< Return to Video

Network Switching Overview - N10-008 CompTIA Network+ : 2.3

  • 0:02 - 0:05
    The role of a switch
    is to forward traffic
  • 0:05 - 0:07
    based on the
    destination MAC address
  • 0:07 - 0:09
    inside of an ethernet frame.
  • 0:09 - 0:13
    This means the switch needs to
    keep an ongoing and active list
  • 0:13 - 0:16
    of all of the devices
    it happens to know about
  • 0:16 - 0:19
    based on the MAC address
    of those devices.
  • 0:19 - 0:22
    The switch builds this list
    by looking at inbound traffic
  • 0:22 - 0:25
    and examining the
    source MAC address,
  • 0:25 - 0:26
    and tying that source MAC address
  • 0:26 - 0:29
    to a specific physical interface.
  • 0:29 - 0:31
    And for switches
    that are configured
  • 0:31 - 0:33
    with spanning tree
    protocol, or STP,
  • 0:33 - 0:36
    they're also responsible for
    ensuring that a loop does not
  • 0:36 - 0:39
    occur on the switch network.
  • 0:39 - 0:41
    The process of sending traffic
    through a switch network
  • 0:41 - 0:44
    is the same for every ethernet frame.
  • 0:44 - 0:46
    Let's take this
    scenario where Sam,
  • 0:46 - 0:48
    and you can see the MAC
    address for Sam's device,
  • 0:48 - 0:51
    is sending information
    to the SGC server,
  • 0:51 - 0:57
    and you can see the SGC server's
    MAC address is 1000:5555:5555.
  • 0:57 - 1:00
    We have a switch in the
    middle, and all of our devices
  • 1:00 - 1:04
    are plugged into the switch,
    including Sam and the SGC server.
  • 1:04 - 1:07
    Inside of the switch
    is a MAC address table.
  • 1:07 - 1:10
    It lists all the MAC
    addresses and the interfaces
  • 1:10 - 1:12
    where those addresses are connected.
  • 1:12 - 1:16
    When Sam sends traffic to the
    switch with the destination MAC
  • 1:16 - 1:20
    address of
    1000:5555:5555, the switch
  • 1:20 - 1:22
    looks up that address in its table,
  • 1:22 - 1:26
    and if one matches one of the
    entries inside of that table,
  • 1:26 - 1:30
    it identifies the output
    interface for that traffic
  • 1:30 - 1:33
    and sends it down that
    interface to the server
  • 1:33 - 1:35
    that has that MAC address.
  • 1:35 - 1:39
    If you have multiple switches,
    it's exactly the same process,
  • 1:39 - 1:42
    except it occurs twice,
    once on the first switch
  • 1:42 - 1:43
    and once on the second.
  • 1:43 - 1:45
    You can see this is the
    same configuration where
  • 1:45 - 1:48
    Sam is communicating
    to the SGC server,
  • 1:48 - 1:51
    but there is a switch A
    on one side of the network,
  • 1:51 - 1:53
    and a switch B on the other.
  • 1:53 - 1:56
    Switch A has a MAC address table
    specific to the devices plugged
  • 1:56 - 1:59
    into Switch A, and Switch B
    has a completely different
  • 1:59 - 2:02
    and unique, MAC address table.
  • 2:02 - 2:05
    Sam is going to send traffic
    again to the SGC server.
  • 2:05 - 2:11
    It knows that it's sending this traffic
    to MAC address 1000:5555:5555.
  • 2:11 - 2:13
    As that traffic hits Switch A, Switch A
  • 2:13 - 2:15
    refers to its own MAC address table
  • 2:15 - 2:18
    and knows that that particular
    MAC address is located
  • 2:18 - 2:22
    on an interface that is
    a gigabit 0/2 interface,
  • 2:22 - 2:25
    and so it sends that
    traffic out that interface
  • 2:25 - 2:27
    to the next switch.
  • 2:27 - 2:29
    On that switch, the
    same lookup process
  • 2:29 - 2:32
    occurs, where Switch B will
    examine the destination
  • 2:32 - 2:35
    MAC address, determine that
    that MAC address is associated
  • 2:35 - 2:38
    with the interface fast ethernet 0/5,
  • 2:38 - 2:43
    and sends that traffic down that
    interface to the destination device.
  • 2:43 - 2:45
    You can see that building
    that MAC address table
  • 2:45 - 2:47
    is extremely important.
  • 2:47 - 2:49
    If we didn't have the MAC
    address table, the switch
  • 2:49 - 2:51
    would not know where to send that traffic.
  • 2:51 - 2:53
    In order to build
    that table, the switch
  • 2:53 - 2:56
    is going to examine
    all incoming traffic
  • 2:56 - 2:59
    and make a note of the
    source MAC address.
