Continuing from the previous article "Learn three of the four types of switch messages in one minute: broadcast, multicast, and unknown unicast" 90% of the traffic transmitted by the Layer 2 switch is known unicast In the previous article, we talked about how Layer 2 switches divide messages into four categories when forwarding messages: broadcast, multicast, unknown unicast, and known unicast. Although the first three types of messages look different, Layer 2 switches handle them in the same way: flood forwarding. Today we will introduce the last type: known unicast. Because the switch handles it differently from the other three types of messages, we will introduce it separately today! In a daily working environment, more than 90% of the packets forwarded normally by a Layer 2 switch are known unicast packets. If not, it means that there is a problem with the network, there may be a loop or the switch is being attacked. In order to take care of those who are new to the network, let's first popularize the concept of known unicast! In the switch MAC address table, there is a message with an entry, called a known unicast Every time the switch receives a message, it will extract its destination MAC address and then search the MAC address table to see if there is an entry corresponding to the destination MAC:
For example, the MAC address table of a switch is as follows: MAC address entry
For known packets, the Layer 2 switch will forward them from a specific interface. In our previous article, we said that switches will perform flooding for broadcast, multicast, and unknown unicast messages. So how do switches handle known unicast messages?
For example, in the MAC address table below, when the switch receives a packet with a destination MAC of 0000-0011-1111, it will only forward it from G0/0/1 and will not forward it from G0/0/2. It will only be forwarded from G0/0/1 This is also the biggest feature of known unicast! Summarize As mentioned above, more than 90% of the traffic on the network is known unicast. Can you guess why? Because the normal forwarded message must have an outbound interface, if not, the traffic will be flooded! We know that flooded traffic will be copied multiple times and sent out from multiple interfaces! This forwarding method will not only waste the resources of the switch, but also occupy a lot of bandwidth, which should not exist (a small amount is acceptable). If there is a large amount of flooded traffic, it means that there is a problem with the network, and the network failure needs to be eliminated. At the same time, measures should be taken to limit the transmission of flooded traffic! |
<<: Key considerations for deploying Wi-Fi 6
>>: TCP SYN Queue and Accept Queue
Recently, the Ministry of Transport, together wit...
As 2017 is coming to an end, many companies are p...
VMISS (Virtual Machines Innovative Solutions) was...
[[432988]] This article is reprinted from the WeC...
I received a Christmas and New Year promotion fro...
Wireless routers have been attacked frequently re...
An operator executive once believed that user gro...
The networking industry is changing rapidly, and ...
At present, 5G integrated applications are in a c...
Usually, we connect to WiFi when we surf the Inte...
I believe that everyone was like me when they fir...
CMIVPS has released a Black Friday discount plan,...
Western Digital Corporation (NASDAQ: WDC), the le...
Power over Ethernet standards have important diff...
HTTP status code is the response status code retu...