pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Network Switches

LAN switches are an expansion of the concept in LAN bridging. They operate at Layer 2 (link layer) of the OSI reference model, which controls data flow, handles transmission errors, provides physical (as opposed to logical) addressing, and manages access to the physical medium. Switches provide these functions by using various link-layer protocols – such as Ethernet, Token Ring and FDDI – that dictate specific flow control, error handling, addressing, and media-access algorithms.

LAN switches can link four, six, ten or more networks together, and have two basic architectures: cut-through and store-and-forward. In the past, cut-through switches were faster because they examined the packet destination address only before forwarding it on to its destination segment. A store-and-forward switch, on the other hand, accepts and analyses the entire packet before forwarding it to its destination.

It takes more time to examine the entire packet, but it allows the switch to catch certain packet errors and keep them from propagating through the network. By the late 1990s, the speed of store-and-forward switches had caught up with cut-through switches so the difference between the two was minimal. By then, a large number of hybrid switches had become available that mixed both cut-through and store-and-forward architectures.

One way to think of the relative functions of routers and switches is in terms of a residential neighbourhood. The switches are analogous to the streets in the neighbourhood and the routers as the intersections with the street signs. Each house on the street has an address within a range on the block. In the same way, a switch connects various devices each with their own IP address(es) on a LAN. However, the switch knows nothing about IP addresses except its own management address. Routers connect networks together the way that major intersections connect streets to both highways and freeways, etc. The street signs at the intersection (routing table) show which way the packets need to flow.

Routers

Filed Under: Networking

Latest Articles

How to Avoid Scams Online

Everyone has been or will be the victim of fraud.  I know of at least 5 times I was frauded out of money. If your over the age of 20 and think "I have never been a victim of fraud", then you got scammed without even knowing it. It is not your fault that you were frauded.  Humans have urges, … [Read More...]

Reasons for Deleting Groups and Users on WhatsApp

WhatsApp is one of the most widely used applications globally and one of its main claims, beyond its democratization, is the end-to-end encryption with which it protects conversations. However, the fact that, on paper, the platform does not know what the user writes does not mean that it does not … [Read More...]

3 Huge Benefits of White Label Mobile Wallets

For most, the term “Mobile Wallet” brings up images of consumer products such as Apple Pay, Paypal, or Square. Mobile wallets are revolutionizing the financial sector and continually growing in popularity - especially amongst Millenials - for their convenience and security.  A mobile … [Read More...]

What is the Best VPN for Gamers?

Of the 44% of UK Internet users who have used a virtual private network (VPN) at some point in their lives, approximately 39% of this demographic are … [Read More...]

Think About Headless Commerce as of a Modular System

In recent years, eCommerce has transformed to where consumers no longer handle purchases on conventional websites. Shopping is currently carried out … [Read More...]

Service That Succeeds: How To Build an Effective IT Service Desk

In today’s tech-forward world, building a capable IT service team is essential for businesses hoping to scale tech-related hurdles and soar past the … [Read More...]

A simple PC guide on keeping safe while using public Wi-Fi

Did you know that there is a cyberattack every 39 seconds? You are more likely to be a victim if you are lax about your digital security. This … [Read More...]

Motivating Students to Learn Computer Science

Computer science has been an important part of the educational curriculum for decades. Professor Seymour Papert, a mathematician from South Africa … [Read More...]

AI is Driving Changes in the Field of Urban Planning

Artificial intelligence is changing many aspects of our lives. It is being used in more fields than ever before. One of the fields affected by AI … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Graphics Card Adjustments

When we checked Display Properties earlier, to confirm drivers for the new card had been installed successfully, you may have noticed that they … [Read More...]

Remove Security Shield

Security Shield is one of the harder fake security clients to remove. This rogue stops almost all programs including Antivirus clients from … [Read More...]

The Key Differences Between SmartDNS and VPN

If you like streaming content when overseas or want to protect your privacy while browsing the web, you may well have come across the terms Smart … [Read More...]

[footer_backtotop]

Copyright © 2022 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors