In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Building a local area network and configuring an exchange
Today we're going to talk about the configuration of switches in a local area network. First of all, make a topology diagram.
Experimental requirements:
1. Make a topology diagram in the packet tracer according to the requirements shown in the figure, and assign the required IP address to each PC.
Let's look at the graph below:
From left to right PC IP
Pc1: 192.168.1.1 pc2: 192.168.1.2
Pc3: 192.168.1.3 pc4: 192.168.1.4
Pc5: 192.168.1.5 pc6: 192.168.1.6
Pc7: 192.168.1.7 pc8: 192.168.1.8
switch IP
Swch3 192.168.1.111
Swch4 192.168.1.222
The subnet mask above is 255.255.255.0
2. Verify the switch address learning, forwarding and filtering mechanisms and explain how they work (packet forwarding screenshots are required and illustrated in conjunction with the switch mac address table)
IP is configured. Let's take a look at address learning and forwarding and filtering.
Address learning is when the source mac address of an incoming frame is associated with the incoming port
Forwarding is when the switch receives the data frame. Check the MAC address of the frame. See if this address is the MAC address of the switch. if yes, carry out frame checking operation. If it's a complete frame, take it. And decapsulate the data packet, handed over to the upper processing. Not your MAC address. Then check the CAM table, if there is a destination address, send it to the corresponding destination port. If there is no destination address in the CAM table, forward it from other ports of the switch in the form of flooding. It is sent to every PC connected to this switch. Then each pc receives it and checks to see if it's its own. Not your own throwaway. The destination address is your own. a checksum operation is performed. Then unpack the data frame and pass the data to the upper layer for processing. It is essentially returning data to the switch. This process is reversed from the original. The source address becomes the destination address and the destination address becomes the source address. Then send, the switch continues to learn the address, the initial destination address is also associated with the port at this time, and then the switch learns two addresses stored in the MAC table, one is the source address and the other is the destination address, and then sends it to the initial source address. At this time, the switch will not send the form of pan-macro, and send it directly to the pc with the source mac address.
Filtering is actually a known destination address and source address, sent directly, not in the form of flooding sent to all PCs.
Here's a graphical demonstration.
address learning
Use PC1 to Ping PC8
First step: ping PC8
Prepare to send packet, source mac address 192.168.1.1, destination address 192.168.1.8
Send data to switch 2. switch 2 learn that address, saves the source address 192.168.1.1 in the CAM table, connect it with port 2 of the switch, and forwards it,
Switch address learning. We know the source address of PC1. Do not know the destination address, so forward in the form of flooding, as shown in the following figure
PC2--PC7 on the left are not, they have been discarded, as shown in the following figure.
Then PC8 finds that this data is its own, decapsulates it, hands it over to the upper layer for processing, and continues forwarding. At this time, the source MAC address is 192.168.1.8 and the destination address is 192.168.1.1. Switch 3 learns the address of PC8 into the CAM table.
Then forward, because the destination address and source address are already known, this data is a known unicast frame, so it will not be sent in the form of flooding. to switch 2, because switch 2 has the address 192.168.1.1,
Then forward, the switch sends it directly to pc1, not to other pcs
Then take a look. Forwarding is the process of sending by the switch and PC8. Filtering is to know the purpose and not send it in the form of flooding. The specified sending file filters out other addresses and does not send it to other PCs.
filtration of
Send to switch 3, not to other PCs
Switch 3 knows which port the destination address is on and sends it directly to pc8 instead of pc5-7.
See below. Return forwarding is all single-wire transmission.
All right, let's configure the switch
Configure host names, passwords, interface speeds, duplex and labels on both switches, and assign IP addresses to the switches.
Practice switching between modes, practicing using help functions, and familiarizing yourself with the ios system environment
View configuration files, view interface information, and briefly view interface IP information.
Click Switch 2 and this screen appears.
The basic configuration is as follows:
Next, let's take a detailed look at how to modify the hostname, password, interface speed, IP, etc.
The following configuration console line, set login password, close idle timeout, this login password is the password required for local login.
Now set the password for remote login.
Please try PC1 below.
Check below to see if the password is set successfully. The lower right figure shows that the password is set successfully.
Here's how to set switch IP and interface speed, and duplex
Then configure the interface speed and duplex of several pc machines
All right, let's check the configuration of switch 2.
Next, configure Switch 3.
Modify host name configure login password,
Configure the telnet password to enter vty line mode configuration.
Configuration interface speed machine pun
Let's look at the configuration of Switch 3.
All right, the PC is configured. The switches are also configured. Done.
This is simple local area network switch configuration information.
In the real world, there are also situations where switches do not need to be configured. Direct use of the dummy switch.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.