Workng of Switch
Workng of Switch
Workng of Switch
TRAINING REPORT
ON
Working Of Switch
COMMENCED AT
SUBMITTED BY:
Shubham Kumar
Uni Roll No. 1325521
B-TECH 7 th semester
DECLARATION
I hereby declare that the Training Report was submitted by me under the supervision and
guidance of Mr.Usman Khan, project guide, Shaheed Udham Singh Group of Institutions
(Tangori ) . I further declare that I am solely responsible for omission and commission of
errors if any.
(Shubham Kumar)
Signature of the student
EXECUTIVE SUMMARY
Job satisfaction in regard to ones feeling or state of mind in regarding of
their nature of work. Job can be influenced by variety of factors like quality of
once relationship with their supervisor, quality of physical environment in which
they work, degree of fulfillment in their work etc. Positive attitude towards job are
equivalent to job satisfaction whereas negative attitude towards job has been defined
variously from time to time. In short job satisfaction is a persons attitude towards job.
Job satisfaction is an attitude which results from balancing & summation of many
specific likes and dislikes experienced in connection with the job- their evaluation may rest
largely upon ones success or failure in the achievement of personal objective and upon
perceived combination of the job and combination towards these ends
This major project report was review theory and findings on the relationship between
training and development. I described the various important theoretical approaches and
proposed a survey for analysing Job satisfaction in ThinkNEXT Technologies Pvt.
Ltd.,Mohali .
PART-1 contains the profile of the company which include vision, mission, structure .
It also consists of products /services provided, Internal and external customers its linkage
with other functions, brief description of the various operations and corresponding functions.
This part is also briefs about the internship. It includes job assigned, description of the task,
importance of the functions, task performance, learning process, observations.
PART-2 totally deals with the project report. It contains objectives of the study,
topic/Problem/Issues focus in the study, study design or structure of the study, the source of
the information, the analysis tools used, Challenges faced during the study and how it was
over come, Data presentation and analysis, Conclusion and recommendations, Summary of
the report and Bibliography
Structured questionnaire was used to gather data. The questionnaire was distributed to
employees of ThinkNEXT Technologies Pvt. Ltd., Mohali and results were obtained for the
conclusion
ACKNOWLEDGEMENT
Amongst the wide panorama of people who provided me the inspiration, guidance and
encouragement, I take this opportunity to thank those who gave me indebted assistance and
constant encouragement for completing this project.
I would like to thank Mr.Usman Khan, HR Trainer of ThinkNEXT Technologies Pvt.
Ltd., Mohali for his continuous help in completion of this project. He motivated me and was
available whenever his assistance was sought. He was actively involved throughout the
project and was also kind enough to tell me the strengths and weaknesses and how I could
improve myself to face the corporate world. Without his support the completion of this
project would be impossible.
I would also like to thank my college project guide Er Meenakshi Bhalla, Shaheed
Udham Singh Group Of Institutions (Tangori) for her valuable guidance and support.
(Ramesh Singh)
Table of Content
CHAPTER -1: COMPANY PROFILE.................................................................................6-15
CHAPTER- 2: JOB SATISFACTION......................................................................................16
2.1
INTRODUCTION...........................................................................................................17
CHAPTER-1
COMPANY PROFILE
ThinkNEXT Edge
Industrial Training and Certificates from Software/Electronics Company not just from
an institute
Free Interview Preparation, Spoken English and Personality Development
Programmes.
Opportunity to get placed in ThinkNEXT and numerous other companies.
Life-Time Validity Learning and Placement Card.
Part-Time/Full-Time Job Offer for each student during Training.
ThinkNEXT Cloud Campus advantage not only during training, even after completion
of training for life time.
One-to-one PC and Corporate Environment.
Learn from Developers/Industry experts rather than Trainers/Teachers.
Direct interaction with Developers/Industry Experts.
Industrial training programmes are designed to make students industry-ready.
Large Display LEDs in each Class-Room/Lab, Wi-Fi Labs.
Guest Lectures/Seminars by Industry Experts.
Every Student is provided with Live Projects mentored by Software/
Electronics/Industry Experts.
100% Placement assistance.
