Switches are one of the most common×€♦ devices in the weak powe α≥r industry, so how much do you± know about switch-related terms? To∑♠day take you to understand t∏±ogether!
Body text:
1. Switch
Switch is a device used to>↓ realize the switched net¶Ω¥work, in the iSO OSI model, it is lo∞α↑÷cated in the second layer - d♣αata link layer of equipment, ↑¥ ÷can operate on the frame, is an inteβ•lligent device.
2. IEEE 802.3
Ethernet standards.
3. IEEE 802.3u
Fast Ethernet standard.
4. IEEE 802.3ab
Gigabit Ethernet (unshie×✘lded twisted pair) stφ♦±andard.
5. IEEE 802.3z
Gigabit Ethernet (optical fiber, cop™ per) standard.
IEEE 802.3x
Flow control standards.
7. IEEE 802.1X
Port-based access control standarλ±÷ds.
8. IEEE 802.1q
VLAN standard.
9. IEEE 802.1p
Traffic priority contε rol standard.
10. IEEE 802.1d
Spanning tree protocol
11. Data link layer
Located at the second layer of the Iπ¥SO/OSI reference model, it is respon→£§sible for error-free <←$×transmission of one frame of d¶↓φata over the line between no☆∑×des through a series of mea÷∑€ ns such as detection, flow con ↔ trol, and retransmiss∏¥σion, so that from its ←÷previous layer (the network laφ$αyer) it appears to be an error-fre©Ω₹λe link.
12. Full and half duplex×∑¶λ
In the network, full duplex means t÷₩↑hat receiving and sendin•∏g use two independen€$t channels, which can★>§✔ be carried out at the same time±απ without interfering with each other.φ×™λ Half duplex is to receive and se≈λnd the same channel, at" the same time can on≥¶ly send or receive, so half duplex "×>§may cause conflicts. The switch we are ≥&☆talking about is a fullΩε←-duplex device, and the hub is a ha←γ×lf-duplex device.
13. MAC address
The MAC address is t≥☆Ωφhe address used in the media access ←©layer, which is the physicΩγ±al address of the network card (LAN ×∑ ↔node). In the physical tran×$smission process at the b±α↔ottom of the network, the host (LAN≈"→ node) is identified by the ph™βysical address, which is generall$'♦ y unique in the world. Nowadays, MAC a$∞★ddresses are generally 6 bytes and 48↔← bits.
14. IP address
An IP address is a 32-bit addres£₩£s assigned to each host connected to t↑₹he Internet. Each host canσ$≠€ be accessed through an IP address.
15. Auto-Negotiation
The Auto-Negotiation standard ADAP×TS the switch to the →™¶operating rate and operating mode iσ♦φn the following order: 100M f₽←ull duplex, 100M half duplex, 1∑₹0M full duplex, 10M half duplex.
16. Full duplex flow contro∑•≈ l
Following the IEEE 802.3x standard, netβ♠work devices use predefined Pa↑≤use frames for flow con •πtrol when the network is congested.
17. Half duplex flow contro β✘l (Backpressure technology Backpressu≤ ¶↕re)
Based on the IEEE802.σ±3x standard, when the processor €∞πfinds that the buffer is about to filΩλ©₽l up, it sends a false collisio¥ n signal to the source station, delays÷>♣ it for a random time, and then con≥ ≈tinues transmitting. Can reliφγ∞ eve and eliminate congesti↓on.
18. Line speed
Theoretical maximum ↑value of data forwarded by the switchλ¥.
