CN / EN

0755-66849001

Company News Industry Information 當前位置:首頁 > News > Industry Information

How much do you know about coβ‍mmon related terms in switches?
發布時(shí)間(jiān):2023-07>ε←-07

Switches are one of the most common×€♦ devices in the weak powe‍ α≥r industry, so how much do you±  know about switch-related terms? To∑♠day take you to understand t∏±ogether!

Body text:

1. Switch

Switch is a device used to>↓​ realize the switched net¶Ω¥work, in the iSO OSI model, it is lo∞α↑÷cated in the second layer - d♣αata link layer of equipment, ↑¥ ÷can operate on the frame, is an inteβ•lligent device.

2. IEEE 802.3

Ethernet standards.

3. IEEE 802.3u

Fast Ethernet standard.

4. IEEE 802.3ab

Gigabit Ethernet (unshie×​✘lded twisted pair) stφ♦±andard.

5. IEEE 802.3z

Gigabit Ethernet (optical fiber, cop™​ per) standard.
IEEE 802.3x

Flow control standards.

7. IEEE 802.1X

Port-based access control standarλ±÷ds.

8. IEEE 802.1q

VLAN standard.

9. IEEE 802.1p

Traffic priority contε rol standard.

10. IEEE 802.1d

Spanning tree protocol

11. Data link layer

Located at the second layer of the I​π¥SO/OSI reference model, it is respon→£§sible for error-free <←$×transmission of one frame of d¶↓φata over the line between no☆∑×des through a series of mea÷∑€ ns such as detection, flow con ↔ trol, and retransmiss∏¥σion, so that from its ←÷previous layer (the network laφ$αyer) it appears to be an error-fre©Ω₹λe link.

12. Full and half duplex×∑¶λ

In the network, full duplex means t‌÷₩↑hat receiving and sendin•∏‌g use two independen€$t channels, which can★>§✔ be carried out at the same time±απ without interfering with each other.φ×™λ Half duplex is to receive and se≈λnd the same channel, at"  the same time can on≥¶ly send or receive, so half duplex "×>§may cause conflicts. The switch we are ≥&☆talking about is a fullΩε←-duplex device, and the hub is a ha←γ×lf-duplex device.

13. MAC address

The MAC address is t≥☆Ωφhe address used in the media access ←©layer, which is the physicΩγ±al address of the network card (LAN ×∑ ↔node). In the physical tran×$smission process at the b±α↔ottom of the network, the host (LAN​≈"→ node) is identified by the ph™βysical address, which is generall$'♦ y unique in the world. Nowadays, MAC a$∞★‍ddresses are generally 6 bytes and 48↔← bits.

14. IP address

An IP address is a 32-bit addres£₩£s assigned to each host connected to t↑₹he Internet. Each host canσ$≠€ be accessed through an IP address.

15. Auto-Negotiation

The Auto-Negotiation standard ADAP​×TS the switch to the →™¶operating rate and operating mode iσ♦φn the following order: 100M f₽←ull duplex, 100M half duplex, 1‌∑₹0M full duplex, 10M half duplex.

16. Full duplex flow contro∑•≈ l

Following the IEEE 802.3x standard, netβ♠work devices use predefined Pa↑≤use frames for flow con‍ •πtrol when the network is congested.

17. Half duplex flow contro β✘l (Backpressure technology Backpressu≤ ¶↕re)

Based on the IEEE802.σ±3x standard, when the processor €∞π‍finds that the buffer is about to filΩλ©₽l up, it sends a false collisio¥ n signal to the source station, delays÷>♣ it for a random time, and then con≥ ≈tinues transmitting. Can reliφγ∞ eve and eliminate congesti↓‍on.

18. Line speed

Theoretical maximum ↑‌value of data forwarded by the switchλ¥.