\
ThinkNEXT Cloud Campus Advantages
Each Student will have Unique User ID and Password to Login to ThinkNEXT Cloud
Campus 4.0 anytimeanywhere
View Numerous Technical, Personality Development Videos anytimeanyhere
Students will be able to download e-Books, e-Journals, Class Notes, Important Links
and other study material.
ThinkNEXT Smart Campus is a step towards not only 100% placements but also
better job offers even after placements.
Student Profile, Instant Technical Updates, Class Notes, Project Report Submitted,
Attendance, Performance, Notice-Board, Class Timings etc. Everything online.
Communication with industry experts, Technologists through cloud Campus
anytimeanywhere.
7
Network Switches
A network switch is a networking device that performs transparent connection
of multiple network segments with forwarding based on MAC addresses at up
to the speed of the hardware.
A network switch is a small hardware device that joins multiple computers together within
one local area network (LAN).Ethernet switch devices were commonly used on home
networks before home routers became popular; broadband routers integrate Ethernet switches
directly into the unit as one of their many functions. High-performance network switches are
still widely used in corporate networks and data centers.
Switching
SWITCHING It is a technology that alleviate congestion in ethernet,LAN etc.by
reducing traffic and increasing switches , and are designed to work with existing
cable infrastructure for that they can be installed w minimal disruption of
existing networks. Often they replace share hubs.
Switching Process
The performance characteristics of a switch are determined to a large extent by how
packets are processed. The newer switches now use ASICs (Application Specific
Integrated Circuits) for high speed hardware switching of packets. This results in
much faster performance than packets processed in software on the route processor
with multilayer switches and routers. While most of the packet forwarding occurs in
ASICs, there is some network traffic such as encrypted packets that must be processed
in software.
Data Plane
The switch data plane is where forwarding of packets occur. The forwarding of
packets is done after a decision has been made at the Supervisor Engine PFC or line
10
card DFC. The PFC and DFC modules forward packets in hardware ASICs. The PFC
forwarding engine on the Supervisor Engine does Layer 2 and Layer 3 lookups before
deciding how to forward the packet. Line cards with a DFC installed make Layer 2
and Layer 3forwarding decisions at the line card and send the packet across the switch
fabric to the destination line card. From there, the packet is forwarded out the specific
switch egress port. Note that when describing the processing and forwarding of
packets what that refers to is the switch or router examining Layer 2 and Layer 3
packet header information (addressing etc.) and rewriting the packet before
forwarding it.
Control Plane
The switch has a control plane where specific network control packets are processed
for managing network activity. The switch Supervisor Engine is comprised of a route
processor on the MSFC card where the routing table is built. The route processor must
handle certain control packets such as routing advertisements, keepalives, ICMP, ARP
requests and packets destined to the local IP addresses of the router. In addition there
is a switch processor that builds a CAM table for Layer 2 packet processing. The
switch processor manages control packets such as BPDU, CDP, VTP, IGMP, PAgP,
LACP and UDLD. The processing of control packets causes increased switch
Supervisor Engine (CPU) utilization.
Management Plane
The management plane is where all network management traffic is processed. This
includes packets from management protocols such as Telnet, SSH, SNMP, NTP and
TFTP. The route processor also manages some of this traffic along with some control
plane traffic. In addition the management plane manages the switch passwords and
coordinates traffic between the management, control plane and data plane.
11
1.Circuit Switching
Circuit Switching is generally used in the public networks. It come into
existence for handling voice traffic in addition to digital data. How ever
digital data handling by the use of circuit switching methods are proved to
be inefficient. The network for Circuit Switching is shown in figure.
12
Here the network connection allows the electrical current and the associated
voice with it to flow in between the two respective users. The end to end
communication was established during the duration of call.
In circuit switching the routing decision is made when the path is set up across
the given network. After the link has been sets in between the sender and the receiver
then the information is forwarded continuously over the provided link.
In Circuit Switching a dedicated link/path is established across the sender and
the receiver which is maintained for the entire duration of conversation.
2. Packet Switching
In Packet Switching, messages are broken up into packets and each
of which includes a header
with source, destination and
intermediate node address information. Individual Packets in packet
switching technique take different routes to reach their respective
13
The major advantage of Packet switching is that they they are used for
performing data rate conversion.
When traversing the network switches, routers or the other network nodes then
the packets are buffered in the queue, resulting in variable delay and throughput
depending on the networks capacity and the traffic load on network.
