How to perform layer-3 Switch operations

Source: Internet
Author: User

In today's society, the most commonly used vro is the number of routers, because it is relatively cheap and its functions are no different from those of vswitches. However, layer-3 vswitches are indeed more powerful than vrouters, then we will study the layer-3 switch.

Many people have used routers, but have not used switches. They sound different, but their functions are similar. Let's get to know about the vswitch today. What are the specific scenarios of its use? What are the functions of the vro of the layer-3 switch? What is the difference?

First, the HUB, that is, the HUB. Its function can be simply understood as connecting some machines to form a LAN. A vswitch, also known as a switch-type hub, works basically the same as a hub. However, there is a difference between the two in terms of performance: the hub uses the shared bandwidth method, while the switch is the exclusive bandwidth.

In this way, when there are many machines or a large amount of data, the two will be obvious. A vro differs significantly from the preceding two. Its function is to connect different CIDR blocks and find the most suitable path for data transmission in the network. In general, individual users have little need.

A vro is generated after a vswitch, just as a vswitch is generated after a hub, so the vswitch and vro are also associated, and they are not completely independent of each other. Vro mainly overcomes the problem that vswitches cannot route and forward data packets. In general, the main difference between a vro and a vswitch lies in the following aspects:

1) layer-3 vro features comparison: different working levels

The original switch was working on the data link layer of the OSI/RM open architecture, that is, the second layer. At the beginning, the router was designed to work on the network layer of the OSI model. Because the switch works at the Layer 2 data link layer of OSI, its working principle is relatively simple, while the router works at the Layer 3 network layer of OSI.) More protocol information can be obtained, vrouters can make intelligent forwarding decisions.

2) vro function comparison: Data Forwarding depends on different objects

A vswitch uses a physical address or a MAC address to determine the destination address for data forwarding. The router uses different network ID numbers (IP addresses) to determine the data forwarding address. IP addresses are implemented in software, and the network where the device is located is described.

These layer-3 addresses are also called protocol addresses or network addresses. The MAC address is usually provided by the hardware and allocated by the NIC manufacturer, and has been fixed to the NIC. Generally, it cannot be changed. The IP address is usually automatically assigned by the network administrator or the system.

3) layer-3 vro features comparison: Traditional vswitches can only be divided into conflicting domains, but not broadcast domains. vrouters can be divided into broadcast domains.

The CIDR Block connected by the vswitch still belongs to the same broadcast domain. broadcast packets are transmitted across all CIDR blocks connected to the vswitch. In some cases, communication congestion and security vulnerabilities may occur. The CIDR blocks connected to the vro are allocated to different broadcast domains, and the broadcast data does not pass through the vro. Although vswitches above Layer 3 Have VLAN functions and can also be divided into broadcast domains, communication between subbroadcast domains is not allowed, and communication between them still requires routers.

4) layer-3 vro features comparison: vrouters provide Firewall Services. A vro only forwards data packets of a specific address. It does not support packet transmission through the routing protocol or unknown destination network, thus preventing broadcast storms.

The switch is generally used for the LAN-WAN connection, the switch belongs to the bridge, is the data link layer equipment, some switches can also realize the third layer of the exchange. A vro is used for WAN-WAN connections. It can resolve forwarding groups between different networks and act on the network layer.

They only accept the input group from one line and then forward it to another line. These two lines may belong to different networks and adopt different protocols. In comparison, vro features more powerful than vswitches, but the speed is relatively slow and expensive. layer-3 vswitches have both the ability to forward packets at the wire speed of vswitches and the good control function of vrouters, therefore, it is widely used.

At present, I am personally using ADSL for many broadband access methods. Therefore, I will give a brief description of the access to ADSL. Most of the purchased ADSL cats have many routing functions. When the manufacturers leave the factory, the routing function is blocked, because most of them do not enable the routing function during Telecom installation and DHCP is enabled.

Enable the ADSL routing function). If an individual accesses the Internet or a few computers pass through ADSL, you only need to purchase one or more hubs or switches if the computer is large. Please purchase a vswitch because the price difference between the hub and the vswitch is very small.

5) Comparison of vro functions: We recommend that you purchase an eight-port instance to meet the expansion requirements. The general price is about 100 yuan. Connect all the computers to the vswitch. The only thing to do is to insert the network cable of each machine into the interface of the switch and insert the cat network cable into the uplink interface.

Then you can set the routing function and DHCP to share the internet. After reading the above explanation, you should have some knowledge about vswitches, hubs, and vrouters. The current usage is mainly based on the combination of vswitches and vrouters, the specific combination method can be determined based on the specific network conditions and requirements.

  1. Let's talk about the "potential rules" of the security switch"
  2. Summarize the market status of high-end Switches
  3. Security risks of LAN switches
  4. PythonAndroid analyzes the differences and relationships between layer-3 switches and other layer Switches
  5. Measure the Power Consumption Characteristics of LAN switches.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.