19. Broadcast storm cont≠∑≥πrol

Abnormal phenomenon in which ←π€‌the number of broadcast frames on t'®he network (as a result "​£"of being forwarded) increas≥£₽↓es dramatically and affects normal netδ✔work communication. Broadcast s♣£torms can occupy a cons×∑iderable amount of network bandwidth↕>♠β and cause the entire netw δ✔ork to fail to function properly. Broa↓Ωdcast storm control allows ports to✘& filter broadcast storms thaσ♣£t occur on the netwoβ≥¶rk. After broadcast storm control  ₩≈₽is enabled, the port automatica$γσlly discards the rec×§¥πeived broadcast frames when the₩  ‌ number of broadcast frames reaches a p <reset threshold. If this function is&÷ disabled or the num£≠φ↑ber of broadcast frames does no ‍₹πt reach the threshold,₩÷ broadcast frames are norma& ✘λlly broadcast to other≠→ ₹ ports on the switch.


20. TRUNK (Port aggregation"$‍σ)

It is often used to aggregate ‌β​πmultiple ports together to form aσ± high-bandwidth data tr→γ↓>ansmission channel. The sw∏ ↑₩itch treats all port₩•s clustered together as one l∑€≠✔ogical port.

21. VLAN (VirtualLocal±≤‌♥ Area Network)

Is a broadcast domain§> composed of a group of termiε∞δnal workstations, hosts in the sa∞↕←↓me VLAN (switch port) '$©€can communicate with each other, it d≠♣‍oes not need to consider theσ ≥ specific cabling st≤®→​ructure can establish a logical working♥₩☆' group. Flexible configuration improv☆•εes system security.

22. Port VLAN

Port-based VLAN: Ports on the♥✘γ same VLAN can communica↓© te with each other.

23. Tag VLAN

Based on IEEE 802.1Q, different vl¶γδans are divided by VID.<✔♦

24. VID (VLAN ID)

Id of a VLAN, which is use₽ε↕★d to represent a Tag↓< VLAN.

25. MTU VLAN

When configuring the ★εVLAN on the switch, the ports occupie→Ωd by each user and the uplink p§•∞βorts are divided into a separate VLAN&‌.

26. MAC address aging time

Each port on the switch has t↑ he function of automaticalεδ"ly learning addresses βλ. The source addresseφ₩←✔s (source MAC address andε£ switch port number) of frames ♥ sent and received th©£∏©rough the port are stored₩α×₩ in the address table. Aginλ÷↓✘g time is a parameter that af↓¶€←fects the learning process of a s↕¥€witch. The time starts af© πter an address record is added to&♥ the address table. If the ports ≥"‌do not receive frames  ÷₹€with the source MAC addres↓δ÷$s within the aging time, these addres≠↔&ses are deleted from the dyn↔™>¥amic forwarding addres¶∏÷s table (consisting of the sourceΩ  MAC address, destination MAC a ↑÷®ddress, and the correspon<∑ding switch port numλ≠πber). Static MAC address table is‌↔  not affected by the address agi¶®→ng time.

27. Static address table

Static MAC addresses areφ>₽★ different from learned <¥φ dynamic MAC addresses. Once a static ✘↑address is added, the address r&£emains valid until it ★♠₹is deleted and is not subject t∏•αo the maximum aging t₩ ime. The static addre•≤ss table records the static add≥δεresses of ports. A MAC add©ε'γress in a static address table corr'←βesponds to a port. If this is set, φ★↓Ωall data sent to this add∞$​ress is forwarded only to this port.↓"→× Also known as MAC a∏σ£ddress binding.

28.MAC address filtering

MAC address filtering Allλ∑ows the switch to filter data frames™&₽ that are not expected to be forw ₽‍arded. When a restricted MAC address ¶✔ ÷is connected to the s‌™<™witch, the switch automati↑<✘cally filters out the frame‍↑s whose destination addressασ is this address for s ₩ecurity purposes. The φ addresses in the filterα±ing address table are valid for all sw™÷itch ports. An address that ↔∞β®has been added to the filtering₩π® address table cannot be added to the s↓≈tatic address table or dynamicall>'​y bound to a port.