19. Broadcast storm cont≠∑≥πrol
Abnormal phenomenon in which ←π€the number of broadcast frames on t'®he network (as a result "£"of being forwarded) increas≥£₽↓es dramatically and affects normal netδ✔work communication. Broadcast s♣£torms can occupy a cons×∑iderable amount of network bandwidth↕>♠β and cause the entire netw δ✔ork to fail to function properly. Broa↓Ωdcast storm control allows ports to✘& filter broadcast storms thaσ♣£t occur on the netwoβ≥¶rk. After broadcast storm control ₩≈₽is enabled, the port automatica$γσlly discards the rec×§¥πeived broadcast frames when the₩ number of broadcast frames reaches a p <reset threshold. If this function is&÷ disabled or the num£≠φ↑ber of broadcast frames does no ₹πt reach the threshold,₩÷ broadcast frames are norma& ✘λlly broadcast to other≠→ ₹ ports on the switch.
20. TRUNK (Port aggregation"$σ)
It is often used to aggregate βπmultiple ports together to form aσ± high-bandwidth data tr→γ↓>ansmission channel. The sw∏ ↑₩itch treats all port₩•s clustered together as one l∑€≠✔ogical port.
21. VLAN (VirtualLocal±≤♥ Area Network)
Is a broadcast domain§> composed of a group of termiε∞δnal workstations, hosts in the sa∞↕←↓me VLAN (switch port) '$©€can communicate with each other, it d≠♣oes not need to consider theσ ≥ specific cabling st≤®→ructure can establish a logical working♥₩☆' group. Flexible configuration improv☆•εes system security.
22. Port VLAN
Port-based VLAN: Ports on the♥✘γ same VLAN can communica↓© te with each other.
23. Tag VLAN
Based on IEEE 802.1Q, different vl¶γδans are divided by VID.<✔♦
24. VID (VLAN ID)
Id of a VLAN, which is use₽ε↕★d to represent a Tag↓< VLAN.
25. MTU VLAN
When configuring the ★εVLAN on the switch, the ports occupie→Ωd by each user and the uplink p§•∞βorts are divided into a separate VLAN&.
26. MAC address aging time
Each port on the switch has t↑ he function of automaticalεδ"ly learning addresses βλ. The source addresseφ₩←✔s (source MAC address andε£ switch port number) of frames ♥ sent and received th©£∏©rough the port are stored₩α×₩ in the address table. Aginλ÷↓✘g time is a parameter that af↓¶€←fects the learning process of a s↕¥€witch. The time starts af© πter an address record is added to&♥ the address table. If the ports ≥"do not receive frames ÷₹€with the source MAC addres↓δ÷$s within the aging time, these addres≠↔&ses are deleted from the dyn↔™>¥amic forwarding addres¶∏÷s table (consisting of the sourceΩ MAC address, destination MAC a ↑÷®ddress, and the correspon<∑ding switch port numλ≠πber). Static MAC address table is↔ not affected by the address agi¶®→ng time.
27. Static address table
Static MAC addresses areφ>₽★ different from learned <¥φ dynamic MAC addresses. Once a static ✘↑address is added, the address r&£emains valid until it ★♠₹is deleted and is not subject t∏•αo the maximum aging t₩ ime. The static addre•≤ss table records the static add≥δεresses of ports. A MAC add©ε'γress in a static address table corr'←βesponds to a port. If this is set, φ★↓Ωall data sent to this add∞$ress is forwarded only to this port.↓"→× Also known as MAC a∏σ£ddress binding.
28.MAC address filtering
MAC address filtering Allλ∑ows the switch to filter data frames™&₽ that are not expected to be forw ₽arded. When a restricted MAC address ¶✔ ÷is connected to the s™<™witch, the switch automati↑<✘cally filters out the frame↑s whose destination addressασ is this address for s ₩ecurity purposes. The φ addresses in the filterα±ing address table are valid for all sw™÷itch ports. An address that ↔∞β®has been added to the filtering₩π® address table cannot be added to the s↓≈tatic address table or dynamicall>'y bound to a port.
