LAN Standards (INTRO & LAN STANDARDS) PDF
Document Details
Uploaded by CoolestAndradite708
Ayala National High School
Tags
Summary
This document provides an introduction to Local Area Networks (LANs) and the IEEE 802 networking standards. It details the components, protocols, and access methods used in LANs. The summary also covers geographical coverage and different types of networks.
Full Transcript
INTRO & LAN STANDARDS Subtopic : Introduction LAN and IEEE 802 LAN Standard OBJECTIVE: At the end of the class, students will be able to explain the principal components of developing a LAN and IEEE 802 model. Geographical Coverage Networks are sometimes classified according to thei...
INTRO & LAN STANDARDS Subtopic : Introduction LAN and IEEE 802 LAN Standard OBJECTIVE: At the end of the class, students will be able to explain the principal components of developing a LAN and IEEE 802 model. Geographical Coverage Networks are sometimes classified according to their geographical coverage. The following are examples of networks that are based on their geographical coverage: ❑ Personal area networks (PANs) are networks that interconnect devices that are within the reach of an individual, usually, within a range of 10 m. These devices are usually cell phones, tablets, and laptops. ❑ Local area networks (LANs) cover small geographical areas, typically one building, a floor, or a campus. Examples include the Ethernet and token ring ❑ Metropolitan area networks (MANs) interconnect LANs in a campus or metropolitan area. Example includes the fiber distributed data interface (FDDI). ❑ Wide area networks (WANs) cover much larger areas such as a country (e. Note: Will discuss in detail in the next topicg., the public switched telephone network, or WHAT IS LAN? A LAN is a network of computers and other components located relatively close together in a limited area (within limited geographical area/ small geographical area) LANs can vary widely in their size (example: intranet/extranet/PAN/WLAN) It can be wired and wireless network A LAN might consist of only two computers in a home office or small business, or it might include hundreds of computers in a large corporate office or multiple buildings. A small home business or a small office environment could use a small LAN to connect two or more computers and to connect the computers to one or more shared peripheral devices such as printers. A large corporate office could use multiple LANs to accommodate hundreds of computers and shared peripheral devices, for departments such as finance or operations. LAN COMPONENTS Every LAN has specific components, including hardware, interconnections, and software. Computers Computers serve as the endpoints in the network, sending and receiving data Interconnections Interconnections enable data to travel from one point to another in the network. Interconnections include these components: o NICs: Network interface cards (NIC) translate the data produced by the computer into a format that can be transmitted over the LAN. o Network transmission media: wired media (unshielded twisted pair (UTP), coaxial and fiber optic) and wireless media (Bluetooth, microwave, satellite, infrared), transmit signals from one device on the LAN to another. Network devices Hub: Hubs provide aggregation devices operating at Layer 1 of the OSI reference model. However, hubs have been replaced in this function by switches, and it is very rare to see hubs in any LAN these days. Ethernet Switch: Ethernet switches form the aggregation point for LANs. Ethernet switches operate at Layer 2 of the OSI reference model and provide intelligent distribution of frames within the LAN. Router: wired/wireless routers, sometimes called gateways, provide a means to connect LAN segments. Routers operate at Layer 3 of the OSI reference model. Access point : An access point is a wireless network device that acts as a portal for devices to connect to a local area network. LAN COMPONENTS Protocols Protocols govern the way data is transmitted over a LAN and include the following: o Ethernet protocols : CSMA/CD ; o Internet Protocol (IP): IPv4; IPv6 o Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP) o Dynamic Host Configuration Protocol (DHCP) o Transmission Control Protocol (TCP) o Internet Control Message Protocol (ICMP) o Address Resolution Protocol (ARP) Software Network Operating System ex. the major server-based network operating systems are Microsoft Windows NT 4 and Windows 2000 Server, and Novell NetWare 3.x, 4.x and 5.x Operating System ex. Windows 8 Application software ex. Ms Office, VBasic etc :: REVISION :: When communication takes place between devices on a LAN, there is a requirement to identify and thus differentiate between the devices on the network It can be done using host name, MAC address and IP address (which impact to local addressing) Local Address is the address that a computer on a TCP/IP network uses to access another computer on the same subnet of the network HOST NAME MAC ADDRESS IP ADDRESS In computer networking, A MAC (Media Access Control) An IP address is a unique address address, sometimes referred to as a that identifies a device on the a hostname (archaically internet or a local network. nodename) is a label hardware or physical address IP stands for "Internet Protocol," which that is assigned to a Represented as a 48-bit hexadecimal is the set of rules governing the format of data sent via the internet or local device connected to a number (bese-16 numbering system) network. computer network and is a unique, comprised of 12-character It works on Network Layer (Layer 3) that is used to identify broken into 6 pairs ; Each of these which allow one computer to locate another computer on a network. the device in various character uses 4 bits (12 characters forms of electronic *4bits = 48 bits); each pairs separated An example of a IP address communication, such as using “–” symbol ; 192.168.10.10 (IPv4) ; the World Wide Web FE80:CD00:0:CDE:1257:0:211E:729C (IPv6) alphanumeric attribute - that is used to How to know your host identify individual electronic devices on a network. name for your PC/ laptop? The MAC address primarily operates on the data link layer. An example of a MAC address is: 00- B0-D0-63-C2-26 THE 802 PROJECT MODEL Project 802 defined network standards for the physical components of a network (the interface card and the cabling) that are accounted for in the physical and data-link layers of the OSI reference model. IEEE 802 is a collection of networking standards that cover the physical and data-link layer specifications for technologies such as Ethernet and wireless. These specifications apply to local area networks (LAN) and metropolitan area networks (MAN). IEEE 802 also aids in ensuring multi-vendor interoperability by promoting standards for vendors to follow. Essentially, the IEEE 802 standards help make sure internet services and technologies follow a set of recommended practices so network devices can all work together smoothly. IEEE 802 STANDARD This protocol defines: the method The 802 specifications define the ways NICs access and transfer data over the speed of used to access physical media. the network, the physical These include connecting, maintaining, network, and disconnecting network devices. Choosing which protocol to run at the data-link layer is the single most important decision you make when designing a LAN. the types of the NICs and cables you can drivers you use, install. IEEE 802 CATEGORIES The LAN standards defined by the 802 committees are classified into 16 categories that can be identified by next slide. The data link layer in the network system mainly addresses the way that data packets are transmitted from one type of ETHERNET EXPLANATION node to another. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where every computer listens to the cable before transmitting anything throughout the network. The physical layer in the network mainly focuses on the elements of hardware like repeaters, cables & network interface cards (NIC). For instance, an Ethernet network like 100BaseTX or 10BaseT indicates the cables type that can be used, the length of cables, and the optimal topology. IEEE 802.3 IEEE802.3 defines the physical layer and the medium access control (MAC) sub- layer of the data link layer for wired Ethernet networks. Ethernet is classified into two categories: Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and X is the type of medium used. Most varieties of classic Ethernet have become obsolete in present communication scenario. A switched Ethernet uses switches to connect to the stations in the LAN. It replaces the repeaters used in classic Ethernet and allows full bandwidth utilization. IEEE 802.3 POPULAR VERSIONS IEEE 802.3: This was the original standard given for 10BASE-5 (bus topology). It used a thick single coaxial cable into which a connection can be tapped by drilling into the cable to the core. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and 5 refers to the maximum segment length of 500m. IEEE 802.3a : This gave the standard for thin coax (10BASE-2-bus topology), which is a thinner variety where the segments of coaxial cables are connected by BNC connectors. The 2 refers to the maximum segment length of about 200m (185m to be precise). IEEE 802.3i : This gave the standard for twisted pair (10BASE-T – star topology) that uses unshielded twisted pair (UTP) copper wires as physical layer medium. The further variations were given by IEEE 802.3u for 100BASE-TX, 100BASE-T4 and 100BASE-FX. IEEE 802.3j: This gave the standard for Ethernet over Fiber (10BASE-F) that uses fiber optic cables as medium of transmission. COMPARISON BETWEEN ETHERNET AND LAN The following table highlights some of the important differences between Ethernet and LAN: IEEE 802.11 Defines wireless network standard. 802.11 a 802.11 b 802.11 g 802.11 n 802.11 ac 802.11 ax (1999) (1999) (2003) (2009) (2014) (2019) Speed 54 Mbps = 11Mbps 54Mbps 300-600Mpbs 400Mbps-1Gbps 3.4 -14Gbps 6.75Mpbs (multiple streams) Range/ 5Ghz 2.4Ghz 2.4Ghz 2.4Ghz/ 5Ghz 2.4Ghz and Frequency 5.0Ghz (advantage) (2.4Ghz using 5.0Ghz 802.11n technology) Coverage 25 feet 100 feet 100 feet 150 feet Beam forming Extra Features More Lower speed; Backward Speed: beneficial to 8 attena OFDM speed; wide range compatible smartphone; wireless (4 attena using ( orthogonal poor range devices technology, HD video 802.11n frequency- technology (transfer) technology) division multiple) In popular 2.4Ghz provide 2.4Ghz can MIMO SU-MIMO MU-MIMO interference to connect with (Multiple Input/ (Single user/ (Multiple user/ non-registered 802.11b devices Multiple Output) allow Multiple Input/ Multiple Input/ devices /access point more connectivity/ Multiple Output) Multiple Output) (vice verse) more devices No backward technology for b/g technology TWT (Target Wakeup Time) Incompatible to each other Allow people Suppose just for BBS coloring – connect to wireless 5Ghz (not run avoid collusion router 2.4Ghz) interference 802.11 a 802.11 b 802.11 g 802.11 n 802.11 ac 802.11 ax New Name Wi- Fi Wi- Fi Wi- Fi Wi- Fi Wi- Fi Wi- Fi 2 1 3 4 5 6 :: EXERCISE :: 1. 2. 3. 4. 5. 6. 7. 8. END Link: https://www.ceva-ip.com/ourblog/wi-fi-7-ieee-802-11be-mlo-vs-wi-fi-6-6e- ieee-802-11ax-what-to-ask-for-optimal-design-considerations/#:~: text=Originated%20from%20the%20IEEE%20802.11,6%2F6E%20(802.11ax) IEEE 802.11be https://www.anritsu.com/en-US/test-measurement/technologies/wlan/wlan6gfeatures/wifi7?click- from-wifiparent#:~:text=The%20IEEE%20802.11be%20(Wi,width%20up%20to%20320%20MHz. LAN TECHNOLOGIES Subtopic : VLAN | VTP |ETHERCHANNEL | DHCP |STP OBJECTIVE: At the end of the class student will be able to identify and differentiate LAN technologies in that are available to be use in a local area network. 1.0 VIRTUAL LAN (VLAN) A virtual LAN (VLAN) is a logical overlay network that groups together a subset of devices that share a physical LAN, isolating the traffic for each group. BROADCAST DOMAIN A broadcast domain is the domain in which a broadcast is forwarded. Broadcast domain consists of all devices that can receive a broadcast message sent by any devices connected to a single network segment It also referred to the number of available network A broadcast domain contains all devices that can reach each other at the data link layer (OSI layer 2) by using broadcast. All ports on a hub or a switch are by default in the same broadcast domain. All ports on a router are in the different broadcast domains and routers don’t forward broadcasts from one broadcast domain to another. COLLUSION DOMAIN the part of a network where packet collisions can occur. A collision occurs when two devices send a packet at the same time on the shared network segment and sharing the same bandwidth (chance of collusion) The packets collide and both devices must send the packets again, which reduces network efficiency. IF SWITCH In a network all the links that can send data at the same time are count as separate collision domain Collisions are often in a hub environment, because each port on a hub is in the same collision domain. By contrast, each port on a bridge, a switch or a router is in a separate collision domain. We have 6 collision domains in the example above In this picture we have three broadcast domains, since all ports on a hub or a switch are in the same broadcast domain, and all ports on a router are in a different broadcast domain. 1 2 3 HOW MANY BD and CD for the above diagram? VIRTUAL LAN A virtual local area network (VLAN) is a logical group of workstations, servers and network devices that appear to be on the same LAN despite their geographical distribution. A VLAN allows a network of computers and users to communicate in a simulated environment as if they exist in a single LAN and are sharing a single broadcast and multicast domain. OVERVIEW OF VLANS VLAN DEFINITIONS VLANs are logical connections with other similar devices. Placing devices into various VLANs have the following characteristics: Provides segmentation of the various groups of devices on the same switches Provide organization that is more manageable Broadcasts, multicasts and unicasts are isolated in the individual VLAN Each VLAN will have its own unique range of IP addressing Smaller broadcast domains VIRTUAL LAN BENEFITS OF A VLAN DESIGN Benefits Description Smaller Dividing the LAN reduces the number of broadcast domains Broadcast Domains Improved Only users in the same VLAN can communicate together Security Improved IT VLANs can group devices with similar requirements, e.g. faculty vs. students Efficiency Reduced Cost One switch can support multiple groups or VLANs Better Small broadcast domains reduce traffic, improving bandwidth Performance Decreasing the latency and traffic load on the network and the network devices Simpler Similar groups will need similar applications and other network resources Management Making expansion and relocation of a network or a network device easier DISADVANTAGE: VLAN VLAN also have some disadvantages and limitations as listed below: High risk of virus – if one node in a VLAN infected it may spread a virus through the whole logical network Equipment limitations – very networks because additional routers might be needed to control the workload More effective at controlling latency than a WAN but less efficient than a LAN VLANS IN A MULTI-SWITCHED ENVIRONMENT NETWORKS WITHOUT VLANS Without VLANs, all devices connected to the switches will receive all unicast, multicast, and broadcast traffic. VLANS IN A MULTI-SWITCHED ENVIRONMENT NETWORKS WITH VLANS With VLANs, unicast, multicast, and broadcast traffic is confined to a VLAN. Without a Layer 3 device to connect the VLANs, devices in different VLANs cannot communicate. VLAN CONFIGURATION VLAN RANGES ON CATALYST SWITCHES Normal Range VLAN Extended Range Catalyst switches 2960 and 3650 support over 4000 VLANs. 1 – 1005 VLAN 1006 - 4095 Used in Small to Medium Used by Service sized businesses Providers 1002 – 1005 are Are in Running-Config reserved for legacy VLANs 1, 1002 – 1005 are auto Supports fewer VLAN created and cannot be features deleted Stored in the vlan.dat Requires VTP file in flash configurations VTP can synchronize between switches VLAN CONFIGURATION VLAN CREATION COMMANDS VLAN details are stored in the vlan.dat file. You create VLANs in the global configuration mode. Task IOS Command Enter global configuration mode. Switch# configure terminal Assign a device name to the switch switch(config)# hostname switch-name Create a VLAN with a valid ID number. Switch(config)# vlan vlan-id Specify a unique name to identify the Switch(config-vlan)# name vlan-name VLAN. Return to the privileged EXEC mode. Switch(config-vlan)# end EXAMPLE: If the Student PC is going to be in VLAN 20, we will create the VLAN first and then name it. Prompt Command S1# Configure terminal If you do not name it, the Cisco IOS S1(config)# vlan 20 will give it a default name of vlan and the four digit number of the VLAN. E.g. S1(config-vlan)# name student vlan0020 for VLAN 20. S1(config-vlan)# end VLAN CONFIGURATION VLAN PORT ASSIGNMENT COMMANDS Once the VLAN is created, we can then assign it to the correct interfaces. Task Command Enter global configuration mode. Switch# configure terminal Enter interface configuration mode. Switch(config)# interface interface-id Set the port to access mode. Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan Assign the port to a VLAN. vlan-id Return to the privileged EXEC mode. Switch(config-if)# end EXAMPLE: Prompt Command S1# Configure terminal S1(config)# Interface fa0/18 S1(config-if)# Switchport mode access We can assign the VLAN to the port interface. S1(config-if)# Switchport access vlan 20 Once the device is assigned the VLAN, then the end device will need the IP address information for that VLAN S1(config-if)# end Here, you can set IP address for the PC as 172.17.20.22 (or with subnetting IP) VLAN CONFIGURATION VERIFY VLAN INFORMATION Task Command Option Display VLAN name, status and its ports one VLAN per line Show vlan Display VLAN name, status, and its ports one VLAN per line. show vlan brief Display information about the identified VLAN ID number. show vlan id vlan-id Display information about the identified VLAN name. The vlan- show vlan name name is an ASCII string from 1 to 32 characters. vlan-name VLAN CONFIGURATION CHANGE VLAN PORT MEMBERSHIP There are a number of ways to change VLAN membership: re-enter switchport access vlan vlan-id command use the no switchport access vlan to place interface back in VLAN 1 Use the show vlan brief or the show interface fa0/18 switchport commands to verify the correct VLAN association. HOW TO CREATE VLAN? HERE Assign interface/port in created VLAN (using CLI mode) HOW TO VERIFY VLAN? Task Command Save the running configuration to the startup Switch1# copy running-config startup-config configuration file. Activity: Try to connect PC4. 1. What happen to the network if you ping PC1 from PC4? 2. What happen to the network if you ping from PC2 to PC4? 3. Explain two (2) benefits of using VLAN in this LAN? CAUTION!!! Task Command Save the running configuration to the startup configuration file. Switch1#copy running-config startup-config Shut down all interfaces that will not be used. Switch1(config)# interface range f0/2-5, f0/7-24, g0/1-2 Switch1(config-if-range)# shutdown 2.0 VIRTUAL TRUNKING PROTOCOL (VTP) Trunking to mean carrying multiple VLANs through a single network link through the use of a trunking protocol. VTP VTP (VLAN Trunking Protocol) is a Cisco switches to exchange VLAN information. With VTP, you can synchronize VLAN information (such as VLAN ID or VLAN name) with switches inside the same VTP domain. A VTP domain is a set of trunked switches with the matching VTP settings (the domain name, password and VTP version). All switches inside the same VTP domain share their VLAN information with each other.\ A VTP is a technique that eliminates the need for multiple configurations for VLANs throughout the system EXAMPLE Consider in a LAN you have 10 switches: without VTP, if you want to create a VLAN on each switch, you would have to manually enter VLAN configuration commands on every switch! VTP enables you to create the VLAN only on a single switch. That switch can then propagate information about the VLAN to every other switch on the network and cause other switches to create it. Likewise, if you want to delete a VLAN, you only need to delete it on one switch, and the change is automatically propagated to every other switch inside the same VTP domain. Allow faster and more efficient network traffic Why VTP is relevant to be use? WITHOUT VTP WITH VTP HOW VTP WORKS To make switches exchange their VLAN information with each other, they need to be configured in the same VTP domain. Only switches belonging to the same domain share their VLAN information. When a change is made to the VLAN database, it is propagated to all switches via VTP advertisements. To maintain domain consistency, only one switch should be allowed to create (or delete, modify) new VLANs. This switch is like the “master” of the whole VTP domain and it is operated in Server mode (default mode) Other switches are only allowed to receive and forward updates from the “server” switch. They are operated in Client mode (Switches in this mode cannot create, delete or modify VLANs ) VTP REQUIREMENTS Requirements Links must be trunks Create vtp mode Same VTP domain name Same VTP password (if set) VTP MODE VTP Server Mode VTP Client VTP Transparent The default VTP mode for VTP client mode switches VTP transparent mode all cisco catalyst switches is listen to VTP server mode. advertisements