Black Box LGB2118A Manuel D’Utilisation

Page de 76
724-746-5500   |   blackbox.com 
Page 38
Chapter 4: Basic Concepts and Management
How does a switch operate?
A Layer 2 switch uses some features of the Data Link layer in the OSI model to forward the packet to the destination port(s). Here 
we introduce some important features of switches and how they work.
•  MAC address table: When a packet is received on a switch port, the switch first checks if the packet is good or bad and 
extracts the source MAC address (SA) and destination MAC address (DA) to find if SA exists in the MAC address table: if no,  
it puts it in the MAC address table; if yes, it looks up the DA and its associated port to which the traffic is forwarded. If the DA 
does not exist, the packet is broadcasted.
    Because the number of MAC addresses is limited, the switch applies the MAC address aging function. When the MAC address 
has resided and keeps no update in the table for a long time, the traffic using that entry has been inactive. If this time period is 
more than the aging time, the entry will be marked invalid. The vacancy is now available for other new MACs.
    Both learning and forwarding are the most important functions in a switch. VLAN can be one of the rules to forward the  
packet. Ingress rules and egress rules apply. The ingress rule is used to filter the incoming packet by VLAN ID and to decide 
whether the packet is allowed to enter the switch or not. The egress rule is used to forward the packet to the proper port.
•  Mac address aging: There is a field in the MAC address table used to put the entry’s Age time, which determines how long a 
MAC entry can reside in a switch. The age time is refreshed when a packet with source MAC address (SA) is sent. Usually, the 
age time is programmable.
•  Transmission schedule: In most layer 2 switches, QoS is supported. QoS in a switch must associate a transmission schedule to 
transmit the packet. This function depends on the priority level that a packet has. With the given priority, the scheduler will  
perform the proper action. The scheduler has many ways to implement, and different chips may support different schedule 
algorithms. Most common schedulers are: 
 
FCFS: First Come First Service.
 
Strictly Priority: All High before Low.
 
Weighted Round Robin: 
Set a weight figure to the packet with a priority level, say 5–7, and next, set another weight to the packet with a priority level, say 
2–4, and so on. The WRR will transmit the packet with the weight. So the packet of each priority level can be allocated a fixed 
bandwidth.
Bandwidth rating
Bandwidth rating is the limitation set by administrator, and it can be applied to those with SLA. Bandwidth rating can be total 
bandwidth, types of service of a port with many steps. The switch supports by-port Ingress and Egress total bandwidth rate  
control capacity. The bandwidth rate resolution is 0.1 Mbps (100 Kbps) and ranges from 0 to 100 Mbps. 
4.6 Virtual LAN
What is a VLAN?
It is a subset of a LAN. Before we discuss VLAN, we must understand what LAN is. In general, a LAN is composed of different 
physical network segments bridged by switches or bridges that attach to end stations in the same broadcast domain. The traffic 
can reach any station on the same LAN. Beyond this domain, the traffic cannot go without a router’s help. This also implies that a 
LAN is limited. If you need to communicate with the station outside the LAN, a router is needed and always is located on the 
edge of the LAN.
A layer 2 VLAN, uses a logical subset of a physical LAN separated by specific rules such as tag, port, MAC address, and so on. In 
other words, they can communicate with each other between separated small physical LANs within a LAN, but cannot between 
any two separated logical LANs.