I will introduce the key technical parameters of the switch to make it easier for users to compare the different products of different manufacturers when choosing the switch. Each parameter affects the performance, functionality, and different integration characteristics of the switch.
1, Forwarding technology: Switch
This tutorial describes how to start and configure Cisco Catalyst 1900 series switches.1. Tutorial PurposeThrough this experiment, you can master the following skills:Familiar with switch startup interface;Configure the vswitch;Understand the port number of the vswitch.2. device requirementsThis experiment requires the following devices:One Cisco Catalyst 1900 Series Switch with unlimited models and Enterpr
The port of the core switch is mainly of the optical fiber type, but the price of the optical fiber port of the switch is very expensive. You must note that the optical fiber port of the switch is not stacked and can only be used for Cascade. Analyzes the connection methods and basic types of the optical fiber ports of the vswitch. Cascade uses both common ports
With the explosive growth of data traffic, the construction standards of data centers are constantly improving. Obviously, common switches cannot meet the needs of data centers, the data center switch has high capacity, large cache, virtualization, layer-2 TRILL and other technical features to meet your needs. What key parameters should a data center switch have?
Port line rate forwarding:The current data
A typical LAN is to connect a core switch with a layer-3 Switch to several Branch switches (not necessarily with layer-3 switching ). We assume that the core switch name is com, and the Branch switches are par1, par2, and par3 respectively, which are connected to the core switch through the light module of port 1; assu
experiment six using three-layer switch to implement inter-VLAN routingFirst, the experimental target
Mastering the configuration of the switch tag VLAN
Master three layer switch basic configuration method;
Master three-layer switch VLAN routing configuration method;
Inter-VLAN communication throug
with the concept of session hijacking, it was still 2, that was 2001 ~ 2002. At that time, hubs were still quite common ).
Another serious problem is that if a large local area network, such as 500 machines, is connected to all the HUB machines, what will happen ?? Very slow, with poor network efficiency! Why? If 500 machines send a packet, each machine needs to receive about 499 useless packets... and if you need a response ...... useless data packets will flood the entire LAN. This is the leg
This study continues based on the previous project (you can also create a new project) to learn segmented control and switch.
Segmented Control
Switch
The main difference between segmented control and switch is that segmented control can have multiple values for selection, while switch has only two values.
1) Add segme
The configuration of the switch has always been very mysterious, not only for the general user, but also for the vast majority of network administrators, but also as an important and basic indicator of the level of network management. This is mainly for two reasons, one is the majority of enterprises configured switches are desktop non-network management switch, do not need any configuration, pure "fool" ty
12-Layer Forwarding principle
The two-tier forwarding process extracts the source MAC address of the datagram, queries the Mac forwarding post (aka L2fdb), and sends it directly to the corresponding port if found. For addresses not included in the table, send by broadcast, that is, to all ports. Using Address auto-learning (based on source MAC address learning) and aging mechanism (timing mechanism) to maintain Mac forwarding information, two-tier forwarding generally does not change the packet
The core switch is currently the most commonly used networking device, and its security performance is also good. However, improper use may also cause some problems. There are blue sky and white clouds on the Internet, there is also a hidden underflow, if you do not pay attention to it, a variety of network viruses may be "not please come ". In the event of a network virus attack on a LAN, the Internet access speed is not normal. In severe cases, the
The second layer switches the end-to-end data exchange based on the MAC address of the second layer of data link layer and routing through the station table. Because the station table is built and maintained by the switch automatically, and the router is a third-tier device, its addressing process is based on IP address and through the routing table and routing protocol generated. Therefore, the biggest advantage of the second layer of the
Laboratory Equipment:1 routeros5.24 Version Router1 Cisco 2960 Switches2 100M Telecom Bandwidth: 1 downstream 100M Uplink 8M, the other line 100M upstream 4MExperimental Purpose:Overlay multiple internet broadband to increase the company's network demand. In this experiment, there are only two broadband, it is possible to reach hundreds of broadband access, then use a network card access is not very realistic. Use the switch extension to increase the
"Natural selection, survival of the fittest" is the law of evolution of nature, but also applicable to the replacement of products, innovation means change, which means the elimination. Recalling the development process of the switch, passive wireless remote control switch will replace the traditional switch, into households.First, the birth of the switchSince Ed
Case four custom switches:
Function Introduction: The function of this case is to create a custom switch, you can decide the background of the switch. When the slide switch, the slider of the switch can follow the finger to move. When the finger is released, the slider slides to the right or to the far left, depending
It is also helpful to understand some of the knowledge about switch configuration, and here we explain the main statements and procedures for Cisco switch configuration. Last talk with you about how to properly connect the switch, today with some configuration clips to introduce the port configuration. Given that most of the online configuration cases are show-ru
The switch is the most important network connected device of LAN, and the management of the LAN mostly involves the management of the switch. However, many campus network network management on the switch configuration is still very unfamiliar, today we talk about what is a network management switch? What can a network
As a very important transport hub in a LAN, a switch directly determines the stability of the LAN. Generally, when the quality of the switch is relatively good, the switch equipment is rarely prone to failures. Of course, this does not mean that the switch equipment can always work stably, with the passage of its "serv
Set the IP address of the Brocade switch. The default IP address of the Brocade switch is 10.77.77.77. In command line mode, you can use the ipaddrset command to set and modify the IP address of the switch www.2cto.com swd77: admin> ipaddrsetEthernet IP Address [10.77.77.77]: # enter the IP Address that the switch need
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.