Skip to main content

Module 6: Switch Configuration / Overview

Switch Configuration / Overview

When teaching Module 6, explain how a Catalyst switch goes through its startup on powering up. When the startup is complete, the initial software settings may be configured. In this module students will have the opportunity to complete a series of hands-on labs that should help them feel comfortable with the command-line interface (CLI) configuration of switches. Comparisons can be made between the ways students have been programming routers and the way they will program switches. It is suggested that the case study be examined along with the work in this module, since the students will begin programming the switches. Relate what they are learning to the case study.

CAUTION:
This module contains many hands-on labs and instructors are encouraged to assist their students in completing as many of these labs as possible. Prepare the students to see different outputs based on the type of switch they are using. Some academies may be using the menu driven switches, so instructors need to ensure that these students understand how to program the CLI switches. This could be achieved by the use of mini-lectures and demonstrations.

A switch is a Layer 2 network device that acts as the concentration point for the connection of workstations, servers, routers, hubs, and other switches.
A hub is an older type of concentration device that also provides multiple ports. However, hubs are inferior to switches because all devices connected to a hub share the bandwidth and the same collision domain. Another drawback to hubs is that they only operate in half-duplex mode. In half-duplex mode, hubs can only send or receive data at any given time, but they cannot do both at the same time. Switches can operate in full-duplex mode, which means they can send and receive data simultaneously.
Switches are multi-port bridges. Switches are the current standard technology for Ethernet LANs that utilize a star topology. A switch provides many dedicated, point-to-point virtual circuits between connected network devices, so collisions are not likely to occur.
Because of the dominant role of switches in modern networks, the ability to understand and configure switches is essential for network support.
New switches have a preset configuration with factory defaults. This configuration rarely meets the needs of network administrators. Switches can be configured and managed from a command-line interface (CLI). Network devices can also be configured and managed through a web based interface and a browser.
Network administrators must be familiar with all tasks associated with the management of networks with switches. Some of these tasks include maintenance of the switch and its IOS. Other tasks include management of the interfaces and tables for optimal, reliable, and secure operation. Basic switch configuration, IOS upgrades, and password recovery are essential network administrator skills.
This module covers some of the objectives for the CCNA 640-801 and ICND 640-811 exams. 
Students who complete this module should be able to perform the following tasks: 
  • Identify the major components of a Catalyst switch
  • Monitor switch activity and status with the use of LED indicators
  • Examine the switch bootup output with the use of HyperTerminal
  • Use the help features of the command-line interface
  • List the major switch command modes
  • Verify the default settings of a Catalyst switch
  • Set an IP address and default gateway for the switch to allow connection and management over a network
  • View the switch settings with a Web browser
  • Configure interfaces for speed and duplex operation
  • Examine and manage the switch MAC address table
  • Configure port security
  • Manage configuration files and IOS images
  • Perform password recovery on a switch
  • Upgrade the IOS of a switch 


Comments

Popular posts from this blog

OSI layers / Peer-to-peer communications / TCP/IP model

OSI layers 2.3.4 This page discusses the seven layers of the OSI model. The OSI reference model is a framework that is used to understand how information travels throughout a network. The OSI reference model explains how packets travel through the various layers to another device on a network, even if the sender and destination have different types of network media. In the OSI reference model, there are seven numbered layers, each of which illustrates a particular network function. - Dividing the network into seven layers provides the following advantages: • It breaks network communication into smaller, more manageable parts. • It standardizes network components to allow multiple vendor development and support. • It allows different types of network hardware and software to communicate with each other. • It prevents changes in one layer from affecting other layers. • It divides network communication into smaller parts to make learning it easier to understand. In the foll...

Advantages and disadvantages of link-state routing

Advantages and disadvantages of link-state routing 2.1.5  This page lists the advantages and disadvantages of link-state routing protocols. The following are advantages of link-state routing protocols:  Link-state protocols use cost metrics to choose paths through the network. The cost metric reflects the capacity of the links on those paths. Link-state protocols use triggered updates and LSA floods to immediately report changes in the network topology to all routers in the network. This leads to fast convergence times. Each router has a complete and synchronized picture of the network. Therefore, it is very difficult for routing loops to occur. Routers use the latest information to make the best routing decisions. The link-state database sizes can be minimized with careful network design. This leads to smaller Dijkstra calculations and faster convergence. Every router, at the very least, maps the topology of it...

Ports for services

Ports for services 10.2.2  Services running on hosts must have a port number assigned to them so communication can occur. A remote host attempting to connect to a service expects that service to use specific transport layer protocols and ports. Some ports, which are defined in RFC 1700, are known as the well-known ports. These ports are reserved in both TCP and UDP.  These well-known ports define applications that run above the transport layer protocols. For example, a server that runs FTP will use ports 20 and 21 to forward TCP connections from clients to its FTP application. This allows the server to determine which service a client requests. TCP and UDP use port numbers to determine the correct service to which requests are forwarded. The next page will discuss ports in greater detail.