![]() This action is known as unicast flooding. Flood If the destination MAC address is not in the MAC address table, then the frame needs to be flooded and is sent to all ports except for the port through which it arrived.Forward If the destination MAC address comes from another port within the switch, then the frame is sent to the identified port for transmission.Then the MAC address table is searched using the destination MAC address to determine which action to take. If the MAC address was already in the table, its associated aging countdown timer is reset (300 seconds by default). ![]() When a frame is received on a port, the source MAC address is placed in the MAC address table, along with the port ID of the port on which it was received. When a switch is first powered on, the MAC table is empty. ![]() Spanning Tree Protocol (STP) is used to stop network loops while still permitting redundancy. Loop avoidance If multiple connections between switches are created for redundancy purposes, network loops can occur. ![]() The frame is only forwarded out the specified destination port. There are three distinct functions of layer 2 switching: address learning, forward/filter decisions, and loop avoidance.Īddress learning Layer 2 switches and bridges remember the source MAC address of each frame received on an interface, and enter this information into a MAC table called a forward/filter table.įorward/filter decisions When a frame is received on an interface, the switch looks at the destination MAC address and finds the exit interface in the MAC table.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |