The All-New Switch Book: The Complete Guide to LAN Switching Technology, Second Edition
Credits
Contents
Preface
Who Should Read This Book
Introduction
Organization of the Book
A Few Words from the Authors
The Laws of Networking
A Special Bonus for People Who Read Introductions!
A Word of Thanks from Jim
Contact the Author
Part I: Foundations of LAN Switches
Chapter 1: Laying the Foundation
1.1 Network Architecture
1.2 Addressing
1.3 LAN Technology Review
1.4 IEEE LAN Standards
1.5 Terminology
Chapter 2: Transparent Bridges
2.1 Principles of Operation
2.2 Transparent Bridge Architecture
2.3 Implementing the Bridge Address Table
2.4 Bridge Performance
2.5 The IEEE 802.1D Standard
Chapter 3: Bridging Between Technologies
3.1 Bridging the LAN Gap
3.2 Bridging Between Local and Wide Area Networks
Chapter 4: Principles of LAN Switches
4.1 A Switch Is a Bridge Is a Switch
4.2 Switched LAN Concepts
4.3 Cut-Through Versus Store-and-Forward Operation
4.4 MultiLayer Switching
4.5 A Switch Is a Switch Is a Switch Except When
4.6 Four Generations of Switch Integration
4.7 Switch Configurations
4.8 Switch Application Environments
Chapter 5: Loop Resolution
5.1 Diary of a Loopy LAN
5.2 The Spanning Tree Protocol
5.3 Rapid Spanning Tree Protocol
5.4 Loops in a Remotely Bridged (WAN) Catenet
5.5 An Example of Loop Resolution
5.6 Behavior of a Spanning Tree Catenet
5.7 Configuring the Spanning Tree
5.8 Up a Tree Without a Protocol?
Chapter 6: Source Routing
6.1 Overview of Source Routing Operation
6.2 Eine Kleine Sourceroutinggeschichte
6.3 Source Routing Concepts
6.4 Source-Routed Frames
6.5 Source Routing Operation
6.6 Interconnecting the Source-Routed and Transparently Bridged Universes
6.7 IEEE Standards and Source Routing
6.8 The Future of Source Routing
Part II: Advanced LAN Switch Concepts
Chapter 7: Full Duplex Operation
7.1 Why a MAC?
7.2 Full Duplex Enablers
7.3 Full Duplex Ethernet
7.4 Dedicated Token Ring
7.5 Implications of Full Duplex Operation
7.6 Full Duplex Application Environments
Chapter 8: LAN and Switch Flow Control
8.1 The Need for Flow Control
8.2 Controlling Flow in Half Duplex Networks
8.3 MAC Control
8.4 PAUSE Function
8.5 IEEE 802.3x Flow Control Implementation Issues
8.6 Flow Control Symmetry
Chapter 9: Link Aggregation
9.1 Link Aggregation Benefits
9.2 Application of Link Aggregation
9.3 Aggregate or Upgrade?
9.4 Issues in Link Aggregation
9.5 IEEE 802.3ad Link Aggregation Standard
9.6 Split Up the Trunk
Chapter 10: Multicast Pruning
10.1 Multicast Usage
10.2 Trimming the (Spanning) Tree
10.3 GARP Multicast Registration Protocol
Chapter 11: Virtual LANs: Applications and Concepts
11.1 Applications of VLANs
11.2 VLAN Concepts
Chapter 12: Virtual LANs: The IEEE Standard
12.1 Overview and Scope of the Standard
12.2 Elements of the Standard
12.3 Tag and Frame Formats
12.4 IEEE 802.1Q Switch Operation
12.5 Multicast Registration and VLAN Context
12.6 VLANs and the Spanning Tree
12.7 The Multiple Spanning Tree Protocol
Chapter 13: Priority Operation
13.1 Why Priority?
13.2 LAN Priority Mechanisms
13.3 VLAN and Priority Tagging
13.4 Getting into the Priority Business
13.5 Priority Operation in Switches
Chapter 14: LAN Security
14.1 Network Security Overview
14.2 LAN Security
14.3 Wrap Up
Chapter 15: Switch Management
15.1 The Simple Network Management Protocol
15.2 Network Monitoring Tools
15.3 Internal Switch Management Platforms
15.4 Non-SNMP Management
Chapter 16: Network Troubleshooting Strategies
16.1 The Trouble with Troubleshooting
16.2 Housekeeping
16.3 Troubleshooting Tools
16.4 A Systematic Approach
16.5 Some Strategies for Layer 2 Troubleshooting
16.6 Wrap Up
Chapter 17: Make the Switch!
17.1 Keeping House
17.2 Switch Data Receive Path Functions
17.3 Switch Fabrics
17.4 Switch Data Transmit Path Functions
Appendix: Protocol Parsing
Frame Format
Decision Flow
References
Glossary
Terms
Acronyms and Abbreviations
Index