  • 2:59 - 3:01
    It will then associate
    that source MAC address
  • 3:01 - 3:04
    to a specific interface
    on the switch.
  • 3:04 - 3:07
    So let's take a scenario where
    we've just powered up a switch,
  • 3:07 - 3:09
    it has nothing in the
    MAC address table,
  • 3:09 - 3:12
    and we're going to send
    information from Sam's computer
  • 3:12 - 3:13
    to the SGC server.
  • 3:13 - 3:16
    Sam's going to send that
    traffic to the switch,
  • 3:16 - 3:19
    the switch is going to examine
    the source MAC address,
  • 3:19 - 3:24
    and in the case of Sam's
    device, that's 1000:1111:1111.
  • 3:24 - 3:27
    It will then put that MAC
    address into the MAC address
  • 3:27 - 3:30
    table, and it will
    identify the interface
  • 3:30 - 3:34
    where that information was received.
    In this case, interface F0/1.
  • 3:34 - 3:38
    That information is then
    sent on to the SGC server,
  • 3:38 - 3:42
    and then when the SGC server
    responds to that communication,
  • 3:42 - 3:44
    it has a different
    source MAC address,
  • 3:44 - 3:47
    and the process is repeated.
    Except in this case,
  • 3:47 - 3:50
    the switch identifies
    that MAC address is
  • 3:50 - 3:53
    coming from fast ethernet 0/5.
  • 3:53 - 3:57
    In that previous example, we
    were sending information to the SGC
  • 3:57 - 4:00
    server, but the SGC
    server's MAC address
  • 4:00 - 4:02
    was not yet in the switch.
  • 4:02 - 4:05
    If the switch does not have
    an entry for that MAC address
  • 4:05 - 4:07
    in the table, then it
    will send that information
  • 4:07 - 4:09
    to everyone on the network.
  • 4:09 - 4:12
    For example, we'll take Sam
    sending this information
  • 4:12 - 4:13
    to the SGC server.
  • 4:13 - 4:16
    You can see in this case,
    the MAC address table
  • 4:16 - 4:18
    has nothing inside
    of it at the moment.
  • 4:18 - 4:21
    The MAC address table will be
    updated with the source MAC
  • 4:21 - 4:24
    address because Sam did send
    that information to the switch,
  • 4:24 - 4:28
    and it did associate that
    with fast ethernet 0/1,
  • 4:28 - 4:30
    But we're sending this information
  • 4:30 - 4:32
    to a destination MAC
    address that's not currently
  • 4:32 - 4:34
    listed in the switch's table.
  • 4:34 - 4:38
    In that case, it's going to now
    send that traffic to everybody
  • 4:38 - 4:41
    on the network, and
    effectively flood
  • 4:41 - 4:45
    that traffic to all of the
    other interfaces on that switch.
  • 4:45 - 4:47
    If you're familiar with
    the operation of a hub,
  • 4:47 - 4:50
    then you'll notice that this
    is very similar to the way
  • 4:50 - 4:51
    a hub works normally.
  • 4:51 - 4:54
    But this traffic being
    sent to every device
  • 4:54 - 4:57
    ensures that at least
    the destination will
  • 4:57 - 4:58
    receive this particular frame.
  • 4:58 - 5:02
    And in this example, you can see
    that the SGC server did indeed
  • 5:02 - 5:05
    receive that frame, and
    when the SGC server responds
  • 5:05 - 5:08
    back to Sam with a response,
    the source MAC address
  • 5:08 - 5:10
    will be identified by the switch.
  • 5:10 - 5:13
    That information will be added
    to the MAC address table,
  • 5:13 - 5:16
    and the switch will no longer
    need to flood the traffic
  • 5:16 - 5:20
    across all interfaces if communication
    is occurring between Sam
  • 5:20 - 5:23
    and the SGC server again.
  • 5:23 - 5:27
    On an IPv4 network,
    devices are able to obtain
  • 5:27 - 5:31
    the MAC address of a remote
    device using the ARP protocol.
  • 5:31 - 5:34
    ARP stands for
    Address Resolution Protocol.
  • 5:34 - 5:38
    ARP will query the network
    for a specific IP address,
  • 5:38 - 5:42
    and that IP address will respond
    back with its MAC address.
  • 5:42 - 5:44
    Your local computer keeps
    a cache of all of the MAC
  • 5:44 - 5:46
    addresses that it currently knows.
  • 5:46 - 5:49
    If you wanted to look at
    the ARP address table on
  • 5:49 - 5:53
    your local machine, you
    can use the command arp-a.
