SlideShare ist ein Scribd-Unternehmen logo
1 von 26
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 1: Introduction
to Switched Networks
Routing and Switching
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1.0 Introduction
1.1 LAN Design
1.2 Switched Environment
1.3 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Objectives
Upon completion of this chapter, you will be able to:
 Describe convergence of data, voice, and video in the context of
switched networks.
 Describe a switched network in a small-to-medium-sized business.
 Explain the process of frame forwarding in a switched network.
 Compare a collision domain to a broadcast domain.
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Growing Complexity of Networks
 Our digital world is
changing.
 Information must
be accessed from
anywhere in the
world.
 Networks must be
secure, reliable,
and highly
available.
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Elements of a Converged Network
 Collaboration is a
requirement.
 To support collaboration,
networks employ
converged solutions.
 Data services include
voice systems, IP phones,
voice gateways, video
support, and video
conferencing.
 Call control, voice
messaging, mobility, and
automated attendant are
also common features.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Benefits of a Converged Network
 Multiple types of traffic;
only one network to
manage.
 Substantial savings over
installation and
management of
separate voice, video,
and data networks.
 Integrates IT
management.
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Borderless Switched Networks
 The Cisco Borderless Network is a network architecture that
allows organizations to connect anyone, anywhere, anytime,
and on any device securely, reliably, and seamlessly.
 Cisco Borderless Network is designed to address IT and
business challenges, such as supporting the converged
network and changing work patterns.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Hierarchy in the Borderless Switched
Network
Borderless
switched network
design guidelines
are built upon the
following principles:
 Hierarchical
 Modularity
 Resiliency
 Flexibility
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Core, Distribution, Access
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switched Networks
Role of Switched Networks
 Switching technologies are crucial to network design.
 Switching allow traffic to be sent only where it is needed in most
cases, using fast methods.
 A switched LAN:
 Allows more flexibility
 Allows more traffic management
 Supports quality of service, additional security, wireless, IP
telephony, and mobility services
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switched Networks
Form Factor
Fixed
Platform
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switched Networks
Form Factor (cont.)
Modular
Platform
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switched Networks
Form Factor (cont.)
Stackable
Platform
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Switching as a General Concept
 A switch makes a decision based on ingress and a destination
port.
 A LAN switch keeps a table that it uses to determine how to
forward traffic through the switch.
 Cisco LAN switches forward Ethernet frames based on the
destination MAC address of the frames.
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Dynamically Populating a Switch MAC
Address Table
 A switch must first learn which devices exist on each port before it
can transmit a frame.
 It builds a table called a MAC address or content addressable
memory (CAM) table.
 The mapping device <-> port is stored in the CAM table.
 CAM is a special type of memory used in high-speed searching
applications.
 The information in the MAC address table used to send frames.
 When a switch receives an incoming frame with a MAC address that
is not found in the CAM table, it floods it to all ports, but the one that
received the frame.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Switch Forwarding Methods
Add a header
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Store-and-Forward Switching
 Allows the switch to:
 Check for errors (via FCS
check)
 Perform automatic
buffering
 Slower forwarding process
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Store-and-Forward Switching (cont.)
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Cut-Through Switching
 Allows the switch to start forwarding in about 10 microseconds
 No FCS check
 No automatic buffering
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Forwarding
Cut-Through Switching (cont.)
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Domains
Collision Domains
A collision domain is the segment where devices must compete to
communicate.
 All ports of a hub belong to the same collision domain.
 Every port of a switch is a collision domain on its own.
 A switch break the segment into smaller collision domains, easing
device competition.
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Domains
Broadcast Domains
A broadcast domain is the extend of the network where a broadcast
frame can be heard.
 Switches forward broadcast frames to all ports; therefore, switches
do not break broadcast domains.
 All ports of a switch, with its default configuration, belong to the
same broadcast domain.
 If two or more switches are connected, broadcasts are forwarded to
all ports of all switches, except for the port that originally received
the broadcast.
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Domains
Alleviating Network Congestion
Switches help alleviating network congestion by:
 Facilitating the segmentation of a LAN into separate collision
domains
 Providing full-duplex communication between devices
 Taking advantage of their high-port density
 Buffering large frames
 Employing high-speed ports
 Taking advantage of their fast internal switching process
 Having a low, per-port cost
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Summary
In this chapter, you learned:
 The trend in networks is towards convergence using a single set of
wires and devices to handle voice, video, and data transmission.
 There has been a dramatic shift in the way businesses operate.
 There are no physical offices or geographic boundaries constraints.
Resources must now be seamlessly available anytime and
anywhere.
 The Cisco Borderless Network architecture enables different
elements, from access switches to wireless access points, to work
together and allow users to access resources from any place at any
time.
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Summary (cont.)
 The traditional, three-layer hierarchical design model divides the
network into core, distribution, and access layers, and allows each
portion of the network to be optimized for specific functionality.
 It provides modularity, resiliency, and flexibility, which provides a
foundation that allows network designers to overlay security,
mobility, and unified communication features.
 Switches use either store-and-forward or cut-through switching.
 Every port on a switch forms a separate collision domain allowing for
extremely high-speed, full-duplex communication.
 Switch ports do not block broadcasts and connecting switches can
extend the size of the broadcast domain, often resulting in degraded
network performance.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Weitere ähnliche Inhalte