Packet switching contrasts with another principal networking paradigm, circuit
switching, a method which sets up a limited number of dedicated connections of
constant bit rate and constant delay between nodes for exclusive use during the
communication session.
In cases where traffic fees are charged, for example in cellular communication,
packet switching is characterized by a fee per unit of information transmitted.
14
3.Message Switching
In case of Message Switching it is not necessary to established a
dedicated path in between any two communication devices. Here
each message is treated as an independent unit and includes its
own destination source address by its own. Each complete message
is then transmitted from one device to another through
internetwork.
Switching Functionality
To understand how switches and routers should be chosen and placed in a network
design, you should rst understand how to take advantage of data communication at
different layers. The OSI model separates data communication into seven layers, as
shown in Table 2-2. Each layer has a specic function and a specic protocol so that
two devices can exchange data on the same layer. A protocol data unit (PDU) is the
generic name for a block of data that a layer on one device exchanges with the same
layer on a peer device. A PDU is encapsulated in a layers protocol before it is made
available to a lower-level layer or unencapsulated before being handed to a higherlevel layer.
Layer 2 Switching
Layer 2 switches are frequently installed in the enterprise for high-speed connectivity
between end stations at the data link layer. Layer 3 switches are a relatively new
phenomenon, made popular by (among others) the trade press. This article details
some of the issues in the evolution of Layer 2 and Layer 3 switches. We hypothesize
that that the technology is evolutionary and has its origins in earlier products.
Layer 2 Switches
Bridging technology has been around since the 1980s (and maybe even earlier).
Bridging involves segmentation of local-area networks (LANs) at the Layer 2 level. A
multiport bridge typically learns about the Media Access Control (MAC) addresses on
16
each of its ports and transparently passes MAC frames destined to those ports. These
bridges also ensure that frames destined for MAC addresses that lie on the same port
as the originating station are not forwarded to the other ports. For the sake of this
discussion, we consider only Ethernet LANs.
Layer 2 switches effectively provide the same functionality. They are similar to
multiport bridges in that they learn and forward frames on each port. The major
difference is the involvement of hardware that ensures that multiple switching paths
inside the switch can be active at the same time. For example, consider Figure 1,
which details a four-port switch with stations A on port 1, B on port 2, C on port 3 and
D on port 4. Assume that A desires to communicate with B, and C desires to
communicate with D. In a single CPU bridge, this forwarding would typically be done
in software, where the CPU would pick up frames from each of the ports sequentially
and forward them to appropriate output ports. This process is highly inefficient in a
scenario like the one indicated previously, where the traffic between A and B has no
relation to the traffic between C and D.
Figure 1: Layer 2 switch with External Router for Inter-VLAN traffic and connecting
to the internet
Enter hardware-based Layer 2 switching. Layer 2 switches with their hardware support are
able to forward such frames in parallel so that A and B and C and D can have simultaneous
conversations. The parallel-ism has many advantages. Assume that A and B are NetBIOS
stations, while C and D are Internet Protocol (IP) stations. There may be no rea-son for the
communication between A and C and A and D. Layer 2 switching allows this coexistence
without sacrificing efficiency.
MAC addresses are learned from the source addresses of incoming frames.
A table of MAC addresses and their associated bridge/switch ports is built and
maintained.
Broadcast and multicast frames are ooded out to all ports.
Frames destined to unknown locations are ooded out to all ports.
Bridges and switches communicate with each other using the Spanning-Tree
Protocol to eliminate bridging loops.
Characteristics
Layer 2 switches themselves act as IP end nodes for Simple Network
Management Protocol (SNMP) management, Telnet, and Web based
management. Such management functionality involves the presence of an IP
stack on the router along with User Datagram Protocol (UDP), Transmission
Control Protocol (TCP), Telnet, and SNMP functions. The switches themselves
have a MAC address so that they can be addressed as a Layer 2 end node while
also providing transparent switch functions.
Layer 2 switching does not, in general, involve changing the MAC frame.
However, there are situations when switches change the MAC frame. The IEEE
802.1Q Committee is working on a VLAN standard that involves? Tagging? a
MAC frame with the VLAN it belongs to; this tagging process involves
changing the MAC frame.
Layer 3 switches
A Layer 3 switch is a high-performance device for network routing. It is
relatively new term, was conceived as a technology to improve on the
performance of routers used in large local area networks (LANs).
It can support the same routing protocols as network routers do. Both inspect
incoming packets and make dynamic routing decisions based on the source and
destination addresses inside.
19
Characteristic
It is designed to handle high-performance LAN traffic, so Layer 3 switch can
be placed anywhere within a network core or backbone, easily and costeffectively replacing the traditional backbone router.
The switches run routing protocols, such as open shortest path first (OSPF) or
routing information protocol (RIP), to communicate with other Layer 3
switches or routers and to build their routing/forwarding tables. These tables
are looked up to determine the route for an incoming packet
a Layer 3 switch can reprogram the hardware dynamically with the current
Layer 3 routing information. This is what allows much faster packet
processing.
21
VLAN
A virtual LAN, is a method of creating independent logical networks within a
physical network. Several VLANs can co-exist within such a network. This
helps in reducing the broadcast domain and aids in network administration by
22
'
configure terminal
switch(config)#
vlan 10
23
switch(config-vlan)#
name test
switch(config-vlan)#
state active
switch(config-vlan)#
no shutdown
switch(config-vlan)#
exit
switch(config)#
Step-by-Step Instructions
Complete these steps to configure a switch to perform interVLAN routing.
1. Enable routing on the switch by using the ip routing command. Even if
IP routing was previously enabled, this step ensures that it is activated.
Switch(config)#ip routing
Note: If the switch does not accept the ip routing command, upgrade to
either SMI image Cisco IOS Software Release12.1(11)EA1 or later, or
an EMI image, and repeat this step. See the Prerequisites section for
more information.
Tip: Check the show running-configuration . Verify whether ip routing is
enabled. The command, if enabled, appears towards the top of the
output.
hostname Switch
!
!
ip subnet-zero
ip routing
!
vtp domain Cisco
vtp mode transparent
2. Make note of the VLANs that you want to route between. In this
example, you want to route traffic between VLANs 2, 3 and 10.
3. Use the show vlan command to verify that the VLANs exist in the VLAN
database. If they do not exist, add them on the switch. This is an
example of adding VLANs 2, 3, and 10 to the switch VLAN database
Switch#vlan database
Switch(vlan)#vlan 2
VLAN 2 added:
Name: VLAN0002
Switch(vlan)#vlan 3
24
VLAN 3 added:
Name: VLAN0003
Switch(vlan)#vlan 10
VLAN 10 added:
Name: VLAN0010
Switch(vlan)#exit
APPLY completed.
Exiting....
Tip: You can use VLAN Trunking Protocol (VTP) to propagate these
VLANs to other switches. Refer to Understanding and Configuring
VLAN Trunk Protocol (VTP).
4. Determine the IP addresses you want to assign to the VLAN interface
on the switch. For the switch to be able to route between the VLANs,
the VLAN interfaces must be configured with an IP address. When the
switch receives a packet destined for another subnet/VLAN, the switch
looks at the routing table to determine where to forward the packet. The
packet is then passed to the VLAN interface of the destination. It is in
turn sent to the port where the end device is attached.
5. Configure the VLAN interfaces with the IP address identified in step 4.
Switch#configure terminal
Enter configuration commands, one per line. End with
CNTL/Z.
Switch(config)#interface Vlan2
Switch(config-if)#ip address 10.1.2.1 255.255.255.0
Switch(config-if)#no shutdown
Repeat this process for all VLANs identified in step 1.
6. Configure the interface to the default router. In this scenario you have a
Layer 3 FastEthernet port.
Switch(config)#interface FastEthernet 0/1
Switch(config-if)#no switchport
Switch(config-if)#ip address 200.1.1.1 255.255.255.0
Switch(config-if)#no shutdown
The no switchport command makes the interface Layer 3 capable. The
IP address is in the same subnet as the default router.
Note: This step can be omitted if the switch reaches the default router
through a VLAN. In its place, configure an IP address for that VLAN
interface.
7. Configure the default route for the switch.
25
Switching Protocole:-
traffic that could be passed between switches would quickly utilize the entire
bandwidth available within each of the switches affected. One method to prevent
loops is to only provide a single path between switches and ensure that there is no path
redundancy across the entire switched network. While this may work in small
deployments, when dealing with switched networks that are a bit larger the
deployment of redundancy is a required element.