  • 5:53 - 5:56
    Let's run the arp-a
    command on my machine.
  • 5:56 - 6:01
    You can see that I have a number
    of local devices on the 10.1.10 network.
  • 6:01 - 6:03
    You can see them all listed here.
  • 6:03 - 6:06
    There's also some other
    devices on my local network,
  • 6:06 - 6:11
    including some APIPA addresses
    and some multicast addresses.
  • 6:11 - 6:14
    Let's say that I want to
    communicate to a switch
  • 6:14 - 6:15
    that I have on my network.
  • 6:15 - 6:19
    That switch's IP
    address is 10.1.10.210,
  • 6:19 - 6:21
    and you can see in
    my ARP address table,
  • 6:21 - 6:24
    I don't currently have
    that address in the list.
  • 6:24 - 6:29
    So I'm going to perform a ping,
    and I'm gonna ping 10.1.10.210,
  • 6:29 - 6:33
    and I'll get some responses back
    from that particular device.
  • 6:33 - 6:37
    If I now look at my ARP
    address table with an arp-a,
  • 6:37 - 6:42
    you will see that I have a
    new entry for 10.1.10.210,
  • 6:42 - 6:47
    and you'll see that I have a MAC
    address associated with that IP address.
  • 6:47 - 6:50
    When I performed that ping,
    the first thing that occurred
  • 6:50 - 6:52
    was an ARP request
    made to the network
  • 6:52 - 6:54
    to try to find that
    particular device,
  • 6:54 - 6:56
    and I received an
    ARP response, which
  • 6:56 - 7:00
    then allowed me to send traffic
    to that device directly.
  • 7:00 - 7:03
    I captured the ARP
    communication using Wireshark,
  • 7:03 - 7:07
    which is a packet analyzer, and
    you can download and install
  • 7:07 - 7:10
    Wireshark on your own
    machine to see not only ARPs,
  • 7:10 - 7:13
    but all of the network
    traffic on your system.
  • 7:13 - 7:16
    The first frame that I'm
    sending is from my device,
  • 7:16 - 7:18
    and it's sending it
    out as a broadcast,
  • 7:18 - 7:22
    and the ARP itself is
    requesting the MAC address
  • 7:22 - 7:26
    for who has 10.1.10.210.
  • 7:26 - 7:28
    You can see the
    details of the ARP
  • 7:28 - 7:31
    that are located further
    down in the detail.
  • 7:31 - 7:33
    You can see the
    sender MAC address,
  • 7:33 - 7:34
    which is my Apple computer.
  • 7:34 - 7:39
    You can see my local IP
    address, which is 10.1.10.249.
  • 7:39 - 7:41
    You can see the
    target MAC address,
  • 7:41 - 7:44
    right now we don't know what
    the MAC address is of the target,
  • 7:44 - 7:47
    so it's all zeros, and you can
    see that I'm requesting the MAC
  • 7:47 - 7:53
    address for the device that has
    the IP address of 10.1.10.210.
  • 7:53 - 7:56
    We very quickly get a response
    from this device, which
  • 7:56 - 7:59
    happens to be a Cisco
    switch, and the response
  • 7:59 - 8:02
    from the MAC address is
    from the Cisco MAC address
  • 8:02 - 8:06
    with the sender's IP address,
    which is 10.1.10.210,
  • 8:06 - 8:08
    and the target is the response back
  • 8:08 - 8:12
    to my Apple computer
    and my local IP address.
  • 8:12 - 8:16
    You can see in the response
    that it filled in the sender MAC address,
  • 8:16 - 8:19
    so instead of being all zeros,
    I see this long MAC address
  • 8:19 - 8:21
    associated with this IP.
  • 8:21 - 8:24
    And if you remember
    the IP address and MAC
  • 8:24 - 8:26
    address in my
    local ARP cache, it
  • 8:26 - 8:32
    matches both of those that were
    received by this ARP response.
  • 8:32 - 8:35
    That ARP process is what
    we use an IP version
  • 8:35 - 8:37
    4 to be able to
    identify a MAC address,
  • 8:37 - 8:40
    but we don't have
    broadcasts in IPv6.
  • 8:40 - 8:44
    There's also a different
    process for IPv6
  • 8:44 - 8:48
    to identify the MAC addresses of
    devices on your local network.
  • 8:48 - 8:52
    In IPv6, we use in NDP,
    which is Neighbor Discovery
  • 8:52 - 8:57
    Protocol, using multicast,
    specifically with ICMPv6.
  • 8:57 - 9:00
    This replaces the ARP function
    that we would commonly
  • 9:00 - 9:04
    see in IPv4 with
    this Neighbor MAC Discovery.
  • 9:04 - 9:07
    This can also be
    used in conjunction
  • 9:07 - 9:11
    with SLAAC, which is Stateless
    Address Autoconfiguration,
  • 9:11 - 9:14
    which allows the system to
    automatically configure itself
  • 9:14 - 9:18
    with an IP address without
    using a DHCP server.
  • 9:18 - 9:20
    Neighbor Discovery Protocol is also
  • 9:20 - 9:25
    used to identify any
    duplicate addresses using DAD,
  • 9:25 - 9:27
    or Duplicate Address Detection.
  • 9:27 - 9:29
    If you wanted to see
    the conversation that
  • 9:29 - 9:33
    takes place in IPv6,
    instead of using ARP,
  • 9:33 - 9:38
    we send a neighbor solicitation,
    or NS, on a multicast address,
  • 9:38 - 9:44
    and that is the IPv6 multicast that's
    used for this neighbor solicitation frame.
  • 9:44 - 9:47
    The response is sent back from
    the other side with a neighbor
  • 9:47 - 9:50
    advertisement, or NA, and that NA
  • 9:50 - 9:53
    includes the MAC address
    of that local device.
  • 9:53 - 9:56
    Although the protocols and the
    method is slightly different,
  • 9:56 - 10:01
    you can see that the process is very
    similar to the one that occurs in IPv4.
  • 10:01 - 10:04
    Not only are we sending
    data over ethernet networks,
  • 10:04 - 10:07
    we can also send power
    over those networks
  • 10:07 - 10:12
    at the same time using
    Power over Ethernet, or POE.
  • 10:12 - 10:16
    This allows us to connect
    devices such as access points,
  • 10:16 - 10:19
    voiceover IP phones,
    and other devices
  • 10:19 - 10:21
    by simply plugging in
    an ethernet connection.
  • 10:21 - 10:24
    You don't have to then
    plug in a separate power
  • 10:24 - 10:26
    connection for that device.
  • 10:26 - 10:28
    That power is coming
    from either the switch,
  • 10:28 - 10:31
    or another device that's
    connected into the network.
  • 10:31 - 10:35
    If it's coming from the switch,
    we call that an Endspan,
  • 10:35 - 10:38
    or if it's coming from an injector,
    like the one you see here,
  • 10:38 - 10:41
    which sits in the middle of an
    existing ethernet connection,
  • 10:41 - 10:44
    we refer to that as a Midspan.
  • 10:44 - 10:47
    If your ethernet network
    is a 10 or 100 megabit
  • 10:47 - 10:51
    per second connection, then you
    have some extra wires inside
  • 10:51 - 10:53
    of that cable that you
    could use for power.
  • 10:53 - 10:56
    We refer to that as Mode
    B power over ethernet,
  • 10:56 - 10:59
    where you're sending
    power on the spare pairs.
  • 10:59 - 11:01
    But if you're using
    gigabit connections,
  • 11:01 - 11:05
    you're using all of those wires
    for your gigabit ethernet data.
  • 11:05 - 11:07
    And in those cases,
    we're using Mode A,
  • 11:07 - 11:11
    where we're sending power
    and data over the same wire.
  • 11:11 - 11:13
    You'll find there are a
    number of different power
  • 11:13 - 11:16
    over ethernet standards,
    and these standards
  • 11:16 - 11:18
    are being added to and
    changed all the time.
  • 11:18 - 11:24
    Two very common standards are
    the IEEE 802.3af from 2003.
  • 11:24 - 11:28
    We refer to that as the
    original POE standard, which
  • 11:28 - 11:32
    provides 15.4 watts of
    direct current power,
  • 11:32 - 11:35
    with a maximum current
    of 350 milliamps.
  • 11:35 - 11:38
    An update to that standard
    is what we call POE+.
  • 11:38 - 11:43
    This was updated
    with 802.3at in 2009.
  • 11:43 - 11:48
    This also has been incorporated
    into the existing 802.3 ethernet standard.
  • 11:48 - 11:51
    This provides a bit more
    power on the ethernet network,
  • 11:51 - 11:57
    25.5 watts of DC power, with a
    maximum current of 600 milliamps.
  • 11:57 - 11:59
    There are other power
    over ethernet standards,
  • 11:59 - 12:01
    and these are being
    updated all the time,
  • 12:01 - 12:05
    so make sure you check with the
    ethernet standards from IEEE
  • 12:05 - 12:10
    to know exactly what options
    may be available for you.
Title:
Network Switching Overview - N10-008 CompTIA Network+ : 2.3
Description:

more » « less
Video Language:
English
Duration:
12:19

English subtitles

Revisions Compare revisions