Presentation is loading. Please wait.

Presentation is loading. Please wait.

STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.

Similar presentations


Presentation on theme: "STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through."— Presentation transcript:

1 STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through switching. A switch performing store-and-forward will wait to forward a frame until it has received the entire frame. It is most often used in environments supporting reliable physical or data link protocols. A cut through switch will forward the data before it has completed receiving the frame.

2 A received frame is often checked for errors before being forwarded Cut-through switching does not offer this advantage, so the switch might forward frames containing errors. All cut-through switches have no RAM buffers for storing frames.

3 3 Cut-Through Switching Buffering a frame takes time – Suppose L is the length of the frame – And R is the transmission rate of the links – Then, receiving the frame takes L/R time units Buffering delay can be a high fraction of total delay – Propagation delay is small over short distances – Making buffering delay a large fraction of total – Analogy: large group walking through NYC A B switches

4 4 Cut-Through Switching Start transmitting as soon as possible – Inspect the frame header and do the look-up – If outgoing link is idle, start forwarding the frame Overlapping transmissions – Transmit the head of the packet via the outgoing link – … while still receiving the tail via the incoming link – Analogy: different folks crossing different intersections A B switches

5 Switching Methods (continued)

6

7 LAN Switching Segmentation with switches – Switches are hardware controlled – Bridges are software controlled Microsegmentation – Switched bandwidth – Shared bandwidth Efficient use of bandwidth Able to connect segments of different speeds – 10 Mbps to 100 Mbps – 100 Mbps to 1Gbps

8 Virtual LANs VLANs function by logically segmenting the network into different broadcast domains so that packets are only switched between ports that are designated for the same VLAN. Logical grouping of network devices and nodes Broadcast domain Management VLAN – Also known as default VLAN – Cannot be deleted – Every port is on VLAN 1 by default Router are required to move traffic between VLANs

9 VLAN introduction VLANs address scalability, security, and network management. Switches may not bridge any traffic between VLANs, as this would violate the integrity of the VLAN broadcast domain. Traffic should only be routed between VLANs.

10 Broadcast domains with VLANs and routers A VLAN is a broadcast domain created by one or more switches.

11 Broadcast domains with VLANs and routers Layer 3 routing allows the router to send packets to the three different broadcast domains.

12 Broadcast domains with VLANs and routers Implementing VLANs on a switch causes the following to occur: – The switch maintains a separate bridging table for each VLAN. – If the frame comes in on a port in VLAN 1, the switch searches the bridging table for VLAN 1. – When the frame is received, the switch adds the source address to the bridging table if it is currently unknown. – The destination is checked so a forwarding decision can be made. – For learning and forwarding the search is made against the address table for that VLAN only.

13 VLAN types There are three basic VLAN memberships for determining and controlling how a packet gets assigned: - – Port-based VLANs – MAC address based – VLANs Protocol based VLANs The frame headers are encapsulated or modified to reflect a VLAN ID before the frame is sent over the link between switches. Before forwarding to the destination device, the frame header is changed back to the original format.

14 VLAN types Port-based VLANs MAC address based VLANs Protocol based VLANs

15 VLAN operation Each switch port could be assigned to a different VLAN. Ports assigned to the same VLAN share broadcasts. Ports that do not belong to that VLAN do not share these broadcasts.

16 VLAN operation In port-based or port-centric VLAN membership, the port is assigned to a specific VLAN membership independent of the user or system attached to the port. All users of the same port must be in the same VLAN.

17 VLAN operation Dynamic VLANs allow for membership based on the MAC address of the device connected to the switch port. As a device enters the network, it queries a database within the switch for a VLAN membership.

18 Virtual LANs (continued)

19 VLAN operation Network administrators are responsible for configuring VLANs both manually and statically.

20 Benefits of VLANs VLANS provide the following benefits – It is easier to add and move stations on the LAN – It is easier to reconfigure the LAN – There is better traffic control – There is increased security


Download ppt "STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through."

Similar presentations


Ads by Google