Access switches that cannot be ignored during IP Broadband Network Construction

Source: Internet
Author: User

With the increasing popularity of multimedia applications and Internet access, the construction of networks has transformed traditional data networks into today's broadband networks. The adoption of Gigabit Ethernet technology and Ethernet to the user end has become one of the solutions.

A Broadband Network is a network that provides images, voice, and data at the same time. All network designers understand that this is a high-traffic, fast network to cope with massive information exchanges. In addition, this is a network with QoS to handle various applications with different requirements for latency and latency changes. Therefore, designers will carefully and strictly select the switch equipment of each brand for backbone construction. However, when it comes to the user end, considering the investment cost, the importance of the last kilometer is often ignored, and some general layer-2 switches or hubs are used. The requirement for a broadband network is actually end-to-end. The broadband applications and services cannot be provided to the user end due to the incorrect choice in the last step.

For example, the Multicast image Multicast function, if the access layer switch does not support Multicast, the image will become broadcast Flooding when it reaches the access layer switch). Traffic is sent to each user port, which not only increases the overall traffic of the switch, it also enables the user's computer to receive all broadcasts, which consumes the CPU resources of the user's computer and affects the user's applications.

SecureSwitch CP-3124/26 is a real access Layer Broadband switch. Provides every function required by broadband applications. It provides network security functions such as line rate switching, image multicast, QoS, MAC/IP Address binding, and port isolation.

Network Security

IP address, MAC address, and port binding-IP address theft is a common problem when network services are provided, which makes the network center unable to guarantee fees, it may cause errors and charges. IP/MAC address and port binding allow the network center to restrict each port to specify a MAC address and IP address, so that users cannot steal others' IP addresses to access the Internet or connect to the hub. Some network designers may consider using a VLAN for each port, but this design will waste a lot of IP addresses, and it is very troublesome to manage IP addresses. In addition, this will generate a large number of VLANs, greatly increasing the demand indicators of the Upper-layer switch routing, simplifying the entire network, reducing efficiency and increasing costs.

Port and port isolation-The CP-3124 can define isolation between each port, which can prevent some illegal users from entering other users' computers for illegal operations.

QoS and 4 queues per port

CP-3124/26 supports QoS 802.1 P and DiffServ. The CP-3124/26 can be stretched to the client regardless of the standard used by the Network trunk device. The vswitch does not support DiffServ. When an image package with the DiffServ label is switched from the network trunk to the access switch, the access switch will not be able to identify the level of priority indicated by the image Package label, resulting in the same treatment of images and other data services, and cannot guarantee the minimum latency required for images, therefore, the image transmission quality is affected, and the image may suffer from Jitters, non-synchronous sounds, and other phenomena.

 
Figure 4 hardware queues on each port process broadband applications

Each port of the CP-3124 is equipped with 4 hardware queues, which can perform QoS more effectively and improve service quality.

 
Figure

VLAN Tagging 

CP-3124/26 supports standard 802.1Q VLAN Tagging so that all VLANs can be combined with trunk applications.

This feature enables service providers to isolate users in different regions or services of different nature through VLAN definition, optimize network traffic while improving network security, and prevent broadcast storms.

Support for image Multicast

CP-3124/26 supports the IGMP and IGMP Snooping multicast functions of Layer2, can be combined with the main layer of Layer2/3 multicast, make image service like IP/TV broadcast, one-to-Multiple Remote Education Broadcasting can effectively adopt group broadcasting to the user end.

 
Figure

Multicast) not only minimizes the network trunk traffic during broadcasting, but also enables the client to only receive the selected service traffic ). For example 20 MPEG-1 (1.5 M) IP/TV channels, if the multicast function is used, the user selects a channel, only the specified channel 1.5 M traffic is sent to his PC. If it is broadcast, 30 M (1.5X20) of traffic will be sent to the user's PC.

High-Performance Management

CP-3124/26 supports SNMP V.1/V.2, snmp mib ii and RMON Level 4 network management standards, can be combined with the trunk layer equipment unified management. For example, the backbone uses Extreme/Networks exchange devices, you can use Extreme's network management platform, the EPI Center, to manage CP-3124/26 switches, monitor traffic or collect data.

CP-3124/26 also supports Port-Mirroing Port mirroring to facilitate monitoring and computing of various traffic.

Bandwidth Allocation Management 

CP-3124/26 can be based on the port, in 1 Mbps, control the traffic received or sent. In this way, you can effectively allocate different bandwidth based on Service Level Agreement of different Service levels and different charges.

  1. Layer-4 Gigabit access switch Evaluation
  2. Gigabit Access Switch

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.