coming switches do not change from other switches and or modify their VLAN In the VTP domain at least one server switch is modify their VLAN configuration according required to propagate VLAN configurations accordingly to the VTP Server switch, information like VLAN name share the VTP and ID. advertisements with other it can receive and forward switches in the VTP domain. the VTP advertisements We can create, add, modify coming from VTP server or delete VLAN information A network switch in VTP of a VTP domain by the client mode requires a switch to other switches Switch which is in VTP server switch to modify or through the configured Server mode. change their VLAN trunk links. Any changes made in a information. switch which is in server We can not create, add, mode are advertised to the modify or delete VLAN entire VTP domain. information in a switch which is in VTP client mode. ACTIVITY Activity: Lets try configure VTP and understanding the VTP mode. 1. When creating a VLAN 10 at VTP server and name it as LAN 1, what is the latest revision number? 2. What is the function of VTP server? 3. What is the function of VTP client? 4. What is the function of VTP transparent? VTP CONFIGURATION VTP CREATION & VERIFY VTP CONFIGURATION VERIFY VTP INFORMATION Use the following command for verifying VTP setting. The complete syntax is: Switch#show vtp status OR Switch#show interface trunk VTP DRAWBACKS VTP wipeout @ VTP TIME BOMB Now, the entire network effectively “dies” and this term is known as a “VTP Bomb” where a switch with higher revision number creates havoc in network by propagating incorrect database to the domain and the overwriting the stable database. VTP ISSUE VTP PRUNNING VTP Pruning makes more efficient use of trunk bandwidth by forwarding broadcast and unknown unicast frames on a VLAN only if the switch on the receiving end of the trunk has ports in that VLAN. VTP pruning makes more efficient use of trunk bandwidth by reducing unnecessary flooded traffic. Broadcast and unknown unicast frames on a VLAN are forwarded over a trunk link only if the switch on the receiving end of the trunk has ports in that VLAN. In the above example, Server switch doesn’t send broadcast frame to Sw2 because Sw2 doesn’t have ports in VLAN 10. When a switch has a port associated with a VLAN, the switch sends an advertisement to its neighbors to inform that it has active ports on that VLAN. For example, Sw3 sends an advertisement to Server switch to inform that it has active port for VLAN 10. Sw2 has not advertised about VLAN 10 so Server switch will prune VLAN 10 on the trunk to Sw2 VTP PRUNNING Prevents traffic from traversing trunk ports going to switches that do not have an active port in that VLAN Disabled by Default switch1#configure terminal switch1(config)#vtp pruning prunning switched on By default, VLAN 1 cannot be pruned switch1(config)#exit switch1#show vtp status Can be enabled globally Can be per link per VLAN WHY USE VTP PRUNING Reduces unnecessary flooded traffic: Broadcast Multicast Unknown Flooded unicast packets Only want traffic going where it’s needed 3.0 ETHERCHANNEL EtherChannel is the technology which is used to combine several physical links between switches or routers into one logical connection and treat them as a single link. ETHERCHANNEL OPERATION LINK AGGREGATION There are scenarios in which more bandwidth or redundancy between devices is needed than what can be provided by a single link. Multiple links could be connected between devices to increase bandwidth. However, Spanning Tree Protocol (STP), which is enabled on Layer 2 devices like Cisco switches by default, will block redundant links to prevent switching loops. A link aggregation technology is needed that allows redundant links between devices that will not be blocked by STP. That technology is known as EtherChannel. EtherChannel is a link aggregation technology that groups multiple physical Ethernet links together into one single logical link. It is used to provide fault-tolerance, load sharing, increased bandwidth, and redundancy between switches, routers, and servers. EtherChannel technology makes it possible to combine the number of physical links between the switches to increase the overall speed of switch-to-switch communication. ETHERCHANNEL OPERATION ETHERCHANNEL EtherChannel technology was originally developed