29. Dynamic MAC address bind♣ ing
Dynamic address bindin☆∏♠g means that ports on thσ e switch can dynamically le¶©&arn MAC addresses in the dynamic&$"✔ address binding stat↕"♥e. However, the number of addresses t✔↑hat can be learned is limited. When a pβ¥π♥ort learns a MAC addressπΩ✘, it is bound immediately and learns±™ the next MAC address. Th♠'e bound address is not limited by×✔✘$ the aging time and takes effect all↔✔→ the time. After the port learns a certain nu↕πmber of addresses, i± ×t does not learn and biδ©nd any more. The MAC address bo↔♠& und by a port is deleted only aft♠σ>er the port address binding function is∑∑ disabled or the switch is restarted∑™¶∞.
30. Port security
After port security is enabled on∞ a port, the port does noγ't learn new MAC addresses and '♣forwards only the lea"≥rned MAC addresses. Other data fraΩδ€mes are discarded. If the sourceΩ♦↓₩ address of the frame sent to☆& the switch is a member♠★ of the MAC address ta≤©ble of the port, the frame can be fΩ÷≠ orwarded. Otherwise, the frame is ≤∏±discarded. When Disable is selected foγ€₽≈r a port, the port automatically ε¥learns a new MAC address and forwar∏©✔ds received frames.
31. Port bandwidth control
The input/output data t₽≠ransfer rate of each p♥×λ€ort (except the module port♠γ♥>) can be limited by bandwidth≈₽.
32. Port monitoring
Port monitoring replicates t♦δδhe packets from the ₹→monitored port to the monitor≠£•♣ing port. A host installed with the ε✔→¶data packet analysis softwσ←πare is connected to the moni&₹toring port. The network ad↑γ♦≠ministrator analyzes the co♥<llected data packets to monitoδ> r the network and rectify networ≥≥↓k faults.
33. Check cables
When the switch port is c≠☆onnected to a suitable < twisted pair, you can test ©'the status of the twisted pair throu•÷×gh the switch to confirm whether there Ω™ ∑is a problem and where t¥ ∞∞he problem occurs.
34. SNMP
Simple NetworkManagement Protocol γ≠✘&(SNMP) is an OSI Layer 7 (apε&$∑plication layer) protocol used♥₩ to remotely monitor and configure netw"σ∑φork devices. SNMP enable>∞§s network management workstations t÷↓↓₩o read and modify the Setti®§ngs of gateways, routers,<®< switches, and other network devices.↑"<σ
35. InternetGroup Management Protocol Ω≠(IGMP)
IP manages multicast comm≈♠×¥unications through the use of switc"εhes, multicast routers, and IG☆©σMP-enabled hosts. A group of hosΩ₩ts, routers (or switches) commu÷π₹♥nicate multicast data stream $Ωs with members belonging to the sam•γ™e multicast group. And all dev•↕♠βices in this group use the same mu€lticast group address.♣ •↔ IGMP Snooping greatly impr✘®πoves network utilizat♣>ion for applications such as VOD. In ♦ ♦the network, when conducting IP multic•♣$ast communication for a wide variety¶× of multimedia applications, you can ±∞reduce unnecessary ba↕≤<™ndwidth usage by settin¶→g IGMP on each port of theα ↓ switch.
36. IEEE 802.1D/STP
When the IEEE 802.1D Spanning Tree₽↓≥ Protocol detects loops on the network,£∞ ♦ loops are automatically disconnected. £≈If multiple connectio¥€ns exist between switches, on<∞γ ly the most important connectio✔®✘n is enabled, and all other co↕€←nnections are blocked and ¶≥ become standby connec↑ ¶tions. When the primary connect♠↑©ion fails, the spanning tree protoc✘πβ↔ol automatically uses the se£&↓condary connection to take over tαεhe primary connection wi♠•πthout any manual intervent₹€ion.
37. IEEE 802.1X authentication protoco↔☆≠πl
Port-based Access Control Protoc×λ∑♣ol (Port BaseNetwork Access Contro¶§l Protocol). The protocol arch≥≥♦✔itecture is divided int ¶®♠o three parts: client, auth₽₹®≥entication system and authentication se'εφ≈rver.