, you no longer need to broadcast all ports.In this process, the MAC address information of the entire network can be learned. The second-layer switch creates and maintains its own address table.The working principle of a L2 Switch can be inferred from the following three points:(1) because the
longer need to broadcast all ports. In this process, the MAC address information of the entire network can be learned. The second-layer switch creates and maintains its own address table. The working principle of a L2 Switch can be inferred from the following three points: (1) because the
network can be learned. The second-layer switch creates and maintains its own address table. The working principle of a L2 Switch can be inferred from the following three points:
(1) because the switch exchanges data on most ports at the same time, it requires a wide switch
choices, what are the 2-tier, 3-tier, and 7-tier switching technologies, and what are their respective environments?
The traditional layer 2nd Exchange technology
The 2-layer switching technology can identify the MAC address information in the data frame, forward according to the MAC address, and record the MAC addr
A layer-3 network is a layered layer-3 network. The three-tier network architecture adopts a hierarchical model design, which divides the complex network design into several layers. Each layer
the entire network can be learned. The second-layer switch creates and maintains its own address table.
The working principle of a L2 Switch can be inferred from the following three points:
1) because the switch exchanges data on most ports at the same time, it requires a w
rate of the vswitch is, no matter how fast the data transmission rate is, network congestion always exists in the network. This tells us from one side that the absence of Service Quality Control also means that data packets may be lost and the latency may increase. It can be seen that working on switches at a higher level, supporting quality services, relying on software operation and high-level management
Exchange technology is moving in two directions. One Direction is faster and faster, has jumped from the gigabit to the million trillion.
Another direction is from the initial 2-tier exchange to the 3-tier exchange, which has now been developed to the seventh layer of the Network application layer Exchange.
Figurativ
kinds of information that must be used for network communication: the protocol that the connection uses, the IP address of the local host, the protocol port of the local process, the IP address of the remote host, and the protocol port of the remote process.When the application layer communicates data through the transport layer, TCP encounters a problem that pr
Note: This note is written from the programming perspective, that is, the content is something I think is helpful for programming, rather than from the perspective of a network professional knowledge.
The Comparison of Different Computer Architectures: OSI Layer-7 protocol architecture, TCP/IP architecture, and five-layer protocol architecture:
It indicates the c
matter how fast the data transmission rate is, network congestion always exists in the network. This tells us from one side that the absence of Service Quality Control also means that data packets may be lost and the latency may increase. It can be seen that working on switches at a higher level, supporting quality services, relying on software operation and high-level management is an important position i
Tag:httpioosarsp Data divon code The Http://baike.baidu.com/view/69334.htmMAC (Media Access Control) address, or MAC location, is used to define the locations of network devices. In the OSI model, the third layer of the network layer is responsible for the NBSP;IP address, while the second
adding network bandwidth, this is an effective and simple method, no matter how high the vswitch's backboard bandwidth is.
No matter how large the packet forwarding rate of A vswitch is, no matter how fast the data transmission rate is, network congestion always exists in the network. This tells us from one side that the absence of Service Quality Control also m
broadcast all ports.
In this process, the MAC address information of the entire network can be learned. The second-layer switch creates and maintains its own address table.
The working principle of a L2 Switch can be inferred from the following three points:
(1) because the switch
matter how fast the data transmission rate is, network congestion always exists in the network. This tells us from one side that the absence of Service Quality Control also means that data packets may be lost and the latency may increase.
It can be seen that working on switches at a higher level, supporting quality services, relying on software operation and high-level management is an important position i
1,Layer-3 forwardingYesRoute information is requiredThe route selection in the forwarding process determines the final egress of the message,L3 SwitchJust put thisRoute functions are integrated into the switch ChipGo.
2,Route SelectionExistExact matchAndLongest matchTwo methods.
2.1,Exact matchThat is, the destination IP address and the route address information
protocol. Therefore, the biggest advantage of the second-layer switch is that the data transmission speed is fast, because it only needs to identify the MAC address in the data frame, and the algorithm for directly generating the forwarding Port Based on the MAC address is very simple, it is easy to use ASIC dedicated chips. Obviously, the second-layer
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.