29. Dynamic MAC address bind♣ ing

Dynamic address bindin☆∏♠g means that ports on thσ e switch can dynamically le¶©&arn MAC addresses in the dynamic&$"✔ address binding stat↕"♥e. However, the number of addresses t✔↑hat can be learned is limited. When a pβ¥π♥ort learns a MAC addressπΩ✘, it is bound immediately and learns±™ the next MAC address. Th♠'e bound address is not limited by×✔✘$ the aging time and takes effect all↔✔→ the time. After the​  port learns a certain nu↕π‌mber of addresses, i± ×t does not learn and biδ©nd any more. The MAC address bo↔♠& und by a port is deleted only aft♠σ>er the port address binding function is∑∑  disabled or the switch is restarted∑™¶∞.

30. Port security

After port security is enabled on‌∞ a port, the port does noγ​'t learn new MAC addresses and '♣forwards only the lea"≥rned MAC addresses. Other data fraΩδ€mes are discarded. If the sourceΩ♦↓₩ address of the frame sent to☆&  the switch is a member♠★ of the MAC address ta≤©ble of the port, the frame can be fΩ÷≠ orwarded. Otherwise, the frame is ≤∏±discarded. When Disable is selected foγ€₽≈r a port, the port automatically ε¥learns a new MAC address and forwar∏©✔ds received frames.

31. Port bandwidth control

The input/output data t₽≠ransfer rate of each p♥×λ€ort (except the module port♠γ♥>) can be limited by bandwidth≈₽.

32. Port monitoring

Port monitoring replicates t♦δδhe packets from the ‍₹→monitored port to the monitor≠£•♣ing port. A host installed with the ε✔→¶data packet analysis softwσ←πare is connected to the moni&₹toring port. The network ad↑γ♦≠ministrator analyzes the co♥<llected data packets to monitoδ‌> r the network and rectify networ≥‍≥↓k faults.

33. Check cables

When the switch port is c≠☆onnected to a suitable < twisted pair, you can test ©'the status of the twisted pair throu•÷×gh the switch to confirm whether there Ω™ ∑is a problem and where t¥ ∞∞he problem occurs.

34. SNMP

Simple NetworkManagement Protocol γ≠✘&(SNMP) is an OSI Layer 7 (apε&$∑plication layer) protocol used♥₩ to remotely monitor and configure netw"σ∑φork devices. SNMP enable>∞​§s network management workstations t÷↓↓₩o read and modify the Setti®§ngs of gateways, routers,<®< switches, and other network devices.↑"<σ

35. InternetGroup Management Protocol Ω≠(IGMP)

IP manages multicast comm≈♠×¥unications through the use of switc"εhes, multicast routers, and IG☆©σMP-enabled hosts. A group of hosΩ₩ts, routers (or switches) commu÷π₹♥nicate multicast data stream $Ωs with members belonging to the sam•γ™e multicast group. And all dev•↕♠βices in this group use the same mu​€lticast group address.♣ •↔ IGMP Snooping greatly impr✘®πoves network utilizat♣>ion for applications such as VOD. In ♦ ♦the network, when conducting IP multic•♣$ast communication for a wide variety¶× of multimedia applications, you can ±∞reduce unnecessary ba↕≤<™ndwidth usage by settin¶‌→g IGMP on each port of theα ↓ switch.

36. IEEE 802.1D/STP

When the IEEE 802.1D Spanning Tree‍₽↓≥ Protocol detects loops on the network,£∞ ♦ loops are automatically disconnected. £≈If multiple connectio¥€ns exist between switches, on<∞γ ly the most important connectio✔®✘n is enabled, and all other co↕€←nnections are blocked and ¶≥ become standby connec↑ ¶‌tions. When the primary connect♠↑©‌ion fails, the spanning tree protoc✘πβ↔ol automatically uses the se£&​↓condary connection to take over t‌αεhe primary connection wi♠•πthout any manual intervent₹€ion.

37. IEEE 802.1X authentication protoco↔☆≠πl

Port-based Access Control Protoc×λ∑♣ol (Port BaseNetwork Access Contro¶§l Protocol). The protocol arch≥≥♦✔itecture is divided int ¶®♠o three parts: client, auth₽₹®≥entication system and authentication se'εφ≈rver.