There are three operations in the working principle of the switch: 1. Drop, that is, discard when the host under this port accesses the host under this port; 2. Forward, that is, when the host under a certain port accesses Forwarding when a host under a certain port is known; 3. Diffusion, that is, when a host under a certain port accesses a host under an unknown port, it needs to be flooded.
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
A switch is a network device used for forwarding electrical (optical) signals. It can provide an exclusive electrical signal path for any two network nodes connected to the switch. The most common switch is an Ethernet switch. The switch works on the second layer of the OSI reference model, the data link layer. The switch has a high-bandwidth back bus and internal switching matrix that can transmit data between multiple port pairs at the same time. The transmission modes of the switch include full-duplex, half-duplex, and full-duplex/half-duplex adaptive.
Working principle
Address table
The port address table records the host address under the port. MAC address. The port address table is automatically established after the switch is powered on,
is saved in RAM, and is automatically maintained.
The principle of a switch to isolate conflict domains is based on its port address table and forwarding decisions.
Forwarding decision
The forwarding decision of the switch has three operations: discarding, forwarding and flooding.
Discard: Discard when the host under this port accesses the host under this port.
Forwarding: forward when a host under a certain port accesses a known host under a certain port.
Diffusion: When a host under a certain port accesses a host under an unknown port, it needs to be flooded.
Every operation must record the MAC address of the sending end to prepare for access by other hosts.
Lifetime
Lifetime is the lifespan of an entry in the port address list. Each entry starts counting down after it is created, and the timer must be refreshed every time
data is sent. For hosts that do not send data for a long time, their MAC address entries will be deleted at the end of the lifetime.
So the port address table always records the MAC address of the most active host.
(4) It should be said that there is a lot worth learning about switches. Here we mainly introduce the switch structure and networking methods. Since the 1910s, network applications have become more and more widespread, and switches have played an important role as a link in the network. increasingly important role. Simply put, the switch just connects it to the user's computer to complete the data exchange between the computers. To put it more complicated, in terms of the position of the switch in the entire network, some high-level switches, such as three-layer switching and network-managed products, are not so simple in terms of switch structure.
Three-layer switch
Usually, ordinary switches only work on the data link layer, while routers work on the network layer. The powerful three-layer switch can work at the data link layer and network layer at the same time, and forward data packets based on the MAC address or IP address. However, it should be noted that the three-layer switch cannot completely replace the router, because it is mainly used to implement VLAN communication in two different subnets, rather than for complex path selection for data transmission.
Network management function
The management level supported by a switch reflects the manageability and operability of the device. Switches with network management functions can monitor the traffic of each port, set the rate of each port, and close/open port connections. By monitoring switch ports, it is easy to distinguish network business traffic and quickly define network faults, improving network manageability.
Port aggregation
This is an encapsulation technology. It is a point-to-point link. Both ends of the link can be switches or Switches and routers, but also hosts and switches or routers. Based on the port aggregation (Trunk) function, it allows parallel connections between switches and switches, switches and routers, hosts and switches or routers through two or more ports for simultaneous transmission to provide higher bandwidth and greater throughput, significantly providing the entire Network capabilities.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What are the operations included in the working principle of a switch?. For more information, please follow other related articles on the PHP Chinese website!

交换机的工作原理包括:1、数据帧接收和解析;2、转发表的更新;3、数据帧的转发;4、泛洪处理;5、维护连接。详细介绍:1、数据帧接收和解析,当交换机接收到一个数据帧时,它会首先对数据帧进行解析,提取出其中的源MAC地址和目的MAC地址等信息;2、转发表的更新,交换机内部维护着一个转发表,这个表记录了MAC地址与接口的对应关系;3、数据帧的转发等等。

交换机的工作原理是基于OSI参考模型的第二层,即数据链路层。交换机是一种基于学习过程的网络设备,它通过解析和转发数据帧来实现网络中不同设备之间的通信。交换机能够不断完善其内部转发表的内容,提高数据交换的效率和可靠性,同时确保连接的稳定性和安全性。交换机广泛应用于企业网络、数据中心和园区网等场景,为各种应用提供稳定、高效的连接服务。

博通公司最近宣布推出了Trident5-X12芯片,该芯片搭载了全新的NetGNT(网络通用神经网络流量分析器)片上神经网络推理引擎NetGNT与传统数据包处理不同,它能够并行工作,加强标准数据包处理管道。传统流水线一次只能处理一个数据包/路径,而NetGNT作为一个机器学习推理引擎,通过训练可以识别横跨整个芯片的各种流量模式。据了解,Trident5-X12芯片具有强大的软件编程功能和现场升级功能,提供高达16.0Terabits/秒的带宽,是Trident4-X9的两倍。此外,新型芯片还支持

下面以H3C交换机为例,介绍telnet服务的三种认证方式配置None认证模式配置步骤:[H3C]telnetserverenable//开启Telnet服务[H3C]user-interfacevty04//允许远程用户0-4共5个账户同时登陆[H3C-line-vty0-4]authentication-modenone//认证模式为none,不需要认证[H3C-line-vty0-4]user-rolelevel-3//设置登录用户权限Password认证模式配置步骤:[H3C]telne

交换机的主要功能是物理编址、网络拓扑结构、错误校验、帧序列以及流控;交换机是一种用于电光信号转发的网络设备,还具备了一些新的功能如对虚拟局域网的支持、对链路汇聚的支持,甚至有的还具有防火墙的功能。

交换机是一种用于电(光)信号转发的网络设备,它可以为接入交换机的任意两个网络节点提供独享的电信号通路。交换机只是用来分配网络数据的,它可以把很多主机连起来,这些主机对外各有各的IP;交换机工作在中继层,根据MAC地址寻址,且不能提供该功能。

区别:1、工作原理不同:交换机工作在中继层,主要根据MAC地址寻址。而路由器工作在网络层,根据IP地址寻址,并可以处理TCP/IP协议;2、功能不同:交换机可以使连接它的多台电脑组成局域网,但无法自动识别数据包发送和到达的地址。而路由器则负责自动识别数据包发送和到达的地址,并可以处理数据包的路由;3、使用场景不同:路由器通常用于一个地方的收发。而交换机用于连接多台电脑。

【实验名称】交换机的端口安全配置【实验目的】掌握交换机的端口安全功能,控制用户的安全接入【背景描述】你是一个公司的网络管理员,公司要求对网络进行严格控制。为了防止公司内部用户的IP地址冲突,防止公司内部的网络***和破坏行为。为每一位员工分配了固定的IP地址,并且限制只允许公司员工主机可以使用网络,不得随意连接其他主机。例如:某员工分配的IP地址是172.16.1.55/24,主机MAC地址是00-06-1B-DE-13-B4,该主机连接在1台2126G上边。【需求分析】针对交换机的所有端口,配

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Dreamweaver Mac version
Visual web development tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

Atom editor mac version download
The most popular open source editor

SublimeText3 Linux new version
SublimeText3 Linux latest version