To be able to deal with these potential loops that could be caused by these redundant
paths the Spanning Tree Protocol (STP) can be deployed. STP is tasked with
preventing loops throughout the switched network. It does this by temporarily
blocking redundant paths between switches; in this case, if the primary forwarding
path is disrupted, this blocking would be removed allowing traffic to be passed. This
article takes a look at some of the based STP concepts and reviews the configuration
required to deploy STP on a switch.
The first thing to point out is that this article focuses on the original version of STP
that is covered in IEEE 802.1D; some of the material about the newer Rapid STP
(RSTP-IEEE 802.1w) will also be briefly discussed.
The basic function of STP is to provide a loop free switched network; this is done by
creating a topology of all participating STP switches. The best loop free path through
the switched network is then determined from this topology information. The initial
step taken by each STP is to elect a root switch; the root switch is used as a central
point in a switched network to determine the best route through the switched network.
Initially, all switches act as if they are the root switch and do this until they receive
traffic from another superior switch (as determined by switch priority); this is referred
to as a root switch election.
Another thing that must be understood is that multiple root switches can exist in the
network depending on what STP mode is being used. By default, on Cisco switching
equipment, each VLAN has its own STP instance and a root switch is elected for each
VLAN; this mode is called Per VLAN Spanning Tree Plus (PVST+). If implementing
RSTP, Rapid PVST+ is used.
RootThe port given this role is the selected best path to reach the root switch
27
DesignatedThe port given this role is selected with the best path to a specific
switched segment; there is only one designated port per switched segment.
AlternateThe port given this role is selected as a backup to the root port; if
the root port should have a problem, this port would take over the root port
role.
BackupThe port given this role is selected as a back to the designated port; if
the designated port should have a problem this port would take over the
designated port role.
Once the best path is calculated and each of the ports has been given a role, all ports
with the alternate or backup STP roles will be blocked to prevent loops.
Figure 1
As shown in Figure 1, there are five different states that a port can be in, described
below:
Blocking StatePorts that are in the blocking state do not forward traffic; they
simply listen to the network to ensure that they should continue to block traffic.
Should the state of the switched network change, the port could transition to
listening state. All ports start in blocking state after initial switch initialization.
Listening StatePorts that are in the listening state do not forward traffic.
While in this state, the port will only listen to traffic as they did when in
blocking state. This is the first state that comes after the blocking state after the
port is set to start frame forwarding. The default time in the listening state is 15
seconds.
28
Learning StatePorts that are in the learning state do not forward traffic; while
in this state the port will listen to traffic and begin to learn addresses from the
connected devices on a segment. The default time in the learning state is 15
seconds.
Forwarding StatePorts that are in the forwarding state forward traffic as well
as continue to learn addresses from the segment.
Disabled StatePorts that are in the disabled state do not forward traffic or
listen to the network traffic.
When implementing the RSTP, the time that a port takes to transition and the method
used to transition has changed. This provides the ability for a switched network to
begin forwarding traffic sooner without unneeded delays; these delays are a common
complaint about the 802.1D version of STP.
Step 1
router>enable
Step 2
router#configure terminal
Step 3
Step 4
router(config)#end
When initially setting up STP, it is best to determine which of the switches on the
network will become the root switch. While it is possible for the network to determine
this by itself, the election will simply come down to a question of who has the lowest
MAC address. By default, each switch begins with a priority of 32768; this priority is
then combined with the MAC address of the switch to create the bridge ID. During a
root switch election, the switch with the lowest bridge ID will be elected the root
switch.
The commands to determine the root switch are shown in Table 2.
29
Step 1
router>enable
Step 2
router#configure terminal
Step 3
Step 3
Step 3
Step 4
router(config)#end
If the default Spanning Tree mode needs to be changed from the default of PVST+,
use the commands shown in Table 3.
Step 1
router>enable
Step 2
router#configure terminal
30
Step 3
Step 4
router(config)#end
Summary
STP is one of those protocols that are used by most people without them even
knowing that it exists, but without it modern switched networks could not operate.
Hopefully the contents of this article have been able to introduce the concepts used
by STP to eliminate switch loops and how STP can be configured to get the best
performance out of the network.
31