred to in the text as the priority value
of that bridge. The default priority value for all devices using Cisco
STP is 32,768. This value can be set with the command:
spanning tree vlan number priority number
The first number is the number of the virtual LAN that the switch represents. The second number is
the number assigned as the priority for that switch. The text provides
an example of this command which shows that the priority value must be
a multiple of 4096. Setting one switch to this value would make its bridge the lowest on your network, making it the root bridge.
The bridge in the tree with the lowest bridge ID number is the root bridge. Bridges elect a root bridge by sending packets to all ports proclaiming themselves to be the root bridge. If packets are received from bridges with lower IDs, each bridge will acknowledge by changing its opinion, and sending packets that identify the new candidate as the root bridge. (Note that these packets contain the address for the bridge sending the packets in one field, and the address of the bridge it believes to be the root bridge in another field.) A root bridge will continue to send BPDUs every two seconds, by the IEEE standard, even after the election is over. One of our texts compares BPDUs to hello packets, which makes it clearer why they continue as long as the device is running.
TestOut also discusses a Cisco method called EtherChannel
which uses either of two protocols (PAgP or LACP) to connect several
ports of a switch to matching ports of another switch, which allows
those switches to pass frames between them using all those ports,
increasing effective bandwidth.
Review the troubleshooting material in this section as well, to know what to expect from common switching problems.
Week 3 Assignment: Labs for Chapters
5
and 6 (and all the chapters after that)
|