当前位置:网站首页>Switch and router technology-02-working principle of Ethernet switch
Switch and router technology-02-working principle of Ethernet switch
2022-07-27 17:29:00 【W spicy little prince】
Catalog
One 、 Ethernet switch
1.1 Early Ethernet
Early Ethernet : Shared networks
It is made up of hubs (HUB) Connected to a 、 Form a conflict domain / Broadcast area
1.2 Hub introduction
The main function of the hub is to regenerate the received signal Shaping amplification , With Expand the transmission distance of the network , At the same time, all nodes are concentrated on the nodes centered on it . Working on the physical level , There is no switch like " Intelligent memory " Ability and " Study " Ability . It doesn't have what a switch has MAC Address table , So when it sends data, it's not targeted , It is Send by broadcast , So it is called broadcast domain .
When different hosts meanwhile Conflicts occur when sending data to the hub , To form a Conflict domain , And the bandwidth is shared .

When the host 1 Host computer 2 When sending data , host 3 Also to the host 4 send data , There will be conflict , And bandwidth sharing .
1.3 Switched network
Now it's using Switched network ( Ethernet switch )
Adopt broadcast domain , It is simply understood as : A switch in the same network is a broadcast domain
radio broadcast : The way of information dissemination , A device in the network , At the same time, a message is sent to all devices in the network
One to many
The network connected by a switch is called in a broadcast domain , Bandwidth will not be shared 、 Working at the data link layer
1.4 How switches work

When the host A to B When sending data , When you get to the switch , from 1 No. 1 interface receives
The switch works on the second floor , So I will check the data link layer , Source and destination in data frame MAC, Then compare one maintained in the switch MAC surface , Check the sender host A Is your address recorded in MAC In the table . If there is no record of learning ( host A— Interface 1)
Continue to check the purpose MAC Address , If not, forward it by broadcasting ( All connection interfaces except switch interface 2、3) get out 、 host B And host C All will receive data
host B and C Data will be unsealed , Check the purpose MAC Is it myself , If it's not your own , Dispose of it
host B Will respond to the switch , Exchange opportunities to view hosts B Source MAC Address , Because there's no record , Will learn to record ( host B— Interface 2) And check the purpose MAC The address is host A, host A stay MAC There are records in the table , Therefore, the switch forwards unicast according to the corresponding interface ( one-on-one )
If MAC Table has host A and B Of MAC Record , At the beginning, you will find the corresponding port and forward it .
MAC The table maintains the sender's MAC Correspondence between address and interface .
1.5 summary
When the switch receives a data frame , First Learning sources MAC The address records to MAC surface ( Source MAC— Interface number ), Then proceed Broadcast data frames , All interfaces except the switch receiving interface will receive the broadcast . All interfaces will be de encapsulated by the corresponding host , Check the purpose MAC Is it myself , If so, reseal the data , and Respond To switch , Switch received response , View source MAC Address , and Learning record stay MAC In the table ( Source MAC— Interface number ), Continue to check the purpose MAC, Find out MAC The table already exists , Then proceed with Unicast forwarding , Forward it according to the corresponding interface , Other hosts that receive broadcast information , Unpack view purpose MAC Not directly Discard processing . Next time, the data will be forwarded directly by unicast forwarding .
1.5 Switch operating mode
Simplex : Data can only be transmitted in one direction
Half duplex : Data can be transmitted in both directions , But not at the same time
full duplex : Data can be transmitted Bi directionally and simultaneously // At present, they are basically full duplex
1.6 Switch interface rate
10Mbps
100Mbps
1000Mbps
边栏推荐
- Xcode releases test package testflight
- Shell编程规范与变量
- 交换机和路由器技术-03-交换机基本配置
- 技术实践干货 | 从工作流到工作流
- 三表联查1
- Can deep learning overturn video codec? The first prize winner of the National Technological Invention Award nags you in the little red book
- App crash collection and analysis
- 记一次 .NET 某智慧物流 WCS系统 CPU 爆高分析
- Explain the pile of binary trees in detail
- Day07 operation
猜你喜欢

记一次 .NET 某智慧物流 WCS系统 CPU 爆高分析

Lichuang EDA - PCB layout (IV)

Microsoft silently donated $10000 to curl, which was not notified until half a year later

The chess robot broke the finger of a 7-year-old boy. Netizen: it violated the first law of robots

交换机和路由器技术-02-以太网交换机工作原理

Chen Yili of ICT Institute: reducing cost and increasing efficiency is the greatest value of cloud native applications

SAP UI5 FileUploader 使用的隐藏 iframe 和 form 元素的设计明细

Two table joint query 1

New attributes of ES6 array

大排量硬核产品来袭,坦克品牌能否冲破自主品牌天花板?
随机推荐
KMP template - string matching
交换机和路由器技术-02-以太网交换机工作原理
Explain the pile of binary trees in detail
Basic use and optimization of uitableview
URL return nil and urlhash processing
项目练习:表格的查改功能
The chess robot broke the finger of a 7-year-old boy. Netizen: it violated the first law of robots
$attrs与$listeners组件传值
Mobile end Foundation
步 IE 后尘,Firefox 的衰落成必然?
下棋机器人折断7岁男孩手指,网友:违反了机器人第一定律
New attributes of ES6 array
20年前,他是马云最大的敌人
三表联查1
技术实践干货 | 从工作流到工作流
Flex flex flex box layout 2
三表联查2
Why is domestic Xinguan oral medicine a drug for the treatment of AIDS
Niuke topic - the minimum number of K
Shell programming specifications and variables