by Cisco as a LAN switch-to-switch technique of grouping several Fast Ethernet or Gigabit Ethernet ports into one logical channel. When an EtherChannel is configured, the resulting virtual interface is called a port channel. The physical interfaces are bundled It provides fault-tolerant and high-speed links together into a port channel between Cisco switches and routers and is often seen in the backbone network. interface, as shown in the figure. ADVANTAGES OF ETHERCHANNEL EtherChannel technology has many advantages, including the following: EtherChannel relies on existing switch ports. There is no need to upgrade the link to a faster and more expensive connection to have more bandwidth. Load balancing takes place between links that are part of the same EtherChannel. EtherChannel creates an aggregation that is seen as one logical link. When several EtherChannel bundles exist between two switches, STP may block one of the bundles to prevent switching loops. When STP blocks one of the redundant links, it blocks the entire EtherChannel. This blocks all the ports belonging to that EtherChannel link. Where there is only one EtherChannel link, all physical links in the EtherChannel are active because STP sees only one (logical) link. EtherChannel provides redundancy because the overall link is seen as one logical connection. Additionally, the loss of one physical link within the channel does not create a change in the topology. ETHERCHANNEL OPERATION IMPLEMENTATION RESTRICTIONS EtherChannel has certain implementation restrictions, including the following: Interface types cannot be mixed. For example, Fast Ethernet and Gigabit Ethernet cannot be mixed within a single EtherChannel. Currently each EtherChannel can consist of up to eight compatibly-configured Ethernet ports. EtherChannel provides full-duplex bandwidth up to 800 Mbps (Fast EtherChannel) or 8 Gbps (Gigabit EtherChannel) between one switch and another switch or host. The Cisco Catalyst 2960 Layer 2 switch currently supports up to six EtherChannels. The individual EtherChannel group member port configuration must be consistent on both devices. If the physical ports of one side are configured as trunks, the physical ports of the other side must also be configured as trunks within the same native VLAN. Additionally, all ports in each EtherChannel link must be configured as Layer 2 ports. Each EtherChannel has a logical port channel interface. A configuration applied to the port channel interface affects all physical interfaces that are assigned to that interface. A switch can have multiple port channels. ETHERCHANNEL: MODE ETHERCHANNEL: REQUIREMENT Same duplex (all ports) Same speed Same VLAN configuration Switchport modes should be the same (access or trunk mode) ETHERCHANNEL: FACTS To bundle multiple physical Ethernet ports together, you must use the channel-group command, this enables a single logical interface called a port-channel. A port channel can be an access port or it can be a trunk port. You can aggregate up to eight 10/100 ports together to enable a port- channel on Cisco Catalyst switches, You can also bundle or aggregate up to eight-gigabit ports if available. A switch can have multiple port channels Down status will be appear when you run; solution: please config both side then you might found that the status is Type the same coding on Switch 0 and switch 1 change WHY WE USE ETHERCHANNEL? Increased In our network planning, we always take into account the cost. For example, our company needs more than 100 Mbps bandwidth, but our hardware only supports Fast Ethernet (100 Mbps). In this case, we can option not to upgrade the hardware by implementing EtherChannel. Bandwidth EtherChannel aggregates or combines traffic across all available active links, which makes it look like one logical cable. So in if we have 8 active links with 100 Mbps each, that will be a total of 800 Mbps. If any of the physical links inside the EtherChannel go down, Spanning Tree Protocol will not see this and will not recalculate. Redundancy EtherChannel allows more available links in case one or more links go down. The loss of one physical link within the channel does not create a change in the topology. Load With load balancing, we are able to balance the traffic load across the links and improves the Balancing efficient use of bandwidth.