Network Basic 1 vswitch vro7 OSI7 layer model, network basic osi7

Source: Internet
Author: User

Network Basic 1 vswitch vro7 OSI7 layer model, network basic osi7
Chapter 2 network basics 1st network appearance

Solve computer communication requirements

Computer Information can be transferred

1.2 Basic Requirements for communication between hosts (three elements)

①. Physical connections must be established between two hosts. physical connections include network cables, optical fiber cables, and wifi and Bluetooth. These methods are collectively referred to as media;

②. The two hosts can identify data information and use the established protocol standards in binary mode.

③ Convert the binary number into an electrical signal so that the media can identify the transmission and use the NIC to send/receive data:

When sending data, convert the binary data to an electrical signal.

Restores an electrical signal to a binary number when receiving data.

Different signals are modulated or received through the NIC; 10 M 100 M 1000 M 100 Mbps = M bits can be transmitted per second

1.2.1 network cable and optical fiber

An electrical signal is transmitted using a network cable.

Optical signals are transmitted using optical fibers.

1.2.2 information transmission in Computer

The computer uses binary to represent data information:

Instance 1-1 for example:

Hello = 01 01 = Hi, use high voltage to identify binary signal 0 low voltage 1 High Voltage

Instance 1-2 multiple consecutive high/low voltage

000 111 ==>> only one signal is received and sent per second

There will be a corresponding network rate of 100 mbps = The number of packets transmitted per second on the NIC

100 M = 100000 K = 100000000bit 0 1 collectively referred to as bit stream)

1.2.3 three factors affect network transmission efficiency

The sender's Nic Rate

Nic speed of the receiver

Transmission rate of transmission media

1.2.4 Data byte and bit conversion formula

Network FIELD: identifying data information --- bit

System field: Identify data information-byte bytes

1 byte = 8bit 1bit = 1/8 byte

Chapter 2 Why do vswitches and vrouters need vswitches 2.1.1

To achieve mutual communication between multiple hosts

A vswitch can isolate conflicting domains, but cannot isolate broadcast domains.

2.1.2 requirements for mutual communication between vswitches

01) find the person who needs to accept my information and implement it through broadcast in an exchange network.

02) Let the recipient know that the received information is sent to him. The network ID, that is, the mac address, must be used.

The mac address is a physical address, which is globally unique.

03) when too many broadcast packets are sent in the network, the performance of hosts on the network is also affected,

This problem is called a broadcast storm.

The impact of a broadcast storm is only in one LAN.

In a LAN, all hosts are in a broadcast domain, and the number of ports in a vswitch is the number of conflicting domains.

2.1.3 vswitch features

All terminal devices connected to the port of a vswitch are in one CIDR Block (called a broadcast domain)

In addition, a CIDR block has a uniform network ID, which will generate broadcast consumption of device cpu resources.

A vswitch can isolate conflicting domains. Each port is a conflicting domain.

Terminal Device Access

Basic Security Functions

2.1.4 broadcast storm

Broadcast storm (broadcast storm) means that when broadcast data is flooded with the network and cannot be processed, it occupies a large amount of network bandwidth, leading to the failure of normal services or even complete paralysis, this caused a "broadcast storm ". A data frame or packet is transmitted to each node on the primary network segment (defined by the broadcast domain). Due to Network Topology Design and connection problems, or for other reasons, the broadcast can be replicated in a large number in the network segment, transmitting data frames, resulting in a decline in network performance, or even network paralysis. This is a broadcast storm.

2.2 why vro2.2.2.1

It is necessary to isolate broadcast storms so that hosts in different LAN can communicate with each other.

2.2.2 interconnection of multiple routers

When multiple routers are interconnected and route table information is unified and consistent, it is called "route table convergence". When routers whisper to each other, the router protocol is used to achieve route convergence.

2.2.3 host identity information

Lan code + host code = router ID information

Network Segment (Network Address) + host address = IP Address

2.3 routing protocol 2.3.1 static Router Protocol

You need to manually specify the target network that I want to arrive at. Which interface does the router use to connect

(Fast route table convergence)

2.3.2 dynamic Router Protocol

In broadcast-like mode, each vro informs other connected vrouters of the networks I connect.

(Easy configuration and operation-rip ospf)

2.4 broadcast domain and conflict domain

Router: each port is a broadcast domain and a conflict domain.

Vswitch: each port is a conflict domain, and one vswitch has a broadcast domain.

Chapter 2 network division 3rd network hierarchy

Core layer, aggregation layer, and access layer

3.1.1 core layer

The core layer mainly aims to provide oil painting and reliable Backbone Transmission Structure through high-speed forwarding communication. Therefore, the core layer switch should have higher reliability, performance, and throughput.

3.1.2 aggregation Layer

The component located between the access layer and the core layer is called the distribution layer or aggregation layer. The convergence layer switching layer is the aggregation point of multiple access layer switches. It must be able to process all traffic from the access layer devices, and provides the uplink link to the core layer. Therefore, compared with the access layer switch, the aggregation layer switch requires higher performance, fewer interfaces, and higher switching rate.

3.1.3 access layer

The access layer is usually called the access layer, which allows end users to connect to the network. Therefore, the access layer switch has the characteristics of low cost and high port density.

3.2 by scale

Lan, man, Wan

3.2.1 LAN

Local private network. If it is a large-scale LAN, it will also become a shared campus network.

3.2.2 man

If a network covers an urban area, it can become a man.

3.2.3 Wan

If the covered area reaches the whole country or the whole world, it will become a wan. The world's largest Wan is the internet.

Chapter 2 OSI7 Layer Model composition 4th Model Structure

From top to bottom.

Layer

Function

Data Unit

 

Application Layer

Network process to application. The Protocol, timing, and representation of specific application layers are encapsulated. Software is used in the end system, such as HTTP.

Data

(Data)

Host Layer

Presentation Layer

Data Representation, encryption and decryption, convert machine-related data into machine-independent data. Specifies the format of the data, such as format conversion.

Session Layer

Communication between hosts to manage sessions between applications. Specifies the communication sequence; defines and synchronizes data exchanges, and creates checkpoints.

Transport Layer

Data packets are reliably distributed among nodes in the network. All legacy transmission problems; multiplexing; traffic; reliable o

Segments

(Data Segment)

Network Layer

Address Allocation, routing, and (not necessarily reliable) packet distribution between nodes in the network. Routing (IP addressing); congestion control.

Datax Network Group/data packet

Media Layer

Data Link Layer

A reliable point-to-point data straight line. CRC code; multi-channel access; Addressing

Bit/Frame (data Frame)

Physical Layer

A (not necessarily reliable) point-to-point straight line data. Define mechanical properties; electrical properties; functional characteristics; Process Characteristics

Bit)

Thoughts: How to Use the OSI7 layer model to achieve interconnectivity between hosts

 

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.