In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Recently, they have been sorting out the relevant knowledge of the system, and the knowledge of the network has not yet begun to be sorted out, but the classification of the network is a little empty. Let's share the basic knowledge of the network-- the basic architecture of the network.
The basic architecture of the network is the most basic knowledge point, for this basic architecture, the name may be different, but the general division level can not be removed, understanding this basic architecture is the premise of learning the network.
Global View:
Among them: WAN: wide area network, which represents a national region here. LAN: local area network, which represents a city-level area
Country View:
Among them: ISP represents the network service provider, through which users access the network, ISP also has classification.
Computer room view (core view, main view of operation and maintenance):
Interpretation:
Access layer (layer 2 switch):
The access layer usually refers to the part of the network that connects or accesses directly to the user. The purpose of the access layer is to allow end users to connect to the network, so access layer switches have the characteristics of low cost and high port density.
High network performance and functionality are the main considerations in the design of the core layer and the aggregation layer.
The access layer is composed of wireless network card, AP and L2Switch. According to the definition of broadband network, the main function of the access layer is to complete the access and isolation of user traffic. For wireless LAN WLAN users, the user terminal completes user access through the wireless network card and the wireless access point AP
Aggregation layer (layer 2 switch, layer 3 switch or stackable switch):
Generally speaking, user access control is arranged at the access layer, but this is not absolute and can also be arranged at the aggregation layer. When implementing security control and identity authentication in the aggregation layer, a centralized management mode is adopted. When the network scale is large, comprehensive security management policies can be designed, such as identity authentication and MAC address binding in the access layer, flow control and access rights constraints in the aggregation layer.
Provide data aggregation\ transmission\ management\ distribution processing for the access layer. The aggregation layer provides policy-based connections for the access layer, such as address merging, protocol filtering, routing services, authentication management, etc. Isolating some network segments (such as VLAN) from the network can prevent the problems of some network segments from spreading and affecting the core layer. The aggregation layer can also provide the interconnection between the access layer virtual networks, control and restrict the access of the access layer to the core layer, and ensure the security and stability of the core layer.
Compared with access layer switches, aggregation layer switches require higher performance, fewer interfaces and higher switching rates.
Core layer (layer 3 switch, router):
The function of the core layer is mainly to realize the optimal transmission between backbone networks.
The main purpose is to provide an optimized and reliable backbone transmission structure through high-speed forwarding communications, so core layer switches should have higher reliability, performance and throughput.
Backbone layer (router, ISP):
High transmissibility
PS: all the pictures in this article are from Packer Technology.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.