Was ist angesagt?

CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingVuz Dở Hơi
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkVuz Dở Hơi
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingVuz Dở Hơi
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11Nil Menon
 
Cisco router basic
Cisco router basicCisco router basic
Cisco router basicTapan Khilar
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 

Was ist angesagt? (20)

CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the network
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
Cisco router basic
Cisco router basicCisco router basic
Cisco router basic
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 

Andere mochten auch

CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
Digital Transmission Fundamentals
Digital Transmission FundamentalsDigital Transmission Fundamentals
Digital Transmission FundamentalsAisu
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSAshita Agrawal
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionWayne Jones Jnr
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network DevicesDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 

Andere mochten auch (20)

CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Digital Transmission Fundamentals
Digital Transmission FundamentalsDigital Transmission Fundamentals
Digital Transmission Fundamentals
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMS
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 

Ähnlich wie Introduction to Switched Networks

CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
 
introduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERintroduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERhasby if
 
CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4Chaing Ravuth
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4Waqas Ahmed Nawaz
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalCamTESOL2015
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxRahafKhalid14
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxParthaDas754073
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayVuz Dở Hơi
 
Cn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalCn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalLeoo Romo
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - EthernetYaser Rahmati
 
Chapter 5 : Ethernet
Chapter 5 : EthernetChapter 5 : Ethernet
Chapter 5 : Ethernetteknetir
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetVuz Dở Hơi
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19eyad alaa
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1Chaing Ravuth
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Hamza Malik
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1Waqas Ahmed Nawaz
 

Ähnlich wie Introduction to Switched Networks (20)

CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
introduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERintroduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTER
 
CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptx
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
Cn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalCn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_final
 
CCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptxCCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptx
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - Ethernet
 
Chapter 5 : Ethernet
Chapter 5 : EthernetChapter 5 : Ethernet
Chapter 5 : Ethernet
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
 

Mehr von Vuz Dở Hơi

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Vuz Dở Hơi
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Vuz Dở Hơi
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionVuz Dở Hơi
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Vuz Dở Hơi
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Vuz Dở Hơi
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Vuz Dở Hơi
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Vuz Dở Hơi
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Vuz Dở Hơi
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Vuz Dở Hơi
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Vuz Dở Hơi
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Vuz Dở Hơi
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Vuz Dở Hơi
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationVuz Dở Hơi
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceVuz Dở Hơi
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Vuz Dở Hơi
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Vuz Dở Hơi
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingVuz Dở Hơi
 

Mehr von Vuz Dở Hơi (20)

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 

Introduction to Switched Networks

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Switched Networks Routing and Switching
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1 1.0 Introduction 1.1 LAN Design 1.2 Switched Environment 1.3 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Objectives Upon completion of this chapter, you will be able to:  Describe convergence of data, voice, and video in the context of switched networks.  Describe a switched network in a small-to-medium-sized business.  Explain the process of frame forwarding in a switched network.  Compare a collision domain to a broadcast domain.
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Growing Complexity of Networks  Our digital world is changing.  Information must be accessed from anywhere in the world.  Networks must be secure, reliable, and highly available.
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Elements of a Converged Network  Collaboration is a requirement.  To support collaboration, networks employ converged solutions.  Data services include voice systems, IP phones, voice gateways, video support, and video conferencing.  Call control, voice messaging, mobility, and automated attendant are also common features.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Benefits of a Converged Network  Multiple types of traffic; only one network to manage.  Substantial savings over installation and management of separate voice, video, and data networks.  Integrates IT management.
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Borderless Switched Networks  The Cisco Borderless Network is a network architecture that allows organizations to connect anyone, anywhere, anytime, and on any device securely, reliably, and seamlessly.  Cisco Borderless Network is designed to address IT and business challenges, such as supporting the converged network and changing work patterns.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Hierarchy in the Borderless Switched Network Borderless switched network design guidelines are built upon the following principles:  Hierarchical  Modularity  Resiliency  Flexibility
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Core, Distribution, Access
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switched Networks Role of Switched Networks  Switching technologies are crucial to network design.  Switching allow traffic to be sent only where it is needed in most cases, using fast methods.  A switched LAN:  Allows more flexibility  Allows more traffic management  Supports quality of service, additional security, wireless, IP telephony, and mobility services
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switched Networks Form Factor Fixed Platform
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switched Networks Form Factor (cont.) Modular Platform
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switched Networks Form Factor (cont.) Stackable Platform
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Switching as a General Concept  A switch makes a decision based on ingress and a destination port.  A LAN switch keeps a table that it uses to determine how to forward traffic through the switch.  Cisco LAN switches forward Ethernet frames based on the destination MAC address of the frames.
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Dynamically Populating a Switch MAC Address Table  A switch must first learn which devices exist on each port before it can transmit a frame.  It builds a table called a MAC address or content addressable memory (CAM) table.  The mapping device <-> port is stored in the CAM table.  CAM is a special type of memory used in high-speed searching applications.  The information in the MAC address table used to send frames.  When a switch receives an incoming frame with a MAC address that is not found in the CAM table, it floods it to all ports, but the one that received the frame.
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Switch Forwarding Methods Add a header
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Store-and-Forward Switching  Allows the switch to:  Check for errors (via FCS check)  Perform automatic buffering  Slower forwarding process
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Store-and-Forward Switching (cont.)
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Cut-Through Switching  Allows the switch to start forwarding in about 10 microseconds  No FCS check  No automatic buffering
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Forwarding Cut-Through Switching (cont.)
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Domains Collision Domains A collision domain is the segment where devices must compete to communicate.  All ports of a hub belong to the same collision domain.  Every port of a switch is a collision domain on its own.  A switch break the segment into smaller collision domains, easing device competition.
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Domains Broadcast Domains A broadcast domain is the extend of the network where a broadcast frame can be heard.  Switches forward broadcast frames to all ports; therefore, switches do not break broadcast domains.  All ports of a switch, with its default configuration, belong to the same broadcast domain.  If two or more switches are connected, broadcasts are forwarded to all ports of all switches, except for the port that originally received the broadcast.
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Domains Alleviating Network Congestion Switches help alleviating network congestion by:  Facilitating the segmentation of a LAN into separate collision domains  Providing full-duplex communication between devices  Taking advantage of their high-port density  Buffering large frames  Employing high-speed ports  Taking advantage of their fast internal switching process  Having a low, per-port cost
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Summary In this chapter, you learned:  The trend in networks is towards convergence using a single set of wires and devices to handle voice, video, and data transmission.  There has been a dramatic shift in the way businesses operate.  There are no physical offices or geographic boundaries constraints. Resources must now be seamlessly available anytime and anywhere.  The Cisco Borderless Network architecture enables different elements, from access switches to wireless access points, to work together and allow users to access resources from any place at any time.
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Summary (cont.)  The traditional, three-layer hierarchical design model divides the network into core, distribution, and access layers, and allows each portion of the network to be optimized for specific functionality.  It provides modularity, resiliency, and flexibility, which provides a foundation that allows network designers to overlay security, mobility, and unified communication features.  Switches use either store-and-forward or cut-through switching.  Every port on a switch forms a separate collision domain allowing for extremely high-speed, full-duplex communication.  Switch ports do not block broadcasts and connecting switches can extend the size of the broadcast domain, often resulting in degraded network performance.
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential