<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
	<title type="text">Network Fundamentals</title>
	<subtitle type="text">Leading Network Security &amp; Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips &amp; more.</subtitle>
	<link rel="alternate" type="text/html" href="https://www.firewall.cx"/>
	<id>https://www.firewall.cx/networking/network-fundamentals.feed</id>
	<updated>2026-04-11T12:35:26+10:00</updated>
	<author>
		<name>Firewall.cx Website</name>
	</author>
	<generator uri="https://www.joomla.org"></generator>
	<link rel="self" type="application/atom+xml" href="https://www.firewall.cx/networking/network-fundamentals.feed?type=atom"/>
	<entry>
		<title>The Importance of a Network Analyzer – Packet Sniffer. Must-Have Features for Demanding Engineers &amp; Administrators</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/important-network-analyzer-packet-sniffer-features.html"/>
		<published>2015-04-21T03:58:21+10:00</published>
		<updated>2015-04-21T03:58:21+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/important-network-analyzer-packet-sniffer-features.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/important-network-analyzer-packet-sniffer-features-intro.webp&quot; alt=&quot;The Importance of a Network Analyzer – Packet Sniffer&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-1a.jpg&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Important Network Analyzer features - Must have features&quot; /&gt;Network Analyzers&lt;/strong&gt;, also known as &lt;strong&gt;Packet Sniffers&lt;/strong&gt;, are amongst the most &lt;strong&gt;popular network tools&lt;/strong&gt; found inside any &lt;strong&gt;Network Engineer’s toolkit&lt;/strong&gt;. A Network Analyzer allows users to &lt;strong&gt;capture network packets&lt;/strong&gt; as they flow within the enterprise network or Internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Engineers usually make use of Network Analyzers to help &lt;strong&gt;uncover&lt;/strong&gt;, &lt;strong&gt;diagnose&lt;/strong&gt; and &lt;strong&gt;fix network problems&lt;/strong&gt;, but they are also used by &lt;strong&gt;hackers&lt;/strong&gt; to obtain &lt;strong&gt;access&lt;/strong&gt; to &lt;strong&gt;sensitive information&lt;/strong&gt; and &lt;strong&gt;user data&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Features Offered In High-Quality Network Analyzers&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When dealing with network problems, engineers usually follow standard tests to try to identify the source of the problem and make any necessary corrections. These tests usually involve checking the source (Client or Network device) IP address, Gateway, DNS server, Nslookup and performing a few &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/icmp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;ICMP Echo Requests - ICMP Protocol&quot;&gt;ICMP Echo Requests&lt;/a&gt; (aka Ping) to verify connectivity with the local network and destination IP.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These methods are usually enough to diagnose simple problems, but are clearly inadequate when dealing with complex network problems. This is where a &lt;strong&gt;high-quality network analyzer&lt;/strong&gt; comes into play.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Any typical network analyzer will capture and display packets, providing basic packet information such as &lt;strong&gt;time of capture&lt;/strong&gt;, &lt;strong&gt;source &amp;amp; destination MAC address&lt;/strong&gt;, s&lt;strong&gt;ource &amp;amp; destination IP address&lt;/strong&gt;, &lt;strong&gt;Layer 4 protocol information&lt;/strong&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;TCP/UDP flags, ports, sequence/acknowledgement numbers&quot;&gt;TCP/UDP flags, ports, sequence/acknowledgement numbers&lt;/a&gt;) and the data payload. While this information is extremely useful information, it often means that additional time is required by the engineer to locate the data stream/conversation of interest and track down all associated packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Further analysis of the captured data usually increases the difficulty and expertise level required to make sense of the information captured.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s take a look at the most important features high-end network analyzers have, that helps simplify complex troubleshooting in our everyday routine.&lt;/p&gt;
&lt;p class=&quot;info&quot;&gt;Extensive How-To articles can be found in our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzers&quot;&gt;Network Protocol Analyzers section&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Real-Time Network Card Utilization&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Real-time network card utilization is a very handy ‘visual tool’ as it shows the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-performance-testing.html&quot; target=&quot;_blank&quot; title=&quot;Bandwidth Measurement - Utilization&quot;&gt;bandwidth utilization&lt;/a&gt; of the network card used to capture packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;configuring SPAN on Cisco Catalyst switches&quot;&gt;configuring SPAN on Cisco Catalyst switches&lt;/a&gt; to monitor a switchport that connects to a router or server, the real-time visual representation of network traffic has proven to be extremely useful as it’s much easier spot packet bursts and other traffic patterns.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-1.jpg&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-1&quot; style=&quot;margin: 7px auto; display: block; vertical-align: middle;&quot; title=&quot;Enterprise-class packet analyzer - real-time network utilization&quot; /&gt;&lt;/strong&gt;Real-time network utilization&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;center&quot;&gt;Configurable Buffer Size&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All traffic captured by the network analyzer is stored in a special buffer. This buffer usually resides in the workstation’s RAM and can be saved on the hard disk, so that additional analysis can be performed later. While most packet analyzers allow the buffer size to changed, its size is usually restricted to a few MB.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The ability to use an extremely large capture buffer e.g 1024MB or 1 Gigabyte, is necessary when performing analysis of heavy traffic where a couple of hundreds of MBs are typically required.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;IP Conversation Tracking &amp;amp; Transaction Sequence Diagrams&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A high-quality network analyzer smartly presents all captured information in an easy-to-understand manner, making it easy and fast to locate any &lt;strong&gt;IP Conversation&lt;/strong&gt; between hosts:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-2.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-2&quot; style=&quot;margin: 7px auto; display: block; vertical-align: middle;&quot; title=&quot;Enterprise- Class Network Analyzer - IP Conversation Tracking&quot; /&gt;&lt;/strong&gt;A high-quality packet analyzer displays &lt;strong&gt;IP Conversations&lt;/strong&gt; between our workstation and Firewall.cx&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Having the ability to drill-down into each IP Conversation is equally important. An &lt;strong&gt;Enterprise-class packet analyzer&lt;/strong&gt; provides this important feature by simply double-clicking on any of the displayed conversations:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-3.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-3&quot; style=&quot;margin: 7px auto; display: block; vertical-align: middle;&quot; title=&quot;Enterprise Class Network Analyzer allows us to drill-into each IP Conversation&quot; /&gt;&lt;/strong&gt;Enterprise-class packet analyzer allows us to drill-into each IP Conversation&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Transaction Sequence Diagram&lt;/strong&gt; section on the left side displays the flow of packets of the displayed IP Conversation. Tracking &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-seq-ack-numbers.html&quot; target=&quot;_blank&quot; title=&quot;TCP Sequence Numbers&quot;&gt;TCP sequence numbers&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-seq-ack-numbers.html&quot; target=&quot;_blank&quot; title=&quot;TCP acknowledgements&quot;&gt;TCP acknowledgements&lt;/a&gt; is often a very time-consuming process so using the right network analyzer will allow engineers to focus on the more important information.&lt;/p&gt;
&lt;h2&gt;Automatic Diagnostic Tools&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Network engineers often need to deal with network problems that occur either from user configuration errors (e.g invalid Domain, incorrect URL etc) or other problems that are often difficult to identify.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Considering the fact your network analyzer captures all traffic, it should be able to &lt;strong&gt;automatically identify network/session problems&lt;/strong&gt; and &lt;strong&gt;errors&lt;/strong&gt;. This helpful feature helps dramatically when dealing with various network issues as it provides an overall view of problems that have been identified.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In many cases, these errors can lead to &lt;strong&gt;uncovering suspicious user activity&lt;/strong&gt; or &lt;strong&gt;hacking attempts&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-4.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-4&quot; style=&quot;margin: 7px; vertical-align: middle;&quot; title=&quot;Automatically identify network problems that would otherwise be missed&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Automatically identift network problems that would otherwise be missed&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown in the screenshot above, our network analyzer has identified &lt;strong&gt;36 events&lt;/strong&gt; that can be examined by &lt;strong&gt;double-clicking&lt;/strong&gt; on the specific event in the left window and then selecting the associated addresses from the right window. Packets are then displayed at the bottom area. &lt;strong&gt;Double-clicking&lt;/strong&gt; on these packets will open them for further examination.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Top Network Talkers&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During times of excessive traffic, it is usually required to identify the network’s top talkers and take action. When supported by the network analyzer, it makes life very easy. When not supported, a sample of network traffic must be taken and sorted by the IP address with the greatest amount of data transferred.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-5.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-5&quot; style=&quot;margin: 7px auto; display: block; vertical-align: middle;&quot; title=&quot;Monitoring the network’s top talkers and their traffic&quot; /&gt;&lt;/strong&gt;Monitoring the network’s top talkers and their traffic&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Enterprise-class network analyzers provide 4 reports of Top Talkers: &lt;strong&gt;Top100 IPv4 Nodes&lt;/strong&gt; (shown above), &lt;strong&gt;Top100 IPv4 Conversations&lt;/strong&gt; (IP Based), &lt;strong&gt;Top100 Physical Nodes&lt;/strong&gt; (MAC Based) and &lt;strong&gt;Top100 Physical Conversations&lt;/strong&gt; (MAC Based).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Top IP’s can also be obtained via a Dashboard (shown below) which provides &lt;strong&gt;Global Utilization&lt;/strong&gt; (% of total interface bandwidth) and &lt;strong&gt;Traffic&lt;/strong&gt; (bytes) within a specific timeframe, &lt;strong&gt;Top IPs &lt;/strong&gt;based on bytes transferred, and &lt;strong&gt;Top Application Protocols&lt;/strong&gt; based on the protocol used:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-6.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-6&quot; style=&quot;margin-top: 7px; margin-bottom: 7px; vertical-align: middle;&quot; title=&quot;Network Analyzer dashboard providing a healthy amount of real-time information and traffic captured&quot; /&gt;&lt;/strong&gt;&lt;br /&gt;Network Analyzer dashboard providing a healthy amount of real-time information and traffic captured&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Advanced Filtering&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Filtering is a core feature that allows network engineers to select specific type of traffic based on its characteristics. Common filtering found on most network analyzers includes: &lt;strong&gt;Source/Destination MAC&lt;/strong&gt; or &lt;strong&gt;IP address&lt;/strong&gt;, &lt;strong&gt;Protocol&lt;/strong&gt; and &lt;strong&gt;Port numbers&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Advanced filtering&lt;/strong&gt; is a feature most engineers require in their network analyzer, but often don’t have. Advanced filtering allows special complex filters to be created based on additional characteristics such as &lt;strong&gt;Time&lt;/strong&gt;, &lt;strong&gt;Packet size&lt;/strong&gt;, &lt;strong&gt;Data Payload&lt;/strong&gt; values in conjunction with &lt;strong&gt;AND/OR/NOT logical operations&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-7.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-7&quot; style=&quot;margin: 7px auto; display: block; vertical-align: middle;&quot; title=&quot;Advanced Filtering options are a must!&quot; /&gt;&lt;/strong&gt;Advanced Filtering options are a must!&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;high-quality network analyzer&lt;/strong&gt; bundled with useful &lt;strong&gt;advanced features&lt;/strong&gt; as the above will help any engineer or administrator &lt;strong&gt;diagnose&lt;/strong&gt; and deal with &lt;strong&gt;network problems&lt;/strong&gt; &lt;strong&gt;quickly&lt;/strong&gt; and &lt;strong&gt;efficiently&lt;/strong&gt;, but also &lt;strong&gt;capture suspicious network traffic patterns&lt;/strong&gt; often associated with &lt;strong&gt;hacking attempts&lt;/strong&gt;. When selecting your network tools, ensure they are of the highest quality and provide features that will help make your job easier. Our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; title=&quot;Network Protocol Analyzer&quot;&gt;Network Protocol Analyzer section&lt;/a&gt; contains valuable articles to help you get started with Wireshark Network Protocol Analyzer.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/important-network-analyzer-packet-sniffer-features-intro.webp&quot; alt=&quot;The Importance of a Network Analyzer – Packet Sniffer&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-1a.jpg&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Important Network Analyzer features - Must have features&quot; /&gt;Network Analyzers&lt;/strong&gt;, also known as &lt;strong&gt;Packet Sniffers&lt;/strong&gt;, are amongst the most &lt;strong&gt;popular network tools&lt;/strong&gt; found inside any &lt;strong&gt;Network Engineer’s toolkit&lt;/strong&gt;. A Network Analyzer allows users to &lt;strong&gt;capture network packets&lt;/strong&gt; as they flow within the enterprise network or Internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Engineers usually make use of Network Analyzers to help &lt;strong&gt;uncover&lt;/strong&gt;, &lt;strong&gt;diagnose&lt;/strong&gt; and &lt;strong&gt;fix network problems&lt;/strong&gt;, but they are also used by &lt;strong&gt;hackers&lt;/strong&gt; to obtain &lt;strong&gt;access&lt;/strong&gt; to &lt;strong&gt;sensitive information&lt;/strong&gt; and &lt;strong&gt;user data&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Features Offered In High-Quality Network Analyzers&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When dealing with network problems, engineers usually follow standard tests to try to identify the source of the problem and make any necessary corrections. These tests usually involve checking the source (Client or Network device) IP address, Gateway, DNS server, Nslookup and performing a few &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/icmp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;ICMP Echo Requests - ICMP Protocol&quot;&gt;ICMP Echo Requests&lt;/a&gt; (aka Ping) to verify connectivity with the local network and destination IP.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These methods are usually enough to diagnose simple problems, but are clearly inadequate when dealing with complex network problems. This is where a &lt;strong&gt;high-quality network analyzer&lt;/strong&gt; comes into play.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Any typical network analyzer will capture and display packets, providing basic packet information such as &lt;strong&gt;time of capture&lt;/strong&gt;, &lt;strong&gt;source &amp;amp; destination MAC address&lt;/strong&gt;, s&lt;strong&gt;ource &amp;amp; destination IP address&lt;/strong&gt;, &lt;strong&gt;Layer 4 protocol information&lt;/strong&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;TCP/UDP flags, ports, sequence/acknowledgement numbers&quot;&gt;TCP/UDP flags, ports, sequence/acknowledgement numbers&lt;/a&gt;) and the data payload. While this information is extremely useful information, it often means that additional time is required by the engineer to locate the data stream/conversation of interest and track down all associated packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Further analysis of the captured data usually increases the difficulty and expertise level required to make sense of the information captured.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s take a look at the most important features high-end network analyzers have, that helps simplify complex troubleshooting in our everyday routine.&lt;/p&gt;
&lt;p class=&quot;info&quot;&gt;Extensive How-To articles can be found in our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;Network Protocol Analyzers&quot;&gt;Network Protocol Analyzers section&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Real-Time Network Card Utilization&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Real-time network card utilization is a very handy ‘visual tool’ as it shows the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-performance-testing.html&quot; target=&quot;_blank&quot; title=&quot;Bandwidth Measurement - Utilization&quot;&gt;bandwidth utilization&lt;/a&gt; of the network card used to capture packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;configuring SPAN on Cisco Catalyst switches&quot;&gt;configuring SPAN on Cisco Catalyst switches&lt;/a&gt; to monitor a switchport that connects to a router or server, the real-time visual representation of network traffic has proven to be extremely useful as it’s much easier spot packet bursts and other traffic patterns.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-1.jpg&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-1&quot; style=&quot;margin: 7px auto; display: block; vertical-align: middle;&quot; title=&quot;Enterprise-class packet analyzer - real-time network utilization&quot; /&gt;&lt;/strong&gt;Real-time network utilization&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot; align=&quot;center&quot;&gt;Configurable Buffer Size&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All traffic captured by the network analyzer is stored in a special buffer. This buffer usually resides in the workstation’s RAM and can be saved on the hard disk, so that additional analysis can be performed later. While most packet analyzers allow the buffer size to changed, its size is usually restricted to a few MB.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The ability to use an extremely large capture buffer e.g 1024MB or 1 Gigabyte, is necessary when performing analysis of heavy traffic where a couple of hundreds of MBs are typically required.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;IP Conversation Tracking &amp;amp; Transaction Sequence Diagrams&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A high-quality network analyzer smartly presents all captured information in an easy-to-understand manner, making it easy and fast to locate any &lt;strong&gt;IP Conversation&lt;/strong&gt; between hosts:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-2.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-2&quot; style=&quot;margin: 7px auto; display: block; vertical-align: middle;&quot; title=&quot;Enterprise- Class Network Analyzer - IP Conversation Tracking&quot; /&gt;&lt;/strong&gt;A high-quality packet analyzer displays &lt;strong&gt;IP Conversations&lt;/strong&gt; between our workstation and Firewall.cx&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Having the ability to drill-down into each IP Conversation is equally important. An &lt;strong&gt;Enterprise-class packet analyzer&lt;/strong&gt; provides this important feature by simply double-clicking on any of the displayed conversations:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-3.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-3&quot; style=&quot;margin: 7px auto; display: block; vertical-align: middle;&quot; title=&quot;Enterprise Class Network Analyzer allows us to drill-into each IP Conversation&quot; /&gt;&lt;/strong&gt;Enterprise-class packet analyzer allows us to drill-into each IP Conversation&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Transaction Sequence Diagram&lt;/strong&gt; section on the left side displays the flow of packets of the displayed IP Conversation. Tracking &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-seq-ack-numbers.html&quot; target=&quot;_blank&quot; title=&quot;TCP Sequence Numbers&quot;&gt;TCP sequence numbers&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-seq-ack-numbers.html&quot; target=&quot;_blank&quot; title=&quot;TCP acknowledgements&quot;&gt;TCP acknowledgements&lt;/a&gt; is often a very time-consuming process so using the right network analyzer will allow engineers to focus on the more important information.&lt;/p&gt;
&lt;h2&gt;Automatic Diagnostic Tools&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Network engineers often need to deal with network problems that occur either from user configuration errors (e.g invalid Domain, incorrect URL etc) or other problems that are often difficult to identify.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Considering the fact your network analyzer captures all traffic, it should be able to &lt;strong&gt;automatically identify network/session problems&lt;/strong&gt; and &lt;strong&gt;errors&lt;/strong&gt;. This helpful feature helps dramatically when dealing with various network issues as it provides an overall view of problems that have been identified.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In many cases, these errors can lead to &lt;strong&gt;uncovering suspicious user activity&lt;/strong&gt; or &lt;strong&gt;hacking attempts&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-4.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-4&quot; style=&quot;margin: 7px; vertical-align: middle;&quot; title=&quot;Automatically identify network problems that would otherwise be missed&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Automatically identift network problems that would otherwise be missed&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown in the screenshot above, our network analyzer has identified &lt;strong&gt;36 events&lt;/strong&gt; that can be examined by &lt;strong&gt;double-clicking&lt;/strong&gt; on the specific event in the left window and then selecting the associated addresses from the right window. Packets are then displayed at the bottom area. &lt;strong&gt;Double-clicking&lt;/strong&gt; on these packets will open them for further examination.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Top Network Talkers&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During times of excessive traffic, it is usually required to identify the network’s top talkers and take action. When supported by the network analyzer, it makes life very easy. When not supported, a sample of network traffic must be taken and sorted by the IP address with the greatest amount of data transferred.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-5.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-5&quot; style=&quot;margin: 7px auto; display: block; vertical-align: middle;&quot; title=&quot;Monitoring the network’s top talkers and their traffic&quot; /&gt;&lt;/strong&gt;Monitoring the network’s top talkers and their traffic&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Enterprise-class network analyzers provide 4 reports of Top Talkers: &lt;strong&gt;Top100 IPv4 Nodes&lt;/strong&gt; (shown above), &lt;strong&gt;Top100 IPv4 Conversations&lt;/strong&gt; (IP Based), &lt;strong&gt;Top100 Physical Nodes&lt;/strong&gt; (MAC Based) and &lt;strong&gt;Top100 Physical Conversations&lt;/strong&gt; (MAC Based).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Top IP’s can also be obtained via a Dashboard (shown below) which provides &lt;strong&gt;Global Utilization&lt;/strong&gt; (% of total interface bandwidth) and &lt;strong&gt;Traffic&lt;/strong&gt; (bytes) within a specific timeframe, &lt;strong&gt;Top IPs &lt;/strong&gt;based on bytes transferred, and &lt;strong&gt;Top Application Protocols&lt;/strong&gt; based on the protocol used:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-6.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-6&quot; style=&quot;margin-top: 7px; margin-bottom: 7px; vertical-align: middle;&quot; title=&quot;Network Analyzer dashboard providing a healthy amount of real-time information and traffic captured&quot; /&gt;&lt;/strong&gt;&lt;br /&gt;Network Analyzer dashboard providing a healthy amount of real-time information and traffic captured&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Advanced Filtering&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Filtering is a core feature that allows network engineers to select specific type of traffic based on its characteristics. Common filtering found on most network analyzers includes: &lt;strong&gt;Source/Destination MAC&lt;/strong&gt; or &lt;strong&gt;IP address&lt;/strong&gt;, &lt;strong&gt;Protocol&lt;/strong&gt; and &lt;strong&gt;Port numbers&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Advanced filtering&lt;/strong&gt; is a feature most engineers require in their network analyzer, but often don’t have. Advanced filtering allows special complex filters to be created based on additional characteristics such as &lt;strong&gt;Time&lt;/strong&gt;, &lt;strong&gt;Packet size&lt;/strong&gt;, &lt;strong&gt;Data Payload&lt;/strong&gt; values in conjunction with &lt;strong&gt;AND/OR/NOT logical operations&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/important-network-analyzer-packet-sniffer-features-7.png&quot; alt=&quot;important-network-analyzer-packet-sniffer-features-7&quot; style=&quot;margin: 7px auto; display: block; vertical-align: middle;&quot; title=&quot;Advanced Filtering options are a must!&quot; /&gt;&lt;/strong&gt;Advanced Filtering options are a must!&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;high-quality network analyzer&lt;/strong&gt; bundled with useful &lt;strong&gt;advanced features&lt;/strong&gt; as the above will help any engineer or administrator &lt;strong&gt;diagnose&lt;/strong&gt; and deal with &lt;strong&gt;network problems&lt;/strong&gt; &lt;strong&gt;quickly&lt;/strong&gt; and &lt;strong&gt;efficiently&lt;/strong&gt;, but also &lt;strong&gt;capture suspicious network traffic patterns&lt;/strong&gt; often associated with &lt;strong&gt;hacking attempts&lt;/strong&gt;. When selecting your network tools, ensure they are of the highest quality and provide features that will help make your job easier. Our &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; title=&quot;Network Protocol Analyzer&quot;&gt;Network Protocol Analyzer section&lt;/a&gt; contains valuable articles to help you get started with Wireshark Network Protocol Analyzer.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Measuring Network Performance: Test Network Throughput, Delay-Latency, Jitter, Transfer Speeds, Packet loss &amp; Reliability. Packet Generation Using Iperf / Jperf</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/network-performance-testing.html"/>
		<published>2013-08-06T08:45:00+10:00</published>
		<updated>2013-08-06T08:45:00+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/network-performance-testing.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/network-performance-testing-intro.webp&quot; alt=&quot;&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-performance-testing-1a.jpg&quot; alt=&quot;network-performance-testing-1a&quot; width=&quot;350&quot; height=&quot;186&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Measuring Network Performance: Test Network Throughput&quot; /&gt;&lt;strong&gt;Measuring network performance&lt;/strong&gt; has always been a difficult and unclear task, mainly because most engineers and administrators are unsure which approach is best suited for their &lt;strong&gt;LAN&lt;/strong&gt; or &lt;strong&gt;WAN network&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A common (and very simple) method of &lt;strong&gt;testing network performance&lt;/strong&gt; is by initiating a simple file transfer from one end (usually workstation) to another (usually server), however, this method is frequently debated amongst engineers and there is good reason for that: When &lt;strong&gt;performing file transfers&lt;/strong&gt;, we are not only &lt;strong&gt;measuring the transfer speed&lt;/strong&gt; but also &lt;strong&gt;hard disk delays on both ends&lt;/strong&gt; of the stream. It is very likely that the destination target is capable of accepting &lt;strong&gt;greater transmission rates&lt;/strong&gt; than the source is able to send, or the other way around. These &lt;strong&gt;bottlenecks&lt;/strong&gt;, caused by hard disk drives, operating system queuing mechanism or other hardware components, &lt;strong&gt;introduce unwanted delays&lt;/strong&gt;, ultimately providing incorrect results.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The best way to measure the maximum throughput and other aspects of a network is to minimise the delay introduced by the machines participating in the test. High/Mid-end machines (servers, workstations or laptops) can be used to perform these tests, as long as they are not dealing with other tasks during the test operations.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While large companies have the financial resources to overcome all the above and purchase expensive equipment dedicated to testing network environments, the rest of us can rely on other methods and tools, most of which are freely available from the open source community.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Related articles:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization&quot;&gt;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;Netflow vs SNMP. Two Different Approaches to Network Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Introducing Iperf&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Iperf&lt;/strong&gt; is a simple and very powerful network tool that was developed for measuring TCP and UDP bandwidth performance. By tuning various parameters and characteristics of the TCP/UDP protocol, the engineer is able to perform a number of tests that will provide an insight into the network’s bandwidth availability, delay, jitter and data loss.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Main features of Iperf include:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;TCP and UDP Bandwidth Measurement&lt;/li&gt;
&lt;li&gt;Reporting of Maximum Segment Size / Maximum Transmission Unit&lt;/li&gt;
&lt;li&gt;Support for TCP Window size&lt;/li&gt;
&lt;li&gt;Multi-threaded for multiple simultaneous connections&lt;/li&gt;
&lt;li&gt;Creation of specific UDP bandwidth streams&lt;/li&gt;
&lt;li&gt;Measurement of packet loss&lt;/li&gt;
&lt;li&gt;Measurement of delay jitter&lt;/li&gt;
&lt;li&gt;Ability to run as a service or daemon&lt;/li&gt;
&lt;li&gt;Option to set and interval to automate performance tests&lt;/li&gt;
&lt;li&gt;Save results and errors to a file (useful for reviewing results later)&lt;/li&gt;
&lt;li&gt;Runs under Windows, Linux OSX or Solaris&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unlike other fancy tools, Iperf is a command line program that accepts a number of different options, making it very easy and flexible to use. Users who prefer GUI based tools can download Kperf or Jperf, which are enhancement projects aimed to provide a friendly GUI interface for Iperf.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://clixtrac.com/goto/?233607&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Measure Network Performance - Network Monitoring&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/collaborations/zoho-opmanager-800x140.jpg&quot; alt=&quot;zoho-opmanager-800x140&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another great thing about Iperf is that both ends do not require to be on the same type of operating system. This means that one end can be running on a Windows PC/Server while the other end is a Linux based system.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Currently supported operating systems are as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows 2000, XP, 2003, Vista, 7, 8 &amp;amp; Windows 2008&lt;/li&gt;
&lt;li&gt;Linux 32bit (i386)&lt;/li&gt;
&lt;li&gt;Linux 64bit (AMD64)&lt;/li&gt;
&lt;li&gt;MacOS X (Intel &amp;amp; PowerPC)&lt;/li&gt;
&lt;li&gt;Oracle Solaris (8, 9 and 10)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Downloading Iperf/Jperf for Windows &amp;amp; Linux - Compiling &amp;amp; Installing on Linux&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Iperf is available as a free download from our &lt;a href=&quot;https://www.firewall.cx/downloads/administrator-utilities.html&quot; target=&quot;_blank&quot; title=&quot;Download Administrator Utilities&quot;&gt;Administrator Utilities&lt;/a&gt; download section. The downloadable zip file contains the Windows and Linux version of Iperf, along with the Java-based graphical interfaces (Jperf). Full installation instructions are available within the .zip file.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Linux version is easily installed using the procedure outlined below. First step is to &lt;strong&gt;untar&lt;/strong&gt; and &lt;strong&gt;unzip&lt;/strong&gt; the file containing the Iperf application:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky ~]# &lt;strong&gt;tar -zxvf iperf-2.0.5.tar.gz&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;Next, enter the Iperf directory, configure, compile and install the application:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;[root@Nightsky ~]# &lt;strong&gt;cd iperf-2.0.5&lt;/strong&gt;&lt;br /&gt;[root@Nightsky iperf-2.0.5]# &lt;strong&gt;./configure&lt;/strong&gt;&lt;br /&gt;[root@Nightsky iperf-2.0.5]# &lt;strong&gt;make&lt;/strong&gt; &lt;br /&gt;&lt;em&gt;&amp;lt;output omitted&amp;gt;&lt;/em&gt;&lt;br /&gt;[root@Nightsky iperf-2.0.5]#&amp;nbsp; &lt;strong&gt;make install&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;&amp;lt;output omitted&amp;gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;br id=&quot;tinymce&quot; class=&quot;mceContentBody&quot; /&gt;Finally, &lt;strong&gt;clean&lt;/strong&gt; the directory containing our compiled leftover files:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;&amp;nbsp;[root@Nightsky iperf-2.0.5]# &lt;strong&gt;make clean&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Iperf&lt;/strong&gt; can be conveniently found in the &lt;strong&gt;/usr/local/bin/&lt;/strong&gt; directory on the Linux server or workstation.&lt;br /&gt;&lt;br /&gt;Below is a screenshot from the &lt;strong&gt;Windows GUI&lt;/strong&gt; - &lt;strong&gt;Jperf&lt;/strong&gt; application. Its friendly interface makes it easy to select &lt;strong&gt;bandwidth speed&lt;/strong&gt;, &lt;strong&gt;protocol specific parameters&lt;/strong&gt;, and much more, with just a few clicks. At the top of the GUI, &lt;strong&gt;Jperf&lt;/strong&gt; will also display the CLI command used for the options selected - a neat feature:&lt;br /&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-performance-testing-5l.png&quot; class=&quot;jcepopup&quot; title=&quot;Jperf - Windows based GUI - Network performance tester&quot; data-mediabox=&quot;1&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-performance-testing-5s.png&quot; alt=&quot;network-performance-testing-5s&quot; width=&quot;400&quot; height=&quot;342&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;Iperf - Jperf - Measuring Network Performance&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Ideas On Unleashing Iperf – Detailed Examples On How To Use Iperf&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Having a great tool like &lt;strong&gt;Iperf&lt;/strong&gt; to measure network performance, packet loss, jitter and other characteristics of a network, opens a number of brilliant possibilities that can help an engineer not only identify possible pitfalls in their network (LAN or WAN), but also test different vendor equipment and technologies to discover real performance differences between them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here are a few ideas the Firewall.cx team came up with during our brainstorming session on Iperf:&lt;/p&gt;
&lt;ul class=&quot;plus check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Measuring the network (LAN) backbone throughput&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Measuring Jitter and packet loss across links&lt;/strong&gt;. The jitter value is particularly important on network links supporting voice over IP (VoIP) because a high jitter can break a VoIP call.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test WAN link speeds and CIR&lt;/strong&gt; – Is the Telco provider delivering the speeds we are paying for?&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test router or firewall VPN throughput between links&lt;/strong&gt;. By tuning IPSec encryption algorithms we can increase our throughput significantly.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test Access Point performance between clients&lt;/strong&gt;. Wireless clients connect at 150Mbps or 300Mbps to an access point, but what are the maximum speeds that can be achieved between them?&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test Client – Server bottlenecks&lt;/strong&gt;. If there’s a server performance issue and we are not quite sure if its network related, Iperf can help shed light on the source of the problem, leaving out of the equation possible bottlenecks such as hard disk drives.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Creating parallel data transfer streams to increase load on the network to test router or switch utilisation&lt;/strong&gt;. By running Iperf on multiple workstations with multiple threads, we can create a significant amount of load on our network and perform various stress-tests.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At first sight, it is evident that &lt;strong&gt;Iperf&lt;/strong&gt; is a tool that can be used to test any part of your network, whether it be &lt;a href=&quot;https://www.firewall.cx/networking/network-cabling/network-cabling-utp-xover.html&quot; target=&quot;_blank&quot; title=&quot;Copper Links&quot;&gt;Copper (UTP) links&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/networking/network-cabling/network-cabling-fiberoptic.html&quot; target=&quot;_blank&quot; title=&quot;fiber optic links&quot;&gt;fiber optic links&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless.html&quot; target=&quot;_blank&quot; title=&quot;Wireless&quot;&gt;Wi-Fi&lt;/a&gt;, leased lines, &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-callmanager-ccme.html&quot; target=&quot;_blank&quot; title=&quot;Cisco VoIP infrastructure&quot;&gt;VoIP infrastructure&lt;/a&gt; and much more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because every network has different needs and problems we thought it would be better to take a different approach to Iperf and, instead of presenting test results of our setups (LAB Environment), show how it can be used to test and diagnose different problems engineers are forced to deal with.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By having a firm understanding how to use the options supported by Iperf, engineers can tweak the commands to help them identify their own network problems and test their network performance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For this reason, we have split this Iperf presentation by covering its various parameters. &lt;strong&gt;Note the parameters are case sensitive&lt;/strong&gt;:&lt;/p&gt;
&lt;ul class=&quot;checkbox&quot;&gt;
&lt;li&gt;Default Iperf Settings for Server and Client&lt;/li&gt;
&lt;li&gt;Communications Ports (&lt;strong&gt;-p&lt;/strong&gt;), Interval (&lt;strong&gt;-i&lt;/strong&gt;) and timing (&lt;strong&gt;-t&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Data format report (Kbps, Mbps, Kbytes, Mbytes)&amp;nbsp; (&lt;strong&gt;-f&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Buffer lengths to read or write (&lt;strong&gt;-l&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;UDP Protocol Tests (&lt;strong&gt;-u&lt;/strong&gt;) &amp;amp; UDP bandwidth settings (&lt;strong&gt;-b&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Multiple parallel threads (&lt;strong&gt;-P&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Bi-directional bandwidth measurement (&lt;strong&gt;-r&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Simultaneous bi-directional bandwidth measurement (&lt;strong&gt;-d&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;TCP Window size (&lt;strong&gt;-w&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;TCP Maximum Segment Size (MSS) (&lt;strong&gt;-M&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Iperf Help (&lt;strong&gt;-h&lt;/strong&gt;)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Default Iperf Settings for Server and Client&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By default, Iperf server listens on &lt;strong&gt;TCP port 5001&lt;/strong&gt; with a TCP &lt;strong&gt;window size&lt;/strong&gt; of &lt;strong&gt;85Kbytes&lt;/strong&gt;. When running Iperf in server mode under Windows, the TCP window size is set to 64Kbytes. The Iperf server is run using the following command:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;iperf -s&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Iperf client connects to the Iperf server at &lt;strong&gt;TCP port 5001&lt;/strong&gt;. When running in client mode we must specify the Iperf server’s IP address. Iperf will run immediately and present its results:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.5&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 52339 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp;&amp;nbsp; &lt;strong&gt;105 MBytes&lt;/strong&gt;&amp;nbsp; &lt;strong&gt;87.6 Mbits/s&lt;/strong&gt;ec&lt;/div&gt;
&lt;div&gt;The average bandwidth test was 87.6Mbps&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;strong&gt;Server Side Results&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The server also provides the test results, allowing both ends to verify the results. In some cases there might be a minor difference in the bandwidth because of how it's calculated from each end:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;------------------------------------------------------------&lt;br /&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] local 192.168.5.5 port 5001 connected with 192.168.5.237 port 52339&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4]&amp;nbsp; 0.0-10.0 sec&amp;nbsp;&amp;nbsp; &lt;strong&gt;105 MBytes&amp;nbsp; 87.5 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Communications Ports (-p), Interval (-i) and Timing (-t)&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The port under which Iperf runs can be changed using the &lt;strong&gt;–p&lt;/strong&gt; parameter. The same value must be configured on both server and client side. The interval &lt;strong&gt;-i&lt;/strong&gt; is a Server/Client parameter used to set the interval between periodic bandwidth reports, in seconds, and is very useful to see how bandwidth reports change during the testing period.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The timing parameter &lt;strong&gt;–t&lt;/strong&gt; is client specific and specifies the duration of the test in seconds. The default is 10 seconds.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;iperf -s -p 32000&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 32000&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.5 -p 32000 -i 2 -t 5&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 32000&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 52602 connected with 192.168.5.5 port 32000&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0- 2.0 sec&amp;nbsp; 20.4 MBytes&amp;nbsp; 85.5 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 2.0- 4.0 sec&amp;nbsp; 20.8 MBytes&amp;nbsp; 87.0 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0- 5.0 sec&amp;nbsp; 51.8 MBytes&amp;nbsp; 86.5 Mbits/sec&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;strong&gt;Server Side Results&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;------------------------------------------------------------&lt;br /&gt;
&lt;div&gt;Server listening on TCP port 32000&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] local 192.168.5.5 port 32000 connected with 192.168.5.237 port 52678&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
[&amp;nbsp; 4]&amp;nbsp; 0.0- 5.0 sec&amp;nbsp; &lt;strong&gt;51.6 MBytes&amp;nbsp; 86.2 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;h2&gt;Data Format Report (Kbytes &amp;amp; Kbps, Mbytes &amp;amp; Mbps)&amp;nbsp; (-f) – Server/Client Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Iperf&lt;/strong&gt; can display the &lt;strong&gt;bandwidth results&lt;/strong&gt; in different format, making it easy to read. Bandwidth measurements and data transfers will be displayed in the format selected.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;iperf -s&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here a test is performed on a 10Mbps link using default parameters. Notice the &lt;strong&gt;Transfer&lt;/strong&gt; and &lt;strong&gt;Bandwidth&lt;/strong&gt; report at the end:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.5&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 53006 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.2 sec &amp;nbsp;&lt;strong&gt;11.4 MBytes&amp;nbsp; 9.39 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Same test was executed with the &lt;strong&gt;–f k&lt;/strong&gt; parameter so that Iperf would display the results in &lt;strong&gt;Kilobytes&lt;/strong&gt; and &lt;strong&gt;Kbps&lt;/strong&gt; format:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.5 -f k&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 53038 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.2 sec&amp;nbsp; &lt;strong&gt;11648 KBytes&amp;nbsp; 9373 Kbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Buffer Lengths To Read Or Write (-l) – Server/Client Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The buffer lengths are rarely used, however, they are useful when dealing with large capacity links such as local networks (LAN). The &lt;strong&gt;–l &lt;/strong&gt;parameter specifies the length of buffer read/write for each side and is a client/server parameter. Values specified can be in &lt;strong&gt;K&lt;/strong&gt; (Kbytes) or &lt;strong&gt;M&lt;/strong&gt; (Mbytes). It’s best to always ensure both sides have the same buffer value set. The default length of read/write buffer is 8K.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;iperf -s -l 256K&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side with default read/write buffer of 8K. &lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note that for test, the &lt;strong&gt;Server&lt;/strong&gt; side was not set, making it the default value of &lt;strong&gt;8K&lt;/strong&gt;.&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.241&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.241, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 53331 connected with 192.168.5.241 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp;&amp;nbsp;&lt;strong&gt; 735 MBytes&amp;nbsp;&amp;nbsp; 616 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side with read/write buffer of 256K. &lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note that, for this test, the Server side was set to the same buffer length value of &lt;strong&gt;256K&lt;/strong&gt;.&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.241 -l 256K&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.241, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 53330 connected with 192.168.5.241 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp; &amp;nbsp;&lt;strong&gt;796 MBytes&amp;nbsp;&amp;nbsp; 667 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side with read/write buffer of 20MB. &lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note that, for this test, the Server side was set to the same buffer length value of &lt;strong&gt;20MB&lt;/strong&gt;. Notice the dramatic increase of Transfer and Bandwidth with a 20MB read/write buffer:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.241 -l 20M&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.241, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 53860 connected with 192.168.5.241 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.2 sec&amp;nbsp;&amp;nbsp; &lt;strong&gt;980 MBytes&amp;nbsp;&amp;nbsp; 803 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When running tests with large read/write buffers it is equally interesting to monitor the client’s or server’s CPU, memory and bandwidth usage.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since the 20MB buffer is swapped to memory during the test there will be a noticeable increase of memory usage. Those curious can also try a much larger buffer such as 100MB to see how the system will respond. At the same time, CPU usage will also increase as it is handing the packets being generated and received. Our &lt;strong&gt;Dual-Core CPU&lt;/strong&gt; handled the test without a problem, however, it doesn't take much to bring the system to its knees. For this reason it is highly advisable not run other heavy applications during the tests:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-performance-testing-2.gif&quot; alt=&quot;&quot; width=&quot;369&quot; height=&quot;400&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Server/Workstation CPU and Memory utilisation during network performance tests&quot; data-alt=&quot;network-performance-testing-2&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On the other hand, monitoring the network utilisation through the Windows Task Manager also helps provide a visual result of the network throughput test:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-performance-testing-3.gif&quot; alt=&quot;network-performance-testing-3&quot; width=&quot;412&quot; height=&quot;400&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Network Card Utilisation during network performance tests&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;UDP Protocol Tests (-u) &amp;amp; UDP Bandwidth Settings (-b) – Important For VoIP Networks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;–u&lt;/strong&gt; parameter is a Server/Client specific parameter.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;VoIP networks are great candidates for this type of test and extremely important. UDP tests can provide us with valuable information on jitter and packet loss. Jitter is the latency variation and does not depend on the latency itself. We can have high response times and low jitter values without introducing VoIP communications problems. High jitter can cause serious problems to VoIP calls and even break them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The UDP test also measures the packet loss of your network. A good quality link must have a packet loss less than &lt;strong&gt;1%&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;–b&lt;/strong&gt; parameter is &lt;strong&gt;client specific&lt;/strong&gt; and allows us to specify the bandwidth to send in bits/sec. The useful combination of &lt;strong&gt;–u&lt;/strong&gt; and &lt;strong&gt;–b&lt;/strong&gt; allows us to control the rate at which data is sent across the link being tested. The default value is 1Mbps.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;iperf -s -u&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on UDP port 5001&lt;/div&gt;
&lt;div&gt;Receiving 1470 byte datagrams&lt;/div&gt;
&lt;div&gt;UDP buffer size:&amp;nbsp; 224 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following command instructs our client to send UDP data at the rate of &lt;strong&gt;10Mbps&lt;/strong&gt;:&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.5 -u -b10m&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, UDP port 5001&lt;/div&gt;
&lt;div&gt;Sending 1470 byte datagrams&lt;/div&gt;
&lt;div&gt;UDP buffer size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 64214 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp; &lt;strong&gt;11.8 MBytes&amp;nbsp; 9.89 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] Sent 8418 datagrams&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] Server Report:&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp; &lt;strong&gt;5.23 MBytes&amp;nbsp; 4.39 Mbits/sec&amp;nbsp;&amp;nbsp; 0.218 ms 4683/ 8417 (56%)&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp; &lt;strong&gt;1 datagrams received out-of-order&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to note that the Iperf client presents its local and remote Iperf server statistics. While the client reports that it was able to send data at the rate of &lt;strong&gt;9.89Mbps&lt;/strong&gt;, the server reported it was receiving data at the rate of &lt;strong&gt;4.39Mbps&lt;/strong&gt;, clearly indicating a problem in our link.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next in the server’s bandwidth report (&lt;strong&gt;4.39Mbps&lt;/strong&gt;) are the &lt;strong&gt;jitter&lt;/strong&gt; and &lt;strong&gt;packet loss &lt;/strong&gt;statistics. The jitter was measured at &lt;strong&gt;0.218msec&lt;/strong&gt; – an acceptable delay, however, the &lt;strong&gt;56% packet loss&lt;/strong&gt; is totally unacceptable and explains why the server received slightly less than half (&lt;strong&gt;4.39Mbps&lt;/strong&gt;) of the transmitted rate of&lt;strong&gt; 9.89Mbps&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When tests reveal possible network problems it is always best to re-run the test to determine if packet loss is constant or happens at specific times during the total transfer. This information can be revealed by repeating the Iperf command but including the &lt;strong&gt;–i 2&lt;/strong&gt; parameter, which instructs our client to send UDP data at the rate of &lt;strong&gt;10Mbps&lt;/strong&gt; and sets &lt;strong&gt;interval between periodic bandwidth reports to 2 seconds&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -u -b10m -i 2&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, UDP port 5001&lt;/div&gt;
&lt;div&gt;Sending 1470 byte datagrams&lt;/div&gt;
&lt;div&gt;UDP buffer size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 64609 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0- 2.0 sec&amp;nbsp; 2.32 MBytes&amp;nbsp; 9.74 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 2.0- 4.0 sec&amp;nbsp; 2.40 MBytes&amp;nbsp; 10.1 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 4.0- 6.0 sec&amp;nbsp; 2.34 MBytes&amp;nbsp; 9.80 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;6.0- 8.0 sec&amp;nbsp; 2.07 MBytes&amp;nbsp; 8.68 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;8.0-10.0 sec&amp;nbsp; 2.06 MBytes&amp;nbsp; 8.64 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.3 sec&amp;nbsp; 11.2 MBytes&amp;nbsp; 9.10 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] Sent 7983 datagrams&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] &lt;strong&gt;Server Report:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;0.0-50.4 sec&amp;nbsp; 4.76 MBytes&amp;nbsp;&amp;nbsp; 793 Kbits/sec&amp;nbsp;&amp;nbsp; 0.270 ms 4584/ 7982 (57%)&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-50.4 sec&amp;nbsp; 1 datagrams received out-of-order&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The results with 2 second interval reporting show that there was a significant drop in transmission speed a bit later than half way through the test, between 6 and 10 seconds. If this was a leased line or Frame Relay link, it would most likely indicate that we are hitting our &lt;strong&gt;CIR &lt;/strong&gt;(Committed Information Rate) and the service provider is slowing down our transmission rates.&lt;/p&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Of course, further testing is needed, but any engineer can appreciate the valuable information provided with this simple test.&lt;/div&gt;
&lt;h2&gt;Multiple Parallel Threads (-P) - Client Specific Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The multiple parallel thread parameter &lt;strong&gt;–P&lt;/strong&gt; is client specific and allows the client side to run multiple threads at the same time. Obviously, using this parameter would divide the bandwidth to the amount of threads running and it's considered a valuable parameter when testing QoS functionality. We combined it with the &lt;strong&gt;–l 4M&lt;/strong&gt; parameter to increase the read/write buffer to 4MB, increasing the performance on both ends.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;&lt;strong&gt;iperf -s -l 4M&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;&lt;em&gt;------------------------------------------------------------&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Server listening on TCP port 5001&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;TCP window size: 85.3 KByte (default)&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;------------------------------------------------------------&lt;/em&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -l 4M -P 3&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 5] local 192.168.5.237 port 54222 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 54220 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] local 192.168.5.237 port 54221 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 5]&amp;nbsp; &lt;strong&gt;0.0-11.5 sec&amp;nbsp; 44.0 MBytes&amp;nbsp; 32.1 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4]&amp;nbsp; &lt;strong&gt;0.0-11.7 sec&amp;nbsp; 44.0 MBytes&amp;nbsp; 31.5 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;0.0-11.8 sec&amp;nbsp; 44.0 MBytes&amp;nbsp; 31.4 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
[SUM]&amp;nbsp; &lt;strong&gt;0.0-11.8 sec&amp;nbsp;&amp;nbsp; 132 MBytes&amp;nbsp; 94.1 Mbits/sec&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;h2&gt;Individual Bi-directional Bandwidth Measurement (-r) - Client Specific Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The bi-directional parameter &lt;strong&gt;–r&lt;/strong&gt; forces an individual bi-directional test, forcing the client to become the server after its initial test is complete. This option is considered very useful when it is necessary to test the performance in both directions and saves us manually switching the roles between the client and server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;[root@Nightsky bin]#&lt;strong&gt;&lt;strong&gt; iperf -s&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -r&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] &lt;strong&gt;local 192.168.5.237 port 54538 connected with 192.168.5.5 port 5001&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4]&amp;nbsp; 0.0-10.0 sec&amp;nbsp;&amp;nbsp; 103 MBytes&amp;nbsp; 86.3 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] &lt;strong&gt;local 192.168.5.237 port 5001 connected with 192.168.5.5 port 39426&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4]&amp;nbsp; 0.0-10.0 sec&amp;nbsp;&amp;nbsp; 110 MBytes&amp;nbsp; 92.5 Mbits/sec&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Notice the two connections created, one for each direction. A similar report is generated on the server’s side.&lt;/p&gt;
&lt;h2&gt;Simultaneous Bi-directional Bandwidth Measurement (-d) – Client Specific&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The simultaneous bi-directional bandwidth measurement parameter –d is client specific and forces a simultaneous two way data transfer test. Think about is as a full-duplex test between the server and client. This test is great for leased line WAN links which offer synchronous download/upload speeds.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We tested it between our Linux server and Windows 7 client using the –l 5M parameter, to increase the send/receive buffer and test out speeds through a 100Mbit link.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;&lt;strong&gt;iperf -s -l 5M&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -d -l 5M&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] local 192.168.5.237 port 52671 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 5] local 192.168.5.237 port 5001 connected with 192.168.5.5 port 39430&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 5]&amp;nbsp; &lt;strong&gt;0.0-10.3 sec&amp;nbsp; 90.0 MBytes&amp;nbsp; 73.2 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4]&amp;nbsp;&lt;strong&gt; 0.0-10.7 sec&amp;nbsp;&amp;nbsp; 115 MBytes&amp;nbsp; 90.0 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We can see the two sessions [&lt;strong&gt;4 &amp;amp; 5&lt;/strong&gt;] created between our two endpoints along with their results – an average of &lt;strong&gt;81,6Mbps&lt;/strong&gt; ( (73.2+90) / 2), falling slightly short of our expectations of our &lt;strong&gt;100Mbps &lt;/strong&gt;test link.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;TCP Window Size (-w) – Server/Client Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The TCP Window size can be set using the –w parameter. The TCP Window size represents the amount of data that can be sent from the server without the receiver being required to acknowledge it. Typical values are between 2 and 65,535bytes. The default value is 64KB.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Firewall.cx has covered the TCP Window size concept in great depth. Readers can refer to our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-window-size-checksum.html&quot; target=&quot;_blank&quot; title=&quot;TCP Windows Size&quot;&gt;TCP Windows Size&lt;/a&gt; article to understand its importance and how it can help increase throughput on links with increased latency e.g Satellite links.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On Linux, when specifying a TCP Window size, the kernel allocated double that requested. Ironically, the Windows operating system allowed a 1MB and even 5MB window size without any problem.&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;&lt;strong&gt;iperf -s -l 5M -w 4000&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;TCP window size: 7.81 KByte (WARNING: requested 3.91 KByte)&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -l 5M -w 4000&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 3.91 KByte&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 54172 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;0.0-11.5 sec&amp;nbsp; 55.0 MBytes&amp;nbsp; 40.1 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Using a &lt;strong&gt;4KB&lt;/strong&gt; &lt;strong&gt;TCP Window&lt;/strong&gt; size gave us only &lt;strong&gt;40.1Mbps&lt;/strong&gt; - half of our potential 100Mbps link. When we increased this to &lt;strong&gt;64KB&lt;/strong&gt;, we managed to squeeze out &lt;strong&gt;93.9Mbps&lt;/strong&gt; throughput!&lt;/p&gt;
&lt;h2&gt;TCP Maximum Segment Size (MSS) (-M) - Server/Client Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Maximum Segment Size (mss) is the largest amount of data, in bytes, that a computer can support in a single unfragmented TCP segment. Readers interested in understanding the importance of mss and how it works can refer to our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-options.html&quot; target=&quot;_blank&quot; title=&quot;TCP header analysis article&quot;&gt;TCP header analysis article&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If the MSS is set too low or high it can greatly affect network performance, especially over WAN links.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below are some default values for various networks:&lt;/p&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Ethernet – Lan&lt;/strong&gt;: 1500 Bytes&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;PPPoE ADSL&lt;/strong&gt;: 1492 Bytes&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Dialup&lt;/strong&gt;: 576 Bytes&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;&lt;strong&gt;iperf -s&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;strong&gt;------------------------------------------------------------&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -M 1350&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;WARNING: attempt to set TCP maximum segment size to 1350, but got 1281&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 54877 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;0.0-10.0 sec&amp;nbsp;&amp;nbsp; 105 MBytes&amp;nbsp; 88.2 Mbits/sec&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;h2&gt;Iperf Help –(h)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While we’ve covered most of the Iperf supported parameters, there are still more readers can discover and work with. Using the &lt;strong&gt;iperf –h&lt;/strong&gt; command will reveal all available options:&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -h&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;Usage:&lt;strong&gt; iperf [-s|-c host] [options]&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; iperf [-h|--help] [-v|--version]&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Client/Server:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -f, --format&amp;nbsp;&amp;nbsp;&amp;nbsp; [kmKM]&amp;nbsp;&amp;nbsp; format to report: Kbits, Mbits, KBytes, MBytes&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -i, --interval&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;seconds between periodic bandwidth reports&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -l, --len&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #[KM]&amp;nbsp;&amp;nbsp;&amp;nbsp; length of buffer to read or write (default 8 KB)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -m, --print_mss&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print TCP maximum segment size (MTU - TCP/IP header)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -o, --output&amp;nbsp;&amp;nbsp;&amp;nbsp;output the report or error message to this specified file&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -p, --port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; server port to listen on/connect to&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -u, --udp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; use UDP rather than TCP&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -w, --window&amp;nbsp;&amp;nbsp;&amp;nbsp; #[KM]&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP window size (socket buffer size)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -B, --bind&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; bind to, an interface or multicast address&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -C, --compatibility&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for use with older versions does not sent extra msgs&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -M, --mss&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set TCP maximum segment size (MTU - 40 bytes)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -N, --nodelay&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set TCP no delay, disabling Nagle's Algorithm&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -V, --IPv6Version&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set the domain to IPv6&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Server specific:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -s, --server&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; run in server mode&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -U, --single_udp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; run in single threaded UDP mode&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -D, --daemon&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; run the server as a daemon&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Client specific:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -b, --bandwidth #[KM]&amp;nbsp;&amp;nbsp;&amp;nbsp; for UDP, bandwidth to send at in bits/sec&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (default 1 Mbit/sec, implies -u)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -c, --client&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; run in client mode, connecting to&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -d, --dualtest&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Do a bidirectional test simultaneously&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -n, --num&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #[KM]&amp;nbsp;&amp;nbsp;&amp;nbsp; number of bytes to transmit (instead of -t)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -r, --tradeoff&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Do a bidirectional test individually&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -t, --time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; time in seconds to transmit for (default 10 secs)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -F, --fileinput&amp;nbsp;&amp;nbsp; input the data to be transmitted from a file&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -I, --stdin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input the data to be transmitted from stdin&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -L, --listenport #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port to receive bidirectional tests back on&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -P, --parallel&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; number of parallel client threads to run&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -T, --ttl&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; time-to-live, for multicast (default 1)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -Z, --linux-congestion&amp;nbsp; set TCP congestion control algorithm (Linux only)&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;&amp;nbsp;In this article we showed how &lt;strong&gt;IT Administrators&lt;/strong&gt;, &lt;strong&gt;IT Managers&lt;/strong&gt; and &lt;strong&gt;Network Engineers&lt;/strong&gt; can use &lt;strong&gt;IPerf&lt;/strong&gt; to correctly test their &lt;strong&gt;network throughput&lt;/strong&gt;, &lt;strong&gt;network delay&lt;/strong&gt;, &lt;strong&gt;packet loss and link reliability&lt;/strong&gt;.&lt;a href=&quot;https://www.firewall.cx/networking-topics/general-networking.html&quot;&gt; &lt;/a&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/network-performance-testing-intro.webp&quot; alt=&quot;&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-performance-testing-1a.jpg&quot; alt=&quot;network-performance-testing-1a&quot; width=&quot;350&quot; height=&quot;186&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Measuring Network Performance: Test Network Throughput&quot; /&gt;&lt;strong&gt;Measuring network performance&lt;/strong&gt; has always been a difficult and unclear task, mainly because most engineers and administrators are unsure which approach is best suited for their &lt;strong&gt;LAN&lt;/strong&gt; or &lt;strong&gt;WAN network&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A common (and very simple) method of &lt;strong&gt;testing network performance&lt;/strong&gt; is by initiating a simple file transfer from one end (usually workstation) to another (usually server), however, this method is frequently debated amongst engineers and there is good reason for that: When &lt;strong&gt;performing file transfers&lt;/strong&gt;, we are not only &lt;strong&gt;measuring the transfer speed&lt;/strong&gt; but also &lt;strong&gt;hard disk delays on both ends&lt;/strong&gt; of the stream. It is very likely that the destination target is capable of accepting &lt;strong&gt;greater transmission rates&lt;/strong&gt; than the source is able to send, or the other way around. These &lt;strong&gt;bottlenecks&lt;/strong&gt;, caused by hard disk drives, operating system queuing mechanism or other hardware components, &lt;strong&gt;introduce unwanted delays&lt;/strong&gt;, ultimately providing incorrect results.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The best way to measure the maximum throughput and other aspects of a network is to minimise the delay introduced by the machines participating in the test. High/Mid-end machines (servers, workstations or laptops) can be used to perform these tests, as long as they are not dealing with other tasks during the test operations.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While large companies have the financial resources to overcome all the above and purchase expensive equipment dedicated to testing network environments, the rest of us can rely on other methods and tools, most of which are freely available from the open source community.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Related articles:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization&quot;&gt;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;Netflow vs SNMP. Two Different Approaches to Network Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Introducing Iperf&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Iperf&lt;/strong&gt; is a simple and very powerful network tool that was developed for measuring TCP and UDP bandwidth performance. By tuning various parameters and characteristics of the TCP/UDP protocol, the engineer is able to perform a number of tests that will provide an insight into the network’s bandwidth availability, delay, jitter and data loss.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Main features of Iperf include:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;TCP and UDP Bandwidth Measurement&lt;/li&gt;
&lt;li&gt;Reporting of Maximum Segment Size / Maximum Transmission Unit&lt;/li&gt;
&lt;li&gt;Support for TCP Window size&lt;/li&gt;
&lt;li&gt;Multi-threaded for multiple simultaneous connections&lt;/li&gt;
&lt;li&gt;Creation of specific UDP bandwidth streams&lt;/li&gt;
&lt;li&gt;Measurement of packet loss&lt;/li&gt;
&lt;li&gt;Measurement of delay jitter&lt;/li&gt;
&lt;li&gt;Ability to run as a service or daemon&lt;/li&gt;
&lt;li&gt;Option to set and interval to automate performance tests&lt;/li&gt;
&lt;li&gt;Save results and errors to a file (useful for reviewing results later)&lt;/li&gt;
&lt;li&gt;Runs under Windows, Linux OSX or Solaris&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unlike other fancy tools, Iperf is a command line program that accepts a number of different options, making it very easy and flexible to use. Users who prefer GUI based tools can download Kperf or Jperf, which are enhancement projects aimed to provide a friendly GUI interface for Iperf.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://clixtrac.com/goto/?233607&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Measure Network Performance - Network Monitoring&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/collaborations/zoho-opmanager-800x140.jpg&quot; alt=&quot;zoho-opmanager-800x140&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another great thing about Iperf is that both ends do not require to be on the same type of operating system. This means that one end can be running on a Windows PC/Server while the other end is a Linux based system.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Currently supported operating systems are as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows 2000, XP, 2003, Vista, 7, 8 &amp;amp; Windows 2008&lt;/li&gt;
&lt;li&gt;Linux 32bit (i386)&lt;/li&gt;
&lt;li&gt;Linux 64bit (AMD64)&lt;/li&gt;
&lt;li&gt;MacOS X (Intel &amp;amp; PowerPC)&lt;/li&gt;
&lt;li&gt;Oracle Solaris (8, 9 and 10)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Downloading Iperf/Jperf for Windows &amp;amp; Linux - Compiling &amp;amp; Installing on Linux&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Iperf is available as a free download from our &lt;a href=&quot;https://www.firewall.cx/downloads/administrator-utilities.html&quot; target=&quot;_blank&quot; title=&quot;Download Administrator Utilities&quot;&gt;Administrator Utilities&lt;/a&gt; download section. The downloadable zip file contains the Windows and Linux version of Iperf, along with the Java-based graphical interfaces (Jperf). Full installation instructions are available within the .zip file.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Linux version is easily installed using the procedure outlined below. First step is to &lt;strong&gt;untar&lt;/strong&gt; and &lt;strong&gt;unzip&lt;/strong&gt; the file containing the Iperf application:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky ~]# &lt;strong&gt;tar -zxvf iperf-2.0.5.tar.gz&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;Next, enter the Iperf directory, configure, compile and install the application:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;[root@Nightsky ~]# &lt;strong&gt;cd iperf-2.0.5&lt;/strong&gt;&lt;br /&gt;[root@Nightsky iperf-2.0.5]# &lt;strong&gt;./configure&lt;/strong&gt;&lt;br /&gt;[root@Nightsky iperf-2.0.5]# &lt;strong&gt;make&lt;/strong&gt; &lt;br /&gt;&lt;em&gt;&amp;lt;output omitted&amp;gt;&lt;/em&gt;&lt;br /&gt;[root@Nightsky iperf-2.0.5]#&amp;nbsp; &lt;strong&gt;make install&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;&amp;lt;output omitted&amp;gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;br id=&quot;tinymce&quot; class=&quot;mceContentBody&quot; /&gt;Finally, &lt;strong&gt;clean&lt;/strong&gt; the directory containing our compiled leftover files:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;&amp;nbsp;[root@Nightsky iperf-2.0.5]# &lt;strong&gt;make clean&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Iperf&lt;/strong&gt; can be conveniently found in the &lt;strong&gt;/usr/local/bin/&lt;/strong&gt; directory on the Linux server or workstation.&lt;br /&gt;&lt;br /&gt;Below is a screenshot from the &lt;strong&gt;Windows GUI&lt;/strong&gt; - &lt;strong&gt;Jperf&lt;/strong&gt; application. Its friendly interface makes it easy to select &lt;strong&gt;bandwidth speed&lt;/strong&gt;, &lt;strong&gt;protocol specific parameters&lt;/strong&gt;, and much more, with just a few clicks. At the top of the GUI, &lt;strong&gt;Jperf&lt;/strong&gt; will also display the CLI command used for the options selected - a neat feature:&lt;br /&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/network-performance-testing-5l.png&quot; class=&quot;jcepopup&quot; title=&quot;Jperf - Windows based GUI - Network performance tester&quot; data-mediabox=&quot;1&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-performance-testing-5s.png&quot; alt=&quot;network-performance-testing-5s&quot; width=&quot;400&quot; height=&quot;342&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;Iperf - Jperf - Measuring Network Performance&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Ideas On Unleashing Iperf – Detailed Examples On How To Use Iperf&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Having a great tool like &lt;strong&gt;Iperf&lt;/strong&gt; to measure network performance, packet loss, jitter and other characteristics of a network, opens a number of brilliant possibilities that can help an engineer not only identify possible pitfalls in their network (LAN or WAN), but also test different vendor equipment and technologies to discover real performance differences between them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here are a few ideas the Firewall.cx team came up with during our brainstorming session on Iperf:&lt;/p&gt;
&lt;ul class=&quot;plus check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Measuring the network (LAN) backbone throughput&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Measuring Jitter and packet loss across links&lt;/strong&gt;. The jitter value is particularly important on network links supporting voice over IP (VoIP) because a high jitter can break a VoIP call.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test WAN link speeds and CIR&lt;/strong&gt; – Is the Telco provider delivering the speeds we are paying for?&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test router or firewall VPN throughput between links&lt;/strong&gt;. By tuning IPSec encryption algorithms we can increase our throughput significantly.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test Access Point performance between clients&lt;/strong&gt;. Wireless clients connect at 150Mbps or 300Mbps to an access point, but what are the maximum speeds that can be achieved between them?&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test Client – Server bottlenecks&lt;/strong&gt;. If there’s a server performance issue and we are not quite sure if its network related, Iperf can help shed light on the source of the problem, leaving out of the equation possible bottlenecks such as hard disk drives.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Creating parallel data transfer streams to increase load on the network to test router or switch utilisation&lt;/strong&gt;. By running Iperf on multiple workstations with multiple threads, we can create a significant amount of load on our network and perform various stress-tests.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At first sight, it is evident that &lt;strong&gt;Iperf&lt;/strong&gt; is a tool that can be used to test any part of your network, whether it be &lt;a href=&quot;https://www.firewall.cx/networking/network-cabling/network-cabling-utp-xover.html&quot; target=&quot;_blank&quot; title=&quot;Copper Links&quot;&gt;Copper (UTP) links&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/networking/network-cabling/network-cabling-fiberoptic.html&quot; target=&quot;_blank&quot; title=&quot;fiber optic links&quot;&gt;fiber optic links&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless.html&quot; target=&quot;_blank&quot; title=&quot;Wireless&quot;&gt;Wi-Fi&lt;/a&gt;, leased lines, &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-callmanager-ccme.html&quot; target=&quot;_blank&quot; title=&quot;Cisco VoIP infrastructure&quot;&gt;VoIP infrastructure&lt;/a&gt; and much more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because every network has different needs and problems we thought it would be better to take a different approach to Iperf and, instead of presenting test results of our setups (LAB Environment), show how it can be used to test and diagnose different problems engineers are forced to deal with.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By having a firm understanding how to use the options supported by Iperf, engineers can tweak the commands to help them identify their own network problems and test their network performance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For this reason, we have split this Iperf presentation by covering its various parameters. &lt;strong&gt;Note the parameters are case sensitive&lt;/strong&gt;:&lt;/p&gt;
&lt;ul class=&quot;checkbox&quot;&gt;
&lt;li&gt;Default Iperf Settings for Server and Client&lt;/li&gt;
&lt;li&gt;Communications Ports (&lt;strong&gt;-p&lt;/strong&gt;), Interval (&lt;strong&gt;-i&lt;/strong&gt;) and timing (&lt;strong&gt;-t&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Data format report (Kbps, Mbps, Kbytes, Mbytes)&amp;nbsp; (&lt;strong&gt;-f&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Buffer lengths to read or write (&lt;strong&gt;-l&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;UDP Protocol Tests (&lt;strong&gt;-u&lt;/strong&gt;) &amp;amp; UDP bandwidth settings (&lt;strong&gt;-b&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Multiple parallel threads (&lt;strong&gt;-P&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Bi-directional bandwidth measurement (&lt;strong&gt;-r&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Simultaneous bi-directional bandwidth measurement (&lt;strong&gt;-d&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;TCP Window size (&lt;strong&gt;-w&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;TCP Maximum Segment Size (MSS) (&lt;strong&gt;-M&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;Iperf Help (&lt;strong&gt;-h&lt;/strong&gt;)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Default Iperf Settings for Server and Client&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By default, Iperf server listens on &lt;strong&gt;TCP port 5001&lt;/strong&gt; with a TCP &lt;strong&gt;window size&lt;/strong&gt; of &lt;strong&gt;85Kbytes&lt;/strong&gt;. When running Iperf in server mode under Windows, the TCP window size is set to 64Kbytes. The Iperf server is run using the following command:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;iperf -s&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Iperf client connects to the Iperf server at &lt;strong&gt;TCP port 5001&lt;/strong&gt;. When running in client mode we must specify the Iperf server’s IP address. Iperf will run immediately and present its results:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.5&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 52339 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp;&amp;nbsp; &lt;strong&gt;105 MBytes&lt;/strong&gt;&amp;nbsp; &lt;strong&gt;87.6 Mbits/s&lt;/strong&gt;ec&lt;/div&gt;
&lt;div&gt;The average bandwidth test was 87.6Mbps&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;strong&gt;Server Side Results&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The server also provides the test results, allowing both ends to verify the results. In some cases there might be a minor difference in the bandwidth because of how it's calculated from each end:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;------------------------------------------------------------&lt;br /&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] local 192.168.5.5 port 5001 connected with 192.168.5.237 port 52339&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4]&amp;nbsp; 0.0-10.0 sec&amp;nbsp;&amp;nbsp; &lt;strong&gt;105 MBytes&amp;nbsp; 87.5 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Communications Ports (-p), Interval (-i) and Timing (-t)&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The port under which Iperf runs can be changed using the &lt;strong&gt;–p&lt;/strong&gt; parameter. The same value must be configured on both server and client side. The interval &lt;strong&gt;-i&lt;/strong&gt; is a Server/Client parameter used to set the interval between periodic bandwidth reports, in seconds, and is very useful to see how bandwidth reports change during the testing period.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The timing parameter &lt;strong&gt;–t&lt;/strong&gt; is client specific and specifies the duration of the test in seconds. The default is 10 seconds.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;iperf -s -p 32000&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 32000&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.5 -p 32000 -i 2 -t 5&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 32000&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 52602 connected with 192.168.5.5 port 32000&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0- 2.0 sec&amp;nbsp; 20.4 MBytes&amp;nbsp; 85.5 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 2.0- 4.0 sec&amp;nbsp; 20.8 MBytes&amp;nbsp; 87.0 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0- 5.0 sec&amp;nbsp; 51.8 MBytes&amp;nbsp; 86.5 Mbits/sec&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;strong&gt;Server Side Results&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;------------------------------------------------------------&lt;br /&gt;
&lt;div&gt;Server listening on TCP port 32000&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] local 192.168.5.5 port 32000 connected with 192.168.5.237 port 52678&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
[&amp;nbsp; 4]&amp;nbsp; 0.0- 5.0 sec&amp;nbsp; &lt;strong&gt;51.6 MBytes&amp;nbsp; 86.2 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;h2&gt;Data Format Report (Kbytes &amp;amp; Kbps, Mbytes &amp;amp; Mbps)&amp;nbsp; (-f) – Server/Client Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Iperf&lt;/strong&gt; can display the &lt;strong&gt;bandwidth results&lt;/strong&gt; in different format, making it easy to read. Bandwidth measurements and data transfers will be displayed in the format selected.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;iperf -s&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here a test is performed on a 10Mbps link using default parameters. Notice the &lt;strong&gt;Transfer&lt;/strong&gt; and &lt;strong&gt;Bandwidth&lt;/strong&gt; report at the end:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.5&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 53006 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.2 sec &amp;nbsp;&lt;strong&gt;11.4 MBytes&amp;nbsp; 9.39 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Same test was executed with the &lt;strong&gt;–f k&lt;/strong&gt; parameter so that Iperf would display the results in &lt;strong&gt;Kilobytes&lt;/strong&gt; and &lt;strong&gt;Kbps&lt;/strong&gt; format:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.5 -f k&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 53038 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.2 sec&amp;nbsp; &lt;strong&gt;11648 KBytes&amp;nbsp; 9373 Kbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Buffer Lengths To Read Or Write (-l) – Server/Client Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The buffer lengths are rarely used, however, they are useful when dealing with large capacity links such as local networks (LAN). The &lt;strong&gt;–l &lt;/strong&gt;parameter specifies the length of buffer read/write for each side and is a client/server parameter. Values specified can be in &lt;strong&gt;K&lt;/strong&gt; (Kbytes) or &lt;strong&gt;M&lt;/strong&gt; (Mbytes). It’s best to always ensure both sides have the same buffer value set. The default length of read/write buffer is 8K.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;iperf -s -l 256K&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side with default read/write buffer of 8K. &lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note that for test, the &lt;strong&gt;Server&lt;/strong&gt; side was not set, making it the default value of &lt;strong&gt;8K&lt;/strong&gt;.&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.241&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.241, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 53331 connected with 192.168.5.241 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp;&amp;nbsp;&lt;strong&gt; 735 MBytes&amp;nbsp;&amp;nbsp; 616 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side with read/write buffer of 256K. &lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note that, for this test, the Server side was set to the same buffer length value of &lt;strong&gt;256K&lt;/strong&gt;.&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.241 -l 256K&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.241, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 53330 connected with 192.168.5.241 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp; &amp;nbsp;&lt;strong&gt;796 MBytes&amp;nbsp;&amp;nbsp; 667 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side with read/write buffer of 20MB. &lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note that, for this test, the Server side was set to the same buffer length value of &lt;strong&gt;20MB&lt;/strong&gt;. Notice the dramatic increase of Transfer and Bandwidth with a 20MB read/write buffer:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.241 -l 20M&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.241, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 53860 connected with 192.168.5.241 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.2 sec&amp;nbsp;&amp;nbsp; &lt;strong&gt;980 MBytes&amp;nbsp;&amp;nbsp; 803 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When running tests with large read/write buffers it is equally interesting to monitor the client’s or server’s CPU, memory and bandwidth usage.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since the 20MB buffer is swapped to memory during the test there will be a noticeable increase of memory usage. Those curious can also try a much larger buffer such as 100MB to see how the system will respond. At the same time, CPU usage will also increase as it is handing the packets being generated and received. Our &lt;strong&gt;Dual-Core CPU&lt;/strong&gt; handled the test without a problem, however, it doesn't take much to bring the system to its knees. For this reason it is highly advisable not run other heavy applications during the tests:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-performance-testing-2.gif&quot; alt=&quot;&quot; width=&quot;369&quot; height=&quot;400&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Server/Workstation CPU and Memory utilisation during network performance tests&quot; data-alt=&quot;network-performance-testing-2&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On the other hand, monitoring the network utilisation through the Windows Task Manager also helps provide a visual result of the network throughput test:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/network-performance-testing-3.gif&quot; alt=&quot;network-performance-testing-3&quot; width=&quot;412&quot; height=&quot;400&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Network Card Utilisation during network performance tests&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;UDP Protocol Tests (-u) &amp;amp; UDP Bandwidth Settings (-b) – Important For VoIP Networks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;–u&lt;/strong&gt; parameter is a Server/Client specific parameter.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;VoIP networks are great candidates for this type of test and extremely important. UDP tests can provide us with valuable information on jitter and packet loss. Jitter is the latency variation and does not depend on the latency itself. We can have high response times and low jitter values without introducing VoIP communications problems. High jitter can cause serious problems to VoIP calls and even break them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The UDP test also measures the packet loss of your network. A good quality link must have a packet loss less than &lt;strong&gt;1%&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;–b&lt;/strong&gt; parameter is &lt;strong&gt;client specific&lt;/strong&gt; and allows us to specify the bandwidth to send in bits/sec. The useful combination of &lt;strong&gt;–u&lt;/strong&gt; and &lt;strong&gt;–b&lt;/strong&gt; allows us to control the rate at which data is sent across the link being tested. The default value is 1Mbps.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;iperf -s -u&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on UDP port 5001&lt;/div&gt;
&lt;div&gt;Receiving 1470 byte datagrams&lt;/div&gt;
&lt;div&gt;UDP buffer size:&amp;nbsp; 224 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following command instructs our client to send UDP data at the rate of &lt;strong&gt;10Mbps&lt;/strong&gt;:&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;iperf -c 192.168.5.5 -u -b10m&lt;/strong&gt;&lt;br /&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, UDP port 5001&lt;/div&gt;
&lt;div&gt;Sending 1470 byte datagrams&lt;/div&gt;
&lt;div&gt;UDP buffer size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 64214 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp; &lt;strong&gt;11.8 MBytes&amp;nbsp; 9.89 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] Sent 8418 datagrams&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] Server Report:&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp; &lt;strong&gt;5.23 MBytes&amp;nbsp; 4.39 Mbits/sec&amp;nbsp;&amp;nbsp; 0.218 ms 4683/ 8417 (56%)&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.0 sec&amp;nbsp; &lt;strong&gt;1 datagrams received out-of-order&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to note that the Iperf client presents its local and remote Iperf server statistics. While the client reports that it was able to send data at the rate of &lt;strong&gt;9.89Mbps&lt;/strong&gt;, the server reported it was receiving data at the rate of &lt;strong&gt;4.39Mbps&lt;/strong&gt;, clearly indicating a problem in our link.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next in the server’s bandwidth report (&lt;strong&gt;4.39Mbps&lt;/strong&gt;) are the &lt;strong&gt;jitter&lt;/strong&gt; and &lt;strong&gt;packet loss &lt;/strong&gt;statistics. The jitter was measured at &lt;strong&gt;0.218msec&lt;/strong&gt; – an acceptable delay, however, the &lt;strong&gt;56% packet loss&lt;/strong&gt; is totally unacceptable and explains why the server received slightly less than half (&lt;strong&gt;4.39Mbps&lt;/strong&gt;) of the transmitted rate of&lt;strong&gt; 9.89Mbps&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When tests reveal possible network problems it is always best to re-run the test to determine if packet loss is constant or happens at specific times during the total transfer. This information can be revealed by repeating the Iperf command but including the &lt;strong&gt;–i 2&lt;/strong&gt; parameter, which instructs our client to send UDP data at the rate of &lt;strong&gt;10Mbps&lt;/strong&gt; and sets &lt;strong&gt;interval between periodic bandwidth reports to 2 seconds&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -u -b10m -i 2&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, UDP port 5001&lt;/div&gt;
&lt;div&gt;Sending 1470 byte datagrams&lt;/div&gt;
&lt;div&gt;UDP buffer size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 64609 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0- 2.0 sec&amp;nbsp; 2.32 MBytes&amp;nbsp; 9.74 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 2.0- 4.0 sec&amp;nbsp; 2.40 MBytes&amp;nbsp; 10.1 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 4.0- 6.0 sec&amp;nbsp; 2.34 MBytes&amp;nbsp; 9.80 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;6.0- 8.0 sec&amp;nbsp; 2.07 MBytes&amp;nbsp; 8.68 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;8.0-10.0 sec&amp;nbsp; 2.06 MBytes&amp;nbsp; 8.64 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-10.3 sec&amp;nbsp; 11.2 MBytes&amp;nbsp; 9.10 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] Sent 7983 datagrams&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] &lt;strong&gt;Server Report:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;0.0-50.4 sec&amp;nbsp; 4.76 MBytes&amp;nbsp;&amp;nbsp; 793 Kbits/sec&amp;nbsp;&amp;nbsp; 0.270 ms 4584/ 7982 (57%)&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; 0.0-50.4 sec&amp;nbsp; 1 datagrams received out-of-order&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The results with 2 second interval reporting show that there was a significant drop in transmission speed a bit later than half way through the test, between 6 and 10 seconds. If this was a leased line or Frame Relay link, it would most likely indicate that we are hitting our &lt;strong&gt;CIR &lt;/strong&gt;(Committed Information Rate) and the service provider is slowing down our transmission rates.&lt;/p&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Of course, further testing is needed, but any engineer can appreciate the valuable information provided with this simple test.&lt;/div&gt;
&lt;h2&gt;Multiple Parallel Threads (-P) - Client Specific Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The multiple parallel thread parameter &lt;strong&gt;–P&lt;/strong&gt; is client specific and allows the client side to run multiple threads at the same time. Obviously, using this parameter would divide the bandwidth to the amount of threads running and it's considered a valuable parameter when testing QoS functionality. We combined it with the &lt;strong&gt;–l 4M&lt;/strong&gt; parameter to increase the read/write buffer to 4MB, increasing the performance on both ends.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;&lt;strong&gt;iperf -s -l 4M&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;&lt;em&gt;------------------------------------------------------------&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Server listening on TCP port 5001&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;TCP window size: 85.3 KByte (default)&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;------------------------------------------------------------&lt;/em&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -l 4M -P 3&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 5] local 192.168.5.237 port 54222 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 54220 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] local 192.168.5.237 port 54221 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 5]&amp;nbsp; &lt;strong&gt;0.0-11.5 sec&amp;nbsp; 44.0 MBytes&amp;nbsp; 32.1 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4]&amp;nbsp; &lt;strong&gt;0.0-11.7 sec&amp;nbsp; 44.0 MBytes&amp;nbsp; 31.5 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;0.0-11.8 sec&amp;nbsp; 44.0 MBytes&amp;nbsp; 31.4 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
[SUM]&amp;nbsp; &lt;strong&gt;0.0-11.8 sec&amp;nbsp;&amp;nbsp; 132 MBytes&amp;nbsp; 94.1 Mbits/sec&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;h2&gt;Individual Bi-directional Bandwidth Measurement (-r) - Client Specific Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The bi-directional parameter &lt;strong&gt;–r&lt;/strong&gt; forces an individual bi-directional test, forcing the client to become the server after its initial test is complete. This option is considered very useful when it is necessary to test the performance in both directions and saves us manually switching the roles between the client and server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;[root@Nightsky bin]#&lt;strong&gt;&lt;strong&gt; iperf -s&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -r&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] &lt;strong&gt;local 192.168.5.237 port 54538 connected with 192.168.5.5 port 5001&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4]&amp;nbsp; 0.0-10.0 sec&amp;nbsp;&amp;nbsp; 103 MBytes&amp;nbsp; 86.3 Mbits/sec&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] &lt;strong&gt;local 192.168.5.237 port 5001 connected with 192.168.5.5 port 39426&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4]&amp;nbsp; 0.0-10.0 sec&amp;nbsp;&amp;nbsp; 110 MBytes&amp;nbsp; 92.5 Mbits/sec&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Notice the two connections created, one for each direction. A similar report is generated on the server’s side.&lt;/p&gt;
&lt;h2&gt;Simultaneous Bi-directional Bandwidth Measurement (-d) – Client Specific&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The simultaneous bi-directional bandwidth measurement parameter –d is client specific and forces a simultaneous two way data transfer test. Think about is as a full-duplex test between the server and client. This test is great for leased line WAN links which offer synchronous download/upload speeds.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We tested it between our Linux server and Windows 7 client using the –l 5M parameter, to increase the send/receive buffer and test out speeds through a 100Mbit link.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;&lt;strong&gt;iperf -s -l 5M&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -d -l 5M&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4] local 192.168.5.237 port 52671 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 5] local 192.168.5.237 port 5001 connected with 192.168.5.5 port 39430&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 5]&amp;nbsp; &lt;strong&gt;0.0-10.3 sec&amp;nbsp; 90.0 MBytes&amp;nbsp; 73.2 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 4]&amp;nbsp;&lt;strong&gt; 0.0-10.7 sec&amp;nbsp;&amp;nbsp; 115 MBytes&amp;nbsp; 90.0 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We can see the two sessions [&lt;strong&gt;4 &amp;amp; 5&lt;/strong&gt;] created between our two endpoints along with their results – an average of &lt;strong&gt;81,6Mbps&lt;/strong&gt; ( (73.2+90) / 2), falling slightly short of our expectations of our &lt;strong&gt;100Mbps &lt;/strong&gt;test link.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;TCP Window Size (-w) – Server/Client Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The TCP Window size can be set using the –w parameter. The TCP Window size represents the amount of data that can be sent from the server without the receiver being required to acknowledge it. Typical values are between 2 and 65,535bytes. The default value is 64KB.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Firewall.cx has covered the TCP Window size concept in great depth. Readers can refer to our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-window-size-checksum.html&quot; target=&quot;_blank&quot; title=&quot;TCP Windows Size&quot;&gt;TCP Windows Size&lt;/a&gt; article to understand its importance and how it can help increase throughput on links with increased latency e.g Satellite links.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On Linux, when specifying a TCP Window size, the kernel allocated double that requested. Ironically, the Windows operating system allowed a 1MB and even 5MB window size without any problem.&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;&lt;strong&gt;iperf -s -l 5M -w 4000&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;TCP window size: 7.81 KByte (WARNING: requested 3.91 KByte)&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -l 5M -w 4000&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 3.91 KByte&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 54172 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;0.0-11.5 sec&amp;nbsp; 55.0 MBytes&amp;nbsp; 40.1 Mbits/sec&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Using a &lt;strong&gt;4KB&lt;/strong&gt; &lt;strong&gt;TCP Window&lt;/strong&gt; size gave us only &lt;strong&gt;40.1Mbps&lt;/strong&gt; - half of our potential 100Mbps link. When we increased this to &lt;strong&gt;64KB&lt;/strong&gt;, we managed to squeeze out &lt;strong&gt;93.9Mbps&lt;/strong&gt; throughput!&lt;/p&gt;
&lt;h2&gt;TCP Maximum Segment Size (MSS) (-M) - Server/Client Parameter&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Maximum Segment Size (mss) is the largest amount of data, in bytes, that a computer can support in a single unfragmented TCP segment. Readers interested in understanding the importance of mss and how it works can refer to our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-options.html&quot; target=&quot;_blank&quot; title=&quot;TCP header analysis article&quot;&gt;TCP header analysis article&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If the MSS is set too low or high it can greatly affect network performance, especially over WAN links.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below are some default values for various networks:&lt;/p&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Ethernet – Lan&lt;/strong&gt;: 1500 Bytes&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;PPPoE ADSL&lt;/strong&gt;: 1492 Bytes&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Dialup&lt;/strong&gt;: 576 Bytes&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Server Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;[root@Nightsky bin]# &lt;strong&gt;&lt;strong&gt;iperf -s&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Server listening on TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 85.3 KByte (default)&lt;/div&gt;
&lt;strong&gt;------------------------------------------------------------&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Client Side&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -c 192.168.5.5 -M 1350&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;WARNING: attempt to set TCP maximum segment size to 1350, but got 1281&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;Client connecting to 192.168.5.5, TCP port 5001&lt;/div&gt;
&lt;div&gt;TCP window size: 64.0 KByte (default)&lt;/div&gt;
&lt;div&gt;------------------------------------------------------------&lt;/div&gt;
&lt;div&gt;[&amp;nbsp; 3] local 192.168.5.237 port 54877 connected with 192.168.5.5 port 5001&lt;/div&gt;
&lt;div&gt;[ ID] Interval&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bandwidth&lt;/div&gt;
[&amp;nbsp; 3]&amp;nbsp; &lt;strong&gt;0.0-10.0 sec&amp;nbsp;&amp;nbsp; 105 MBytes&amp;nbsp; 88.2 Mbits/sec&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;h2&gt;Iperf Help –(h)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While we’ve covered most of the Iperf supported parameters, there are still more readers can discover and work with. Using the &lt;strong&gt;iperf –h&lt;/strong&gt; command will reveal all available options:&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;C:\Users\Chris\Desktop\iperf-2.0.5-2-win32&amp;gt; &lt;strong&gt;&lt;strong&gt;iperf -h&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;
&lt;div&gt;Usage:&lt;strong&gt; iperf [-s|-c host] [options]&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; iperf [-h|--help] [-v|--version]&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Client/Server:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -f, --format&amp;nbsp;&amp;nbsp;&amp;nbsp; [kmKM]&amp;nbsp;&amp;nbsp; format to report: Kbits, Mbits, KBytes, MBytes&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -i, --interval&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;seconds between periodic bandwidth reports&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -l, --len&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #[KM]&amp;nbsp;&amp;nbsp;&amp;nbsp; length of buffer to read or write (default 8 KB)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -m, --print_mss&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print TCP maximum segment size (MTU - TCP/IP header)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -o, --output&amp;nbsp;&amp;nbsp;&amp;nbsp;output the report or error message to this specified file&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -p, --port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; server port to listen on/connect to&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -u, --udp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; use UDP rather than TCP&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -w, --window&amp;nbsp;&amp;nbsp;&amp;nbsp; #[KM]&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP window size (socket buffer size)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -B, --bind&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; bind to, an interface or multicast address&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -C, --compatibility&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for use with older versions does not sent extra msgs&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -M, --mss&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set TCP maximum segment size (MTU - 40 bytes)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -N, --nodelay&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set TCP no delay, disabling Nagle's Algorithm&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -V, --IPv6Version&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set the domain to IPv6&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Server specific:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -s, --server&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; run in server mode&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -U, --single_udp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; run in single threaded UDP mode&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -D, --daemon&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; run the server as a daemon&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Client specific:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -b, --bandwidth #[KM]&amp;nbsp;&amp;nbsp;&amp;nbsp; for UDP, bandwidth to send at in bits/sec&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (default 1 Mbit/sec, implies -u)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -c, --client&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; run in client mode, connecting to&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -d, --dualtest&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Do a bidirectional test simultaneously&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -n, --num&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #[KM]&amp;nbsp;&amp;nbsp;&amp;nbsp; number of bytes to transmit (instead of -t)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -r, --tradeoff&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Do a bidirectional test individually&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -t, --time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; time in seconds to transmit for (default 10 secs)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -F, --fileinput&amp;nbsp;&amp;nbsp; input the data to be transmitted from a file&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -I, --stdin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input the data to be transmitted from stdin&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -L, --listenport #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port to receive bidirectional tests back on&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -P, --parallel&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; number of parallel client threads to run&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -T, --ttl&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; time-to-live, for multicast (default 1)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; -Z, --linux-congestion&amp;nbsp; set TCP congestion control algorithm (Linux only)&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;&amp;nbsp;In this article we showed how &lt;strong&gt;IT Administrators&lt;/strong&gt;, &lt;strong&gt;IT Managers&lt;/strong&gt; and &lt;strong&gt;Network Engineers&lt;/strong&gt; can use &lt;strong&gt;IPerf&lt;/strong&gt; to correctly test their &lt;strong&gt;network throughput&lt;/strong&gt;, &lt;strong&gt;network delay&lt;/strong&gt;, &lt;strong&gt;packet loss and link reliability&lt;/strong&gt;.&lt;a href=&quot;https://www.firewall.cx/networking-topics/general-networking.html&quot;&gt; &lt;/a&gt;&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Introduction to Content Switching - Application &amp; Virtual Server Load Balancing via Deep Packet Inspection</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/cisco-switches-content-switching.html"/>
		<published>2013-06-10T07:00:00+10:00</published>
		<updated>2013-06-10T07:00:00+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/cisco-switches-content-switching.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro.webp&quot; alt=&quot;Introduction to Content Switching&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Content switches&lt;/strong&gt; (also sometimes called application switches) is a class of network device that is becoming increasingly common in medium to large sized data centres and web-facing infrastructures.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The devices we traditionally call switches work at &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;OSI Layer 2&quot;&gt;Layer 2&lt;/a&gt; of the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI model&quot;&gt;OSI model&lt;/a&gt; and simply direct incoming frames to the appropriate exit port based on their destination &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC address&quot;&gt;MAC address&lt;/a&gt;. Content switches, however, also inspect the contents of the data packet all the way from &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer4.html&quot; target=&quot;_blank&quot; title=&quot;Layer 4&quot;&gt;Layer 4&lt;/a&gt; right up to &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer7.html&quot; target=&quot;_blank&quot; title=&quot;Layer 7&quot;&gt;Layer 7&lt;/a&gt; and can be configured to do all sorts of clever things depending on what they find.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-8.jpg&quot; alt=&quot;Cisco ACE Module for Catalyst 6500 &amp;amp; 7600 Engines&quot; width=&quot;301&quot; height=&quot;131&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Cisco ACE Module for Catalyst 6500 &amp;amp; 7600 Engines&quot; /&gt;An increasing number of vendors are offering these products. Cisco’s CSM (Content Switching Module) and ACE (Application Control Engine) module will slot into its 6500 Series switches and 7600 Series routers and Cisco provides standalone appliances such as the ACE 4710. F5 Networks is another major contender with its &lt;strong&gt;BigIP LTM&lt;/strong&gt; (Local Traffic Manager) and &lt;strong&gt;GTM&lt;/strong&gt; (Global Traffic Manager) range of appliances.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-9.jpg&quot; alt=&quot;Cisco ACE 4710 Content Switch Appliance&quot; width=&quot;300&quot; height=&quot;85&quot; style=&quot;margin: 7px; float: right;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In functional terms what you get here is a dedicated computer running a real OS (the &lt;strong&gt;BigIP LTMs&lt;/strong&gt; run a variant of Linux) with added hardware to handle the packet manipulation and switching aspects. The content switching application, running on top of the OS and interacting with the hardware, provides both in-depth control and powerful traffic processing facilities.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So what can these devices do? We’ll consider that by looking at an example. Suppose you have a number of end-user PCs out on the internet that need to access an application running on a server farm in a data centre:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-1.png&quot; alt=&quot;content-switching-intro-1&quot; width=&quot;388&quot; height=&quot;419&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Obviously you have a few things to do here. Firstly you need to somehow provide a single ‘target’ IP address for those users to aim at, as opposed to publishing all the addresses of all the individual servers. Secondly you need some method of routing all those incoming sessions through to your server farm and sharing them evenly across your servers while still providing isolation between your internal network and the outside world. And, thirdly, you need it to be resilient so it doesn’t fall over the moment one of your servers goes off-line or something changes. A content switch can do all of this for you and much more:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-2.png&quot; alt=&quot;content-switching-intro-2&quot; width=&quot;389&quot; height=&quot;510&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s look at each of these aspects in more detail.&lt;/p&gt;
&lt;h2&gt;Virtual Servers&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is one of the most basic things you can do with these devices. On your content switch you can define a virtual server which the switch will then ‘offer’ to the outside world. This is more, though, than just a &lt;strong&gt;virtual IP address&lt;/strong&gt; - you can specify the ports served, the protocols accepted, the source(s) allowed and a whole heap of other parameters. And because it’s your content switch the users are accessing now, you can take all this overhead away from your back-end servers and leave them to do what they do best - serve up data.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For example, if this is a secure connection, why make each server labour with the complexities of certificate management and &lt;strong&gt;SSL session decryption&lt;/strong&gt;? Let the content switch handle the &lt;strong&gt;SSL termination&lt;/strong&gt; and manage the client and server certificates for you. This reduces the server load, the application complexity and your administration overhead. Do you need users to authenticate to gain access to the application? Again, do it at the virtual server within the content switch and everything becomes much easier. &lt;strong&gt;Timeouts&lt;/strong&gt;, &lt;strong&gt;session limits&lt;/strong&gt; and all sorts of other things can be defined and controlled at this level too.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-3.png&quot; alt=&quot;content-switching-intro-3&quot; width=&quot;523&quot; height=&quot;493&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Load Balancing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once our users have successfully accessed the virtual server, what then? Typically you would define a resource pool (of servers) on your content switch and then define the members (individual servers) within it. Here you can address issues such as how you want the pool to share the work across the member servers (round robin or quietest first), and what should happen if things go wrong.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This second point is important – you might need two servers as a minimum sharing the load to provide a good enough service to your users, but what happens if there’s only one? And what happens if a server goes down while your service is running? You can take care of all this inside the content switch within the configuration of your pool. For example, you could say that if there is fewer than two servers up then the device should stop offering the virtual service to new clients until the situation improves. And you can set up monitors (Cisco calls them probes) so that the switch will check for application availability (again, not just simple pings) across its pool members and adjust itself accordingly. And all this will happen automatically while you sit back and sip your coffee.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You also need to consider established sessions. If a user opens a new session and their initial request is handled by server 1, you need to make sure that all subsequent communications from that user also go to server 1 as opposed to servers 2 or 3 which have no record of the data the user has already entered. This is called persistence, and the content switch can handle that for you as well.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-4.png&quot; alt=&quot;content-switching-intro-4&quot; width=&quot;549&quot; height=&quot;530&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;Deep Packet Inspection&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Content switches do all the above because they inspect the contents of incoming packets right up to &lt;strong&gt;Layer 7&lt;/strong&gt;. They know the protocol in use, for example, and can pull the username and password out of the data entered by the user and use those to grant or deny access. This ability unleashes the ultimate power of the device – you can inspect the whole of the packet including the data and basically have your switch do anything you want.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Perhaps you feel malicious and want to deny all users named “Fred”. It’s a silly example, but you could do it. Maybe you’d like the switch to look in the packet’s data and change every instance of “Fred” to “idiot” as the data passes through. Again, you could do it. The value of this becomes clearer when you think of global enterprises (Microsoft Update is a prime example) where they want to know, perhaps, what OS you’re running or which continent you’re on so you can be silently rerouted to the server farm most appropriate for your needs. Your content switch can literally inspect and modify the incoming data on the fly to facilitate intelligent traffic-based routing, seamless redirects or disaster recovery scenarios that would be hard to achieve by conventional means. Want to inspect the HTTP header fields and use, say, the browser version to decide which back-end server farm the user should hit? Want to check for a cookie on the user’s machine and make a routing decision based on that? Want to create a cookie if there isn’t one? You can do all of this and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With the higher-end devices this really is limited only by your creativity. For example, the F5 and &lt;a href=&quot;https://www.firewall.cx/cisco.html&quot; title=&quot;Cisco devices&quot;&gt;Cisco devices&lt;/a&gt; offer a whole programming language in which you can implement whatever custom processing you need. Once written, you simply apply these scripts (called I-Rules on the F5) at the appropriate points in the virtual server topology and off they go.&lt;/p&gt;
&lt;h2&gt;Scalability&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What happens if you suddenly double your user base overnight and now need six back-end servers to handle the load instead of three? No problem – just add three more servers into the server pool on your content switch, plug them into your back-end network and they’re ready to go. And remember all you need here are simple application servers because all the clever stuff is being handled for them by the content switch. With an architecture like this server power becomes a commodity you can add or remove at will, and it’s also very easy to make application-level changes across all your servers because it’s all defined in the content switch.&lt;/p&gt;
&lt;h2&gt;Topologies&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;How might you see a content switch physically deployed? Well, these are switches so you might well see one in the traditional ‘&lt;strong&gt;straight through&lt;/strong&gt;’ arrangement:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-5.png&quot; alt=&quot;content-switching-intro-5&quot; width=&quot;318&quot; height=&quot;520&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Or since they are VLAN aware you might also see a ‘&lt;strong&gt;content-switch-on-a-stick&lt;/strong&gt;’:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-6.png&quot; alt=&quot;content-switching-intro-6&quot; width=&quot;431&quot; height=&quot;496&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You’ll also often find them in resilient pairs or clusters offering various failover options to ensure high availability. And it’s worth pointing out here that failover means just that – the session data and persistence information is constantly passed across to the standby so that if failover occurs even the in-flight sessions can be taken up and the end users won’t even notice.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-7.png&quot; alt=&quot;content-switching-intro-7&quot; width=&quot;514&quot; height=&quot;661&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;And, finally, you can now even get virtual content switches that you can integrate with other virtual modules to provide a complete application service-set within a single high-end switch or router chassis. Data centre in a box, anyone?&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Content switches go far beyond the connectivity and packet-routing services offered by traditional layer 2 and 3 switches. By inspecting the whole packet right up to Layer 7 including the end-user data they can:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Intelligently load balance traffic across multiple servers based on the availability of the content and the load on the servers.&lt;/li&gt;
&lt;li&gt;Monitor the health of each server and provide automatic failover by re-routing user sessions to the remaining devices in the server farm.&lt;/li&gt;
&lt;li&gt;Provide intelligent traffic management capabilities and differentiated services.&lt;/li&gt;
&lt;li&gt;Handle SSL termination and certificate management, user access control, quality-of-service and bandwidth management.&lt;/li&gt;
&lt;li&gt;Provide increased application resilience and improve scalability and flexibility.&lt;/li&gt;
&lt;li&gt;Allow content to be flexibly located and support virtual hosting.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Further information&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Links to Cisco webpages&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.cisco.com/en/US/prod/collateral/contnetw/ps5719/ps7027/Data_Sheet_Cisco_ACE_4710.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://www.cisco.com/en/US/prod/collateral/contnetw/ps5719/ps7027/Data_Sheet_Cisco_ACE_4710.html&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.cisco.com/en/US/products/ps6906/index.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://www.cisco.com/en/US/products/ps6906/index.html&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.cisco.com/en/US/prod/collateral/modules/ps2706/ps6906/prod_brochure0900aecd804585e5.pdf&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://www.cisco.com/en/US/prod/collateral/modules/ps2706/ps6906/prod_brochure0900aecd804585e5.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt; &lt;strong&gt;Links to F5 webpages&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.f5.com/products/big-ip/big-ip-local-traffic-manager/overview/&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://www.f5.com/products/big-ip/big-ip-local-traffic-manager/overview/&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.f5.com/pdf/products/big-ip-platforms-datasheet.pdf&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://www.f5.com/pdf/products/big-ip-platforms-datasheet.pdf&lt;/a&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro.webp&quot; alt=&quot;Introduction to Content Switching&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Content switches&lt;/strong&gt; (also sometimes called application switches) is a class of network device that is becoming increasingly common in medium to large sized data centres and web-facing infrastructures.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The devices we traditionally call switches work at &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;OSI Layer 2&quot;&gt;Layer 2&lt;/a&gt; of the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI model&quot;&gt;OSI model&lt;/a&gt; and simply direct incoming frames to the appropriate exit port based on their destination &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC address&quot;&gt;MAC address&lt;/a&gt;. Content switches, however, also inspect the contents of the data packet all the way from &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer4.html&quot; target=&quot;_blank&quot; title=&quot;Layer 4&quot;&gt;Layer 4&lt;/a&gt; right up to &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer7.html&quot; target=&quot;_blank&quot; title=&quot;Layer 7&quot;&gt;Layer 7&lt;/a&gt; and can be configured to do all sorts of clever things depending on what they find.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-8.jpg&quot; alt=&quot;Cisco ACE Module for Catalyst 6500 &amp;amp; 7600 Engines&quot; width=&quot;301&quot; height=&quot;131&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Cisco ACE Module for Catalyst 6500 &amp;amp; 7600 Engines&quot; /&gt;An increasing number of vendors are offering these products. Cisco’s CSM (Content Switching Module) and ACE (Application Control Engine) module will slot into its 6500 Series switches and 7600 Series routers and Cisco provides standalone appliances such as the ACE 4710. F5 Networks is another major contender with its &lt;strong&gt;BigIP LTM&lt;/strong&gt; (Local Traffic Manager) and &lt;strong&gt;GTM&lt;/strong&gt; (Global Traffic Manager) range of appliances.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-9.jpg&quot; alt=&quot;Cisco ACE 4710 Content Switch Appliance&quot; width=&quot;300&quot; height=&quot;85&quot; style=&quot;margin: 7px; float: right;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In functional terms what you get here is a dedicated computer running a real OS (the &lt;strong&gt;BigIP LTMs&lt;/strong&gt; run a variant of Linux) with added hardware to handle the packet manipulation and switching aspects. The content switching application, running on top of the OS and interacting with the hardware, provides both in-depth control and powerful traffic processing facilities.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So what can these devices do? We’ll consider that by looking at an example. Suppose you have a number of end-user PCs out on the internet that need to access an application running on a server farm in a data centre:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-1.png&quot; alt=&quot;content-switching-intro-1&quot; width=&quot;388&quot; height=&quot;419&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Obviously you have a few things to do here. Firstly you need to somehow provide a single ‘target’ IP address for those users to aim at, as opposed to publishing all the addresses of all the individual servers. Secondly you need some method of routing all those incoming sessions through to your server farm and sharing them evenly across your servers while still providing isolation between your internal network and the outside world. And, thirdly, you need it to be resilient so it doesn’t fall over the moment one of your servers goes off-line or something changes. A content switch can do all of this for you and much more:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-2.png&quot; alt=&quot;content-switching-intro-2&quot; width=&quot;389&quot; height=&quot;510&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s look at each of these aspects in more detail.&lt;/p&gt;
&lt;h2&gt;Virtual Servers&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is one of the most basic things you can do with these devices. On your content switch you can define a virtual server which the switch will then ‘offer’ to the outside world. This is more, though, than just a &lt;strong&gt;virtual IP address&lt;/strong&gt; - you can specify the ports served, the protocols accepted, the source(s) allowed and a whole heap of other parameters. And because it’s your content switch the users are accessing now, you can take all this overhead away from your back-end servers and leave them to do what they do best - serve up data.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For example, if this is a secure connection, why make each server labour with the complexities of certificate management and &lt;strong&gt;SSL session decryption&lt;/strong&gt;? Let the content switch handle the &lt;strong&gt;SSL termination&lt;/strong&gt; and manage the client and server certificates for you. This reduces the server load, the application complexity and your administration overhead. Do you need users to authenticate to gain access to the application? Again, do it at the virtual server within the content switch and everything becomes much easier. &lt;strong&gt;Timeouts&lt;/strong&gt;, &lt;strong&gt;session limits&lt;/strong&gt; and all sorts of other things can be defined and controlled at this level too.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-3.png&quot; alt=&quot;content-switching-intro-3&quot; width=&quot;523&quot; height=&quot;493&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Load Balancing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once our users have successfully accessed the virtual server, what then? Typically you would define a resource pool (of servers) on your content switch and then define the members (individual servers) within it. Here you can address issues such as how you want the pool to share the work across the member servers (round robin or quietest first), and what should happen if things go wrong.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This second point is important – you might need two servers as a minimum sharing the load to provide a good enough service to your users, but what happens if there’s only one? And what happens if a server goes down while your service is running? You can take care of all this inside the content switch within the configuration of your pool. For example, you could say that if there is fewer than two servers up then the device should stop offering the virtual service to new clients until the situation improves. And you can set up monitors (Cisco calls them probes) so that the switch will check for application availability (again, not just simple pings) across its pool members and adjust itself accordingly. And all this will happen automatically while you sit back and sip your coffee.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You also need to consider established sessions. If a user opens a new session and their initial request is handled by server 1, you need to make sure that all subsequent communications from that user also go to server 1 as opposed to servers 2 or 3 which have no record of the data the user has already entered. This is called persistence, and the content switch can handle that for you as well.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-4.png&quot; alt=&quot;content-switching-intro-4&quot; width=&quot;549&quot; height=&quot;530&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;Deep Packet Inspection&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Content switches do all the above because they inspect the contents of incoming packets right up to &lt;strong&gt;Layer 7&lt;/strong&gt;. They know the protocol in use, for example, and can pull the username and password out of the data entered by the user and use those to grant or deny access. This ability unleashes the ultimate power of the device – you can inspect the whole of the packet including the data and basically have your switch do anything you want.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Perhaps you feel malicious and want to deny all users named “Fred”. It’s a silly example, but you could do it. Maybe you’d like the switch to look in the packet’s data and change every instance of “Fred” to “idiot” as the data passes through. Again, you could do it. The value of this becomes clearer when you think of global enterprises (Microsoft Update is a prime example) where they want to know, perhaps, what OS you’re running or which continent you’re on so you can be silently rerouted to the server farm most appropriate for your needs. Your content switch can literally inspect and modify the incoming data on the fly to facilitate intelligent traffic-based routing, seamless redirects or disaster recovery scenarios that would be hard to achieve by conventional means. Want to inspect the HTTP header fields and use, say, the browser version to decide which back-end server farm the user should hit? Want to check for a cookie on the user’s machine and make a routing decision based on that? Want to create a cookie if there isn’t one? You can do all of this and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With the higher-end devices this really is limited only by your creativity. For example, the F5 and &lt;a href=&quot;https://www.firewall.cx/cisco.html&quot; title=&quot;Cisco devices&quot;&gt;Cisco devices&lt;/a&gt; offer a whole programming language in which you can implement whatever custom processing you need. Once written, you simply apply these scripts (called I-Rules on the F5) at the appropriate points in the virtual server topology and off they go.&lt;/p&gt;
&lt;h2&gt;Scalability&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What happens if you suddenly double your user base overnight and now need six back-end servers to handle the load instead of three? No problem – just add three more servers into the server pool on your content switch, plug them into your back-end network and they’re ready to go. And remember all you need here are simple application servers because all the clever stuff is being handled for them by the content switch. With an architecture like this server power becomes a commodity you can add or remove at will, and it’s also very easy to make application-level changes across all your servers because it’s all defined in the content switch.&lt;/p&gt;
&lt;h2&gt;Topologies&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;How might you see a content switch physically deployed? Well, these are switches so you might well see one in the traditional ‘&lt;strong&gt;straight through&lt;/strong&gt;’ arrangement:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-5.png&quot; alt=&quot;content-switching-intro-5&quot; width=&quot;318&quot; height=&quot;520&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Or since they are VLAN aware you might also see a ‘&lt;strong&gt;content-switch-on-a-stick&lt;/strong&gt;’:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-6.png&quot; alt=&quot;content-switching-intro-6&quot; width=&quot;431&quot; height=&quot;496&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You’ll also often find them in resilient pairs or clusters offering various failover options to ensure high availability. And it’s worth pointing out here that failover means just that – the session data and persistence information is constantly passed across to the standby so that if failover occurs even the in-flight sessions can be taken up and the end users won’t even notice.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/content-switching-intro-7.png&quot; alt=&quot;content-switching-intro-7&quot; width=&quot;514&quot; height=&quot;661&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;And, finally, you can now even get virtual content switches that you can integrate with other virtual modules to provide a complete application service-set within a single high-end switch or router chassis. Data centre in a box, anyone?&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Content switches go far beyond the connectivity and packet-routing services offered by traditional layer 2 and 3 switches. By inspecting the whole packet right up to Layer 7 including the end-user data they can:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Intelligently load balance traffic across multiple servers based on the availability of the content and the load on the servers.&lt;/li&gt;
&lt;li&gt;Monitor the health of each server and provide automatic failover by re-routing user sessions to the remaining devices in the server farm.&lt;/li&gt;
&lt;li&gt;Provide intelligent traffic management capabilities and differentiated services.&lt;/li&gt;
&lt;li&gt;Handle SSL termination and certificate management, user access control, quality-of-service and bandwidth management.&lt;/li&gt;
&lt;li&gt;Provide increased application resilience and improve scalability and flexibility.&lt;/li&gt;
&lt;li&gt;Allow content to be flexibly located and support virtual hosting.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Further information&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Links to Cisco webpages&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.cisco.com/en/US/prod/collateral/contnetw/ps5719/ps7027/Data_Sheet_Cisco_ACE_4710.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://www.cisco.com/en/US/prod/collateral/contnetw/ps5719/ps7027/Data_Sheet_Cisco_ACE_4710.html&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.cisco.com/en/US/products/ps6906/index.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://www.cisco.com/en/US/products/ps6906/index.html&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.cisco.com/en/US/prod/collateral/modules/ps2706/ps6906/prod_brochure0900aecd804585e5.pdf&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://www.cisco.com/en/US/prod/collateral/modules/ps2706/ps6906/prod_brochure0900aecd804585e5.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt; &lt;strong&gt;Links to F5 webpages&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.f5.com/products/big-ip/big-ip-local-traffic-manager/overview/&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://www.f5.com/products/big-ip/big-ip-local-traffic-manager/overview/&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.f5.com/pdf/products/big-ip-platforms-datasheet.pdf&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://www.f5.com/pdf/products/big-ip-platforms-datasheet.pdf&lt;/a&gt;&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Need for Speed – The Data Tsunami &amp; Advancements in Networking. From FastEthernet 100Mbps to Wireless 17.6Tbps! </title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/networking-accelerating-lan-wan-wifi-speeds.html"/>
		<published>2013-05-17T08:00:00+10:00</published>
		<updated>2013-05-17T08:00:00+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/networking-accelerating-lan-wan-wifi-speeds.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking-accelerating-lan-wan-wifi-speeds-intro.webp&quot; alt=&quot;Need for SpeeThe Data Tsunami &amp;amp; Advancements in Networking&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking-accelerating-speeds-1.jpg&quot; alt=&quot;Ethernet network speeds cisco switches&quot; width=&quot;285&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; /&gt;A long-long time ago (not long ago in earth time) &lt;strong&gt;100 Mbps&lt;/strong&gt; was THE technology. 100 Mbps uplinks bundled with ether-channel was the ultimate uplink technology. This was the prevailing technology during the tech boom. Gigabit Ethernet was up and coming.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Fast forward to today and we are looking forward to deploying 40 Gbps. Every now and then we hear in the news about deployment of +100 Gbps links. The very fact that it is newsworthy tells us that it is not common.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Cisco&lt;/strong&gt; says that mobile data traffic alone will increase 13X (thirteen times) over the next four years and will outpace the global fixed data traffic by a factor of 3 by 2017.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These trends have prompted IEEE to consider the Ethernet solution beyond the &lt;strong&gt;100 Gbps&lt;/strong&gt;, which is just coming to the market.&lt;/p&gt;
&lt;h2&gt;Interesting Fact:&lt;/h2&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Large Hadron Collider at CERN generates 1Petabyte of data/sec (a Peta&amp;nbsp; has 15 zeros and is also called a quintillion). Of course, they cannot store all of it and so they filter it to keep INTERESTING data only, which is still about 25 Peta Bytes per year (1000 years’ worth of DVDs). This data is sent out by CERN to 11 Tier 1 institutions around the globe for analysis.&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Keeping all this in mind, I was intrigued to read that in Feb 2013 &lt;strong&gt;400 Gbps&lt;/strong&gt; per wavelength had been deployed between the French Cities of Paris and Lyon. The link actually uses 44 such wavelengths to achieve &lt;strong&gt;17.6 Tbps&lt;/strong&gt; of traffic in total. To give you an idea, at &lt;strong&gt;17.6 Tbs&lt;/strong&gt; you can transfer 44 Blu-ray discs each second.&lt;/p&gt;
&lt;h2&gt;Interesting Fact:&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The work on ratification of &lt;strong&gt;100 Gbps&lt;/strong&gt; was started in 2006 when there were no smartphones as we know them today.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The latest news (March 2013) is about Fujitsu creating newer modulation demodulation technology that can use the standard, widely available hardware used in &lt;strong&gt;10 Gbps networking&lt;/strong&gt; to &lt;strong&gt;transmit 100 Gbps&lt;/strong&gt; of data on a single channel. Combining four streams of &lt;strong&gt;100 Gbps&lt;/strong&gt; each to an &lt;strong&gt;optical transceiver&lt;/strong&gt; would result in a &lt;strong&gt;400 Gbps Ethernet transceiver&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This made me very curious and I looked further to see that researchers at AT&amp;amp;T labs had achieved this feat of sending &lt;strong&gt;400 Gbps&lt;/strong&gt; over fiber an extremely long distance. Can you guess, how long?&amp;nbsp;&lt;strong&gt;12000Km&lt;/strong&gt;! which is approximately &lt;strong&gt;7500 miles&lt;/strong&gt;, breaking their old record of&amp;nbsp;&lt;strong&gt;9000Km&lt;/strong&gt;. This is exciting because it increases the reach by a &lt;strong&gt;factor of 2.5&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Interesting Fact:&lt;/h2&gt;
&lt;p&gt;It took &lt;strong&gt;IEEE 4 years&lt;/strong&gt; to ratify the standard for &lt;strong&gt;100 Gbps&lt;/strong&gt; from &lt;strong&gt;2006 to 2010&lt;/strong&gt;. It is expected that the new &lt;strong&gt;400 Gbps&lt;/strong&gt; standard will be ratified by 2017.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;IEEE announced, on 2 April 2013, that the &lt;strong&gt;IEEE 802.3 400 Gbps&lt;/strong&gt; study group is meeting May 14-17 in Victoria BC Canada to explore the development of a &lt;strong&gt;400 Gbps Ethernet standard&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Previously this group had concluded that by 2015 networks would need to support the capacity of &lt;strong&gt;1 Tbps&lt;/strong&gt; and by &lt;strong&gt;2020&lt;/strong&gt; to support &lt;strong&gt;10 Tbps&lt;/strong&gt;, however, in September 2012, they decided to focus on &lt;strong&gt;400 Gbps&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The reason for this was that &lt;strong&gt;400 Gbps&lt;/strong&gt; was immediately feasible technically and economically. Any of these speeds could be achieved by bundling multiple connections together. This will get expensive and cumbersome especially over copper. For &lt;strong&gt;400 Gbps&lt;/strong&gt; you will need 16 pathways of &lt;strong&gt;25-gigabit connections&lt;/strong&gt;. This increases to 40 pathways of &lt;strong&gt;25-gigabit connections for 1 TbE&lt;/strong&gt;, making these full duplex would double the connections. Imagine a copper cable that will be very short for these speeds and would be potentially 2 or 3 inches in diameter. Datacenter physical infrastructure will surely need reinforcement to run multiple runs of these cables.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;My concern is that &lt;strong&gt;400 Gbps&lt;/strong&gt; may end up slightly unpopular like &lt;strong&gt;40 Gbps&lt;/strong&gt; because the market will decide to &lt;strong&gt;aggregate 10 Gbps ports&lt;/strong&gt; instead of buying new hardware.&lt;/p&gt;
&lt;h2&gt;Interesting Fact:&lt;/h2&gt;
&lt;p&gt;In March 2013 five leading global companies intend to enter into a multi-source agreement (MSA) to create a &lt;strong&gt;400 Gbps pluggable module&lt;/strong&gt; for the industry. These companies are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Avago Technologies&lt;/li&gt;
&lt;li&gt;Brocade Communications Systems Inc.&lt;/li&gt;
&lt;li&gt;JDS Uniphase Corporation&lt;/li&gt;
&lt;li&gt;Molex Incorporated&lt;/li&gt;
&lt;li&gt;TE Connectivity&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This &lt;strong&gt;400 Gbps hot pluggable module&lt;/strong&gt; integrates &lt;strong&gt;16 transmit&lt;/strong&gt; and &lt;strong&gt;16 receive channels&lt;/strong&gt; supporting passive and active copper cables and active optical modules.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article was written because history was created and all network engineers like us are a proud part of this history.&lt;/p&gt;
&lt;p&gt;Ethernet is 40 years old and I wish humanity could grow this fast. (From &lt;strong&gt;10 Mbps&lt;/strong&gt; to &lt;strong&gt;100 Gbps&lt;/strong&gt; today and &lt;strong&gt;400 Gbps&lt;/strong&gt; in the near future to &lt;strong&gt;10 TbE&lt;/strong&gt; by 2020).&lt;/p&gt;
&lt;h2&gt;Bibliography&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Alcatel-Lucent and France-Telecom deploy world's first live &lt;strong&gt;400 Gbps&lt;/strong&gt;-per-wavelength optical link: &lt;a href=&quot;https://www.tmcnet.com/usubmit/2013/02/07/6909019.htm&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://www.tmcnet.com/usubmit/2013/02/07/6909019.htm&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Fujitsu Develops First Optical Transmission Technology to Achieve &lt;strong&gt;100 Gbps&lt;/strong&gt; Using &lt;strong&gt;10 Gbps Transmission Components&lt;/strong&gt;: &lt;a href=&quot;https://www.fujitsu.com/global/news/pr/archives/month/2013/20130314-02.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://www.fujitsu.com/global/news/pr/archives/month/2013/20130314-02.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cablinginstall.com/articles/2013/03/att-400g-distance.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://www.cablinginstall.com/articles/2013/03/att-400g-distance.html&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking-accelerating-lan-wan-wifi-speeds-intro.webp&quot; alt=&quot;Need for SpeeThe Data Tsunami &amp;amp; Advancements in Networking&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking-accelerating-speeds-1.jpg&quot; alt=&quot;Ethernet network speeds cisco switches&quot; width=&quot;285&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; /&gt;A long-long time ago (not long ago in earth time) &lt;strong&gt;100 Mbps&lt;/strong&gt; was THE technology. 100 Mbps uplinks bundled with ether-channel was the ultimate uplink technology. This was the prevailing technology during the tech boom. Gigabit Ethernet was up and coming.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Fast forward to today and we are looking forward to deploying 40 Gbps. Every now and then we hear in the news about deployment of +100 Gbps links. The very fact that it is newsworthy tells us that it is not common.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Cisco&lt;/strong&gt; says that mobile data traffic alone will increase 13X (thirteen times) over the next four years and will outpace the global fixed data traffic by a factor of 3 by 2017.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These trends have prompted IEEE to consider the Ethernet solution beyond the &lt;strong&gt;100 Gbps&lt;/strong&gt;, which is just coming to the market.&lt;/p&gt;
&lt;h2&gt;Interesting Fact:&lt;/h2&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Large Hadron Collider at CERN generates 1Petabyte of data/sec (a Peta&amp;nbsp; has 15 zeros and is also called a quintillion). Of course, they cannot store all of it and so they filter it to keep INTERESTING data only, which is still about 25 Peta Bytes per year (1000 years’ worth of DVDs). This data is sent out by CERN to 11 Tier 1 institutions around the globe for analysis.&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Keeping all this in mind, I was intrigued to read that in Feb 2013 &lt;strong&gt;400 Gbps&lt;/strong&gt; per wavelength had been deployed between the French Cities of Paris and Lyon. The link actually uses 44 such wavelengths to achieve &lt;strong&gt;17.6 Tbps&lt;/strong&gt; of traffic in total. To give you an idea, at &lt;strong&gt;17.6 Tbs&lt;/strong&gt; you can transfer 44 Blu-ray discs each second.&lt;/p&gt;
&lt;h2&gt;Interesting Fact:&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The work on ratification of &lt;strong&gt;100 Gbps&lt;/strong&gt; was started in 2006 when there were no smartphones as we know them today.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The latest news (March 2013) is about Fujitsu creating newer modulation demodulation technology that can use the standard, widely available hardware used in &lt;strong&gt;10 Gbps networking&lt;/strong&gt; to &lt;strong&gt;transmit 100 Gbps&lt;/strong&gt; of data on a single channel. Combining four streams of &lt;strong&gt;100 Gbps&lt;/strong&gt; each to an &lt;strong&gt;optical transceiver&lt;/strong&gt; would result in a &lt;strong&gt;400 Gbps Ethernet transceiver&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This made me very curious and I looked further to see that researchers at AT&amp;amp;T labs had achieved this feat of sending &lt;strong&gt;400 Gbps&lt;/strong&gt; over fiber an extremely long distance. Can you guess, how long?&amp;nbsp;&lt;strong&gt;12000Km&lt;/strong&gt;! which is approximately &lt;strong&gt;7500 miles&lt;/strong&gt;, breaking their old record of&amp;nbsp;&lt;strong&gt;9000Km&lt;/strong&gt;. This is exciting because it increases the reach by a &lt;strong&gt;factor of 2.5&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Interesting Fact:&lt;/h2&gt;
&lt;p&gt;It took &lt;strong&gt;IEEE 4 years&lt;/strong&gt; to ratify the standard for &lt;strong&gt;100 Gbps&lt;/strong&gt; from &lt;strong&gt;2006 to 2010&lt;/strong&gt;. It is expected that the new &lt;strong&gt;400 Gbps&lt;/strong&gt; standard will be ratified by 2017.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;IEEE announced, on 2 April 2013, that the &lt;strong&gt;IEEE 802.3 400 Gbps&lt;/strong&gt; study group is meeting May 14-17 in Victoria BC Canada to explore the development of a &lt;strong&gt;400 Gbps Ethernet standard&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Previously this group had concluded that by 2015 networks would need to support the capacity of &lt;strong&gt;1 Tbps&lt;/strong&gt; and by &lt;strong&gt;2020&lt;/strong&gt; to support &lt;strong&gt;10 Tbps&lt;/strong&gt;, however, in September 2012, they decided to focus on &lt;strong&gt;400 Gbps&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The reason for this was that &lt;strong&gt;400 Gbps&lt;/strong&gt; was immediately feasible technically and economically. Any of these speeds could be achieved by bundling multiple connections together. This will get expensive and cumbersome especially over copper. For &lt;strong&gt;400 Gbps&lt;/strong&gt; you will need 16 pathways of &lt;strong&gt;25-gigabit connections&lt;/strong&gt;. This increases to 40 pathways of &lt;strong&gt;25-gigabit connections for 1 TbE&lt;/strong&gt;, making these full duplex would double the connections. Imagine a copper cable that will be very short for these speeds and would be potentially 2 or 3 inches in diameter. Datacenter physical infrastructure will surely need reinforcement to run multiple runs of these cables.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;My concern is that &lt;strong&gt;400 Gbps&lt;/strong&gt; may end up slightly unpopular like &lt;strong&gt;40 Gbps&lt;/strong&gt; because the market will decide to &lt;strong&gt;aggregate 10 Gbps ports&lt;/strong&gt; instead of buying new hardware.&lt;/p&gt;
&lt;h2&gt;Interesting Fact:&lt;/h2&gt;
&lt;p&gt;In March 2013 five leading global companies intend to enter into a multi-source agreement (MSA) to create a &lt;strong&gt;400 Gbps pluggable module&lt;/strong&gt; for the industry. These companies are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Avago Technologies&lt;/li&gt;
&lt;li&gt;Brocade Communications Systems Inc.&lt;/li&gt;
&lt;li&gt;JDS Uniphase Corporation&lt;/li&gt;
&lt;li&gt;Molex Incorporated&lt;/li&gt;
&lt;li&gt;TE Connectivity&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This &lt;strong&gt;400 Gbps hot pluggable module&lt;/strong&gt; integrates &lt;strong&gt;16 transmit&lt;/strong&gt; and &lt;strong&gt;16 receive channels&lt;/strong&gt; supporting passive and active copper cables and active optical modules.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article was written because history was created and all network engineers like us are a proud part of this history.&lt;/p&gt;
&lt;p&gt;Ethernet is 40 years old and I wish humanity could grow this fast. (From &lt;strong&gt;10 Mbps&lt;/strong&gt; to &lt;strong&gt;100 Gbps&lt;/strong&gt; today and &lt;strong&gt;400 Gbps&lt;/strong&gt; in the near future to &lt;strong&gt;10 TbE&lt;/strong&gt; by 2020).&lt;/p&gt;
&lt;h2&gt;Bibliography&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Alcatel-Lucent and France-Telecom deploy world's first live &lt;strong&gt;400 Gbps&lt;/strong&gt;-per-wavelength optical link: &lt;a href=&quot;https://www.tmcnet.com/usubmit/2013/02/07/6909019.htm&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://www.tmcnet.com/usubmit/2013/02/07/6909019.htm&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Fujitsu Develops First Optical Transmission Technology to Achieve &lt;strong&gt;100 Gbps&lt;/strong&gt; Using &lt;strong&gt;10 Gbps Transmission Components&lt;/strong&gt;: &lt;a href=&quot;https://www.fujitsu.com/global/news/pr/archives/month/2013/20130314-02.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://www.fujitsu.com/global/news/pr/archives/month/2013/20130314-02.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cablinginstall.com/articles/2013/03/att-400g-distance.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://www.cablinginstall.com/articles/2013/03/att-400g-distance.html&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Power over Ethernet - Understanding PoE Technology, PoE Options &amp; Power Requirements</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/networking-power-over-ethernet.html"/>
		<published>2012-01-18T09:03:28+11:00</published>
		<updated>2012-01-18T09:03:28+11:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/networking-power-over-ethernet.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking-power-over-ethernet-intro.webp&quot; alt=&quot;Power over Ethernet - Understanding PoE Technology&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking-power-over-ethernet-intro.webp&quot; alt=&quot;networking power over ethernet intro&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Power of Ehternet - Networking&quot; /&gt;Power over Ethernet&lt;/strong&gt; (PoE) was invented by &lt;strong&gt;PowerDsine&lt;/strong&gt; back in &lt;strong&gt;1997&lt;/strong&gt; and the &lt;strong&gt;first power injector&lt;/strong&gt; (&lt;strong&gt;Midspan&lt;/strong&gt;) was installed in &lt;strong&gt;1998&lt;/strong&gt;! Many manufacturespartnered with PowerDsine to make useof this innovation. The Institute of Electrical and Electronic Engineers (IEEE) was approached to form an international standard to facilitate wide spread deployment of the technology.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In &lt;strong&gt;June of 2003&lt;/strong&gt; the &lt;strong&gt;PoE&lt;/strong&gt; specification became the &lt;strong&gt;IEEE 802.3af&lt;/strong&gt; standard defining the delivery of safe &lt;strong&gt;power over standard Ethernet&lt;/strong&gt; cables, &lt;strong&gt;Cat5&lt;/strong&gt; and &lt;strong&gt;Cat5E&lt;/strong&gt;. &lt;strong&gt;PowerDsine&lt;/strong&gt; assisted the industry further by providing a service to Ethernet device manufacturers to test conformance with the new standard.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To date, over three hundred terminal devices have been compliance tested by PowerDsine, including most of the leading &lt;strong&gt;voice over IP telephones&lt;/strong&gt;, wireless access points and IP security cameras. Today the University of New Hampshire, being vendor independent, is the official conformance testing body appointed by the IEEE.&lt;/p&gt;
&lt;h2&gt;Why Power over Ethernet (PoE)?&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Whether you consider running IP telephony across your existing data network, or extending the reach of the network with strategically placed wireless access points, or just adding a physical security layer to your premises with IP cameras, the risk of possible failure is increased by having remote devices that need AC power connections. Losing data during a power outage is one thing, but losing data, voice and the company security is something else entirely.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A common goal is to consistently achieve &lt;strong&gt;99.999% availability&lt;/strong&gt; with 5.3 minutes of downtime per year or less. By connecting a UPS to a PoE source in the communications room, the entire network, including the remotely located resources, is capable of continuous operation during a power outage. Most UPS’s also provide for surge protection which is normally unavailable for remotely connected devices, the disruption created by power surges is more common than that created by power outages.&lt;/p&gt;
&lt;h2&gt;Manage the Risk&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To understand the risk here are some stats reported for North America but are generally applicable to any location. The average number of power outages sufficient to cause IT system malfunction per year at a typical site is 15.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;•&amp;nbsp;&amp;nbsp; 90% of the outages are less than five minutes in duration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;•&amp;nbsp;&amp;nbsp; 99% of the outages are less than one hour in duration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;•&amp;nbsp;&amp;nbsp; Total cumulative outage duration is approximately 100 minutes per year.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Based on the theoretical availability and the power protection strategy to achieve five nines or higher, &lt;strong&gt;Power over Ethernet&lt;/strong&gt; sources must be backed up by a &lt;strong&gt;UPS&lt;/strong&gt;. system with a minimum of &lt;strong&gt;one hour battery life&lt;/strong&gt;. This will protect the vast majority of systems.&lt;/p&gt;
&lt;h2&gt;How’s the Economics?&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-callmanager-ccme.html&quot; target=&quot;_blank&quot; title=&quot;IP Telephony&quot;&gt;IP telephony&lt;/a&gt;, scalability is important; for wireless and security systems, the location is crucial. Understanding one example of the installation costs will highlight the benefits to be gained from PoE in each scenario.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you are installing a &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Access point&quot;&gt;&lt;strong&gt;Wireless Access point&lt;/strong&gt;&lt;/a&gt;, you tend to put it in ceiling or high up on a wall out of reach of the general public. This area is usually void of AC outlets, therefore to power the units traditionally an AC contractor is needed to install an outlet. In a private area, average costs are in the region of $1200 dependent on country and vendor.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In public areas, there is a health and safety issue associated with AC power provisioning, which usually means that the power must be channelled into the wall or supplied through metal conduit. This can increase the costs by a factor of 10. The alternative is to run an &lt;strong&gt;Ethernet cable&lt;/strong&gt; from the &lt;strong&gt;Wireless Access point&lt;/strong&gt; to the &lt;strong&gt;Switch&lt;/strong&gt; or &lt;strong&gt;Router&lt;/strong&gt;. It is very simple, at this location, to connect to a &lt;strong&gt;PoE port&lt;/strong&gt; on the &lt;strong&gt;Switch&lt;/strong&gt; or to use a &lt;strong&gt;one port power injector&lt;/strong&gt;. Either way no AC contactor is needed and worst case scenario you are looking at $50 for the PoE port.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You save money, installation is quicker and easier and there is no disruption while holes are cut into walls. Is there something useful you can do with the money you saved on the installation? Buy a UPS.&lt;/p&gt;
&lt;h2&gt;Understand the Options for Delivering PoE&lt;/h2&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;IEEE802.3af&lt;/strong&gt; allows for switches to provide power on the Data Pair or the Spare Pair. Most switches select the Data Pair. If you are considering separate &lt;strong&gt;Power Injectors&lt;/strong&gt; called &lt;strong&gt;Midspans&lt;/strong&gt;, the standard states they must use the spare pairs. Therefore you should check your cabling installation to see if you have all pairs or only data pairs. Note that most &lt;strong&gt;Midspans&lt;/strong&gt; cannot be used on a Gigabit connection because there are no Spare Pairs in a Gigabit installation. This is why &lt;strong&gt;PowerDsine&lt;/strong&gt; has the &lt;strong&gt;6000G&lt;/strong&gt; range to support Gigabit connections.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;An Ethernet cable connected to a &lt;strong&gt;PoE source&lt;/strong&gt; will not carry power if no end device is connected. The &lt;strong&gt;IEEE 802.3af&lt;/strong&gt; standard requires that the source first tests the connected device for compliance to the standard before enabling power. After passing the signature test for compliance, a second test is carried out. This test is to determine the amount of power required at the remote location. This information is recorded by the power source as the &lt;strong&gt;Class of PoE&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;Pre-standard Cisco powering method&lt;/strong&gt; is different from &lt;strong&gt;IEEE802.3af&lt;/strong&gt; in the polarity of the power on the connector and the signature of the end device.&amp;nbsp; So if these devices have to be supported, you will need to know how the cable connection can rectify the polarity of the power and how the power source, &lt;strong&gt;Midspan&lt;/strong&gt; or &lt;strong&gt;Switch&lt;/strong&gt;, can recognize the Cisco signature.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;Pre-Standard capacitive test&lt;/strong&gt;. There are still legacy devices in the market that were early adopters of &lt;strong&gt;PoE&lt;/strong&gt; and implemented a pre-standard signature based on capacitive signature, which is different obviously from today’s resistive test.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Devices that do not conform to the &lt;strong&gt;PoE specifications&lt;/strong&gt; can still benefit with the use of a &lt;strong&gt;Splitter&lt;/strong&gt;. The &lt;strong&gt;Splitter&lt;/strong&gt; is mounted next to the remote device and receives the &lt;strong&gt;PoE Ethernet cable&lt;/strong&gt; ac input. It then splits the out put into a standard Ethernet data connection and a separate DC power connection.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Understand the Power Requirements of Attached Devices&lt;/h2&gt;
&lt;p&gt;According to the &lt;strong&gt;IEEE 802.3af&lt;/strong&gt; standard,&amp;nbsp; the amount of power available after &lt;strong&gt;100 meters of Cat5&lt;/strong&gt; or &lt;strong&gt;Cat 5E cable&lt;/strong&gt;, is up to &lt;strong&gt;12.95 watts&lt;/strong&gt;. See below the typical power requirements of the most common IP devices. The power consumption of each IP device can be found at the technical specifications of the manufacturer’s data sheets.&lt;code&gt;&lt;br /&gt;&lt;/code&gt;&lt;/p&gt;
&lt;table border=&quot;0&quot; style=&quot;width: 623px; height: 203px; border: 0pt solid #33ccff;&quot;&gt;&lt;caption&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Power Levels Available&lt;/span&gt;&lt;/strong&gt;&lt;/caption&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #003366; text-align: center;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Class&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366; text-align: center;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Usage&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366; text-align: center;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Classification current&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt; [mA]&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366; text-align: center;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Power range&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt; [Watt]&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366; text-align: center;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Class description&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;&lt;strong&gt;0&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Default&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;0–4&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;0.44–12.94&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Classification unimplemented&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Optional&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;9–12&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;0.44–3.84&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Very Low power&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Optional&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;17–20&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;3.84–6.49&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Low power&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Optional&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;26–30&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;6.49–12.95&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Mid power&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Valid for 802.3at (Type 2) devices,&lt;br /&gt; not allowed for 802.3af devices&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;36–44&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;12.95–25.50&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;High power&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;IEEE802.3af&lt;/strong&gt; power is &lt;strong&gt;15.4 watts&lt;/strong&gt; at the power source and &lt;strong&gt;12.95 watts&lt;/strong&gt; at the Powered Device. However part of the standard’s specification involves testing the class of power, which refers to the specific power requirement of the end device.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As an example, a &lt;strong&gt;7 watt device&lt;/strong&gt; is &lt;strong&gt;Class 2&lt;/strong&gt;. Manufacturers marketing departments are using this as a tool instead of saying their Switch only supplies &lt;strong&gt;7 watts&lt;/strong&gt; they say their Switch is a &lt;strong&gt;Class 2 PoE&lt;/strong&gt; conformant device. This is a problem if &lt;strong&gt;Wireless AP&lt;/strong&gt;, &lt;strong&gt;Video IP phones&lt;/strong&gt; or many security cameras should be powered, as these devices require more power than &lt;strong&gt;7W&lt;/strong&gt; (&lt;strong&gt;Class 2&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The standard mechanism when a device requires more power than can be delivered is to disable the power. The solution from the Switch manufacturers is to provide additional external power supplies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note&lt;/strong&gt;: when installing &lt;strong&gt;PoE switches&lt;/strong&gt; with &lt;strong&gt;class 2 PoE&lt;/strong&gt;, you should check the cost and sizing of adding external power supplies before deciding whether to have &lt;strong&gt;internal or external PoE capabilities&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following table from Wikipedia shows the &lt;strong&gt;standard PoE parameters&lt;/strong&gt; and comparison between them:&lt;/p&gt;
&lt;table border=&quot;0&quot; style=&quot;border: 0pt solid #33ccff;&quot;&gt;&lt;caption&gt;&lt;strong&gt;Standard PoE Parameters and Comparison&lt;/strong&gt;&lt;/caption&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #003366;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Property&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;802.3af (802.3at Type 1)&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;802.3at Type 2&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Power available at PD&lt;sup id=&quot;cite_ref-16&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#cite_note-16&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/td&gt;
&lt;td&gt;12.95 W&lt;/td&gt;
&lt;td&gt;25.50 W&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maximum power delivered by PSE&lt;/td&gt;
&lt;td&gt;15.40 W&lt;/td&gt;
&lt;td&gt;34.20 W&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Voltage range (at PSE)&lt;/td&gt;
&lt;td&gt;44.0–57.0 V&lt;/td&gt;
&lt;td&gt;50.0–57.0 V&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Voltage range (at PD)&lt;/td&gt;
&lt;td&gt;37.0–57.0 V&lt;/td&gt;
&lt;td&gt;42.5–57.0 V&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maximum current&lt;/td&gt;
&lt;td&gt;350 mA&lt;/td&gt;
&lt;td&gt;600 mAper mode&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maximum cable resistance&lt;/td&gt;
&lt;td&gt;20 Ω (Category 3)&lt;/td&gt;
&lt;td&gt;12.5 Ω (Category 5)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Power management&lt;/td&gt;
&lt;td&gt;Three power class levels negotiated at initial connection&lt;/td&gt;
&lt;td&gt;Four power class levels negotiated at initial connection or 0.1 W steps negotiated continuously&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Derating of maximum cable ambient operating temperature&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;5°C with one mode (two pairs) active&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Supported cabling&lt;/td&gt;
&lt;td&gt;Category 3 and Category 5&lt;/td&gt;
&lt;td&gt;Category 5&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Supported modes&lt;/td&gt;
&lt;td&gt;Mode A (endspan), Mode B (midspan)&lt;/td&gt;
&lt;td&gt;Mode A, Mode B&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You do not have to worry about powering non compliant devices ,such as Printers, Fax machines or PC’s because these devices do not carry the &lt;strong&gt;IEEE802.3af&lt;/strong&gt; signature, thus the ports will automatically disable power.&amp;nbsp; However if you are using integrated &lt;strong&gt;PoE&lt;/strong&gt; on a &lt;strong&gt;24 port networking blade&lt;/strong&gt; and many of the ports are supporting non powered devices, it might be more prudent to use a &lt;strong&gt;Midspan&lt;/strong&gt; and only connect powered ports to the devices that need it. This will lower the overall cost of the installation.&lt;/p&gt;
&lt;h2&gt;Caution Regarding Full Power &amp;amp; Forced Power&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The question of using managed power or full power has to be considered. Full power is where the power delivered by all ports simultaneously is &lt;strong&gt;15.4 watts&lt;/strong&gt;. This looks like an attractive option, however the issue to consider is the actual power requirements in an organization. If the installation mainly consists of IP phones with &lt;strong&gt;power consumption of&amp;nbsp; 3-5 watts per phone&lt;/strong&gt;, the overall power consumption will be in the range of &lt;strong&gt;120W&lt;/strong&gt;. Thus, putting a &lt;strong&gt;24 port PoE injector&lt;/strong&gt; in the computer room delivering &lt;strong&gt;400 watts&lt;/strong&gt; is false economy.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All systems installation teams have to calculate the BTU’s and Airflow requirements in the computer room to ensure the air conditioning systems can perform adequately. A better solution is to use power injectors that use the &lt;strong&gt;Class of Power information&lt;/strong&gt; to manage the power delivery to the ports that require higher levels. Power management allows the automation of efficient power distribution from a power injectors with smaller power supplies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some PoE injector manufacturers are using the term &lt;strong&gt;Forced Power&lt;/strong&gt;. This is where they leave the power on continuously. This is outside the standard.&amp;nbsp;&lt;strong&gt;IEEE802.3af&lt;/strong&gt; requires that power is removed within &lt;strong&gt;47 milli-seconds&lt;/strong&gt; of disconnect. The reason is that an engineer might be swapping cables at a ‘cross connect panel’ and by accident connect a powered port into a PC connection. Today, PC’s cannot be powered using &lt;strong&gt;PoE&lt;/strong&gt; thus &lt;strong&gt;48volts&lt;/strong&gt; can burn out the Ethernet port at the computer side and it also runs the risk of damaging Switch ports.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Cable Specifications Often Missed&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In order to avoid EMI from noise generated by the power source, it is important to conform to the cable specifications of &lt;strong&gt;Cat5&lt;/strong&gt; and &lt;strong&gt;Cat 5E&lt;/strong&gt;. Among the crucial tests is crosstalk. Devices that do not conform to these specifications will generate excessive errors into the data path. The worst case of cross talk we have measured to date from an uncertified power injector is taking a &lt;strong&gt;10 Mbps link&lt;/strong&gt; and dropping it to &lt;strong&gt;1 Mbps&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There is a defined limit to the current that can be sent down a pair of twisted wires. Currently the ITA specification is &lt;strong&gt;175milliamps on one pair&lt;/strong&gt; of cables. According to the &lt;strong&gt;IEEE802.3af&lt;/strong&gt; specification for delivering the required power, it is &lt;strong&gt;350 milliamps on two pairs&lt;/strong&gt;. PoE is running the cable at its maximum allowed capacity. Therefore there is a real need for effective current protection to prevent failing end devices from drawing too much current and causing cable faults.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Evaluate Internal Power or Separate Midspan Units&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here are some of the questions to consider when evaluating how to deploy PoE:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1) How old are your Switches and do they have the features such as QOS that fit your requirements? Midspans were designed to be used with any switch and save on the expense and time involved in doing an upgrade to the switch to implement a PoE solution. Midspans can be installed while the network is live with zero down time.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2) Will the proposed Switch have the correct power level to support all devices, or are additional external power supplies needed? What are the costs of these external PSU’s? How much rack space do they take? Can they be redeployed if you change your supplier?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3) What is your history of upgrades? Companies keep their networking switches for 3-10 years.&amp;nbsp; Over the last 5 years how many adaptors did you swap out of the switch for new ones, most probably, with new features? If you are doing 2–3 upgrades, then you will buy power 2–3 times if it is integral to the switch. Compare the purchase cost (over 5 years) between integrated PoE and external Midspans which are designed to be part of the cabling scheme and last for 10 years.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4) How much rack space does the Switch’s external PSU take? Midspans consume rack space. 48-port Midspan from PowerDsine takes 1U.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5) In some cases, integrated PoE will be a better strategy for powering terminals with low power consumption. However, when an external power supply is required for higher power levels, a Midspan solution might be your cost effective choice.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Managed or Unmanaged PoE?&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;PoE Midspans&lt;/strong&gt; can be SNMP managed or unmanaged. The areas of relevance to most enterprises are power consumption and the ability to remotely control Power On – Power Off. Management data and control functions need to be secured against unauthorized personnel. A hacker intruding into your network could use the power to disable all peripheral PoE devices.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Wireless Access Points&lt;/strong&gt; and Security Cameras tend to be installed out of reach of the public. This means they are also not very accessible to engineers.&amp;nbsp; The ability to remotely perform a power on reset could be extremely useful.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;IPT requires that all IP phones be powered. &lt;strong&gt;SNMP&lt;/strong&gt; management might be useful as the controlling tool for applications that can power telephones on and off when the relevant staff has passed security into the building and powering the phones off when they leave. It might be interesting for energy conservation to use batch files to enable telephones during work hours and disabling telephones in the evenings, weekends and holidays.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Enterprise users might need to account for power usage by the different departments inside the company. Therefore consideration should be given to the ability of the PoE system to monitor power consumption of the remote devices.&amp;nbsp; Also on power failure, when the UPS kicks in, the management could use a priority scheme to ensure that as the power outage continues, the power is directed to key resources. This management of failed power distribution could enable cost savings in the size of UPS needed for any given scenario. This will extend the life of the UPS support and it is a non linear function. If you halve the load on a UPS, it doesn’t last twice as long, but more like 3-4 times as long. Better value and increased business continuity.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1) &lt;strong&gt;PoE is a must&lt;/strong&gt;. Savings in power outlet installation costs, the speed of installation and the lack of disruptions to office environments are good justifications&amp;nbsp; for PoE Midspan. The use of a central UPS’s in conjunction with a Midspan to deliver the UPS service to remote locations is a better justification for PoE.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2) Use the Integrated PoE supplied with the switch unless you need higher power than its standard PSU can deliver. Use a Midspan for all additional power and high power requirements.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3) Choose units that conform to the IEEE standard and legacy support where needed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4) Ensure that they conform to EMI and Xtalk specification and have current protection. The biggest single investment in your network infrastructure is the cable plant so you should protect it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5) It is recommended to use power management SNMP v3 for secure control, monitoring and management of power distribution. It allows you to control an orderly shut down of connected devices, and optimize the power backup of the UPS in the system.&lt;/p&gt;
&lt;h2&gt;About this Article&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some information provided in this article was obtained from various sources such as &lt;strong&gt;PowerDsine&lt;/strong&gt;, &lt;strong&gt;Cisco&lt;/strong&gt; and &lt;strong&gt;WikiPedia&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking-power-over-ethernet-intro.webp&quot; alt=&quot;Power over Ethernet - Understanding PoE Technology&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking-power-over-ethernet-intro.webp&quot; alt=&quot;networking power over ethernet intro&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Power of Ehternet - Networking&quot; /&gt;Power over Ethernet&lt;/strong&gt; (PoE) was invented by &lt;strong&gt;PowerDsine&lt;/strong&gt; back in &lt;strong&gt;1997&lt;/strong&gt; and the &lt;strong&gt;first power injector&lt;/strong&gt; (&lt;strong&gt;Midspan&lt;/strong&gt;) was installed in &lt;strong&gt;1998&lt;/strong&gt;! Many manufacturespartnered with PowerDsine to make useof this innovation. The Institute of Electrical and Electronic Engineers (IEEE) was approached to form an international standard to facilitate wide spread deployment of the technology.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In &lt;strong&gt;June of 2003&lt;/strong&gt; the &lt;strong&gt;PoE&lt;/strong&gt; specification became the &lt;strong&gt;IEEE 802.3af&lt;/strong&gt; standard defining the delivery of safe &lt;strong&gt;power over standard Ethernet&lt;/strong&gt; cables, &lt;strong&gt;Cat5&lt;/strong&gt; and &lt;strong&gt;Cat5E&lt;/strong&gt;. &lt;strong&gt;PowerDsine&lt;/strong&gt; assisted the industry further by providing a service to Ethernet device manufacturers to test conformance with the new standard.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To date, over three hundred terminal devices have been compliance tested by PowerDsine, including most of the leading &lt;strong&gt;voice over IP telephones&lt;/strong&gt;, wireless access points and IP security cameras. Today the University of New Hampshire, being vendor independent, is the official conformance testing body appointed by the IEEE.&lt;/p&gt;
&lt;h2&gt;Why Power over Ethernet (PoE)?&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Whether you consider running IP telephony across your existing data network, or extending the reach of the network with strategically placed wireless access points, or just adding a physical security layer to your premises with IP cameras, the risk of possible failure is increased by having remote devices that need AC power connections. Losing data during a power outage is one thing, but losing data, voice and the company security is something else entirely.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A common goal is to consistently achieve &lt;strong&gt;99.999% availability&lt;/strong&gt; with 5.3 minutes of downtime per year or less. By connecting a UPS to a PoE source in the communications room, the entire network, including the remotely located resources, is capable of continuous operation during a power outage. Most UPS’s also provide for surge protection which is normally unavailable for remotely connected devices, the disruption created by power surges is more common than that created by power outages.&lt;/p&gt;
&lt;h2&gt;Manage the Risk&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To understand the risk here are some stats reported for North America but are generally applicable to any location. The average number of power outages sufficient to cause IT system malfunction per year at a typical site is 15.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;•&amp;nbsp;&amp;nbsp; 90% of the outages are less than five minutes in duration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;•&amp;nbsp;&amp;nbsp; 99% of the outages are less than one hour in duration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;•&amp;nbsp;&amp;nbsp; Total cumulative outage duration is approximately 100 minutes per year.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Based on the theoretical availability and the power protection strategy to achieve five nines or higher, &lt;strong&gt;Power over Ethernet&lt;/strong&gt; sources must be backed up by a &lt;strong&gt;UPS&lt;/strong&gt;. system with a minimum of &lt;strong&gt;one hour battery life&lt;/strong&gt;. This will protect the vast majority of systems.&lt;/p&gt;
&lt;h2&gt;How’s the Economics?&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-callmanager-ccme.html&quot; target=&quot;_blank&quot; title=&quot;IP Telephony&quot;&gt;IP telephony&lt;/a&gt;, scalability is important; for wireless and security systems, the location is crucial. Understanding one example of the installation costs will highlight the benefits to be gained from PoE in each scenario.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you are installing a &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Access point&quot;&gt;&lt;strong&gt;Wireless Access point&lt;/strong&gt;&lt;/a&gt;, you tend to put it in ceiling or high up on a wall out of reach of the general public. This area is usually void of AC outlets, therefore to power the units traditionally an AC contractor is needed to install an outlet. In a private area, average costs are in the region of $1200 dependent on country and vendor.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In public areas, there is a health and safety issue associated with AC power provisioning, which usually means that the power must be channelled into the wall or supplied through metal conduit. This can increase the costs by a factor of 10. The alternative is to run an &lt;strong&gt;Ethernet cable&lt;/strong&gt; from the &lt;strong&gt;Wireless Access point&lt;/strong&gt; to the &lt;strong&gt;Switch&lt;/strong&gt; or &lt;strong&gt;Router&lt;/strong&gt;. It is very simple, at this location, to connect to a &lt;strong&gt;PoE port&lt;/strong&gt; on the &lt;strong&gt;Switch&lt;/strong&gt; or to use a &lt;strong&gt;one port power injector&lt;/strong&gt;. Either way no AC contactor is needed and worst case scenario you are looking at $50 for the PoE port.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You save money, installation is quicker and easier and there is no disruption while holes are cut into walls. Is there something useful you can do with the money you saved on the installation? Buy a UPS.&lt;/p&gt;
&lt;h2&gt;Understand the Options for Delivering PoE&lt;/h2&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;IEEE802.3af&lt;/strong&gt; allows for switches to provide power on the Data Pair or the Spare Pair. Most switches select the Data Pair. If you are considering separate &lt;strong&gt;Power Injectors&lt;/strong&gt; called &lt;strong&gt;Midspans&lt;/strong&gt;, the standard states they must use the spare pairs. Therefore you should check your cabling installation to see if you have all pairs or only data pairs. Note that most &lt;strong&gt;Midspans&lt;/strong&gt; cannot be used on a Gigabit connection because there are no Spare Pairs in a Gigabit installation. This is why &lt;strong&gt;PowerDsine&lt;/strong&gt; has the &lt;strong&gt;6000G&lt;/strong&gt; range to support Gigabit connections.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;An Ethernet cable connected to a &lt;strong&gt;PoE source&lt;/strong&gt; will not carry power if no end device is connected. The &lt;strong&gt;IEEE 802.3af&lt;/strong&gt; standard requires that the source first tests the connected device for compliance to the standard before enabling power. After passing the signature test for compliance, a second test is carried out. This test is to determine the amount of power required at the remote location. This information is recorded by the power source as the &lt;strong&gt;Class of PoE&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;Pre-standard Cisco powering method&lt;/strong&gt; is different from &lt;strong&gt;IEEE802.3af&lt;/strong&gt; in the polarity of the power on the connector and the signature of the end device.&amp;nbsp; So if these devices have to be supported, you will need to know how the cable connection can rectify the polarity of the power and how the power source, &lt;strong&gt;Midspan&lt;/strong&gt; or &lt;strong&gt;Switch&lt;/strong&gt;, can recognize the Cisco signature.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;Pre-Standard capacitive test&lt;/strong&gt;. There are still legacy devices in the market that were early adopters of &lt;strong&gt;PoE&lt;/strong&gt; and implemented a pre-standard signature based on capacitive signature, which is different obviously from today’s resistive test.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Devices that do not conform to the &lt;strong&gt;PoE specifications&lt;/strong&gt; can still benefit with the use of a &lt;strong&gt;Splitter&lt;/strong&gt;. The &lt;strong&gt;Splitter&lt;/strong&gt; is mounted next to the remote device and receives the &lt;strong&gt;PoE Ethernet cable&lt;/strong&gt; ac input. It then splits the out put into a standard Ethernet data connection and a separate DC power connection.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Understand the Power Requirements of Attached Devices&lt;/h2&gt;
&lt;p&gt;According to the &lt;strong&gt;IEEE 802.3af&lt;/strong&gt; standard,&amp;nbsp; the amount of power available after &lt;strong&gt;100 meters of Cat5&lt;/strong&gt; or &lt;strong&gt;Cat 5E cable&lt;/strong&gt;, is up to &lt;strong&gt;12.95 watts&lt;/strong&gt;. See below the typical power requirements of the most common IP devices. The power consumption of each IP device can be found at the technical specifications of the manufacturer’s data sheets.&lt;code&gt;&lt;br /&gt;&lt;/code&gt;&lt;/p&gt;
&lt;table border=&quot;0&quot; style=&quot;width: 623px; height: 203px; border: 0pt solid #33ccff;&quot;&gt;&lt;caption&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Power Levels Available&lt;/span&gt;&lt;/strong&gt;&lt;/caption&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #003366; text-align: center;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Class&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366; text-align: center;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Usage&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366; text-align: center;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Classification current&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt; [mA]&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366; text-align: center;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Power range&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt; [Watt]&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366; text-align: center;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Class description&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;&lt;strong&gt;0&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Default&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;0–4&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;0.44–12.94&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Classification unimplemented&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Optional&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;9–12&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;0.44–3.84&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Very Low power&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Optional&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;17–20&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;3.84–6.49&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Low power&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Optional&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;26–30&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;6.49–12.95&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Mid power&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;Valid for 802.3at (Type 2) devices,&lt;br /&gt; not allowed for 802.3af devices&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;36–44&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;12.95–25.50&lt;/td&gt;
&lt;td style=&quot;text-align: center; border: 1px solid #6666ff;&quot;&gt;High power&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;IEEE802.3af&lt;/strong&gt; power is &lt;strong&gt;15.4 watts&lt;/strong&gt; at the power source and &lt;strong&gt;12.95 watts&lt;/strong&gt; at the Powered Device. However part of the standard’s specification involves testing the class of power, which refers to the specific power requirement of the end device.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As an example, a &lt;strong&gt;7 watt device&lt;/strong&gt; is &lt;strong&gt;Class 2&lt;/strong&gt;. Manufacturers marketing departments are using this as a tool instead of saying their Switch only supplies &lt;strong&gt;7 watts&lt;/strong&gt; they say their Switch is a &lt;strong&gt;Class 2 PoE&lt;/strong&gt; conformant device. This is a problem if &lt;strong&gt;Wireless AP&lt;/strong&gt;, &lt;strong&gt;Video IP phones&lt;/strong&gt; or many security cameras should be powered, as these devices require more power than &lt;strong&gt;7W&lt;/strong&gt; (&lt;strong&gt;Class 2&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The standard mechanism when a device requires more power than can be delivered is to disable the power. The solution from the Switch manufacturers is to provide additional external power supplies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note&lt;/strong&gt;: when installing &lt;strong&gt;PoE switches&lt;/strong&gt; with &lt;strong&gt;class 2 PoE&lt;/strong&gt;, you should check the cost and sizing of adding external power supplies before deciding whether to have &lt;strong&gt;internal or external PoE capabilities&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following table from Wikipedia shows the &lt;strong&gt;standard PoE parameters&lt;/strong&gt; and comparison between them:&lt;/p&gt;
&lt;table border=&quot;0&quot; style=&quot;border: 0pt solid #33ccff;&quot;&gt;&lt;caption&gt;&lt;strong&gt;Standard PoE Parameters and Comparison&lt;/strong&gt;&lt;/caption&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;background-color: #003366;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;Property&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;802.3af (802.3at Type 1)&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;background-color: #003366;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;strong&gt;802.3at Type 2&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Power available at PD&lt;sup id=&quot;cite_ref-16&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#cite_note-16&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/td&gt;
&lt;td&gt;12.95 W&lt;/td&gt;
&lt;td&gt;25.50 W&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maximum power delivered by PSE&lt;/td&gt;
&lt;td&gt;15.40 W&lt;/td&gt;
&lt;td&gt;34.20 W&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Voltage range (at PSE)&lt;/td&gt;
&lt;td&gt;44.0–57.0 V&lt;/td&gt;
&lt;td&gt;50.0–57.0 V&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Voltage range (at PD)&lt;/td&gt;
&lt;td&gt;37.0–57.0 V&lt;/td&gt;
&lt;td&gt;42.5–57.0 V&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maximum current&lt;/td&gt;
&lt;td&gt;350 mA&lt;/td&gt;
&lt;td&gt;600 mAper mode&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maximum cable resistance&lt;/td&gt;
&lt;td&gt;20 Ω (Category 3)&lt;/td&gt;
&lt;td&gt;12.5 Ω (Category 5)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Power management&lt;/td&gt;
&lt;td&gt;Three power class levels negotiated at initial connection&lt;/td&gt;
&lt;td&gt;Four power class levels negotiated at initial connection or 0.1 W steps negotiated continuously&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Derating of maximum cable ambient operating temperature&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;5°C with one mode (two pairs) active&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Supported cabling&lt;/td&gt;
&lt;td&gt;Category 3 and Category 5&lt;/td&gt;
&lt;td&gt;Category 5&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Supported modes&lt;/td&gt;
&lt;td&gt;Mode A (endspan), Mode B (midspan)&lt;/td&gt;
&lt;td&gt;Mode A, Mode B&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You do not have to worry about powering non compliant devices ,such as Printers, Fax machines or PC’s because these devices do not carry the &lt;strong&gt;IEEE802.3af&lt;/strong&gt; signature, thus the ports will automatically disable power.&amp;nbsp; However if you are using integrated &lt;strong&gt;PoE&lt;/strong&gt; on a &lt;strong&gt;24 port networking blade&lt;/strong&gt; and many of the ports are supporting non powered devices, it might be more prudent to use a &lt;strong&gt;Midspan&lt;/strong&gt; and only connect powered ports to the devices that need it. This will lower the overall cost of the installation.&lt;/p&gt;
&lt;h2&gt;Caution Regarding Full Power &amp;amp; Forced Power&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The question of using managed power or full power has to be considered. Full power is where the power delivered by all ports simultaneously is &lt;strong&gt;15.4 watts&lt;/strong&gt;. This looks like an attractive option, however the issue to consider is the actual power requirements in an organization. If the installation mainly consists of IP phones with &lt;strong&gt;power consumption of&amp;nbsp; 3-5 watts per phone&lt;/strong&gt;, the overall power consumption will be in the range of &lt;strong&gt;120W&lt;/strong&gt;. Thus, putting a &lt;strong&gt;24 port PoE injector&lt;/strong&gt; in the computer room delivering &lt;strong&gt;400 watts&lt;/strong&gt; is false economy.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All systems installation teams have to calculate the BTU’s and Airflow requirements in the computer room to ensure the air conditioning systems can perform adequately. A better solution is to use power injectors that use the &lt;strong&gt;Class of Power information&lt;/strong&gt; to manage the power delivery to the ports that require higher levels. Power management allows the automation of efficient power distribution from a power injectors with smaller power supplies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some PoE injector manufacturers are using the term &lt;strong&gt;Forced Power&lt;/strong&gt;. This is where they leave the power on continuously. This is outside the standard.&amp;nbsp;&lt;strong&gt;IEEE802.3af&lt;/strong&gt; requires that power is removed within &lt;strong&gt;47 milli-seconds&lt;/strong&gt; of disconnect. The reason is that an engineer might be swapping cables at a ‘cross connect panel’ and by accident connect a powered port into a PC connection. Today, PC’s cannot be powered using &lt;strong&gt;PoE&lt;/strong&gt; thus &lt;strong&gt;48volts&lt;/strong&gt; can burn out the Ethernet port at the computer side and it also runs the risk of damaging Switch ports.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Cable Specifications Often Missed&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In order to avoid EMI from noise generated by the power source, it is important to conform to the cable specifications of &lt;strong&gt;Cat5&lt;/strong&gt; and &lt;strong&gt;Cat 5E&lt;/strong&gt;. Among the crucial tests is crosstalk. Devices that do not conform to these specifications will generate excessive errors into the data path. The worst case of cross talk we have measured to date from an uncertified power injector is taking a &lt;strong&gt;10 Mbps link&lt;/strong&gt; and dropping it to &lt;strong&gt;1 Mbps&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There is a defined limit to the current that can be sent down a pair of twisted wires. Currently the ITA specification is &lt;strong&gt;175milliamps on one pair&lt;/strong&gt; of cables. According to the &lt;strong&gt;IEEE802.3af&lt;/strong&gt; specification for delivering the required power, it is &lt;strong&gt;350 milliamps on two pairs&lt;/strong&gt;. PoE is running the cable at its maximum allowed capacity. Therefore there is a real need for effective current protection to prevent failing end devices from drawing too much current and causing cable faults.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Evaluate Internal Power or Separate Midspan Units&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here are some of the questions to consider when evaluating how to deploy PoE:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1) How old are your Switches and do they have the features such as QOS that fit your requirements? Midspans were designed to be used with any switch and save on the expense and time involved in doing an upgrade to the switch to implement a PoE solution. Midspans can be installed while the network is live with zero down time.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2) Will the proposed Switch have the correct power level to support all devices, or are additional external power supplies needed? What are the costs of these external PSU’s? How much rack space do they take? Can they be redeployed if you change your supplier?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3) What is your history of upgrades? Companies keep their networking switches for 3-10 years.&amp;nbsp; Over the last 5 years how many adaptors did you swap out of the switch for new ones, most probably, with new features? If you are doing 2–3 upgrades, then you will buy power 2–3 times if it is integral to the switch. Compare the purchase cost (over 5 years) between integrated PoE and external Midspans which are designed to be part of the cabling scheme and last for 10 years.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4) How much rack space does the Switch’s external PSU take? Midspans consume rack space. 48-port Midspan from PowerDsine takes 1U.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5) In some cases, integrated PoE will be a better strategy for powering terminals with low power consumption. However, when an external power supply is required for higher power levels, a Midspan solution might be your cost effective choice.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Managed or Unmanaged PoE?&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;PoE Midspans&lt;/strong&gt; can be SNMP managed or unmanaged. The areas of relevance to most enterprises are power consumption and the ability to remotely control Power On – Power Off. Management data and control functions need to be secured against unauthorized personnel. A hacker intruding into your network could use the power to disable all peripheral PoE devices.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Wireless Access Points&lt;/strong&gt; and Security Cameras tend to be installed out of reach of the public. This means they are also not very accessible to engineers.&amp;nbsp; The ability to remotely perform a power on reset could be extremely useful.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;IPT requires that all IP phones be powered. &lt;strong&gt;SNMP&lt;/strong&gt; management might be useful as the controlling tool for applications that can power telephones on and off when the relevant staff has passed security into the building and powering the phones off when they leave. It might be interesting for energy conservation to use batch files to enable telephones during work hours and disabling telephones in the evenings, weekends and holidays.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Enterprise users might need to account for power usage by the different departments inside the company. Therefore consideration should be given to the ability of the PoE system to monitor power consumption of the remote devices.&amp;nbsp; Also on power failure, when the UPS kicks in, the management could use a priority scheme to ensure that as the power outage continues, the power is directed to key resources. This management of failed power distribution could enable cost savings in the size of UPS needed for any given scenario. This will extend the life of the UPS support and it is a non linear function. If you halve the load on a UPS, it doesn’t last twice as long, but more like 3-4 times as long. Better value and increased business continuity.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1) &lt;strong&gt;PoE is a must&lt;/strong&gt;. Savings in power outlet installation costs, the speed of installation and the lack of disruptions to office environments are good justifications&amp;nbsp; for PoE Midspan. The use of a central UPS’s in conjunction with a Midspan to deliver the UPS service to remote locations is a better justification for PoE.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2) Use the Integrated PoE supplied with the switch unless you need higher power than its standard PSU can deliver. Use a Midspan for all additional power and high power requirements.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3) Choose units that conform to the IEEE standard and legacy support where needed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4) Ensure that they conform to EMI and Xtalk specification and have current protection. The biggest single investment in your network infrastructure is the cable plant so you should protect it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5) It is recommended to use power management SNMP v3 for secure control, monitoring and management of power distribution. It allows you to control an orderly shut down of connected devices, and optimize the power backup of the UPS in the system.&lt;/p&gt;
&lt;h2&gt;About this Article&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some information provided in this article was obtained from various sources such as &lt;strong&gt;PowerDsine&lt;/strong&gt;, &lt;strong&gt;Cisco&lt;/strong&gt; and &lt;strong&gt;WikiPedia&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Network Switches &amp; Bridges</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/switches-bridges.html"/>
		<published>2011-06-10T06:58:22+10:00</published>
		<updated>2011-06-10T06:58:22+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/switches-bridges.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/switches-bridges-intro.webp&quot; alt=&quot;Switches &amp;amp; Bridges&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/switches-bridges-intro.webp&quot; alt=&quot;Switches and Bridges&quot; style=&quot;margin: 7px; float: left;&quot; /&gt;&lt;strong&gt;Network Switches&lt;/strong&gt; are the evolution of &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/hubs-repeaters.html&quot; target=&quot;_blank&quot; title=&quot;Hubs and Repeaters&quot;&gt;Hubs and Repeaters&lt;/a&gt;, and enable the creation of networks by connecting multiple devices together. They are critical components in computer networking and are used to connect devices like computers, printers, and servers in local area networks (LANs) and wide area networks (WANs). Switches are designed to manage the flow of data between devices, ensuring that each device is able to communicate efficiently and effectively with other devices on the network.&lt;/p&gt;
&lt;div class=&quot;flex flex-grow flex-col gap-3&quot;&gt;
&lt;div class=&quot;min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap&quot;&gt;
&lt;div class=&quot;markdown prose w-full break-words dark:prose-invert light&quot;&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Switches operate at the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;data link layer&quot;&gt;data link layer&lt;/a&gt; (layer 2) of the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI (Open Systems Interconnection) model&quot;&gt;OSI (Open Systems Interconnection) model&lt;/a&gt; and use &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC (Media Access Control) addresses&quot;&gt;MAC (Media Access Control) addresses&lt;/a&gt; to identify devices on the network. When a device sends data to another device on the network, the switch reads the MAC address of the data packet and determines the best route for the packet to take to reach its destination. This process is called packet switching, and it allows multiple devices on a network to communicate simultaneously without interfering with each other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are various types of switches, including &lt;strong&gt;unmanaged switches&lt;/strong&gt;, &lt;strong&gt;managed switches&lt;/strong&gt;, and &lt;strong&gt;Layer 3 switches&lt;/strong&gt;. &lt;strong&gt;Unmanaged switches&lt;/strong&gt; are basic switches that are easy to set up and use, while managed switches offer more advanced features and greater control over the network. &lt;strong&gt;Layer 3 switches&lt;/strong&gt; are used in large networks and are capable of routing data at the network layer of the &lt;strong&gt;OSI model&lt;/strong&gt;. Switches are critical components in modern networks and play an important role in enabling communication and data exchange between devices.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Switches&lt;/strong&gt; (Layer-2 Switching) do not receive and transmit data throughout every port, like &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/hubs-repeaters.html&quot; target=&quot;_blank&quot; title=&quot;Hubs&quot;&gt;&lt;strong&gt;hubs&lt;/strong&gt;&lt;/a&gt;, but instead examine a packet's &lt;strong&gt;destination&lt;/strong&gt; by checking the &lt;strong&gt;MAC address&lt;/strong&gt;. The &lt;strong&gt;destination MAC address&lt;/strong&gt; is always located at the beginning of the packet (see &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II Fram&quot;&gt;Ethernet II Protocol&lt;/a&gt; article) as shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ethernet-frames-ethernet-ii-1.gif&quot; alt=&quot;Ethernet II Frame&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A switch will then forward the frame via the intended port, or out all its ports, depending if it finds an entry for this MAC address in its memory (filter table). This process is explained in more detail later in this article.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Switches use &lt;strong&gt;Application Specific Integrated Circuits&lt;/strong&gt; (&lt;strong&gt;ASIC's&lt;/strong&gt;) to build and maintain filter tables. Layer-2 switches switch packets between ports at a faster rate compared to routers, simply because routers need to examine the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer3.html&quot; target=&quot;_blank&quot; title=&quot;Network layer&quot;&gt;Network layer&lt;/a&gt; (layer-3) information of the packet, which is higher up in the OSI model and requires additional processing power and time.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;They provide hardware based bridging (MAC addresses)&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They work at wire speed, therefor have low latency&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;div align=&quot;left&quot;&gt;&lt;strong&gt;They come in 3 different types: Store &amp;amp; Forward, Cut-Through and Fragment Free (Analysed later)&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Physically, it's difficult to tell a switch from a hub as they both look alike. The difference between them is under the hood! The photos below show a 8-port hub (left) and 18 port switch (right). Notice the switch provides two ports on the far right - these are uplink ports, allowing the switch to connect to the rest of the network (other switches):&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/fs108.jpg&quot; alt=&quot;&quot; width=&quot;331&quot; height=&quot;187&quot; data-alt=&quot;fs108&quot; /&gt;&amp;nbsp; &lt;img src=&quot;https://www.firewall.cx/images/stories/fs518.jpg&quot; alt=&quot;&quot; width=&quot;331&quot; height=&quot;187&quot; data-alt=&quot;fs518&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;The Three Operating Stages of a Network Switch&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Network switches operate in three stages: learning, forwarding, and filtering.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Stage 1: Learning &lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Stage 2: Forwarding&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Stage 3: Filtering&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Loop Avoidance (Optional)&lt;/span&gt; &lt;br /&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Overall, the three stages of &lt;strong&gt;learning&lt;/strong&gt;, &lt;strong&gt;forwarding&lt;/strong&gt;, and &lt;strong&gt;filtering&lt;/strong&gt; allow the network switch to effectively manage the flow of data on a computer network, ensuring that devices can communicate with each other efficiently and securely.&lt;/p&gt;
&lt;h4&gt;Stage 1: Address Learning&lt;/h4&gt;
&lt;div class=&quot;markdown prose w-full break-words dark:prose-invert light&quot;&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;address learning&lt;/strong&gt; phase of a network switch is the process by which the switch builds and maintains a table of MAC addresses and their corresponding switch ports, known as the &lt;strong&gt;MAC address table&lt;/strong&gt; or the &lt;strong&gt;Content Addressable Memory (&lt;/strong&gt;&lt;strong&gt;CAM) table&lt;/strong&gt;. When a switch receives a frame, it examines the &lt;strong&gt;source MAC address&lt;/strong&gt; of the frame and records it in the MAC address table along with the port on which the frame was received. This allows the switch to forward future frames to that device more efficiently, without having to flood the network with unnecessary traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During the &lt;strong&gt;address learning phase&lt;/strong&gt;, the switch also updates its MAC address table as it receives frames with &lt;strong&gt;new source addresses&lt;/strong&gt;. If the switch already has an entry for a particular MAC address, it updates the associated port information. If the switch does not have an entry for the MAC address, it adds a new entry to the table.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to note that the MAC address table has a limited size, usually a few thousand entries (8000-10,000),&amp;nbsp; and can become full if the switch receives frames from too many devices. When the table becomes full, the switch must discard old entries to make room for new ones. This can result in temporary network disruptions as the switch re-learns the addresses of devices that it has not seen in a while.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Overall, the address learning phase is a crucial aspect of switch operation, as it allows switches to efficiently forward frames and reduce network congestion. By maintaining an up-to-date MAC address table, switches can ensure that network traffic is delivered to the correct destination with minimal delay.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;The diagrams below shows how frames are forwarded out all switchports when the destination MAC address is unknown (there is no entry in the MAC address table). This is usually the case when a switch is initially powered on (or has an empty MAC address table). In this example, &lt;strong&gt;Node 1&lt;/strong&gt; sends a packet desitined to &lt;strong&gt;Node 2&lt;/strong&gt;. The switch at this point has already inserted &lt;strong&gt;Node1's MAC address&lt;/strong&gt; in its &lt;strong&gt;MAC address table&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/switches.gif&quot; alt=&quot;switches&quot; width=&quot;456&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;how network switches work&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;And after the first frame has been successfully received by &lt;strong&gt;Node 2&lt;/strong&gt;, it then sends a reply to &lt;strong&gt;Node 1&lt;/strong&gt;. The switch is now aware of the two nodes MAC addresses and will send all frames between them, out through the switchports they are connected to:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/switches-node-2-sends-a-frame-to-node-1.gif&quot; alt=&quot;switches-node-2-sends-a-frame-to-node-1&quot; width=&quot;456&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Network Switch functionality&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Notice how &lt;strong&gt;Node 2's&lt;/strong&gt; frame destined to &lt;strong&gt;Node 1&lt;/strong&gt;, is &lt;strong&gt;not transmitted&lt;/strong&gt; out every switchport . The switch is &lt;strong&gt;now aware&lt;/strong&gt; of the switch ports both &lt;strong&gt;Node 1&lt;/strong&gt; and &lt;strong&gt;Node 2&lt;/strong&gt; are connected to:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/switches-after-mac-port-is-known.gif&quot; alt=&quot;switches-after-mac-port-is-known&quot; width=&quot;456&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h4&gt;Forward/Filter Decision&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a frame arrives at a switch, the switch examines the &lt;strong&gt;destination MAC address&lt;/strong&gt; of the frame to determine which port it should forward the frame to. As noted previously, the switch maintains a table, called the &lt;strong&gt;MAC address table&lt;/strong&gt; or the &lt;strong&gt;CAM table&lt;/strong&gt;, which &lt;strong&gt;maps MAC addresses to their associated switch ports&lt;/strong&gt;. If the &lt;strong&gt;destination MAC address&lt;/strong&gt; is already in the MAC address table, the switch will forward the frame out the &lt;strong&gt;corresponding port&lt;/strong&gt;. If the &lt;strong&gt;destination MAC address&lt;/strong&gt; is not in the table, the switch will flood the frame to &lt;strong&gt;all ports except the one on which it was received&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is known as&amp;nbsp;&lt;strong&gt;unknown unicast flooding&lt;/strong&gt; and ensures that the frame reaches its intended destination. Once the frame reaches its destination, the switch updates its MAC address table with the &lt;strong&gt;source MAC address&lt;/strong&gt; and the port on which the frame was received, so that it can forward future frames to that device more efficiently.&lt;/p&gt;
&lt;h4&gt;Loop Avoidance (Optional) - Spanning-tree protocol&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol.html&quot; target=&quot;_blank&quot; title=&quot;Spanning Tree Protocol (STP)&quot;&gt;Spanning Tree Protocol (STP)&lt;/a&gt; is a networking protocol designed to prevent loops in networks with redundant links. When multiple paths are available between devices in a network, a loop can occur if the same packet is forwarded indefinitely between devices. This can cause network congestion and ultimately result in a network outage. STP solves this problem by creating a loop-free logical topology for the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;STP works by selecting a root bridge, which is the device that has the highest priority in the network. Once the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol/spanning-tree-protocol-root-bridge-election.html&quot; target=&quot;_blank&quot; title=&quot;root bridge and port roles&quot;&gt;root bridge and port roles&lt;/a&gt; have been determined, STP builds a tree-like topology that includes all devices in the network. The topology is designed to ensure that there is only one active path between any two devices, which prevents loops from occurring. The tree-like topology is also designed to provide redundancy in the event of a link failure. If a link fails, STP recalculates the topology to find a new path between the affected devices.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;STP has several variations, including &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol/spanning-tree-protocol-port-costs-states.html&quot; target=&quot;_blank&quot; title=&quot;Rapid Spanning Tree Protocol (RSTP)&quot;&gt;Rapid Spanning Tree Protocol (RSTP)&lt;/a&gt; and Multiple Spanning Tree Protocol (MSTP). RSTP is an improvement on STP that reduces the time it takes for the network to recover from link failures. MSTP is a protocol that allows multiple VLANs to be mapped to a single spanning tree instance, which reduces the number of spanning tree instances required in a network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In summary, STP is a networking protocol that creates a &lt;strong&gt;loop-free logical topology&lt;/strong&gt; for networks with redundant links. By selecting a root bridge and assigning roles to other devices in the network, STP ensures that there is only one active path between any two devices, which prevents network congestion and outages. STP operates in three phases and has several variations, including RSTP and MSTP.&lt;strong&gt; &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;Switching Modes: Store-and-forward, Cut-through &amp;amp; Fragment-free&lt;/h2&gt;
&lt;p&gt;There are three primary switching methods: &lt;strong&gt;store-and-forward&lt;/strong&gt;, &lt;strong&gt;cut-through&lt;/strong&gt;, and &lt;strong&gt;fragment-free&lt;/strong&gt;. While all three methods are analyzed in detail, the below diagram shows the portion of a receiving frame a switch will process (check), before forwarding it out its intended port(s):&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/switches-switching-methods.gif&quot; alt=&quot;switches-switching-methods&quot; width=&quot;646&quot; height=&quot;283&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Switches Cut-Through, Fragment Free, Store &amp;amp; Forward mode&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Store-and-forward&lt;/strong&gt; switching is the &lt;strong&gt;most common method&lt;/strong&gt; and involves the switch &lt;strong&gt;receiving and buffering the entire frame&lt;/strong&gt; before forwarding it to the destination device. During this process, the switch performs error checking on the frame to ensure it is complete and &lt;strong&gt;error-free&lt;/strong&gt;. If the frame is damaged, the switch discards it. &lt;strong&gt;Store-and-forward&lt;/strong&gt; switching is considered the &lt;strong&gt;most reliable switching method&lt;/strong&gt; as it ensures that only complete, error-free frames are forwarded, but it also has the &lt;strong&gt;highest latency&lt;/strong&gt; due to the buffering and error checking process.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Cut-through&lt;/strong&gt; switching is a &lt;strong&gt;faster method&lt;/strong&gt; than &lt;strong&gt;store-and-forward&lt;/strong&gt;, as the switch starts forwarding the frame as soon as it reads the &lt;strong&gt;destination MAC address&lt;/strong&gt;. With &lt;strong&gt;cut-through&lt;/strong&gt;, the switch &lt;strong&gt;only buffers the minimum amount of the frame&lt;/strong&gt; (up to the destination MAC address section) required to determine the &lt;strong&gt;destination port&lt;/strong&gt;. &lt;strong&gt;Cut-through&lt;/strong&gt; switching is &lt;strong&gt;faster&lt;/strong&gt; than &lt;strong&gt;store-and-forward&lt;/strong&gt; because it does not wait for the entire frame to be received and verified before forwarding. Keep in mind that this method can forward corrupted frames since there is no error checking before forwarding.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fragment-free&lt;/strong&gt; switching is a variation of &lt;strong&gt;cut-through&lt;/strong&gt; switching that reads the &lt;strong&gt;first 64 bytes&lt;/strong&gt; of a frame before forwarding it. This is done to prevent forwarding of frames that may have been damaged during transmission. In general, the &lt;strong&gt;first 64 bytes&lt;/strong&gt; of a frame contain the frame header, which includes the &lt;strong&gt;source and destination MAC addresses&lt;/strong&gt;, as well as the &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;ethernet frame type&quot;&gt;frame type&lt;/a&gt;. By reading the &lt;strong&gt;first 64 bytes&lt;/strong&gt;, &lt;strong&gt;fragment-free switching&lt;/strong&gt; can ensure that the frame is &lt;strong&gt;not corrupted&lt;/strong&gt; without having to wait for the entire frame to be received.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Generally speaking, &lt;strong&gt;store-and-forward&lt;/strong&gt; switching is the &lt;strong&gt;most reliable&lt;/strong&gt; but has the &lt;strong&gt;highest latency&lt;/strong&gt; due to the buffering and error checking process. &lt;strong&gt;Cut-through&lt;/strong&gt; switching is &lt;strong&gt;faster&lt;/strong&gt; than &lt;strong&gt;store-and-forward&lt;/strong&gt; but can forward &lt;strong&gt;corrupted frames&lt;/strong&gt;. &lt;strong&gt;Fragment-free&lt;/strong&gt; switching is a variation of &lt;strong&gt;cut-through&lt;/strong&gt; that reads the &lt;strong&gt;first 64 bytes&lt;/strong&gt; of a frame before forwarding it, which &lt;strong&gt;reduces&lt;/strong&gt; the likelihood of forwarding &lt;strong&gt;corrupted frames&lt;/strong&gt;. The choice of switching method depends on the specific needs of the network, and a combination of these methods can be used in larger networks to achieve a balance between reliability and speed.&lt;/p&gt;
&lt;h2&gt;Network Switches Memory Buffer&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;memory buffer&lt;/strong&gt; in a network switch is an essential component that plays a &lt;strong&gt;critical role&lt;/strong&gt; in ensuring &lt;strong&gt;efficient&lt;/strong&gt; and &lt;strong&gt;reliable data transmission&lt;/strong&gt;. The buffer is responsible for &lt;strong&gt;temporarily storing incoming data packets&lt;/strong&gt; before &lt;strong&gt;forwarding&lt;/strong&gt; them to their destination. Without a memory buffer, the switch would be unable to handle high volumes of network traffic, resulting in packet loss and network congestion. The buffer also helps to prevent data loss by holding packets in case of congestion, allowing time for the switch to &lt;strong&gt;clear the congestion&lt;/strong&gt; and &lt;strong&gt;forward the packets&lt;/strong&gt;. The &lt;strong&gt;size&lt;/strong&gt; of the buffer is an important factor in determining the performance of the switch, as it determines the amount of data that can be temporarily stored. A switch with a larger buffer can handle more traffic and is better equipped to handle bursts of data. As such, the memory buffer is a critical component in ensuring reliable and efficient network performance.&lt;/p&gt;
&lt;div style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;
&lt;h2 align=&quot;left&quot;&gt;Network Bridges&lt;span style=&quot;color: #99cc00;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;A &lt;strong&gt;network bridge&lt;/strong&gt; is a device that connects two or more &lt;strong&gt;separate network segments&lt;/strong&gt; and forwards traffic &lt;strong&gt;between&lt;/strong&gt; them. Bridges operate at the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;datalink layer&quot;&gt;data link layer&lt;/a&gt; of the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI Model&quot;&gt;OSI model&lt;/a&gt; and use the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC address&quot;&gt;MAC address&lt;/a&gt; of devices to determine where to forward traffic. When a bridge receives a frame from one network segment, it examines the &lt;strong&gt;destination MAC address&lt;/strong&gt; of the frame and forwards it to the appropriate segment based on the MAC address table it has learned. The &lt;strong&gt;bridge&lt;/strong&gt; also filters out any frames with destination MAC addresses that are &lt;strong&gt;not present&lt;/strong&gt; on the other side of the bridge, helping to reduce unnecessary network traffic.&lt;/p&gt;
&lt;p&gt;Bridges are commonly used to &lt;strong&gt;segment networks&lt;/strong&gt;, isolate network problems, and extend the reach of networks by connecting segments over long distances. With the advent of more advanced network devices such as switches and routers, bridges have become less common but still serve a useful purpose in some network configurations.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;strong&gt;Interesting facts:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;Bridges are software based, while switches are hardware based because they use an ASICs chip to help them make filtering decisions.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Bridges can only have one spanning-tree instance per bridge, while switches can have many.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Bridges can only have upto 16 ports, while a switch can have hundreds!&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;This article explained how network switches operate and compared them with hubs. We examined the three operating stages of a switch: &lt;strong&gt;learning&lt;/strong&gt;, &lt;strong&gt;forwarding&lt;/strong&gt;, and &lt;strong&gt;filtering&lt;/strong&gt;, and provided an overview of &lt;strong&gt;network loop avoidance&lt;/strong&gt; with the help of the &lt;strong&gt;Spanning-Tree protocol&lt;/strong&gt;. We talked about the three &lt;strong&gt;switching modes&lt;/strong&gt; used by switches to forward frames: &lt;strong&gt;Store-and-forward&lt;/strong&gt;, &lt;strong&gt;Cut-through&lt;/strong&gt; &amp;amp; &lt;strong&gt;Fragment-free&lt;/strong&gt;, and how the switch &lt;strong&gt;memory buffer&lt;/strong&gt; plays a critical role in this process. Lastly touched on &lt;strong&gt;network bridges&lt;/strong&gt; and how they we used in the early days to segment networks.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/switches-bridges-intro.webp&quot; alt=&quot;Switches &amp;amp; Bridges&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/switches-bridges-intro.webp&quot; alt=&quot;Switches and Bridges&quot; style=&quot;margin: 7px; float: left;&quot; /&gt;&lt;strong&gt;Network Switches&lt;/strong&gt; are the evolution of &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/hubs-repeaters.html&quot; target=&quot;_blank&quot; title=&quot;Hubs and Repeaters&quot;&gt;Hubs and Repeaters&lt;/a&gt;, and enable the creation of networks by connecting multiple devices together. They are critical components in computer networking and are used to connect devices like computers, printers, and servers in local area networks (LANs) and wide area networks (WANs). Switches are designed to manage the flow of data between devices, ensuring that each device is able to communicate efficiently and effectively with other devices on the network.&lt;/p&gt;
&lt;div class=&quot;flex flex-grow flex-col gap-3&quot;&gt;
&lt;div class=&quot;min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap&quot;&gt;
&lt;div class=&quot;markdown prose w-full break-words dark:prose-invert light&quot;&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Switches operate at the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;data link layer&quot;&gt;data link layer&lt;/a&gt; (layer 2) of the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI (Open Systems Interconnection) model&quot;&gt;OSI (Open Systems Interconnection) model&lt;/a&gt; and use &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC (Media Access Control) addresses&quot;&gt;MAC (Media Access Control) addresses&lt;/a&gt; to identify devices on the network. When a device sends data to another device on the network, the switch reads the MAC address of the data packet and determines the best route for the packet to take to reach its destination. This process is called packet switching, and it allows multiple devices on a network to communicate simultaneously without interfering with each other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are various types of switches, including &lt;strong&gt;unmanaged switches&lt;/strong&gt;, &lt;strong&gt;managed switches&lt;/strong&gt;, and &lt;strong&gt;Layer 3 switches&lt;/strong&gt;. &lt;strong&gt;Unmanaged switches&lt;/strong&gt; are basic switches that are easy to set up and use, while managed switches offer more advanced features and greater control over the network. &lt;strong&gt;Layer 3 switches&lt;/strong&gt; are used in large networks and are capable of routing data at the network layer of the &lt;strong&gt;OSI model&lt;/strong&gt;. Switches are critical components in modern networks and play an important role in enabling communication and data exchange between devices.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Switches&lt;/strong&gt; (Layer-2 Switching) do not receive and transmit data throughout every port, like &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/hubs-repeaters.html&quot; target=&quot;_blank&quot; title=&quot;Hubs&quot;&gt;&lt;strong&gt;hubs&lt;/strong&gt;&lt;/a&gt;, but instead examine a packet's &lt;strong&gt;destination&lt;/strong&gt; by checking the &lt;strong&gt;MAC address&lt;/strong&gt;. The &lt;strong&gt;destination MAC address&lt;/strong&gt; is always located at the beginning of the packet (see &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II Fram&quot;&gt;Ethernet II Protocol&lt;/a&gt; article) as shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ethernet-frames-ethernet-ii-1.gif&quot; alt=&quot;Ethernet II Frame&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A switch will then forward the frame via the intended port, or out all its ports, depending if it finds an entry for this MAC address in its memory (filter table). This process is explained in more detail later in this article.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Switches use &lt;strong&gt;Application Specific Integrated Circuits&lt;/strong&gt; (&lt;strong&gt;ASIC's&lt;/strong&gt;) to build and maintain filter tables. Layer-2 switches switch packets between ports at a faster rate compared to routers, simply because routers need to examine the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer3.html&quot; target=&quot;_blank&quot; title=&quot;Network layer&quot;&gt;Network layer&lt;/a&gt; (layer-3) information of the packet, which is higher up in the OSI model and requires additional processing power and time.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;They provide hardware based bridging (MAC addresses)&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;They work at wire speed, therefor have low latency&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;div align=&quot;left&quot;&gt;&lt;strong&gt;They come in 3 different types: Store &amp;amp; Forward, Cut-Through and Fragment Free (Analysed later)&lt;/strong&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Physically, it's difficult to tell a switch from a hub as they both look alike. The difference between them is under the hood! The photos below show a 8-port hub (left) and 18 port switch (right). Notice the switch provides two ports on the far right - these are uplink ports, allowing the switch to connect to the rest of the network (other switches):&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/fs108.jpg&quot; alt=&quot;&quot; width=&quot;331&quot; height=&quot;187&quot; data-alt=&quot;fs108&quot; /&gt;&amp;nbsp; &lt;img src=&quot;https://www.firewall.cx/images/stories/fs518.jpg&quot; alt=&quot;&quot; width=&quot;331&quot; height=&quot;187&quot; data-alt=&quot;fs518&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;The Three Operating Stages of a Network Switch&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Network switches operate in three stages: learning, forwarding, and filtering.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Stage 1: Learning &lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Stage 2: Forwarding&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Stage 3: Filtering&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;Loop Avoidance (Optional)&lt;/span&gt; &lt;br /&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Overall, the three stages of &lt;strong&gt;learning&lt;/strong&gt;, &lt;strong&gt;forwarding&lt;/strong&gt;, and &lt;strong&gt;filtering&lt;/strong&gt; allow the network switch to effectively manage the flow of data on a computer network, ensuring that devices can communicate with each other efficiently and securely.&lt;/p&gt;
&lt;h4&gt;Stage 1: Address Learning&lt;/h4&gt;
&lt;div class=&quot;markdown prose w-full break-words dark:prose-invert light&quot;&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;address learning&lt;/strong&gt; phase of a network switch is the process by which the switch builds and maintains a table of MAC addresses and their corresponding switch ports, known as the &lt;strong&gt;MAC address table&lt;/strong&gt; or the &lt;strong&gt;Content Addressable Memory (&lt;/strong&gt;&lt;strong&gt;CAM) table&lt;/strong&gt;. When a switch receives a frame, it examines the &lt;strong&gt;source MAC address&lt;/strong&gt; of the frame and records it in the MAC address table along with the port on which the frame was received. This allows the switch to forward future frames to that device more efficiently, without having to flood the network with unnecessary traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;During the &lt;strong&gt;address learning phase&lt;/strong&gt;, the switch also updates its MAC address table as it receives frames with &lt;strong&gt;new source addresses&lt;/strong&gt;. If the switch already has an entry for a particular MAC address, it updates the associated port information. If the switch does not have an entry for the MAC address, it adds a new entry to the table.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to note that the MAC address table has a limited size, usually a few thousand entries (8000-10,000),&amp;nbsp; and can become full if the switch receives frames from too many devices. When the table becomes full, the switch must discard old entries to make room for new ones. This can result in temporary network disruptions as the switch re-learns the addresses of devices that it has not seen in a while.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Overall, the address learning phase is a crucial aspect of switch operation, as it allows switches to efficiently forward frames and reduce network congestion. By maintaining an up-to-date MAC address table, switches can ensure that network traffic is delivered to the correct destination with minimal delay.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;The diagrams below shows how frames are forwarded out all switchports when the destination MAC address is unknown (there is no entry in the MAC address table). This is usually the case when a switch is initially powered on (or has an empty MAC address table). In this example, &lt;strong&gt;Node 1&lt;/strong&gt; sends a packet desitined to &lt;strong&gt;Node 2&lt;/strong&gt;. The switch at this point has already inserted &lt;strong&gt;Node1's MAC address&lt;/strong&gt; in its &lt;strong&gt;MAC address table&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/switches.gif&quot; alt=&quot;switches&quot; width=&quot;456&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;how network switches work&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;And after the first frame has been successfully received by &lt;strong&gt;Node 2&lt;/strong&gt;, it then sends a reply to &lt;strong&gt;Node 1&lt;/strong&gt;. The switch is now aware of the two nodes MAC addresses and will send all frames between them, out through the switchports they are connected to:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/switches-node-2-sends-a-frame-to-node-1.gif&quot; alt=&quot;switches-node-2-sends-a-frame-to-node-1&quot; width=&quot;456&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Network Switch functionality&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Notice how &lt;strong&gt;Node 2's&lt;/strong&gt; frame destined to &lt;strong&gt;Node 1&lt;/strong&gt;, is &lt;strong&gt;not transmitted&lt;/strong&gt; out every switchport . The switch is &lt;strong&gt;now aware&lt;/strong&gt; of the switch ports both &lt;strong&gt;Node 1&lt;/strong&gt; and &lt;strong&gt;Node 2&lt;/strong&gt; are connected to:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/switches-after-mac-port-is-known.gif&quot; alt=&quot;switches-after-mac-port-is-known&quot; width=&quot;456&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h4&gt;Forward/Filter Decision&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a frame arrives at a switch, the switch examines the &lt;strong&gt;destination MAC address&lt;/strong&gt; of the frame to determine which port it should forward the frame to. As noted previously, the switch maintains a table, called the &lt;strong&gt;MAC address table&lt;/strong&gt; or the &lt;strong&gt;CAM table&lt;/strong&gt;, which &lt;strong&gt;maps MAC addresses to their associated switch ports&lt;/strong&gt;. If the &lt;strong&gt;destination MAC address&lt;/strong&gt; is already in the MAC address table, the switch will forward the frame out the &lt;strong&gt;corresponding port&lt;/strong&gt;. If the &lt;strong&gt;destination MAC address&lt;/strong&gt; is not in the table, the switch will flood the frame to &lt;strong&gt;all ports except the one on which it was received&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is known as&amp;nbsp;&lt;strong&gt;unknown unicast flooding&lt;/strong&gt; and ensures that the frame reaches its intended destination. Once the frame reaches its destination, the switch updates its MAC address table with the &lt;strong&gt;source MAC address&lt;/strong&gt; and the port on which the frame was received, so that it can forward future frames to that device more efficiently.&lt;/p&gt;
&lt;h4&gt;Loop Avoidance (Optional) - Spanning-tree protocol&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol.html&quot; target=&quot;_blank&quot; title=&quot;Spanning Tree Protocol (STP)&quot;&gt;Spanning Tree Protocol (STP)&lt;/a&gt; is a networking protocol designed to prevent loops in networks with redundant links. When multiple paths are available between devices in a network, a loop can occur if the same packet is forwarded indefinitely between devices. This can cause network congestion and ultimately result in a network outage. STP solves this problem by creating a loop-free logical topology for the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;STP works by selecting a root bridge, which is the device that has the highest priority in the network. Once the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol/spanning-tree-protocol-root-bridge-election.html&quot; target=&quot;_blank&quot; title=&quot;root bridge and port roles&quot;&gt;root bridge and port roles&lt;/a&gt; have been determined, STP builds a tree-like topology that includes all devices in the network. The topology is designed to ensure that there is only one active path between any two devices, which prevents loops from occurring. The tree-like topology is also designed to provide redundancy in the event of a link failure. If a link fails, STP recalculates the topology to find a new path between the affected devices.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;STP has several variations, including &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol/spanning-tree-protocol-port-costs-states.html&quot; target=&quot;_blank&quot; title=&quot;Rapid Spanning Tree Protocol (RSTP)&quot;&gt;Rapid Spanning Tree Protocol (RSTP)&lt;/a&gt; and Multiple Spanning Tree Protocol (MSTP). RSTP is an improvement on STP that reduces the time it takes for the network to recover from link failures. MSTP is a protocol that allows multiple VLANs to be mapped to a single spanning tree instance, which reduces the number of spanning tree instances required in a network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In summary, STP is a networking protocol that creates a &lt;strong&gt;loop-free logical topology&lt;/strong&gt; for networks with redundant links. By selecting a root bridge and assigning roles to other devices in the network, STP ensures that there is only one active path between any two devices, which prevents network congestion and outages. STP operates in three phases and has several variations, including RSTP and MSTP.&lt;strong&gt; &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;Switching Modes: Store-and-forward, Cut-through &amp;amp; Fragment-free&lt;/h2&gt;
&lt;p&gt;There are three primary switching methods: &lt;strong&gt;store-and-forward&lt;/strong&gt;, &lt;strong&gt;cut-through&lt;/strong&gt;, and &lt;strong&gt;fragment-free&lt;/strong&gt;. While all three methods are analyzed in detail, the below diagram shows the portion of a receiving frame a switch will process (check), before forwarding it out its intended port(s):&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/switches-switching-methods.gif&quot; alt=&quot;switches-switching-methods&quot; width=&quot;646&quot; height=&quot;283&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Switches Cut-Through, Fragment Free, Store &amp;amp; Forward mode&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Store-and-forward&lt;/strong&gt; switching is the &lt;strong&gt;most common method&lt;/strong&gt; and involves the switch &lt;strong&gt;receiving and buffering the entire frame&lt;/strong&gt; before forwarding it to the destination device. During this process, the switch performs error checking on the frame to ensure it is complete and &lt;strong&gt;error-free&lt;/strong&gt;. If the frame is damaged, the switch discards it. &lt;strong&gt;Store-and-forward&lt;/strong&gt; switching is considered the &lt;strong&gt;most reliable switching method&lt;/strong&gt; as it ensures that only complete, error-free frames are forwarded, but it also has the &lt;strong&gt;highest latency&lt;/strong&gt; due to the buffering and error checking process.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Cut-through&lt;/strong&gt; switching is a &lt;strong&gt;faster method&lt;/strong&gt; than &lt;strong&gt;store-and-forward&lt;/strong&gt;, as the switch starts forwarding the frame as soon as it reads the &lt;strong&gt;destination MAC address&lt;/strong&gt;. With &lt;strong&gt;cut-through&lt;/strong&gt;, the switch &lt;strong&gt;only buffers the minimum amount of the frame&lt;/strong&gt; (up to the destination MAC address section) required to determine the &lt;strong&gt;destination port&lt;/strong&gt;. &lt;strong&gt;Cut-through&lt;/strong&gt; switching is &lt;strong&gt;faster&lt;/strong&gt; than &lt;strong&gt;store-and-forward&lt;/strong&gt; because it does not wait for the entire frame to be received and verified before forwarding. Keep in mind that this method can forward corrupted frames since there is no error checking before forwarding.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fragment-free&lt;/strong&gt; switching is a variation of &lt;strong&gt;cut-through&lt;/strong&gt; switching that reads the &lt;strong&gt;first 64 bytes&lt;/strong&gt; of a frame before forwarding it. This is done to prevent forwarding of frames that may have been damaged during transmission. In general, the &lt;strong&gt;first 64 bytes&lt;/strong&gt; of a frame contain the frame header, which includes the &lt;strong&gt;source and destination MAC addresses&lt;/strong&gt;, as well as the &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;ethernet frame type&quot;&gt;frame type&lt;/a&gt;. By reading the &lt;strong&gt;first 64 bytes&lt;/strong&gt;, &lt;strong&gt;fragment-free switching&lt;/strong&gt; can ensure that the frame is &lt;strong&gt;not corrupted&lt;/strong&gt; without having to wait for the entire frame to be received.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Generally speaking, &lt;strong&gt;store-and-forward&lt;/strong&gt; switching is the &lt;strong&gt;most reliable&lt;/strong&gt; but has the &lt;strong&gt;highest latency&lt;/strong&gt; due to the buffering and error checking process. &lt;strong&gt;Cut-through&lt;/strong&gt; switching is &lt;strong&gt;faster&lt;/strong&gt; than &lt;strong&gt;store-and-forward&lt;/strong&gt; but can forward &lt;strong&gt;corrupted frames&lt;/strong&gt;. &lt;strong&gt;Fragment-free&lt;/strong&gt; switching is a variation of &lt;strong&gt;cut-through&lt;/strong&gt; that reads the &lt;strong&gt;first 64 bytes&lt;/strong&gt; of a frame before forwarding it, which &lt;strong&gt;reduces&lt;/strong&gt; the likelihood of forwarding &lt;strong&gt;corrupted frames&lt;/strong&gt;. The choice of switching method depends on the specific needs of the network, and a combination of these methods can be used in larger networks to achieve a balance between reliability and speed.&lt;/p&gt;
&lt;h2&gt;Network Switches Memory Buffer&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;memory buffer&lt;/strong&gt; in a network switch is an essential component that plays a &lt;strong&gt;critical role&lt;/strong&gt; in ensuring &lt;strong&gt;efficient&lt;/strong&gt; and &lt;strong&gt;reliable data transmission&lt;/strong&gt;. The buffer is responsible for &lt;strong&gt;temporarily storing incoming data packets&lt;/strong&gt; before &lt;strong&gt;forwarding&lt;/strong&gt; them to their destination. Without a memory buffer, the switch would be unable to handle high volumes of network traffic, resulting in packet loss and network congestion. The buffer also helps to prevent data loss by holding packets in case of congestion, allowing time for the switch to &lt;strong&gt;clear the congestion&lt;/strong&gt; and &lt;strong&gt;forward the packets&lt;/strong&gt;. The &lt;strong&gt;size&lt;/strong&gt; of the buffer is an important factor in determining the performance of the switch, as it determines the amount of data that can be temporarily stored. A switch with a larger buffer can handle more traffic and is better equipped to handle bursts of data. As such, the memory buffer is a critical component in ensuring reliable and efficient network performance.&lt;/p&gt;
&lt;div style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;
&lt;h2 align=&quot;left&quot;&gt;Network Bridges&lt;span style=&quot;color: #99cc00;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;A &lt;strong&gt;network bridge&lt;/strong&gt; is a device that connects two or more &lt;strong&gt;separate network segments&lt;/strong&gt; and forwards traffic &lt;strong&gt;between&lt;/strong&gt; them. Bridges operate at the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;datalink layer&quot;&gt;data link layer&lt;/a&gt; of the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI Model&quot;&gt;OSI model&lt;/a&gt; and use the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC address&quot;&gt;MAC address&lt;/a&gt; of devices to determine where to forward traffic. When a bridge receives a frame from one network segment, it examines the &lt;strong&gt;destination MAC address&lt;/strong&gt; of the frame and forwards it to the appropriate segment based on the MAC address table it has learned. The &lt;strong&gt;bridge&lt;/strong&gt; also filters out any frames with destination MAC addresses that are &lt;strong&gt;not present&lt;/strong&gt; on the other side of the bridge, helping to reduce unnecessary network traffic.&lt;/p&gt;
&lt;p&gt;Bridges are commonly used to &lt;strong&gt;segment networks&lt;/strong&gt;, isolate network problems, and extend the reach of networks by connecting segments over long distances. With the advent of more advanced network devices such as switches and routers, bridges have become less common but still serve a useful purpose in some network configurations.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;strong&gt;Interesting facts:&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;Bridges are software based, while switches are hardware based because they use an ASICs chip to help them make filtering decisions.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Bridges can only have one spanning-tree instance per bridge, while switches can have many.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Bridges can only have upto 16 ports, while a switch can have hundreds!&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;This article explained how network switches operate and compared them with hubs. We examined the three operating stages of a switch: &lt;strong&gt;learning&lt;/strong&gt;, &lt;strong&gt;forwarding&lt;/strong&gt;, and &lt;strong&gt;filtering&lt;/strong&gt;, and provided an overview of &lt;strong&gt;network loop avoidance&lt;/strong&gt; with the help of the &lt;strong&gt;Spanning-Tree protocol&lt;/strong&gt;. We talked about the three &lt;strong&gt;switching modes&lt;/strong&gt; used by switches to forward frames: &lt;strong&gt;Store-and-forward&lt;/strong&gt;, &lt;strong&gt;Cut-through&lt;/strong&gt; &amp;amp; &lt;strong&gt;Fragment-free&lt;/strong&gt;, and how the switch &lt;strong&gt;memory buffer&lt;/strong&gt; plays a critical role in this process. Lastly touched on &lt;strong&gt;network bridges&lt;/strong&gt; and how they we used in the early days to segment networks.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Hubs &amp; Repeaters</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/hubs-repeaters.html"/>
		<published>2011-06-09T08:20:04+10:00</published>
		<updated>2011-06-09T08:20:04+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/hubs-repeaters.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/hubs-repeaters-intro.webp&quot; alt=&quot;&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs-repeaters-intro.webp&quot; alt=&quot;hubs repeaters intro&quot; style=&quot;margin: 7px; float: left;&quot; /&gt;Network hubs&lt;/strong&gt; were once the primary method of interconnecting network devices to create a local area network (LAN). Hubs were inexpensive, easy to install, and provided a simple means of connecting multiple devices in a network. However, as networks grew in size and complexity, hubs were found to be inefficient and were gradually replaced by more advanced network devices such as switches and routers. Despite their obsolescence, hubs remain a useful tool in certain network scenarios and are worth discussing to understand their limitations and strengths.&lt;/p&gt;
&lt;p&gt;It is important at this point to cover a few network terms that are used to describe how hubs work:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Domain&lt;/strong&gt;: refers to a logical grouping of network devices that share the same broadcast domain.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Broadcast domain&lt;/strong&gt; is a group of devices that receive the same broadcast messages. When a device sends a broadcast message, it is transmitted to all devices on the same broadcast domain.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collision domain&lt;/strong&gt; is a group of devices that share the same physical network segment, where data collisions can occur.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs-repeaters-netgear-ds108.jpg&quot; alt=&quot;hubs repeaters netgear ds108&quot; width=&quot;550&quot; height=&quot;174&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;How Network Hubs Work&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Returning back to our discussion on &lt;strong&gt;network hubs,&lt;/strong&gt; they are a simple devices that &lt;strong&gt;connect multiple network devices&lt;/strong&gt; together by forwarding incoming data to all connected devices. Hubs operate at the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer1.html&quot; target=&quot;_blank&quot; title=&quot;physical layer&quot;&gt;physical layer&lt;/a&gt; of the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI model&quot;&gt;OSI model&lt;/a&gt; and act as a repeater, amplifying the electrical signal of incoming data before broadcasting it to all connected devices:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs.gif&quot; alt=&quot;hubs&quot; width=&quot;456&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown in the example above, frames transmitted by &lt;strong&gt;Node 1&lt;/strong&gt; are received by the hub and forwarded out all its ports.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Hubs do not analyze or manage network traffic in any way, and as such, they are not able to distinguish between different types of network traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the key limitations of hubs is their &lt;strong&gt;inability&lt;/strong&gt; to &lt;strong&gt;isolate network traffic&lt;/strong&gt;. When a device connected to a hub sends data, the data is broadcast to all devices connected to the hub, regardless of whether they are the intended recipient or not. This means that &lt;strong&gt;all connected devices&lt;/strong&gt; receive the data, regardless of whether they need it or not. This can lead to network congestion, as unnecessary traffic is transmitted to devices that have no use for it. In addition, because all devices on a hub share the same &lt;strong&gt;domain&lt;/strong&gt;, any traffic that is transmitted on the hub creates a collision domain, where multiple devices may attempt to transmit data simultaneously, resulting in a collision and lost data.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One advantage of hubs is their simplicity. Hubs are &lt;strong&gt;inexpensive&lt;/strong&gt; and &lt;strong&gt;easy to install&lt;/strong&gt;, making them an attractive option for small networks or temporary network setups. Hubs are also transparent to the network, which means they do not modify network traffic in any way, making them ideal for troubleshooting network connectivity issues.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Hubs are often used to tap into a network by placing them between critical devices e.g between a server and a &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/switches-bridges.html&quot; target=&quot;_blank&quot; title=&quot;Network switch&quot;&gt;network switch&lt;/a&gt;, then connecting a laptop loaded with a &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;network protocol analyzer&quot;&gt;network protocol analyzer&lt;/a&gt; to capture and analyze packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, the limitations of hubs, particularly their &lt;strong&gt;inability to isolate network traffic&lt;/strong&gt;, make them unsuitable for larger networks or networks with high traffic volumes. As network traffic increases, the potential for collisions (&lt;a href=&quot;https://www.firewall.cx/networking/ethernet/early-ethernet-collisions.html&quot; target=&quot;_blank&quot; title=&quot;early ethernet collisions&quot;&gt;early&lt;/a&gt; or &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/late-ethernet-collisions.html&quot; target=&quot;_blank&quot; title=&quot;late ethernet collisions&quot;&gt;late collisions&lt;/a&gt;) and congestion also increases, leading to decreased network performance and increased network downtime.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below shows how multiple hubs can connect to perform a larger network. Keep in mind that such a setup will create a larger broadcast domain that will affect more devices and further reducing network bandwidth:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/diasy-chained-hubs.gif&quot; alt=&quot;diasy-chained-hubs&quot; width=&quot;620&quot; height=&quot;196&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Network Repeaters&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A &lt;strong&gt;network repeater&lt;/strong&gt; is a network device that is used to &lt;strong&gt;regenerate&lt;/strong&gt; and &lt;strong&gt;amplify&lt;/strong&gt; a network signal that has become weak or distorted due to attenuation or interference. When a signal is transmitted over a long distance, it may weaken or become distorted due to various factors such as cable attenuation, electromagnetic interference, or signal reflections. A repeater receives the weakened signal and regenerates it, amplifying it to its original strength before retransmitting it to the next device in the network. A repeater does not analyze or manage network traffic in any way.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the key differences between a &lt;strong&gt;hub and a repeater&lt;/strong&gt; is the way they handle network traffic. A repeater simply regenerates and amplifies a network signal, while a hub broadcasts incoming data to all connected devices on the network. A repeater is used to extend the reach of a network signal, while a hub is used to connect multiple devices together to create a LAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another difference between a hub and a repeater is their ability to isolate network traffic. A &lt;strong&gt;repeater&lt;/strong&gt; does &lt;strong&gt;not isolate network traffic&lt;/strong&gt; and does &lt;strong&gt;not create collision domains&lt;/strong&gt;. A hub, on the other hand, shares the &lt;strong&gt;same domain&lt;/strong&gt; with all connected devices and creates a &lt;strong&gt;collision domain&lt;/strong&gt;. When a device connected to a hub sends data, all devices connected to the hub receive the data, which as we've outlined earlier, can cause collisions and network congestion.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The Three Type of Hubs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are primarily three types of network hubs: passive, active, and intelligent.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Passive Hub&lt;/strong&gt;: A passive hub is a basic type of hub that does not require an external power source. It simply amplifies the incoming signal and broadcasts it to all connected devices on the network. Passive hubs do not have any built-in intelligence or management features, and they do not isolate network traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Active Hub&lt;/strong&gt;: An active hub, also known as a powered hub, requires an external power source. It contains a power supply that amplifies and regenerates the incoming signal, boosting its strength before broadcasting it to all connected devices. Active hubs also include features such as automatic detection of network speeds and error detection, which allows them to manage and optimize network traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Intelligent Hub&lt;/strong&gt;: An intelligent hub, also known as a managed hub, is a more advanced type of hub that includes management and monitoring features. Intelligent hubs allow network administrators to monitor and manage network traffic, isolate network segments, and configure network settings. They also provide features such as &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;span - port mirroring&quot;&gt;port mirroring&lt;/a&gt;, which allows administrators to monitor the traffic on a specific port, and &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Networks&quot;&gt;virtual LANs (VLANs)&lt;/a&gt;, which allow administrators to segment the network and isolate traffic.&lt;/p&gt;
&lt;h2&gt;Network Hubs with BNC Connectors (Coax Cable)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Coaxial cable&lt;/strong&gt;, also known as &lt;strong&gt;coax&lt;/strong&gt;, is a type of cable that is commonly used for transmitting data signals in computer networks. Coaxial cables consist of a copper wire that is surrounded by an insulating layer, which is then covered by a braided shield and an outer jacket. The braided shield provides protection against electromagnetic interference, which can distort or weaken the data signal.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs-repeaters-coax-cable.jpg&quot; alt=&quot;hubs repeaters coax cable&quot; width=&quot;400&quot; height=&quot;266&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When data is transmitted over coaxial cable, it is done so using electrical impulses. These impulses travel along the copper wire at the center of the cable, which is surrounded by the insulating layer and braided shield. The data is transmitted in the form of analog signals that are converted into digital signals by network devices such as hubs or switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some older network hubs are designed to support coaxial cable connections. These hubs typically include a &lt;strong&gt;coax BNC&lt;/strong&gt; (&lt;strong&gt;Bayonet Neill-Concelman&lt;/strong&gt;) &lt;strong&gt;connector&lt;/strong&gt;, which is a type of connector that is commonly used with coaxial cables. The &lt;strong&gt;BNC connector&lt;/strong&gt; is a twist-lock connector that provides a secure and reliable connection between the coaxial cable and the hub:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs-repeaters-rg59-bnc.jpg&quot; alt=&quot;hubs repeaters rg59 bnc&quot; width=&quot;350&quot; height=&quot;209&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To connect a coaxial cable to a hub, the cable is first connected to the BNC connector on the hub using a coaxial BNC connector. The hub then amplifies and broadcasts the data signal to all connected devices on the network. However, as previously mentioned, hubs have largely been replaced by switches in modern networking, and coaxial cable connections are becoming less common.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Coaxial cable&lt;/strong&gt; was once a popular choice for networking because it is relatively inexpensive, easy to install, and can transmit data over long distances without significant signal loss. However, coaxial cable has several limitations that make it less desirable for modern networking. For example, coaxial cable has a lower bandwidth than other types of cables, such as twisted pair or fiber optic cables. This means that it can transmit data at slower speeds and may not be suitable for high-bandwidth applications.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/compex-8-port.jpg&quot; alt=&quot;compex-8-port&quot; width=&quot;420&quot; height=&quot;314&quot; title=&quot;Network hub with BNC connector&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Network Hub with BNC connector&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It's also worth noting that coaxial cable networks use &lt;strong&gt;50-ohm terminating resistors&lt;/strong&gt; to prevent signal reflections that can cause interference and degrade signal quality. When an electrical signal travels along a coaxial cable, it encounters impedance, which is the resistance to the flow of electrical current. If the cable is not properly terminated, the signal can reflect back towards the source and interfere with the original signal. This can cause signal distortion, attenuation, and loss of data.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs-repeaters-terminating-resistors-50ohm.jpg&quot; alt=&quot;hubs repeaters terminating resistors 50ohm&quot; width=&quot;350&quot; height=&quot;140&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By adding a &lt;strong&gt;50-ohm terminating resistor&lt;/strong&gt; at the &lt;strong&gt;end of the cable&lt;/strong&gt;, the impedance is matched and the signal can be properly absorbed, preventing reflections. This helps to maintain signal integrity and improve overall network performance. The &lt;strong&gt;50-ohm terminating resistor&lt;/strong&gt; is designed to match the characteristic impedance of the coaxial cable, which is typically 50 ohms:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/coax-network.gif&quot; alt=&quot;coax-network&quot; width=&quot;567&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The coax cable can be up to &lt;strong&gt;185 meters long&lt;/strong&gt; and can contain no more than&lt;strong&gt; 30 nodes per segment&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;In this article we explained how hubs and repeaters operate within a network. We listed the main &lt;strong&gt;advantages&lt;/strong&gt; and &lt;strong&gt;disadvantages&lt;/strong&gt; of hubs and covered the three different type of hub devices: &lt;strong&gt;passive hubs&lt;/strong&gt;, &lt;strong&gt;active hubs&lt;/strong&gt; and &lt;strong&gt;intelligent hubs&lt;/strong&gt;. Finally we took a look at older &lt;strong&gt;coaxial-based networks&lt;/strong&gt; and talked about their limitations and components.&lt;/p&gt;
&lt;div id=&quot;_mcePaste&quot; class=&quot;mcePaste&quot; style=&quot;overflow: hidden; position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; text-align: justify;&quot;&gt;
&lt;table border=&quot;0&quot; style=&quot;width: 630px;&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 783px;&quot; valign=&quot;top&quot;&gt;
&lt;h5 align=&quot;left&quot;&gt;Introduction&lt;/h5&gt;
&lt;p align=&quot;left&quot;&gt;Here we will talk about hubs and explain how they work. In the next section we will move to switches and how they differ from hubs, how they work and the types of switching methods that are available; we will also compare them.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Before we start there are a few definitions which I need to speak about so you can understand the terminology we will be using.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;color: #ff33ff;&quot;&gt;Domain&lt;/span&gt;: Defined as a geographical area or logical area (in our imagination) where anything in it becomes part of the domain. In computer land, this means that when something happens in this domain (area) every computer that's part of it will see or hear everything that happens in it.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;color: #00ffff;&quot;&gt;Collision Domain&lt;/span&gt;: Putting it simple, whenever a collision between two computers occurs, every other computer within the domain will hear and know about the collision. These computers are said to be in the same collision domain. As you're going to see later on, when computers connect together using a hub they become part of the same collision domain. This dosen't happen with switches.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;color: #00ff99;&quot;&gt;Broadcast Domain&lt;/span&gt;: A domain where every broadcast (a broadcast is a frame or data which is sent to every comeputer) is seen by all computers within the domain. Hubs and switches do not break up broadcast domains. You need a router to achieve this.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;There are different devices which can break-up collision domains and broadcast domains and make the network a lot faster and efficient. Switches create separate collision domains but not broadcast domains. Routers create separate broadcast and collision domains. Hubs are too simple to do either, can't create separate collision or broadcast domain.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;color: #9999ff;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Hubs &amp;amp; Repeaters &lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Hubs and repeaters are basically the same, so we will be using the term &quot;Hub&quot; to keep things simple. Hubs are common today in every network. They are the cheapest way to connect two or more computers together. Hubs are also known as &lt;em&gt;Repeaters&lt;/em&gt; and work on the first layer of the &lt;a href=&quot;https://www.firewall.cx/osi-intro.php&quot;&gt;OSI model&lt;/a&gt;. They are said to work on the first layer because of the function they perform. They don't read the data frames at all (like switches and routers do), they only make sure the frame is repeated out on each port and that's about it.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;The Nodes that share an &lt;a href=&quot;https://www.firewall.cx/ethernet-intro.php&quot;&gt;Ethernet&lt;/a&gt; or Fast Ethernet LAN using the CSMA/CD rules are said to be in the same &lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;em&gt;&lt;span style=&quot;color: #00ffff;&quot;&gt;collision domain&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;. In plain English, this means that all nodes connected to a hub are part of the same collision domain. In a Collision domain, when a collision occurs everyone in that domain/area will hear it and will be affected. The Ethernet section talks about CSMA/CD and collision domains since they are part of the rules under which Ethernet functions.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;The picture below shows a few hubs : 8 port Netgear and a D-link hub.&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 1px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 33px; height: 1px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 4px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 38px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 178px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 38px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td colspan=&quot;3&quot; rowspan=&quot;2&quot; valign=&quot;top&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/pictures/Dlinkhub.jpg&quot; alt=&quot;&quot; width=&quot;279&quot; height=&quot;124&quot; /&gt;&lt;/td&gt;
&lt;td style=&quot;width: 34px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 16px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 10px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;height: 128px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td colspan=&quot;3&quot; valign=&quot;top&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/pictures/en108tp.jpg&quot; alt=&quot;&quot; width=&quot;220&quot; height=&quot;124&quot; /&gt;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 169px;&quot; valign=&quot;top&quot;&gt;
&lt;p align=&quot;left&quot;&gt;The computers (nodes) connect to the hub using Unshielded Twisted Pair cable (UTP). Only one node can be connected to each port of the hub. The pictured hub has a total of 8 ports, which means up to 8 computers can be networked.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;When hubs were not that common and also expensive, most offices and home networks use to install coax cable.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;The way hubs work is quite simple and straightforward: When a computer on any one of the eight ports transmits data, this is replicated and sent out to the other seven ports. Check out the below picture which shows it clearly.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;height: 234px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td colspan=&quot;4&quot; valign=&quot;top&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/pictures/hubs.gif&quot; alt=&quot;&quot; width=&quot;456&quot; height=&quot;227&quot; /&gt;&lt;/td&gt;
&lt;td style=&quot;width: 39px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 303px;&quot; valign=&quot;top&quot;&gt;
&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;color: #ff0033;&quot;&gt;EXPLANATION: &lt;/span&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Node 1 is transmitting some data to Node 6 but all nodes are receiving the data as well. This data will be rejected by the rest of the nodes once they figure out it's not for them.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;This is accomplished by the node's network card reading the destination MAC address of the frame (data) it receives, it examines it and sees that it doesn't match with it's own and therefor discards the frame. Please see the Datalink layer in the &lt;a href=&quot;https://www.firewall.cx/osi-intro.php&quot;&gt;OSI section&lt;/a&gt; for more information on MAC addresses.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Most hubs these days also have a special port which can function as a normal port or as an &quot;uplink&quot; port. An uplink port allows you to connect another hub to the existing one, increasing the amount of ports which will be available to you. This is a cheap solution when you need to get a few more computers networked and it works quite well up to a point.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;This is how 2 eight port hubs would look when connected via the uplink port and how the data is replicated to all 16 ports :&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 227px;&quot; valign=&quot;top&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/pictures/diasy%20chained%20hubs.gif&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;198&quot; /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 200px;&quot; valign=&quot;top&quot;&gt;
&lt;p align=&quot;left&quot;&gt;In the above picture you can see that Node 1 is again transmitting data to Node 6 and that every other node connected to the hub is receiving the information. As we said, this is a pretty good and cheap solution, but as the network gets busier, you can clearly understand that there is going to be a lot of unecessary data flowing all over the network. All Nodes here are in the same broastcast and collision domain since they will hear every broadcast and collision that occurs.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;This is the same situation you get when you use coax cable, where every node or computer is connected onto the same cable and the data that's put onto it travels along the cable and is received by every computer.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;height: 245px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td colspan=&quot;7&quot; valign=&quot;top&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/pictures/COAX%20network.gif&quot; alt=&quot;&quot; width=&quot;567&quot; height=&quot;227&quot; /&gt;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 236px;&quot; valign=&quot;top&quot;&gt;
&lt;p align=&quot;left&quot;&gt;You probably also noticed the two orange boxes labled &quot;50 Ohm&quot;. These are called terminating resistors and are used on both ends of the coax cable so when the signal gets to them, it's absorbed by them and that way you don't get the signal reflecting back. Think of them as shock absorbent and the data signal is the shock wave which gets absorbed when it reaches the terminating resistors. The coax cable can be up to 185 meters and can contain no more than 30 nodes per segment. What you're looking at in the above picture is one segment 25 meters long with 4 nodes attached to it.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Now coming back to the hubs, there are a few standard features most of them have these include a link and activity LED for each port, a power LED and collision LED. Some hubs have separate link lights and activity lights, others combine them into one where the link light will flash when there is activity, otherwise it remains constantly on. The Netgear hub which is displayed at the beginning of this page has two separate LEDs for the activity and link but the Compex hub below has only one.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/hubs-repeaters-intro.webp&quot; alt=&quot;&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs-repeaters-intro.webp&quot; alt=&quot;hubs repeaters intro&quot; style=&quot;margin: 7px; float: left;&quot; /&gt;Network hubs&lt;/strong&gt; were once the primary method of interconnecting network devices to create a local area network (LAN). Hubs were inexpensive, easy to install, and provided a simple means of connecting multiple devices in a network. However, as networks grew in size and complexity, hubs were found to be inefficient and were gradually replaced by more advanced network devices such as switches and routers. Despite their obsolescence, hubs remain a useful tool in certain network scenarios and are worth discussing to understand their limitations and strengths.&lt;/p&gt;
&lt;p&gt;It is important at this point to cover a few network terms that are used to describe how hubs work:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Domain&lt;/strong&gt;: refers to a logical grouping of network devices that share the same broadcast domain.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Broadcast domain&lt;/strong&gt; is a group of devices that receive the same broadcast messages. When a device sends a broadcast message, it is transmitted to all devices on the same broadcast domain.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collision domain&lt;/strong&gt; is a group of devices that share the same physical network segment, where data collisions can occur.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs-repeaters-netgear-ds108.jpg&quot; alt=&quot;hubs repeaters netgear ds108&quot; width=&quot;550&quot; height=&quot;174&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;How Network Hubs Work&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Returning back to our discussion on &lt;strong&gt;network hubs,&lt;/strong&gt; they are a simple devices that &lt;strong&gt;connect multiple network devices&lt;/strong&gt; together by forwarding incoming data to all connected devices. Hubs operate at the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer1.html&quot; target=&quot;_blank&quot; title=&quot;physical layer&quot;&gt;physical layer&lt;/a&gt; of the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI model&quot;&gt;OSI model&lt;/a&gt; and act as a repeater, amplifying the electrical signal of incoming data before broadcasting it to all connected devices:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs.gif&quot; alt=&quot;hubs&quot; width=&quot;456&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown in the example above, frames transmitted by &lt;strong&gt;Node 1&lt;/strong&gt; are received by the hub and forwarded out all its ports.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Hubs do not analyze or manage network traffic in any way, and as such, they are not able to distinguish between different types of network traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the key limitations of hubs is their &lt;strong&gt;inability&lt;/strong&gt; to &lt;strong&gt;isolate network traffic&lt;/strong&gt;. When a device connected to a hub sends data, the data is broadcast to all devices connected to the hub, regardless of whether they are the intended recipient or not. This means that &lt;strong&gt;all connected devices&lt;/strong&gt; receive the data, regardless of whether they need it or not. This can lead to network congestion, as unnecessary traffic is transmitted to devices that have no use for it. In addition, because all devices on a hub share the same &lt;strong&gt;domain&lt;/strong&gt;, any traffic that is transmitted on the hub creates a collision domain, where multiple devices may attempt to transmit data simultaneously, resulting in a collision and lost data.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One advantage of hubs is their simplicity. Hubs are &lt;strong&gt;inexpensive&lt;/strong&gt; and &lt;strong&gt;easy to install&lt;/strong&gt;, making them an attractive option for small networks or temporary network setups. Hubs are also transparent to the network, which means they do not modify network traffic in any way, making them ideal for troubleshooting network connectivity issues.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Hubs are often used to tap into a network by placing them between critical devices e.g between a server and a &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/switches-bridges.html&quot; target=&quot;_blank&quot; title=&quot;Network switch&quot;&gt;network switch&lt;/a&gt;, then connecting a laptop loaded with a &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html&quot; target=&quot;_blank&quot; title=&quot;network protocol analyzer&quot;&gt;network protocol analyzer&lt;/a&gt; to capture and analyze packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, the limitations of hubs, particularly their &lt;strong&gt;inability to isolate network traffic&lt;/strong&gt;, make them unsuitable for larger networks or networks with high traffic volumes. As network traffic increases, the potential for collisions (&lt;a href=&quot;https://www.firewall.cx/networking/ethernet/early-ethernet-collisions.html&quot; target=&quot;_blank&quot; title=&quot;early ethernet collisions&quot;&gt;early&lt;/a&gt; or &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/late-ethernet-collisions.html&quot; target=&quot;_blank&quot; title=&quot;late ethernet collisions&quot;&gt;late collisions&lt;/a&gt;) and congestion also increases, leading to decreased network performance and increased network downtime.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below shows how multiple hubs can connect to perform a larger network. Keep in mind that such a setup will create a larger broadcast domain that will affect more devices and further reducing network bandwidth:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/diasy-chained-hubs.gif&quot; alt=&quot;diasy-chained-hubs&quot; width=&quot;620&quot; height=&quot;196&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Network Repeaters&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A &lt;strong&gt;network repeater&lt;/strong&gt; is a network device that is used to &lt;strong&gt;regenerate&lt;/strong&gt; and &lt;strong&gt;amplify&lt;/strong&gt; a network signal that has become weak or distorted due to attenuation or interference. When a signal is transmitted over a long distance, it may weaken or become distorted due to various factors such as cable attenuation, electromagnetic interference, or signal reflections. A repeater receives the weakened signal and regenerates it, amplifying it to its original strength before retransmitting it to the next device in the network. A repeater does not analyze or manage network traffic in any way.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the key differences between a &lt;strong&gt;hub and a repeater&lt;/strong&gt; is the way they handle network traffic. A repeater simply regenerates and amplifies a network signal, while a hub broadcasts incoming data to all connected devices on the network. A repeater is used to extend the reach of a network signal, while a hub is used to connect multiple devices together to create a LAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another difference between a hub and a repeater is their ability to isolate network traffic. A &lt;strong&gt;repeater&lt;/strong&gt; does &lt;strong&gt;not isolate network traffic&lt;/strong&gt; and does &lt;strong&gt;not create collision domains&lt;/strong&gt;. A hub, on the other hand, shares the &lt;strong&gt;same domain&lt;/strong&gt; with all connected devices and creates a &lt;strong&gt;collision domain&lt;/strong&gt;. When a device connected to a hub sends data, all devices connected to the hub receive the data, which as we've outlined earlier, can cause collisions and network congestion.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The Three Type of Hubs&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are primarily three types of network hubs: passive, active, and intelligent.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Passive Hub&lt;/strong&gt;: A passive hub is a basic type of hub that does not require an external power source. It simply amplifies the incoming signal and broadcasts it to all connected devices on the network. Passive hubs do not have any built-in intelligence or management features, and they do not isolate network traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Active Hub&lt;/strong&gt;: An active hub, also known as a powered hub, requires an external power source. It contains a power supply that amplifies and regenerates the incoming signal, boosting its strength before broadcasting it to all connected devices. Active hubs also include features such as automatic detection of network speeds and error detection, which allows them to manage and optimize network traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Intelligent Hub&lt;/strong&gt;: An intelligent hub, also known as a managed hub, is a more advanced type of hub that includes management and monitoring features. Intelligent hubs allow network administrators to monitor and manage network traffic, isolate network segments, and configure network settings. They also provide features such as &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;span - port mirroring&quot;&gt;port mirroring&lt;/a&gt;, which allows administrators to monitor the traffic on a specific port, and &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Networks&quot;&gt;virtual LANs (VLANs)&lt;/a&gt;, which allow administrators to segment the network and isolate traffic.&lt;/p&gt;
&lt;h2&gt;Network Hubs with BNC Connectors (Coax Cable)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Coaxial cable&lt;/strong&gt;, also known as &lt;strong&gt;coax&lt;/strong&gt;, is a type of cable that is commonly used for transmitting data signals in computer networks. Coaxial cables consist of a copper wire that is surrounded by an insulating layer, which is then covered by a braided shield and an outer jacket. The braided shield provides protection against electromagnetic interference, which can distort or weaken the data signal.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs-repeaters-coax-cable.jpg&quot; alt=&quot;hubs repeaters coax cable&quot; width=&quot;400&quot; height=&quot;266&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When data is transmitted over coaxial cable, it is done so using electrical impulses. These impulses travel along the copper wire at the center of the cable, which is surrounded by the insulating layer and braided shield. The data is transmitted in the form of analog signals that are converted into digital signals by network devices such as hubs or switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some older network hubs are designed to support coaxial cable connections. These hubs typically include a &lt;strong&gt;coax BNC&lt;/strong&gt; (&lt;strong&gt;Bayonet Neill-Concelman&lt;/strong&gt;) &lt;strong&gt;connector&lt;/strong&gt;, which is a type of connector that is commonly used with coaxial cables. The &lt;strong&gt;BNC connector&lt;/strong&gt; is a twist-lock connector that provides a secure and reliable connection between the coaxial cable and the hub:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs-repeaters-rg59-bnc.jpg&quot; alt=&quot;hubs repeaters rg59 bnc&quot; width=&quot;350&quot; height=&quot;209&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To connect a coaxial cable to a hub, the cable is first connected to the BNC connector on the hub using a coaxial BNC connector. The hub then amplifies and broadcasts the data signal to all connected devices on the network. However, as previously mentioned, hubs have largely been replaced by switches in modern networking, and coaxial cable connections are becoming less common.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Coaxial cable&lt;/strong&gt; was once a popular choice for networking because it is relatively inexpensive, easy to install, and can transmit data over long distances without significant signal loss. However, coaxial cable has several limitations that make it less desirable for modern networking. For example, coaxial cable has a lower bandwidth than other types of cables, such as twisted pair or fiber optic cables. This means that it can transmit data at slower speeds and may not be suitable for high-bandwidth applications.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/compex-8-port.jpg&quot; alt=&quot;compex-8-port&quot; width=&quot;420&quot; height=&quot;314&quot; title=&quot;Network hub with BNC connector&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Network Hub with BNC connector&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It's also worth noting that coaxial cable networks use &lt;strong&gt;50-ohm terminating resistors&lt;/strong&gt; to prevent signal reflections that can cause interference and degrade signal quality. When an electrical signal travels along a coaxial cable, it encounters impedance, which is the resistance to the flow of electrical current. If the cable is not properly terminated, the signal can reflect back towards the source and interfere with the original signal. This can cause signal distortion, attenuation, and loss of data.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/hubs-repeaters-terminating-resistors-50ohm.jpg&quot; alt=&quot;hubs repeaters terminating resistors 50ohm&quot; width=&quot;350&quot; height=&quot;140&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By adding a &lt;strong&gt;50-ohm terminating resistor&lt;/strong&gt; at the &lt;strong&gt;end of the cable&lt;/strong&gt;, the impedance is matched and the signal can be properly absorbed, preventing reflections. This helps to maintain signal integrity and improve overall network performance. The &lt;strong&gt;50-ohm terminating resistor&lt;/strong&gt; is designed to match the characteristic impedance of the coaxial cable, which is typically 50 ohms:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/coax-network.gif&quot; alt=&quot;coax-network&quot; width=&quot;567&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The coax cable can be up to &lt;strong&gt;185 meters long&lt;/strong&gt; and can contain no more than&lt;strong&gt; 30 nodes per segment&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;In this article we explained how hubs and repeaters operate within a network. We listed the main &lt;strong&gt;advantages&lt;/strong&gt; and &lt;strong&gt;disadvantages&lt;/strong&gt; of hubs and covered the three different type of hub devices: &lt;strong&gt;passive hubs&lt;/strong&gt;, &lt;strong&gt;active hubs&lt;/strong&gt; and &lt;strong&gt;intelligent hubs&lt;/strong&gt;. Finally we took a look at older &lt;strong&gt;coaxial-based networks&lt;/strong&gt; and talked about their limitations and components.&lt;/p&gt;
&lt;div id=&quot;_mcePaste&quot; class=&quot;mcePaste&quot; style=&quot;overflow: hidden; position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; text-align: justify;&quot;&gt;
&lt;table border=&quot;0&quot; style=&quot;width: 630px;&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot; align=&quot;center&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 783px;&quot; valign=&quot;top&quot;&gt;
&lt;h5 align=&quot;left&quot;&gt;Introduction&lt;/h5&gt;
&lt;p align=&quot;left&quot;&gt;Here we will talk about hubs and explain how they work. In the next section we will move to switches and how they differ from hubs, how they work and the types of switching methods that are available; we will also compare them.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Before we start there are a few definitions which I need to speak about so you can understand the terminology we will be using.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;color: #ff33ff;&quot;&gt;Domain&lt;/span&gt;: Defined as a geographical area or logical area (in our imagination) where anything in it becomes part of the domain. In computer land, this means that when something happens in this domain (area) every computer that's part of it will see or hear everything that happens in it.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;color: #00ffff;&quot;&gt;Collision Domain&lt;/span&gt;: Putting it simple, whenever a collision between two computers occurs, every other computer within the domain will hear and know about the collision. These computers are said to be in the same collision domain. As you're going to see later on, when computers connect together using a hub they become part of the same collision domain. This dosen't happen with switches.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;color: #00ff99;&quot;&gt;Broadcast Domain&lt;/span&gt;: A domain where every broadcast (a broadcast is a frame or data which is sent to every comeputer) is seen by all computers within the domain. Hubs and switches do not break up broadcast domains. You need a router to achieve this.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;There are different devices which can break-up collision domains and broadcast domains and make the network a lot faster and efficient. Switches create separate collision domains but not broadcast domains. Routers create separate broadcast and collision domains. Hubs are too simple to do either, can't create separate collision or broadcast domain.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;color: #9999ff;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Hubs &amp;amp; Repeaters &lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Hubs and repeaters are basically the same, so we will be using the term &quot;Hub&quot; to keep things simple. Hubs are common today in every network. They are the cheapest way to connect two or more computers together. Hubs are also known as &lt;em&gt;Repeaters&lt;/em&gt; and work on the first layer of the &lt;a href=&quot;https://www.firewall.cx/osi-intro.php&quot;&gt;OSI model&lt;/a&gt;. They are said to work on the first layer because of the function they perform. They don't read the data frames at all (like switches and routers do), they only make sure the frame is repeated out on each port and that's about it.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;The Nodes that share an &lt;a href=&quot;https://www.firewall.cx/ethernet-intro.php&quot;&gt;Ethernet&lt;/a&gt; or Fast Ethernet LAN using the CSMA/CD rules are said to be in the same &lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;em&gt;&lt;span style=&quot;color: #00ffff;&quot;&gt;collision domain&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;. In plain English, this means that all nodes connected to a hub are part of the same collision domain. In a Collision domain, when a collision occurs everyone in that domain/area will hear it and will be affected. The Ethernet section talks about CSMA/CD and collision domains since they are part of the rules under which Ethernet functions.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;The picture below shows a few hubs : 8 port Netgear and a D-link hub.&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 1px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 33px; height: 1px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 4px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 38px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 178px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 38px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td colspan=&quot;3&quot; rowspan=&quot;2&quot; valign=&quot;top&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/pictures/Dlinkhub.jpg&quot; alt=&quot;&quot; width=&quot;279&quot; height=&quot;124&quot; /&gt;&lt;/td&gt;
&lt;td style=&quot;width: 34px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 16px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style=&quot;width: 10px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;height: 128px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td colspan=&quot;3&quot; valign=&quot;top&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/pictures/en108tp.jpg&quot; alt=&quot;&quot; width=&quot;220&quot; height=&quot;124&quot; /&gt;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 169px;&quot; valign=&quot;top&quot;&gt;
&lt;p align=&quot;left&quot;&gt;The computers (nodes) connect to the hub using Unshielded Twisted Pair cable (UTP). Only one node can be connected to each port of the hub. The pictured hub has a total of 8 ports, which means up to 8 computers can be networked.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;When hubs were not that common and also expensive, most offices and home networks use to install coax cable.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;The way hubs work is quite simple and straightforward: When a computer on any one of the eight ports transmits data, this is replicated and sent out to the other seven ports. Check out the below picture which shows it clearly.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;height: 234px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td colspan=&quot;4&quot; valign=&quot;top&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/pictures/hubs.gif&quot; alt=&quot;&quot; width=&quot;456&quot; height=&quot;227&quot; /&gt;&lt;/td&gt;
&lt;td style=&quot;width: 39px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 303px;&quot; valign=&quot;top&quot;&gt;
&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;color: #ff0033;&quot;&gt;EXPLANATION: &lt;/span&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Node 1 is transmitting some data to Node 6 but all nodes are receiving the data as well. This data will be rejected by the rest of the nodes once they figure out it's not for them.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;This is accomplished by the node's network card reading the destination MAC address of the frame (data) it receives, it examines it and sees that it doesn't match with it's own and therefor discards the frame. Please see the Datalink layer in the &lt;a href=&quot;https://www.firewall.cx/osi-intro.php&quot;&gt;OSI section&lt;/a&gt; for more information on MAC addresses.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Most hubs these days also have a special port which can function as a normal port or as an &quot;uplink&quot; port. An uplink port allows you to connect another hub to the existing one, increasing the amount of ports which will be available to you. This is a cheap solution when you need to get a few more computers networked and it works quite well up to a point.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;This is how 2 eight port hubs would look when connected via the uplink port and how the data is replicated to all 16 ports :&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 227px;&quot; valign=&quot;top&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/pictures/diasy%20chained%20hubs.gif&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;198&quot; /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 200px;&quot; valign=&quot;top&quot;&gt;
&lt;p align=&quot;left&quot;&gt;In the above picture you can see that Node 1 is again transmitting data to Node 6 and that every other node connected to the hub is receiving the information. As we said, this is a pretty good and cheap solution, but as the network gets busier, you can clearly understand that there is going to be a lot of unecessary data flowing all over the network. All Nodes here are in the same broastcast and collision domain since they will hear every broadcast and collision that occurs.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;This is the same situation you get when you use coax cable, where every node or computer is connected onto the same cable and the data that's put onto it travels along the cable and is received by every computer.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;height: 245px;&quot; valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td colspan=&quot;7&quot; valign=&quot;top&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/pictures/COAX%20network.gif&quot; alt=&quot;&quot; width=&quot;567&quot; height=&quot;227&quot; /&gt;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;td valign=&quot;top&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;11&quot; style=&quot;height: 236px;&quot; valign=&quot;top&quot;&gt;
&lt;p align=&quot;left&quot;&gt;You probably also noticed the two orange boxes labled &quot;50 Ohm&quot;. These are called terminating resistors and are used on both ends of the coax cable so when the signal gets to them, it's absorbed by them and that way you don't get the signal reflecting back. Think of them as shock absorbent and the data signal is the shock wave which gets absorbed when it reaches the terminating resistors. The coax cable can be up to 185 meters and can contain no more than 30 nodes per segment. What you're looking at in the above picture is one segment 25 meters long with 4 nodes attached to it.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Now coming back to the hubs, there are a few standard features most of them have these include a link and activity LED for each port, a power LED and collision LED. Some hubs have separate link lights and activity lights, others combine them into one where the link light will flash when there is activity, otherwise it remains constantly on. The Netgear hub which is displayed at the beginning of this page has two separate LEDs for the activity and link but the Compex hub below has only one.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Securing Your Home Network </title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/secure-home-network.html"/>
		<published>2011-05-30T00:35:14+10:00</published>
		<updated>2011-05-30T00:35:14+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/secure-home-network.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/secure-home-network-intro.webp&quot; alt=&quot;Securing Your Home Network &quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/secure-home-network-intro.webp&quot; alt=&quot;Securing Your Home Network&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Securing Your Home Network&quot; /&gt;In today's world, &lt;strong&gt;securing your home network&lt;/strong&gt; is more important than ever. With the increasing number of &lt;strong&gt;cyberattacks&lt;/strong&gt;, &lt;strong&gt;data breaches&lt;/strong&gt;, and &lt;strong&gt;online frauds&lt;/strong&gt;, protecting your home network from &lt;strong&gt;potential threats&lt;/strong&gt; is crucial. A home network is a combination of devices such as &lt;strong&gt;routers&lt;/strong&gt;, &lt;strong&gt;modems&lt;/strong&gt;, &lt;strong&gt;computers&lt;/strong&gt;, &lt;strong&gt;smartphones&lt;/strong&gt;, and other &lt;strong&gt;smart devices&lt;/strong&gt; that are connected to the internet. This article will discuss the various methods to secure your home network, including &lt;strong&gt;antivirus software&lt;/strong&gt;, &lt;strong&gt;Windows file sharing&lt;/strong&gt;, &lt;strong&gt;personal firewall&lt;/strong&gt;, &lt;strong&gt;malware scanners&lt;/strong&gt;, &lt;strong&gt;secure Wi-Fi&lt;/strong&gt;, and other recommended methods.&lt;/p&gt;
&lt;h2&gt;Antivirus Software&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Antivirus software&lt;/strong&gt; is a crucial component in securing your home network from potential cyber threats. Antivirus software is designed to detect and remove malicious software, viruses, and other malware that can harm your computer and other devices connected to the network. It works by scanning files and programs on your computer and identifying any malicious code or suspicious activity.&lt;/p&gt;
&lt;p&gt;Antivirus software plays an important role in protecting your home network by preventing malware from infecting your devices and spreading to other devices on the network. It can also block potentially harmful websites and downloads, and alert you if you are about to access a dangerous website or download a harmful file.&lt;/p&gt;
&lt;p&gt;In addition to detecting and removing malware, antivirus software can also provide real-time protection against new and emerging threats. Many antivirus software options offer automatic updates to ensure that you are protected against the latest threats.&lt;/p&gt;
&lt;p&gt;However, it is important to choose a reputable antivirus software and keep it updated regularly to ensure the best protection. Antivirus software can only protect you against known threats, so it is important to keep it up-to-date to ensure that you are protected against new and emerging threats.&lt;/p&gt;
&lt;h2&gt;Windows File Sharing&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Windows file sharing&lt;/strong&gt; can play an important role in securing your home network by allowing you to share files and folders between multiple devices connected to the network. However, it is essential to ensure that file sharing is enabled only for authorized devices and users to prevent unauthorized access to your network.&lt;/p&gt;
&lt;p&gt;Setting up a password-protected user account and limiting the access to shared files and folders can help prevent unauthorized access to your network. It is also recommended to use encryption to secure your files and prevent them from being intercepted by unauthorized users.&lt;/p&gt;
&lt;p&gt;Another way to secure your file sharing is by enabling network discovery and file sharing only on private networks. This can be done in the advanced sharing settings of your Windows computer.&lt;/p&gt;
&lt;p&gt;In addition to securing your file sharing, it is important to also keep your devices and software up-to-date, use strong passwords, and enable two-factor authentication whenever possible. By taking these steps, you can further enhance the security of your home network and reduce the risk of cyberattacks and online fraud.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Windows file sharing&lt;/strong&gt; can be a useful tool in sharing files and folders between devices on your home network. However, it is important to ensure that file sharing is enabled only for authorized devices and users to prevent unauthorized access to your network. By taking additional steps to secure your file sharing, keeping your devices and software up-to-date, and using strong passwords, you can ensure the safety and security of your home network.&lt;/p&gt;
&lt;h2&gt;Personal Software Firewall&lt;/h2&gt;
&lt;p&gt;A &lt;strong&gt;personal software firewall&lt;/strong&gt; is a key component in securing your home network. It is designed to monitor and control the traffic that enters and exits your computer or device, allowing you to block unauthorized access and prevent malware from communicating with the outside world.&lt;/p&gt;
&lt;p&gt;A personal software firewall provides an additional layer of protection against cyberattacks by preventing unauthorized access to your computer or device. It works by analyzing the traffic that passes through it and blocking any incoming traffic that does not meet the specified rules and criteria.&lt;/p&gt;
&lt;p&gt;Personal software firewalls are especially important for devices that are constantly connected to the internet, such as routers, smartphones, and computers. They can prevent attackers from accessing your network and stealing sensitive information or installing malware on your devices.&lt;/p&gt;
&lt;p&gt;In addition to blocking unauthorized traffic, personal software firewalls can also alert you to suspicious activity and provide valuable information about the traffic that is passing through your network. This can help you identify potential threats and take steps to mitigate them.&lt;/p&gt;
&lt;p&gt;However, it is important to note that personal software firewalls are not a substitute for strong passwords, regular software updates, and other security measures. They should be used in conjunction with other security measures to provide comprehensive protection for your home network.&lt;/p&gt;
&lt;p&gt;Summarizing the above, a personal software firewall is a &lt;strong&gt;critical component&lt;/strong&gt; in &lt;strong&gt;securing your home network&lt;/strong&gt;. It provides an additional layer of protection against cyberattacks and prevents unauthorized access to your devices and sensitive information. By using a personal software firewall in conjunction with other security measures, you can ensure the safety and security of your home network.&lt;/p&gt;
&lt;h2&gt;Malware Scanners&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Malware scanners&lt;/strong&gt; are another important tool in securing your home network. Malware scanners are designed to detect and remove malware from your computer and other devices. They can also help prevent malware from spreading to other devices on your network. There are several malware scanner options available, including Malwarebytes and Spybot. It is important to keep your malware scanner updated and run regular scans to ensure maximum protection.&lt;/p&gt;
&lt;h2&gt;Secure Wi-Fi&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Secure Wi-Fi&lt;/strong&gt; is crucial in securing your home network. Wi-Fi is a convenient way to connect to the internet, but it can also be a potential security risk if not secured correctly. It is recommended to secure your Wi-Fi network with a strong password, WPA2 encryption, and a unique network name (SSID). Disabling WPS (Wi-Fi Protected Setup) and disabling guest access can also help increase your network's security.&lt;/p&gt;
&lt;p&gt;In addition to the methods mentioned above, there are several other ways to secure your home network. These include keeping your devices and software up-to-date, disabling remote access to your router, using a VPN (Virtual Private Network) for added security when accessing the internet, and enabling two-factor authentication (2FA) for online accounts. Two-factor authentication adds an extra layer of security to your online accounts by requiring a code in addition to your password.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;Securing your home network is essential in today's digital world. By following the methods mentioned above, you can ensure the safety and security of your devices and personal information. &lt;strong&gt;Antivirus software&lt;/strong&gt;, secure &lt;strong&gt;Windows file sharing&lt;/strong&gt;, &lt;strong&gt;personal firewall&lt;/strong&gt;, &lt;strong&gt;malware scanners&lt;/strong&gt;, &lt;strong&gt;secure Wi-Fi&lt;/strong&gt;, and other recommended methods are all important components in securing your home network. Remember to keep your devices and software up-to-date, use strong passwords, and enable two-factor authentication whenever possible. By taking these steps, you can protect your home network and reduce the risk of cyberattacks and online fraud.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/secure-home-network-intro.webp&quot; alt=&quot;Securing Your Home Network &quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/secure-home-network-intro.webp&quot; alt=&quot;Securing Your Home Network&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Securing Your Home Network&quot; /&gt;In today's world, &lt;strong&gt;securing your home network&lt;/strong&gt; is more important than ever. With the increasing number of &lt;strong&gt;cyberattacks&lt;/strong&gt;, &lt;strong&gt;data breaches&lt;/strong&gt;, and &lt;strong&gt;online frauds&lt;/strong&gt;, protecting your home network from &lt;strong&gt;potential threats&lt;/strong&gt; is crucial. A home network is a combination of devices such as &lt;strong&gt;routers&lt;/strong&gt;, &lt;strong&gt;modems&lt;/strong&gt;, &lt;strong&gt;computers&lt;/strong&gt;, &lt;strong&gt;smartphones&lt;/strong&gt;, and other &lt;strong&gt;smart devices&lt;/strong&gt; that are connected to the internet. This article will discuss the various methods to secure your home network, including &lt;strong&gt;antivirus software&lt;/strong&gt;, &lt;strong&gt;Windows file sharing&lt;/strong&gt;, &lt;strong&gt;personal firewall&lt;/strong&gt;, &lt;strong&gt;malware scanners&lt;/strong&gt;, &lt;strong&gt;secure Wi-Fi&lt;/strong&gt;, and other recommended methods.&lt;/p&gt;
&lt;h2&gt;Antivirus Software&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Antivirus software&lt;/strong&gt; is a crucial component in securing your home network from potential cyber threats. Antivirus software is designed to detect and remove malicious software, viruses, and other malware that can harm your computer and other devices connected to the network. It works by scanning files and programs on your computer and identifying any malicious code or suspicious activity.&lt;/p&gt;
&lt;p&gt;Antivirus software plays an important role in protecting your home network by preventing malware from infecting your devices and spreading to other devices on the network. It can also block potentially harmful websites and downloads, and alert you if you are about to access a dangerous website or download a harmful file.&lt;/p&gt;
&lt;p&gt;In addition to detecting and removing malware, antivirus software can also provide real-time protection against new and emerging threats. Many antivirus software options offer automatic updates to ensure that you are protected against the latest threats.&lt;/p&gt;
&lt;p&gt;However, it is important to choose a reputable antivirus software and keep it updated regularly to ensure the best protection. Antivirus software can only protect you against known threats, so it is important to keep it up-to-date to ensure that you are protected against new and emerging threats.&lt;/p&gt;
&lt;h2&gt;Windows File Sharing&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Windows file sharing&lt;/strong&gt; can play an important role in securing your home network by allowing you to share files and folders between multiple devices connected to the network. However, it is essential to ensure that file sharing is enabled only for authorized devices and users to prevent unauthorized access to your network.&lt;/p&gt;
&lt;p&gt;Setting up a password-protected user account and limiting the access to shared files and folders can help prevent unauthorized access to your network. It is also recommended to use encryption to secure your files and prevent them from being intercepted by unauthorized users.&lt;/p&gt;
&lt;p&gt;Another way to secure your file sharing is by enabling network discovery and file sharing only on private networks. This can be done in the advanced sharing settings of your Windows computer.&lt;/p&gt;
&lt;p&gt;In addition to securing your file sharing, it is important to also keep your devices and software up-to-date, use strong passwords, and enable two-factor authentication whenever possible. By taking these steps, you can further enhance the security of your home network and reduce the risk of cyberattacks and online fraud.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Windows file sharing&lt;/strong&gt; can be a useful tool in sharing files and folders between devices on your home network. However, it is important to ensure that file sharing is enabled only for authorized devices and users to prevent unauthorized access to your network. By taking additional steps to secure your file sharing, keeping your devices and software up-to-date, and using strong passwords, you can ensure the safety and security of your home network.&lt;/p&gt;
&lt;h2&gt;Personal Software Firewall&lt;/h2&gt;
&lt;p&gt;A &lt;strong&gt;personal software firewall&lt;/strong&gt; is a key component in securing your home network. It is designed to monitor and control the traffic that enters and exits your computer or device, allowing you to block unauthorized access and prevent malware from communicating with the outside world.&lt;/p&gt;
&lt;p&gt;A personal software firewall provides an additional layer of protection against cyberattacks by preventing unauthorized access to your computer or device. It works by analyzing the traffic that passes through it and blocking any incoming traffic that does not meet the specified rules and criteria.&lt;/p&gt;
&lt;p&gt;Personal software firewalls are especially important for devices that are constantly connected to the internet, such as routers, smartphones, and computers. They can prevent attackers from accessing your network and stealing sensitive information or installing malware on your devices.&lt;/p&gt;
&lt;p&gt;In addition to blocking unauthorized traffic, personal software firewalls can also alert you to suspicious activity and provide valuable information about the traffic that is passing through your network. This can help you identify potential threats and take steps to mitigate them.&lt;/p&gt;
&lt;p&gt;However, it is important to note that personal software firewalls are not a substitute for strong passwords, regular software updates, and other security measures. They should be used in conjunction with other security measures to provide comprehensive protection for your home network.&lt;/p&gt;
&lt;p&gt;Summarizing the above, a personal software firewall is a &lt;strong&gt;critical component&lt;/strong&gt; in &lt;strong&gt;securing your home network&lt;/strong&gt;. It provides an additional layer of protection against cyberattacks and prevents unauthorized access to your devices and sensitive information. By using a personal software firewall in conjunction with other security measures, you can ensure the safety and security of your home network.&lt;/p&gt;
&lt;h2&gt;Malware Scanners&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Malware scanners&lt;/strong&gt; are another important tool in securing your home network. Malware scanners are designed to detect and remove malware from your computer and other devices. They can also help prevent malware from spreading to other devices on your network. There are several malware scanner options available, including Malwarebytes and Spybot. It is important to keep your malware scanner updated and run regular scans to ensure maximum protection.&lt;/p&gt;
&lt;h2&gt;Secure Wi-Fi&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Secure Wi-Fi&lt;/strong&gt; is crucial in securing your home network. Wi-Fi is a convenient way to connect to the internet, but it can also be a potential security risk if not secured correctly. It is recommended to secure your Wi-Fi network with a strong password, WPA2 encryption, and a unique network name (SSID). Disabling WPS (Wi-Fi Protected Setup) and disabling guest access can also help increase your network's security.&lt;/p&gt;
&lt;p&gt;In addition to the methods mentioned above, there are several other ways to secure your home network. These include keeping your devices and software up-to-date, disabling remote access to your router, using a VPN (Virtual Private Network) for added security when accessing the internet, and enabling two-factor authentication (2FA) for online accounts. Two-factor authentication adds an extra layer of security to your online accounts by requiring a code in addition to your password.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;Securing your home network is essential in today's digital world. By following the methods mentioned above, you can ensure the safety and security of your devices and personal information. &lt;strong&gt;Antivirus software&lt;/strong&gt;, secure &lt;strong&gt;Windows file sharing&lt;/strong&gt;, &lt;strong&gt;personal firewall&lt;/strong&gt;, &lt;strong&gt;malware scanners&lt;/strong&gt;, &lt;strong&gt;secure Wi-Fi&lt;/strong&gt;, and other recommended methods are all important components in securing your home network. Remember to keep your devices and software up-to-date, use strong passwords, and enable two-factor authentication whenever possible. By taking these steps, you can protect your home network and reduce the risk of cyberattacks and online fraud.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>DoS &amp; DDoS Attacks</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/dos-attacks.html"/>
		<published>2011-05-30T00:16:20+10:00</published>
		<updated>2011-05-30T00:16:20+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/dos-attacks.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/dos-attacks-intro-v2.webp&quot; alt=&quot;DoS &amp;amp; DDoS Attacks&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/dos-attacks-intro.webp&quot; alt=&quot;DoS and DDoS attacks&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;DoS and DDoS attacks&quot; /&gt;A &lt;strong&gt;Denial of Service&lt;/strong&gt; (&lt;strong&gt;DoS&lt;/strong&gt;) &lt;strong&gt;attack&lt;/strong&gt; is a malicious attempt to disrupt the normal functioning of a website, server or network by flooding it with traffic or overloading its resources. The aim of such an attack is to make the targeted system unavailable to legitimate users, resulting in a denial of service.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;Distributed Denial of Service&lt;/strong&gt; (&lt;strong&gt;DDoS&lt;/strong&gt;) &lt;strong&gt;attack&lt;/strong&gt; is a type of &lt;strong&gt;DoS attack&lt;/strong&gt; that is carried out by &lt;strong&gt;multiple devices&lt;/strong&gt;, such as &lt;strong&gt;computers&lt;/strong&gt; or &lt;strong&gt;smartphones&lt;/strong&gt;, that are coordinated by a single attacker or group of attackers. This type of attack is more sophisticated and difficult to mitigate because it originates from a large number of sources, making it challenging to identify and block the attacking traffic. &lt;strong&gt;DDoS attacks&lt;/strong&gt; can be launched using a variety of techniques, including &lt;strong&gt;botnets&lt;/strong&gt;, &lt;strong&gt;amplification attacks&lt;/strong&gt;, and &lt;strong&gt;application-layer attacks&lt;/strong&gt;. These attacks have become a significant threat to businesses, organizations, and individuals as they can cause significant financial losses, reputational damage, and even result in the loss of sensitive data. Therefore, it is essential to implement robust security measures to protect against these attacks.&lt;/p&gt;
&lt;h2&gt;Denial of Service Attacks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;strong&gt;Denial of Service (DoS) attacks&lt;/strong&gt; can be a serious federal crime with penalties that include years of imprisonment and many countries have laws that attempt to protect against this. At the very least, offenders routinely lose their Internet Service Provider (ISP) accounts, get suspended if school resources are involved, etc.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;There are two types of &lt;strong&gt;DoS attacks&lt;/strong&gt;:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Application-based attacks&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network-based attacks&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Let's take a closer look at each type of attack.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Application-based Attacks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These attacks target the applications or services running on a system, such as a &lt;strong&gt;web server&lt;/strong&gt; or &lt;strong&gt;database&lt;/strong&gt;, with the aim of &lt;strong&gt;overloading&lt;/strong&gt; them or &lt;strong&gt;exploiting vulnerabilities&lt;/strong&gt; to crash the system. Some examples of application-based attacks include &lt;strong&gt;HTTP flooding&lt;/strong&gt;, where the attacker sends a large number of &lt;strong&gt;HTTP requests&lt;/strong&gt; to the target, or &lt;strong&gt;buffer overflow attacks&lt;/strong&gt;, where the attacker &lt;strong&gt;exploits a vulnerability in the application&lt;/strong&gt; to overload the system's memory.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Developers, Security engineers and Cybersecurity specilists often use special software such as &lt;a href=&quot;https://www.firewall.cx/security/web-application-vulnerability-scanners.html&quot; target=&quot;_blank&quot; title=&quot;Web Application Vulnerability Scanners&quot;&gt;Web Application Vulnerability Scanners&lt;/a&gt; to scan and identify &lt;strong&gt;application-level vulnerabilities&lt;/strong&gt;, and patch them before hackers find and exploit them.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Networking Attacks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These attacks target the &lt;strong&gt;network infrastructure&lt;/strong&gt; of a system, such as &lt;strong&gt;routers&lt;/strong&gt;, &lt;strong&gt;switches&lt;/strong&gt;, or &lt;strong&gt;firewalls&lt;/strong&gt;, with the aim of overwhelming them with traffic. This can be achieved through techniques such as &lt;strong&gt;flooding&lt;/strong&gt;, where the attacker sends a large number of packets to the target, or through a &lt;strong&gt;ping flood&lt;/strong&gt;, where the attacker sends a large number of &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/icmp-protocol&quot; target=&quot;_blank&quot; title=&quot;ICMP Echo requests&quot;&gt;ping requests&lt;/a&gt; to the target, causing it to become unresponsive. Other flooding methods include &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;UDP to TCP Syn packets&quot;&gt;UDP or TCP SYN&lt;/a&gt; packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Spoofing attacks&lt;/strong&gt; involve the attacker disguising their &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol.html&quot; target=&quot;_blank&quot; title=&quot;IP address&quot;&gt;IP address&lt;/a&gt; to make it appear as if the attack is coming from a different source. This technique can be used to bypass filters and access control mechanisms, making it difficult for defenders to trace the source of the attack.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Amplification attacks&lt;/strong&gt; are a more sophisticated type of &lt;strong&gt;network-based DoS attack&lt;/strong&gt;. In these attacks, the attacker exploits a vulnerability in a third-party system to generate a large amount of traffic and direct it to the target system. This can be achieved through techniques such as &lt;strong&gt;DNS amplification&lt;/strong&gt;, &lt;strong&gt;NTP amplification&lt;/strong&gt;, or &lt;strong&gt;SNMP reflection&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Defending against &lt;strong&gt;network-based DoS attacks&lt;/strong&gt; requires a multi-layered approach that includes &lt;a href=&quot;https://www.firewall.cx/security/palo-alto-networks.html&quot; target=&quot;_blank&quot; title=&quot;firewalls&quot;&gt;&lt;strong&gt;firewalls&lt;/strong&gt;&lt;/a&gt;, &lt;strong&gt;intrusion detection systems&lt;/strong&gt;, and &lt;strong&gt;traffic filtering&lt;/strong&gt;. Additionally, organizations can use techniques such as &lt;strong&gt;rate-limiting&lt;/strong&gt;, &lt;strong&gt;blacklisting&lt;/strong&gt;, and &lt;strong&gt;IP blocking&lt;/strong&gt; to mitigate the effects of these attacks. Regular security audits and updates to network devices and software can also help reduce the risk of &lt;strong&gt;network-based DoS attacks&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Distributed Denial-of-Service&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A &lt;strong&gt;distributed denial-of-service&lt;/strong&gt; (&lt;strong&gt;DDoS&lt;/strong&gt;) &lt;strong&gt;attack&lt;/strong&gt; is similair to the &lt;strong&gt;DoS attack&lt;/strong&gt; described above, but involves a multitude of compromised systems which attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A hacker (or, if you prefer, cracker) begins a &lt;strong&gt;DDoS attack&lt;/strong&gt; by exploiting a vulnerability in one computer system and making it the DDoS &quot;master.&quot; It is from the master system that the intruder identifies and communicates with other systems that can be compromised. The intruder loads cracking tools available on the Internet on multiple -- sometimes thousands of -- compromised systems. With a &lt;strong&gt;single command&lt;/strong&gt;, the intruder instructs the controlled machines to launch one of many flood attacks against a specified target. The result of these packets which are sent to the target causes a &lt;strong&gt;denial of service&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/dos-attacks-ddos-example.jpg&quot; alt=&quot;DDoS attack example&quot; width=&quot;650&quot; height=&quot;432&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;DDoS attack example&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;While the press tends to focus on the target of DDoS attacks as the victim, in reality there are many victims in a DDoS attack -- the final target and as well the systems controlled by the intruder.&lt;/p&gt;
&lt;h2&gt;Implications of DoS and DDoS attacks&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Denial of Service (DoS) attacks&lt;/strong&gt; can have severe implications on organizations, including &lt;strong&gt;financial losses&lt;/strong&gt;, &lt;strong&gt;reputational damage&lt;/strong&gt;, and &lt;strong&gt;disruption of business operations&lt;/strong&gt;. Some of the main implications of a DoS attack include:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Revenue loss&lt;/strong&gt;: If an organization's website or online services are unavailable due to a DoS attack, it can result in revenue loss. This is particularly true for e-commerce businesses that rely on their online presence to generate sales.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Damage to reputation&lt;/strong&gt;: A DoS attack can damage an organization's reputation, especially if it results in prolonged downtime or data breaches. Customers may lose trust in the organization's ability to protect their data and may choose to take their business elsewhere.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Business disruption&lt;/strong&gt;: DoS attacks can disrupt business operations, causing significant delays and downtime. This can affect the productivity of employees and disrupt the supply chain, leading to additional losses.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data loss or theft&lt;/strong&gt;: In some cases, DoS attacks can be a smokescreen for more sophisticated attacks such as data theft. Attackers can use the DoS attack to distract security personnel while they attempt to steal sensitive data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Legal and regulatory consequences&lt;/strong&gt;: If an organization is unable to protect its customers' data, it can face legal and regulatory consequences, such as fines or legal action.&lt;/p&gt;
&lt;p&gt;It is crucial for organizations to have robust security measures in place to protect against &lt;strong&gt;DoS attacks&lt;/strong&gt;, such as &lt;strong&gt;firewalls&lt;/strong&gt;, &lt;strong&gt;intrusion detection systems&lt;/strong&gt;, and &lt;strong&gt;regular security audits&lt;/strong&gt;. In addition, organizations should have a contingency plan in place to ensure business continuity in the event of a &lt;strong&gt;DoS attack&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/dos-attacks-intro-v2.webp&quot; alt=&quot;DoS &amp;amp; DDoS Attacks&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/dos-attacks-intro.webp&quot; alt=&quot;DoS and DDoS attacks&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;DoS and DDoS attacks&quot; /&gt;A &lt;strong&gt;Denial of Service&lt;/strong&gt; (&lt;strong&gt;DoS&lt;/strong&gt;) &lt;strong&gt;attack&lt;/strong&gt; is a malicious attempt to disrupt the normal functioning of a website, server or network by flooding it with traffic or overloading its resources. The aim of such an attack is to make the targeted system unavailable to legitimate users, resulting in a denial of service.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;Distributed Denial of Service&lt;/strong&gt; (&lt;strong&gt;DDoS&lt;/strong&gt;) &lt;strong&gt;attack&lt;/strong&gt; is a type of &lt;strong&gt;DoS attack&lt;/strong&gt; that is carried out by &lt;strong&gt;multiple devices&lt;/strong&gt;, such as &lt;strong&gt;computers&lt;/strong&gt; or &lt;strong&gt;smartphones&lt;/strong&gt;, that are coordinated by a single attacker or group of attackers. This type of attack is more sophisticated and difficult to mitigate because it originates from a large number of sources, making it challenging to identify and block the attacking traffic. &lt;strong&gt;DDoS attacks&lt;/strong&gt; can be launched using a variety of techniques, including &lt;strong&gt;botnets&lt;/strong&gt;, &lt;strong&gt;amplification attacks&lt;/strong&gt;, and &lt;strong&gt;application-layer attacks&lt;/strong&gt;. These attacks have become a significant threat to businesses, organizations, and individuals as they can cause significant financial losses, reputational damage, and even result in the loss of sensitive data. Therefore, it is essential to implement robust security measures to protect against these attacks.&lt;/p&gt;
&lt;h2&gt;Denial of Service Attacks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;strong&gt;Denial of Service (DoS) attacks&lt;/strong&gt; can be a serious federal crime with penalties that include years of imprisonment and many countries have laws that attempt to protect against this. At the very least, offenders routinely lose their Internet Service Provider (ISP) accounts, get suspended if school resources are involved, etc.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;There are two types of &lt;strong&gt;DoS attacks&lt;/strong&gt;:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Application-based attacks&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network-based attacks&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Let's take a closer look at each type of attack.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Application-based Attacks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These attacks target the applications or services running on a system, such as a &lt;strong&gt;web server&lt;/strong&gt; or &lt;strong&gt;database&lt;/strong&gt;, with the aim of &lt;strong&gt;overloading&lt;/strong&gt; them or &lt;strong&gt;exploiting vulnerabilities&lt;/strong&gt; to crash the system. Some examples of application-based attacks include &lt;strong&gt;HTTP flooding&lt;/strong&gt;, where the attacker sends a large number of &lt;strong&gt;HTTP requests&lt;/strong&gt; to the target, or &lt;strong&gt;buffer overflow attacks&lt;/strong&gt;, where the attacker &lt;strong&gt;exploits a vulnerability in the application&lt;/strong&gt; to overload the system's memory.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Developers, Security engineers and Cybersecurity specilists often use special software such as &lt;a href=&quot;https://www.firewall.cx/security/web-application-vulnerability-scanners.html&quot; target=&quot;_blank&quot; title=&quot;Web Application Vulnerability Scanners&quot;&gt;Web Application Vulnerability Scanners&lt;/a&gt; to scan and identify &lt;strong&gt;application-level vulnerabilities&lt;/strong&gt;, and patch them before hackers find and exploit them.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Networking Attacks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These attacks target the &lt;strong&gt;network infrastructure&lt;/strong&gt; of a system, such as &lt;strong&gt;routers&lt;/strong&gt;, &lt;strong&gt;switches&lt;/strong&gt;, or &lt;strong&gt;firewalls&lt;/strong&gt;, with the aim of overwhelming them with traffic. This can be achieved through techniques such as &lt;strong&gt;flooding&lt;/strong&gt;, where the attacker sends a large number of packets to the target, or through a &lt;strong&gt;ping flood&lt;/strong&gt;, where the attacker sends a large number of &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/icmp-protocol&quot; target=&quot;_blank&quot; title=&quot;ICMP Echo requests&quot;&gt;ping requests&lt;/a&gt; to the target, causing it to become unresponsive. Other flooding methods include &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;UDP to TCP Syn packets&quot;&gt;UDP or TCP SYN&lt;/a&gt; packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Spoofing attacks&lt;/strong&gt; involve the attacker disguising their &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol.html&quot; target=&quot;_blank&quot; title=&quot;IP address&quot;&gt;IP address&lt;/a&gt; to make it appear as if the attack is coming from a different source. This technique can be used to bypass filters and access control mechanisms, making it difficult for defenders to trace the source of the attack.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Amplification attacks&lt;/strong&gt; are a more sophisticated type of &lt;strong&gt;network-based DoS attack&lt;/strong&gt;. In these attacks, the attacker exploits a vulnerability in a third-party system to generate a large amount of traffic and direct it to the target system. This can be achieved through techniques such as &lt;strong&gt;DNS amplification&lt;/strong&gt;, &lt;strong&gt;NTP amplification&lt;/strong&gt;, or &lt;strong&gt;SNMP reflection&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Defending against &lt;strong&gt;network-based DoS attacks&lt;/strong&gt; requires a multi-layered approach that includes &lt;a href=&quot;https://www.firewall.cx/security/palo-alto-networks.html&quot; target=&quot;_blank&quot; title=&quot;firewalls&quot;&gt;&lt;strong&gt;firewalls&lt;/strong&gt;&lt;/a&gt;, &lt;strong&gt;intrusion detection systems&lt;/strong&gt;, and &lt;strong&gt;traffic filtering&lt;/strong&gt;. Additionally, organizations can use techniques such as &lt;strong&gt;rate-limiting&lt;/strong&gt;, &lt;strong&gt;blacklisting&lt;/strong&gt;, and &lt;strong&gt;IP blocking&lt;/strong&gt; to mitigate the effects of these attacks. Regular security audits and updates to network devices and software can also help reduce the risk of &lt;strong&gt;network-based DoS attacks&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Distributed Denial-of-Service&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A &lt;strong&gt;distributed denial-of-service&lt;/strong&gt; (&lt;strong&gt;DDoS&lt;/strong&gt;) &lt;strong&gt;attack&lt;/strong&gt; is similair to the &lt;strong&gt;DoS attack&lt;/strong&gt; described above, but involves a multitude of compromised systems which attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A hacker (or, if you prefer, cracker) begins a &lt;strong&gt;DDoS attack&lt;/strong&gt; by exploiting a vulnerability in one computer system and making it the DDoS &quot;master.&quot; It is from the master system that the intruder identifies and communicates with other systems that can be compromised. The intruder loads cracking tools available on the Internet on multiple -- sometimes thousands of -- compromised systems. With a &lt;strong&gt;single command&lt;/strong&gt;, the intruder instructs the controlled machines to launch one of many flood attacks against a specified target. The result of these packets which are sent to the target causes a &lt;strong&gt;denial of service&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/dos-attacks-ddos-example.jpg&quot; alt=&quot;DDoS attack example&quot; width=&quot;650&quot; height=&quot;432&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;DDoS attack example&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;While the press tends to focus on the target of DDoS attacks as the victim, in reality there are many victims in a DDoS attack -- the final target and as well the systems controlled by the intruder.&lt;/p&gt;
&lt;h2&gt;Implications of DoS and DDoS attacks&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Denial of Service (DoS) attacks&lt;/strong&gt; can have severe implications on organizations, including &lt;strong&gt;financial losses&lt;/strong&gt;, &lt;strong&gt;reputational damage&lt;/strong&gt;, and &lt;strong&gt;disruption of business operations&lt;/strong&gt;. Some of the main implications of a DoS attack include:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Revenue loss&lt;/strong&gt;: If an organization's website or online services are unavailable due to a DoS attack, it can result in revenue loss. This is particularly true for e-commerce businesses that rely on their online presence to generate sales.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Damage to reputation&lt;/strong&gt;: A DoS attack can damage an organization's reputation, especially if it results in prolonged downtime or data breaches. Customers may lose trust in the organization's ability to protect their data and may choose to take their business elsewhere.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Business disruption&lt;/strong&gt;: DoS attacks can disrupt business operations, causing significant delays and downtime. This can affect the productivity of employees and disrupt the supply chain, leading to additional losses.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data loss or theft&lt;/strong&gt;: In some cases, DoS attacks can be a smokescreen for more sophisticated attacks such as data theft. Attackers can use the DoS attack to distract security personnel while they attempt to steal sensitive data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Legal and regulatory consequences&lt;/strong&gt;: If an organization is unable to protect its customers' data, it can face legal and regulatory consequences, such as fines or legal action.&lt;/p&gt;
&lt;p&gt;It is crucial for organizations to have robust security measures in place to protect against &lt;strong&gt;DoS attacks&lt;/strong&gt;, such as &lt;strong&gt;firewalls&lt;/strong&gt;, &lt;strong&gt;intrusion detection systems&lt;/strong&gt;, and &lt;strong&gt;regular security audits&lt;/strong&gt;. In addition, organizations should have a contingency plan in place to ensure business continuity in the event of a &lt;strong&gt;DoS attack&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Next-Gen Firewalls &amp; Topologies. Designing &amp; Building DMZs. Concepts, Best Practices &amp; Tips</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/firewall-topologies-dmz-zone.html"/>
		<published>2011-05-29T23:42:43+10:00</published>
		<updated>2011-05-29T23:42:43+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/firewall-topologies-dmz-zone.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/firewall-dmz-zone/firewall-dmz-zone-intro.webp&quot; alt=&quot;Next-Gen Firewalls, DMZ Zones, operation, topologies, design and more&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/firewall-dmz-zone-intro.webp&quot; alt=&quot;firewall dmz zone&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;firewall dmz zone&quot; /&gt;&lt;strong&gt;Next-generation firewalls&lt;/strong&gt; (NGFWs)&lt;/strong&gt; and &lt;strong&gt;DMZ zones&lt;/strong&gt; are &lt;strong&gt;two critical components&lt;/strong&gt; of &lt;strong&gt;network security&lt;/strong&gt; that work hand in hand to &lt;strong&gt;protect&lt;/strong&gt; an organization's &lt;strong&gt;network&lt;/strong&gt; from &lt;strong&gt;external threats&lt;/strong&gt;. &lt;strong&gt;Firewalls&lt;/strong&gt; act as a barrier between the &lt;strong&gt;internal network&lt;/strong&gt; and the external world, &lt;strong&gt;filtering traffic&lt;/strong&gt; and &lt;strong&gt;preventing unauthorized access&lt;/strong&gt;. A &lt;strong&gt;DMZ zone&lt;/strong&gt; provides an extra layer of protection by &lt;strong&gt;segregating public-facing servers&lt;/strong&gt; from the internal network, making it harder for attackers to gain access to critical systems.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The combination of &lt;strong&gt;firewalls&lt;/strong&gt; and &lt;strong&gt;DMZ zones&lt;/strong&gt; helps to &lt;strong&gt;reduce the attack surface&lt;/strong&gt; of an organization's network, making it more difficult for attackers to exploit vulnerabilities and gain access to critical systems. Together, these technologies provide an effective defense against external threats and ensure that an organization's network remains secure.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Key topics covered in this article:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#next-gen-firewalls&quot; title=&quot;Next-Generation Firewalls&quot;&gt;Next-Generation Firewalls&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#role-importance-dmz&quot; title=&quot;The Role and Importance of DMZ Zones&quot;&gt;The Role and Importance of DMZ Zones&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#dmz-design&quot; title=&quot;DMZ Design and Operating Recommendations&quot;&gt;DMZ Design and Operating Recommendations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#firewall-topologies&quot; title=&quot;Firewall Topologies&quot;&gt;Firewall Topologies&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Dual-Homed Firewall&lt;/li&gt;
&lt;li&gt;Three-Legged Firewall&lt;/li&gt;
&lt;li&gt;Dual-Firewalls or Screened Subnets&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;next-gen-firewalls&quot;&gt;Next-Generation Firewalls&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Next-generation firewalls&lt;/strong&gt; (NGFWs) are an evolution of traditional firewalls, offering advanced features that enable more comprehensive security for modern networks. &lt;strong&gt;NGFWs&lt;/strong&gt; go beyond the traditional firewall's simple packet filtering and provide advanced security features such as intrusion detection and prevention, web filtering, application control, and deep packet inspection.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While both&lt;strong&gt; Cisco&lt;/strong&gt; and &lt;strong&gt;Palo Alto&lt;/strong&gt; provide NGFW products and services, Palo Alto has taken the lead with its NGFW products thanks to their intuitive interface, ease of management and brilliant design. Cisco's attempt to enter the NGFW market was a bumpy ride as they purchase the opensource SourceFire project and integrated it into their ASA Firewall products to produce the known &lt;strong&gt;FirePower Next-Gen firewalls&lt;/strong&gt;. Cisco next came out with their Firepower series firewall appliances.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-firewalls.html&quot; target=&quot;_blank&quot; title=&quot;Cisco's Firepower NGFW&quot;&gt;Cisco's Firepower NGFW&lt;/a&gt; provides a comprehensive set of security features that are integrated with &lt;strong&gt;Cisco's Advanced Malware Protection&lt;/strong&gt; (&lt;strong&gt;AMP&lt;/strong&gt;) technology. This integration enables the &lt;strong&gt;Firepower NGFW&lt;/strong&gt; to &lt;strong&gt;detect&lt;/strong&gt; and &lt;strong&gt;block advanced threats&lt;/strong&gt;, including &lt;strong&gt;malware&lt;/strong&gt; and &lt;strong&gt;ransomware&lt;/strong&gt;, with &lt;strong&gt;advanced threat intelligence&lt;/strong&gt; capabilities.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/cisco-firepower-2100-series.jpg&quot; alt=&quot;cisco firepower 2100 series&quot; width=&quot;500&quot; height=&quot;101&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;cisco firepower 2100 series&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Cisco Firepower 2100 series appliance&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/security/palo-alto-networks.html&quot; target=&quot;_blank&quot; title=&quot;Palo Alto's NGFW&quot;&gt;Palo Alto's NGFW&lt;/a&gt;, the &lt;strong&gt;Palo Alto Networks Security Operating&lt;/strong&gt; (&lt;strong&gt;PANOS&lt;/strong&gt;) platform, uses a unique approach to security called&amp;nbsp;&lt;strong&gt;Zero Trust&lt;/strong&gt;, which assumes that &lt;strong&gt;no user or device can be trusted by default&lt;/strong&gt;. It includes features such as &lt;strong&gt;policy-based segmentation&lt;/strong&gt;, which &lt;strong&gt;isolates network segments&lt;/strong&gt; and provides &lt;strong&gt;granular control&lt;/strong&gt; over access to resources. It also includes &lt;strong&gt;advanced threat detection capabilities&lt;/strong&gt; using machine learning algorithms and AI-based threat analysis.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/palo-alto-5400-series-firewall.jpg&quot; alt=&quot;palo alto 5400 series firewall&quot; width=&quot;540&quot; height=&quot;155&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;palo alto 5400 series firewall&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Palo Alto Next-Gen 5400 series appliance&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Both &lt;strong&gt;Cisco&lt;/strong&gt; and &lt;strong&gt;Palo Alto's NGFWs&lt;/strong&gt; provide &lt;strong&gt;centralized management&lt;/strong&gt; and reporting, making it easier for security teams to manage and monitor security policies across their networks. They also support integration with other security solutions, such as endpoint protection and &lt;strong&gt;security information and event management&lt;/strong&gt; (&lt;strong&gt;SIEM&lt;/strong&gt;) tools.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Don't forget to check out our popular &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-firewalls.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Firewall section&quot;&gt;Cisco Firewall&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/security/palo-alto-networks.html&quot; target=&quot;_blank&quot; title=&quot;Palo Alto Firewall section&quot;&gt;Palo Alto Firewall&lt;/a&gt; section where you'll find technical how-to articles covering &lt;strong&gt;firewall security&lt;/strong&gt; and &lt;strong&gt;DMZ&lt;/strong&gt; topics.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;role-importance-dmz&quot;&gt;The Role &amp;amp; Importance of a DMZ&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Demilitarized Zone&lt;/strong&gt;, or &lt;strong&gt;DMZ&lt;/strong&gt;, is an expression that comes from the Korean War. There, it meant a strip of land forcibly kept clear of enemy soldiers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The importance of a &lt;strong&gt;DMZ&lt;/strong&gt; cannot be overstated, as it serves as a crucial barrier that &lt;strong&gt;limits&lt;/strong&gt; the impact of a security breach on an organization's internal network. If a hacker were to breach the perimeter security of a company's network, they would first encounter the DMZ. The DMZ serves as a &lt;strong&gt;safe area&lt;/strong&gt; where &lt;strong&gt;public-facing servers&lt;/strong&gt; are &lt;strong&gt;isolated&lt;/strong&gt;, &lt;strong&gt;reducing&lt;/strong&gt; the &lt;strong&gt;risk of a security breach&lt;/strong&gt; impacting sensitive data on the internal network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The example below shows how a public-facing web server is &lt;strong&gt;securely isolated&lt;/strong&gt; inside a DMZ. The web server is protected by two sets of firewalls that limit access to it, and increase network security by providing &lt;strong&gt;inspection&lt;/strong&gt; and &lt;strong&gt;advanced threat detection services&lt;/strong&gt;. The CMS's built-in &lt;strong&gt;web application firewall&lt;/strong&gt; protects against unknown &lt;a href=&quot;https://www.firewall.cx/security/web-application-vulnerability-scanners.html&quot; target=&quot;_blank&quot; title=&quot;web application vulnerabilities&quot;&gt;web application vulnerabilities&lt;/a&gt; and blocks malicious requests that managed to evade the front-end firewalls:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/firewall-dmz-zone-diagram.jpg&quot; alt=&quot;firewall dmz zone diagram&quot; width=&quot;800&quot; height=&quot;333&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;firewall dmz zone diagram&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Additionally, a DMZ helps &lt;strong&gt;reduce the attack surface&lt;/strong&gt; of the network by &lt;strong&gt;limiting access&lt;/strong&gt; to critical systems. By keeping the public-facing servers in a separate network segment, it's easier to manage access control and apply stricter security policies. This way, even if a hacker gains access to the DMZ, they won't necessarily have access to sensitive information or control over critical systems.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another &lt;strong&gt;advantage&lt;/strong&gt; of a &lt;strong&gt;DMZ&lt;/strong&gt; is that it provides flexibility to IT administrators to &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/manageengine/opmanager-network-management/network-management-system-bandwidth-utilization-opmanager.html&quot; target=&quot;_blank&quot; title=&quot;manage and monitor the network&quot;&gt;manage and monitor the network&lt;/a&gt;. A DMZ allows administrators to configure different security policies for &lt;strong&gt;internal&lt;/strong&gt; and &lt;strong&gt;external&lt;/strong&gt; networks. This means that administrators can have more control over who has access to specific resources, and it can be easier to detect and &lt;strong&gt;block suspicious network activity&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In summary, the importance of a DMZ cannot be overstated in today's world where cyber-attacks are becoming more sophisticated and frequent. A DMZ helps to &lt;strong&gt;protect&lt;/strong&gt; an organization's &lt;strong&gt;internal network&lt;/strong&gt; from &lt;strong&gt;external threats&lt;/strong&gt; and &lt;strong&gt;reduces the risk&lt;/strong&gt; of sensitive information being &lt;strong&gt;compromised&lt;/strong&gt;. It provides administrators with a more secure and manageable network environment and limits the attack surface, making it harder for attackers to penetrate an organization's network. For these reasons, a DMZ is a critical component of any organization's network security strategy.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;dmz-design&quot;&gt;DMZ Design and Operating Recommendations&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Designing and operating a DMZ requires careful &lt;strong&gt;planning&lt;/strong&gt;, &lt;strong&gt;configuration&lt;/strong&gt;, and &lt;strong&gt;management&lt;/strong&gt;. Below are tips that can help organizations ensure their DMZ is properly configured and managed to provide the best level of protection for their network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1. &lt;strong&gt;Define the DMZ network&lt;/strong&gt;: The first step in setting up a DMZ is to define the &lt;strong&gt;network segments&lt;/strong&gt; and the servers that will be hosted in the DMZ. This includes identifying the public-facing servers and their respective security policies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2. &lt;strong&gt;Implement proper network segmentation&lt;/strong&gt;: Proper network segmentation is critical in preventing unauthorized access to the internal network. Ensure that network segments are isolated and that access controls are implemented to restrict traffic flow between the DMZ and the internal network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3. &lt;strong&gt;Use proper network security controls&lt;/strong&gt;: Deploy appropriate security controls to prevent unauthorized access and attacks on public-facing servers in the DMZ. This includes implementing firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4. &lt;strong&gt;Regularly update and patch servers&lt;/strong&gt;: Ensure that all servers in the DMZ are up to date with the latest software updates and security patches. This helps to prevent known vulnerabilities from being exploited by attackers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5. &lt;strong&gt;Monitor network traffic&lt;/strong&gt;: Regularly &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/manageengine/opmanager-network-management/network-management-system-bandwidth-utilization-opmanager.html&quot; target=&quot;_blank&quot; title=&quot;monitor network traffic&quot;&gt;monitor network traffic&lt;/a&gt; to detect any suspicious activity that may indicate an attack. This includes monitoring logs from firewalls and IDS/IPS systems.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;6. &lt;strong&gt;Implement strict access controls&lt;/strong&gt;: Implement strict access controls to restrict access to the DMZ and public-facing servers. This includes implementing two-factor authentication, restricting administrative access, and using secure protocols like &lt;a href=&quot;https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#how-ssl-works&quot; target=&quot;_blank&quot; title=&quot;How SSL/TLS Works&quot;&gt;SSL/TLS&lt;/a&gt; for server access.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;7. &lt;strong&gt;Implement proper backup and recovery procedures&lt;/strong&gt;: Implement proper backup and recovery procedures to ensure that in the event of a security breach, data can be restored quickly and efficiently.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;firewall-topologies&quot;&gt;Firewall Topologies&lt;/a&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Firewall topologies&lt;/strong&gt; refer to the different ways in which firewalls can be deployed within a network. There are several &lt;strong&gt;common firewall topologies&lt;/strong&gt;, each with its own &lt;strong&gt;advantages&lt;/strong&gt; and &lt;strong&gt;disadvantages&lt;/strong&gt;. It is important to understand that there is no one-size-fits-all answer to which is the best firewall topology since this depends on the organization's specific security needs, including the size and complexity of the network, the level of security required, and the resources available for configuration and management.&lt;/p&gt;
&lt;p&gt;Let's now take a look at the most common firewall topologies and discuss the advantages and disadvantes of each.&lt;/p&gt;
&lt;h4&gt;Dual-Homed Firewall&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is a simple topology where a firewall with &lt;strong&gt;two interfaces&lt;/strong&gt; has one connected to the &lt;strong&gt;untrusted&lt;/strong&gt; network (internet) and the other to the &lt;strong&gt;internal&lt;/strong&gt; network. &lt;strong&gt;Dual-homed&lt;/strong&gt; topologies are mostly used by small businesses because of their simplified design, complexity and low cost to maintain.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/dual-homed-firewall.jpg&quot; alt=&quot;Dual-homed Firewall&quot; width=&quot;752&quot; height=&quot;253&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Dual-homed Firewall&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You'll quickly notice the absence of a &lt;strong&gt;DMZ zone&lt;/strong&gt; on a &lt;strong&gt;dual-homed firewall&lt;/strong&gt;, making this firewall topology unsuitable to provide any protection for public-facing servers, such as web servers or email servers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What we often see, when there is a need to access an internal resource from the Internet,&lt;strong&gt; Destination Network Address Translation (DNAT)&lt;/strong&gt; is configured on the firewall, to allow hosts from the untrusted network (internet) directly access an internal host:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/dual-homed-firewall-port-forwarding.jpg&quot; alt=&quot;Dual-homed Firewall with port forwarding - DNAT&quot; width=&quot;750&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Dual-homed Firewall with port forwarding - DNAT&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Regrettably, numerous businesses lack awareness of the security hazards associated with such practices, which frequently lead to their appearance on the front page of IT news.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to note that &lt;strong&gt;dual-homed firewall&lt;/strong&gt; setup provides a small level of security. If an attacker is able to breach the firewall, they have direct access to the internal network. This makes the internal network vulnerable to cyber threats, including malware, data breaches, and unauthorized access.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition, a &lt;strong&gt;dual-homed firewall&lt;/strong&gt; These servers are typically located in a DMZ in other firewall topologies, which provides an extra layer of protection between the internet and the internal network.&lt;/p&gt;
&lt;h4&gt;Three-Legged Firewall&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;three-legged firewall&lt;/strong&gt; topology provides a &lt;strong&gt;higher level of security&lt;/strong&gt; than a &lt;strong&gt;dual-homed firewall&lt;/strong&gt; as it isolates the &lt;strong&gt;internal network&lt;/strong&gt; and &lt;strong&gt;DMZ&lt;/strong&gt; from the internet, &lt;strong&gt;reducing&lt;/strong&gt; the risk of a breach.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/three-legged-firewall-dmz.jpg&quot; alt=&quot;Three legged firewall with dmz&quot; width=&quot;750&quot; height=&quot;388&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Three legged firewall with dmz&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One &lt;strong&gt;advantage&lt;/strong&gt; of a &lt;strong&gt;three-legged firewall&lt;/strong&gt; is that it provides strong network segmentation, which helps prevent unauthorized access to sensitive data. By isolating the &lt;strong&gt;internal network&lt;/strong&gt; and &lt;strong&gt;DMZ&lt;/strong&gt; from the internet, attackers have a harder time accessing and compromising internal systems. Additionally, the &lt;strong&gt;DMZ&lt;/strong&gt; acts as an &lt;strong&gt;intermediary&lt;/strong&gt; between the &lt;strong&gt;internet&lt;/strong&gt; and the &lt;strong&gt;internal network&lt;/strong&gt;, allowing organizations to host &lt;strong&gt;public-facing servers&lt;/strong&gt;, without exposing their network to external threats.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another &lt;strong&gt;advantage&lt;/strong&gt; of a &lt;strong&gt;three-legged firewall&lt;/strong&gt; is that it allows for more granular control over network traffic. Administrators can configure the firewall to allow only necessary traffic between the &lt;strong&gt;DMZ&lt;/strong&gt; and the &lt;strong&gt;internal network&lt;/strong&gt;, while &lt;strong&gt;blocking&lt;/strong&gt; all other traffic. This helps prevent the spread of &lt;strong&gt;malware&lt;/strong&gt; or other &lt;strong&gt;threats&lt;/strong&gt; in case a system in the DMZ is compromised.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These advantages come at a price since &lt;strong&gt;three-legged firewall&lt;/strong&gt; can be more complex to configure and manage compared to a dual-homed firewall. It requires more networking components and devices, such as &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches.html&quot; target=&quot;_blank&quot; title=&quot;switches&quot;&gt;switches&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers.html&quot; target=&quot;_blank&quot; title=&quot;cisco/cisco-routers.html&quot;&gt;routers&lt;/a&gt; (in some cases), which can increase the cost and complexity of the network.&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Dual-Firewall or Screened Subnet&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;dual-firewall&lt;/strong&gt; or &lt;strong&gt;screened subnet&lt;/strong&gt; topology offers significant advantages compared to all other setups. This topology consists of two firewalls. The &lt;strong&gt;first firewall&lt;/strong&gt;, also known as the &lt;strong&gt;external&lt;/strong&gt; or &lt;strong&gt;perimeter firewall&lt;/strong&gt;, is connected to the internet and is responsible for filtering and blocking incoming traffic. The &lt;strong&gt;second firewall&lt;/strong&gt;, also known as the &lt;strong&gt;internal&lt;/strong&gt; or &lt;strong&gt;DMZ firewall&lt;/strong&gt;, is placed behind the &lt;strong&gt;perimeter firewall&lt;/strong&gt; and provides an extra layer of protection for the &lt;strong&gt;DMZ zone&lt;/strong&gt; and the &lt;strong&gt;internal network&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/dual-firewall-screened-subnet.jpg&quot; alt=&quot;Dual firewall or screened subnet&quot; width=&quot;843&quot; height=&quot;350&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Dual firewall or screened subnet&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;dual-firewall&lt;/strong&gt; or &lt;strong&gt;screened subnet &lt;/strong&gt;topology provides a high level of security for organizations that require &lt;strong&gt;strong isolation&lt;/strong&gt; between the &lt;strong&gt;internet&lt;/strong&gt;, &lt;strong&gt;DMZ zone&lt;/strong&gt;, and &lt;strong&gt;internal network&lt;/strong&gt;. However, it can be &lt;strong&gt;more complex&lt;/strong&gt; and &lt;strong&gt;expensive&lt;/strong&gt; to set up and maintain compared to other firewall topologies, such as the &lt;strong&gt;three-legged&lt;/strong&gt; or &lt;strong&gt;dual-homed firewall&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Setting apart the significant costs involved for this setup, its increased complexity requires a higher level of knowlege and experience. &lt;strong&gt;Firewall security policies&lt;/strong&gt;, &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Networks&quot;&gt;&lt;strong&gt;VLAN assignments&lt;/strong&gt;&lt;/a&gt; and &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol.html&quot; target=&quot;_blank&quot; title=&quot;IP network addressing&quot;&gt;IP network addressing&lt;/a&gt;&lt;/strong&gt; must be carefully designed and configured so that the necessary &lt;strong&gt;isolation&lt;/strong&gt; exists between &lt;strong&gt;DMZ segments&lt;/strong&gt;, &lt;strong&gt;internal network&lt;/strong&gt; and the &lt;strong&gt;internet&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article introduced &lt;strong&gt;Next-Gen firewalls&lt;/strong&gt;, analyzed their capabilities and explained how they are used to create DMZ zones to &lt;strong&gt;reduce risk &lt;/strong&gt;and&lt;strong&gt; effects&lt;/strong&gt; of a&lt;strong&gt; security breach&lt;/strong&gt;. We covered the &lt;strong&gt;purpose&lt;/strong&gt; and &lt;strong&gt;importance of DMZ zones&lt;/strong&gt;, provided tips to help manage them and also examined number of different firewall topologies including &lt;strong&gt;dual-homed firewalls&lt;/strong&gt;, &lt;strong&gt;three-legged firewalls&lt;/strong&gt; and &lt;strong&gt;dual-firewalls&lt;/strong&gt; aka &lt;strong&gt;screened subnets&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/firewall-dmz-zone/firewall-dmz-zone-intro.webp&quot; alt=&quot;Next-Gen Firewalls, DMZ Zones, operation, topologies, design and more&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/firewall-dmz-zone-intro.webp&quot; alt=&quot;firewall dmz zone&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;firewall dmz zone&quot; /&gt;&lt;strong&gt;Next-generation firewalls&lt;/strong&gt; (NGFWs)&lt;/strong&gt; and &lt;strong&gt;DMZ zones&lt;/strong&gt; are &lt;strong&gt;two critical components&lt;/strong&gt; of &lt;strong&gt;network security&lt;/strong&gt; that work hand in hand to &lt;strong&gt;protect&lt;/strong&gt; an organization's &lt;strong&gt;network&lt;/strong&gt; from &lt;strong&gt;external threats&lt;/strong&gt;. &lt;strong&gt;Firewalls&lt;/strong&gt; act as a barrier between the &lt;strong&gt;internal network&lt;/strong&gt; and the external world, &lt;strong&gt;filtering traffic&lt;/strong&gt; and &lt;strong&gt;preventing unauthorized access&lt;/strong&gt;. A &lt;strong&gt;DMZ zone&lt;/strong&gt; provides an extra layer of protection by &lt;strong&gt;segregating public-facing servers&lt;/strong&gt; from the internal network, making it harder for attackers to gain access to critical systems.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The combination of &lt;strong&gt;firewalls&lt;/strong&gt; and &lt;strong&gt;DMZ zones&lt;/strong&gt; helps to &lt;strong&gt;reduce the attack surface&lt;/strong&gt; of an organization's network, making it more difficult for attackers to exploit vulnerabilities and gain access to critical systems. Together, these technologies provide an effective defense against external threats and ensure that an organization's network remains secure.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Key topics covered in this article:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#next-gen-firewalls&quot; title=&quot;Next-Generation Firewalls&quot;&gt;Next-Generation Firewalls&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#role-importance-dmz&quot; title=&quot;The Role and Importance of DMZ Zones&quot;&gt;The Role and Importance of DMZ Zones&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#dmz-design&quot; title=&quot;DMZ Design and Operating Recommendations&quot;&gt;DMZ Design and Operating Recommendations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#firewall-topologies&quot; title=&quot;Firewall Topologies&quot;&gt;Firewall Topologies&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Dual-Homed Firewall&lt;/li&gt;
&lt;li&gt;Three-Legged Firewall&lt;/li&gt;
&lt;li&gt;Dual-Firewalls or Screened Subnets&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;next-gen-firewalls&quot;&gt;Next-Generation Firewalls&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Next-generation firewalls&lt;/strong&gt; (NGFWs) are an evolution of traditional firewalls, offering advanced features that enable more comprehensive security for modern networks. &lt;strong&gt;NGFWs&lt;/strong&gt; go beyond the traditional firewall's simple packet filtering and provide advanced security features such as intrusion detection and prevention, web filtering, application control, and deep packet inspection.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While both&lt;strong&gt; Cisco&lt;/strong&gt; and &lt;strong&gt;Palo Alto&lt;/strong&gt; provide NGFW products and services, Palo Alto has taken the lead with its NGFW products thanks to their intuitive interface, ease of management and brilliant design. Cisco's attempt to enter the NGFW market was a bumpy ride as they purchase the opensource SourceFire project and integrated it into their ASA Firewall products to produce the known &lt;strong&gt;FirePower Next-Gen firewalls&lt;/strong&gt;. Cisco next came out with their Firepower series firewall appliances.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-firewalls.html&quot; target=&quot;_blank&quot; title=&quot;Cisco's Firepower NGFW&quot;&gt;Cisco's Firepower NGFW&lt;/a&gt; provides a comprehensive set of security features that are integrated with &lt;strong&gt;Cisco's Advanced Malware Protection&lt;/strong&gt; (&lt;strong&gt;AMP&lt;/strong&gt;) technology. This integration enables the &lt;strong&gt;Firepower NGFW&lt;/strong&gt; to &lt;strong&gt;detect&lt;/strong&gt; and &lt;strong&gt;block advanced threats&lt;/strong&gt;, including &lt;strong&gt;malware&lt;/strong&gt; and &lt;strong&gt;ransomware&lt;/strong&gt;, with &lt;strong&gt;advanced threat intelligence&lt;/strong&gt; capabilities.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/cisco-firepower-2100-series.jpg&quot; alt=&quot;cisco firepower 2100 series&quot; width=&quot;500&quot; height=&quot;101&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;cisco firepower 2100 series&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Cisco Firepower 2100 series appliance&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/security/palo-alto-networks.html&quot; target=&quot;_blank&quot; title=&quot;Palo Alto's NGFW&quot;&gt;Palo Alto's NGFW&lt;/a&gt;, the &lt;strong&gt;Palo Alto Networks Security Operating&lt;/strong&gt; (&lt;strong&gt;PANOS&lt;/strong&gt;) platform, uses a unique approach to security called&amp;nbsp;&lt;strong&gt;Zero Trust&lt;/strong&gt;, which assumes that &lt;strong&gt;no user or device can be trusted by default&lt;/strong&gt;. It includes features such as &lt;strong&gt;policy-based segmentation&lt;/strong&gt;, which &lt;strong&gt;isolates network segments&lt;/strong&gt; and provides &lt;strong&gt;granular control&lt;/strong&gt; over access to resources. It also includes &lt;strong&gt;advanced threat detection capabilities&lt;/strong&gt; using machine learning algorithms and AI-based threat analysis.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/palo-alto-5400-series-firewall.jpg&quot; alt=&quot;palo alto 5400 series firewall&quot; width=&quot;540&quot; height=&quot;155&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;palo alto 5400 series firewall&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Palo Alto Next-Gen 5400 series appliance&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Both &lt;strong&gt;Cisco&lt;/strong&gt; and &lt;strong&gt;Palo Alto's NGFWs&lt;/strong&gt; provide &lt;strong&gt;centralized management&lt;/strong&gt; and reporting, making it easier for security teams to manage and monitor security policies across their networks. They also support integration with other security solutions, such as endpoint protection and &lt;strong&gt;security information and event management&lt;/strong&gt; (&lt;strong&gt;SIEM&lt;/strong&gt;) tools.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Don't forget to check out our popular &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-firewalls.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Firewall section&quot;&gt;Cisco Firewall&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/security/palo-alto-networks.html&quot; target=&quot;_blank&quot; title=&quot;Palo Alto Firewall section&quot;&gt;Palo Alto Firewall&lt;/a&gt; section where you'll find technical how-to articles covering &lt;strong&gt;firewall security&lt;/strong&gt; and &lt;strong&gt;DMZ&lt;/strong&gt; topics.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;role-importance-dmz&quot;&gt;The Role &amp;amp; Importance of a DMZ&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Demilitarized Zone&lt;/strong&gt;, or &lt;strong&gt;DMZ&lt;/strong&gt;, is an expression that comes from the Korean War. There, it meant a strip of land forcibly kept clear of enemy soldiers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The importance of a &lt;strong&gt;DMZ&lt;/strong&gt; cannot be overstated, as it serves as a crucial barrier that &lt;strong&gt;limits&lt;/strong&gt; the impact of a security breach on an organization's internal network. If a hacker were to breach the perimeter security of a company's network, they would first encounter the DMZ. The DMZ serves as a &lt;strong&gt;safe area&lt;/strong&gt; where &lt;strong&gt;public-facing servers&lt;/strong&gt; are &lt;strong&gt;isolated&lt;/strong&gt;, &lt;strong&gt;reducing&lt;/strong&gt; the &lt;strong&gt;risk of a security breach&lt;/strong&gt; impacting sensitive data on the internal network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The example below shows how a public-facing web server is &lt;strong&gt;securely isolated&lt;/strong&gt; inside a DMZ. The web server is protected by two sets of firewalls that limit access to it, and increase network security by providing &lt;strong&gt;inspection&lt;/strong&gt; and &lt;strong&gt;advanced threat detection services&lt;/strong&gt;. The CMS's built-in &lt;strong&gt;web application firewall&lt;/strong&gt; protects against unknown &lt;a href=&quot;https://www.firewall.cx/security/web-application-vulnerability-scanners.html&quot; target=&quot;_blank&quot; title=&quot;web application vulnerabilities&quot;&gt;web application vulnerabilities&lt;/a&gt; and blocks malicious requests that managed to evade the front-end firewalls:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/firewall-dmz-zone-diagram.jpg&quot; alt=&quot;firewall dmz zone diagram&quot; width=&quot;800&quot; height=&quot;333&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;firewall dmz zone diagram&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Additionally, a DMZ helps &lt;strong&gt;reduce the attack surface&lt;/strong&gt; of the network by &lt;strong&gt;limiting access&lt;/strong&gt; to critical systems. By keeping the public-facing servers in a separate network segment, it's easier to manage access control and apply stricter security policies. This way, even if a hacker gains access to the DMZ, they won't necessarily have access to sensitive information or control over critical systems.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another &lt;strong&gt;advantage&lt;/strong&gt; of a &lt;strong&gt;DMZ&lt;/strong&gt; is that it provides flexibility to IT administrators to &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/manageengine/opmanager-network-management/network-management-system-bandwidth-utilization-opmanager.html&quot; target=&quot;_blank&quot; title=&quot;manage and monitor the network&quot;&gt;manage and monitor the network&lt;/a&gt;. A DMZ allows administrators to configure different security policies for &lt;strong&gt;internal&lt;/strong&gt; and &lt;strong&gt;external&lt;/strong&gt; networks. This means that administrators can have more control over who has access to specific resources, and it can be easier to detect and &lt;strong&gt;block suspicious network activity&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In summary, the importance of a DMZ cannot be overstated in today's world where cyber-attacks are becoming more sophisticated and frequent. A DMZ helps to &lt;strong&gt;protect&lt;/strong&gt; an organization's &lt;strong&gt;internal network&lt;/strong&gt; from &lt;strong&gt;external threats&lt;/strong&gt; and &lt;strong&gt;reduces the risk&lt;/strong&gt; of sensitive information being &lt;strong&gt;compromised&lt;/strong&gt;. It provides administrators with a more secure and manageable network environment and limits the attack surface, making it harder for attackers to penetrate an organization's network. For these reasons, a DMZ is a critical component of any organization's network security strategy.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;dmz-design&quot;&gt;DMZ Design and Operating Recommendations&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Designing and operating a DMZ requires careful &lt;strong&gt;planning&lt;/strong&gt;, &lt;strong&gt;configuration&lt;/strong&gt;, and &lt;strong&gt;management&lt;/strong&gt;. Below are tips that can help organizations ensure their DMZ is properly configured and managed to provide the best level of protection for their network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1. &lt;strong&gt;Define the DMZ network&lt;/strong&gt;: The first step in setting up a DMZ is to define the &lt;strong&gt;network segments&lt;/strong&gt; and the servers that will be hosted in the DMZ. This includes identifying the public-facing servers and their respective security policies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2. &lt;strong&gt;Implement proper network segmentation&lt;/strong&gt;: Proper network segmentation is critical in preventing unauthorized access to the internal network. Ensure that network segments are isolated and that access controls are implemented to restrict traffic flow between the DMZ and the internal network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3. &lt;strong&gt;Use proper network security controls&lt;/strong&gt;: Deploy appropriate security controls to prevent unauthorized access and attacks on public-facing servers in the DMZ. This includes implementing firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4. &lt;strong&gt;Regularly update and patch servers&lt;/strong&gt;: Ensure that all servers in the DMZ are up to date with the latest software updates and security patches. This helps to prevent known vulnerabilities from being exploited by attackers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5. &lt;strong&gt;Monitor network traffic&lt;/strong&gt;: Regularly &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/manageengine/opmanager-network-management/network-management-system-bandwidth-utilization-opmanager.html&quot; target=&quot;_blank&quot; title=&quot;monitor network traffic&quot;&gt;monitor network traffic&lt;/a&gt; to detect any suspicious activity that may indicate an attack. This includes monitoring logs from firewalls and IDS/IPS systems.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;6. &lt;strong&gt;Implement strict access controls&lt;/strong&gt;: Implement strict access controls to restrict access to the DMZ and public-facing servers. This includes implementing two-factor authentication, restricting administrative access, and using secure protocols like &lt;a href=&quot;https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#how-ssl-works&quot; target=&quot;_blank&quot; title=&quot;How SSL/TLS Works&quot;&gt;SSL/TLS&lt;/a&gt; for server access.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;7. &lt;strong&gt;Implement proper backup and recovery procedures&lt;/strong&gt;: Implement proper backup and recovery procedures to ensure that in the event of a security breach, data can be restored quickly and efficiently.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;firewall-topologies&quot;&gt;Firewall Topologies&lt;/a&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Firewall topologies&lt;/strong&gt; refer to the different ways in which firewalls can be deployed within a network. There are several &lt;strong&gt;common firewall topologies&lt;/strong&gt;, each with its own &lt;strong&gt;advantages&lt;/strong&gt; and &lt;strong&gt;disadvantages&lt;/strong&gt;. It is important to understand that there is no one-size-fits-all answer to which is the best firewall topology since this depends on the organization's specific security needs, including the size and complexity of the network, the level of security required, and the resources available for configuration and management.&lt;/p&gt;
&lt;p&gt;Let's now take a look at the most common firewall topologies and discuss the advantages and disadvantes of each.&lt;/p&gt;
&lt;h4&gt;Dual-Homed Firewall&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is a simple topology where a firewall with &lt;strong&gt;two interfaces&lt;/strong&gt; has one connected to the &lt;strong&gt;untrusted&lt;/strong&gt; network (internet) and the other to the &lt;strong&gt;internal&lt;/strong&gt; network. &lt;strong&gt;Dual-homed&lt;/strong&gt; topologies are mostly used by small businesses because of their simplified design, complexity and low cost to maintain.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/dual-homed-firewall.jpg&quot; alt=&quot;Dual-homed Firewall&quot; width=&quot;752&quot; height=&quot;253&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Dual-homed Firewall&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You'll quickly notice the absence of a &lt;strong&gt;DMZ zone&lt;/strong&gt; on a &lt;strong&gt;dual-homed firewall&lt;/strong&gt;, making this firewall topology unsuitable to provide any protection for public-facing servers, such as web servers or email servers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;What we often see, when there is a need to access an internal resource from the Internet,&lt;strong&gt; Destination Network Address Translation (DNAT)&lt;/strong&gt; is configured on the firewall, to allow hosts from the untrusted network (internet) directly access an internal host:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/dual-homed-firewall-port-forwarding.jpg&quot; alt=&quot;Dual-homed Firewall with port forwarding - DNAT&quot; width=&quot;750&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Dual-homed Firewall with port forwarding - DNAT&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Regrettably, numerous businesses lack awareness of the security hazards associated with such practices, which frequently lead to their appearance on the front page of IT news.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to note that &lt;strong&gt;dual-homed firewall&lt;/strong&gt; setup provides a small level of security. If an attacker is able to breach the firewall, they have direct access to the internal network. This makes the internal network vulnerable to cyber threats, including malware, data breaches, and unauthorized access.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition, a &lt;strong&gt;dual-homed firewall&lt;/strong&gt; These servers are typically located in a DMZ in other firewall topologies, which provides an extra layer of protection between the internet and the internal network.&lt;/p&gt;
&lt;h4&gt;Three-Legged Firewall&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;three-legged firewall&lt;/strong&gt; topology provides a &lt;strong&gt;higher level of security&lt;/strong&gt; than a &lt;strong&gt;dual-homed firewall&lt;/strong&gt; as it isolates the &lt;strong&gt;internal network&lt;/strong&gt; and &lt;strong&gt;DMZ&lt;/strong&gt; from the internet, &lt;strong&gt;reducing&lt;/strong&gt; the risk of a breach.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/three-legged-firewall-dmz.jpg&quot; alt=&quot;Three legged firewall with dmz&quot; width=&quot;750&quot; height=&quot;388&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Three legged firewall with dmz&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One &lt;strong&gt;advantage&lt;/strong&gt; of a &lt;strong&gt;three-legged firewall&lt;/strong&gt; is that it provides strong network segmentation, which helps prevent unauthorized access to sensitive data. By isolating the &lt;strong&gt;internal network&lt;/strong&gt; and &lt;strong&gt;DMZ&lt;/strong&gt; from the internet, attackers have a harder time accessing and compromising internal systems. Additionally, the &lt;strong&gt;DMZ&lt;/strong&gt; acts as an &lt;strong&gt;intermediary&lt;/strong&gt; between the &lt;strong&gt;internet&lt;/strong&gt; and the &lt;strong&gt;internal network&lt;/strong&gt;, allowing organizations to host &lt;strong&gt;public-facing servers&lt;/strong&gt;, without exposing their network to external threats.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another &lt;strong&gt;advantage&lt;/strong&gt; of a &lt;strong&gt;three-legged firewall&lt;/strong&gt; is that it allows for more granular control over network traffic. Administrators can configure the firewall to allow only necessary traffic between the &lt;strong&gt;DMZ&lt;/strong&gt; and the &lt;strong&gt;internal network&lt;/strong&gt;, while &lt;strong&gt;blocking&lt;/strong&gt; all other traffic. This helps prevent the spread of &lt;strong&gt;malware&lt;/strong&gt; or other &lt;strong&gt;threats&lt;/strong&gt; in case a system in the DMZ is compromised.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These advantages come at a price since &lt;strong&gt;three-legged firewall&lt;/strong&gt; can be more complex to configure and manage compared to a dual-homed firewall. It requires more networking components and devices, such as &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-switches.html&quot; target=&quot;_blank&quot; title=&quot;switches&quot;&gt;switches&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers.html&quot; target=&quot;_blank&quot; title=&quot;cisco/cisco-routers.html&quot;&gt;routers&lt;/a&gt; (in some cases), which can increase the cost and complexity of the network.&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Dual-Firewall or Screened Subnet&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;dual-firewall&lt;/strong&gt; or &lt;strong&gt;screened subnet&lt;/strong&gt; topology offers significant advantages compared to all other setups. This topology consists of two firewalls. The &lt;strong&gt;first firewall&lt;/strong&gt;, also known as the &lt;strong&gt;external&lt;/strong&gt; or &lt;strong&gt;perimeter firewall&lt;/strong&gt;, is connected to the internet and is responsible for filtering and blocking incoming traffic. The &lt;strong&gt;second firewall&lt;/strong&gt;, also known as the &lt;strong&gt;internal&lt;/strong&gt; or &lt;strong&gt;DMZ firewall&lt;/strong&gt;, is placed behind the &lt;strong&gt;perimeter firewall&lt;/strong&gt; and provides an extra layer of protection for the &lt;strong&gt;DMZ zone&lt;/strong&gt; and the &lt;strong&gt;internal network&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/firewall-dmz-zone/dual-firewall-screened-subnet.jpg&quot; alt=&quot;Dual firewall or screened subnet&quot; width=&quot;843&quot; height=&quot;350&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Dual firewall or screened subnet&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;dual-firewall&lt;/strong&gt; or &lt;strong&gt;screened subnet &lt;/strong&gt;topology provides a high level of security for organizations that require &lt;strong&gt;strong isolation&lt;/strong&gt; between the &lt;strong&gt;internet&lt;/strong&gt;, &lt;strong&gt;DMZ zone&lt;/strong&gt;, and &lt;strong&gt;internal network&lt;/strong&gt;. However, it can be &lt;strong&gt;more complex&lt;/strong&gt; and &lt;strong&gt;expensive&lt;/strong&gt; to set up and maintain compared to other firewall topologies, such as the &lt;strong&gt;three-legged&lt;/strong&gt; or &lt;strong&gt;dual-homed firewall&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Setting apart the significant costs involved for this setup, its increased complexity requires a higher level of knowlege and experience. &lt;strong&gt;Firewall security policies&lt;/strong&gt;, &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks.html&quot; target=&quot;_blank&quot; title=&quot;VLAN Networks&quot;&gt;&lt;strong&gt;VLAN assignments&lt;/strong&gt;&lt;/a&gt; and &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol.html&quot; target=&quot;_blank&quot; title=&quot;IP network addressing&quot;&gt;IP network addressing&lt;/a&gt;&lt;/strong&gt; must be carefully designed and configured so that the necessary &lt;strong&gt;isolation&lt;/strong&gt; exists between &lt;strong&gt;DMZ segments&lt;/strong&gt;, &lt;strong&gt;internal network&lt;/strong&gt; and the &lt;strong&gt;internet&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article introduced &lt;strong&gt;Next-Gen firewalls&lt;/strong&gt;, analyzed their capabilities and explained how they are used to create DMZ zones to &lt;strong&gt;reduce risk &lt;/strong&gt;and&lt;strong&gt; effects&lt;/strong&gt; of a&lt;strong&gt; security breach&lt;/strong&gt;. We covered the &lt;strong&gt;purpose&lt;/strong&gt; and &lt;strong&gt;importance of DMZ zones&lt;/strong&gt;, provided tips to help manage them and also examined number of different firewall topologies including &lt;strong&gt;dual-homed firewalls&lt;/strong&gt;, &lt;strong&gt;three-legged firewalls&lt;/strong&gt; and &lt;strong&gt;dual-firewalls&lt;/strong&gt; aka &lt;strong&gt;screened subnets&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Firewall Topologies</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/firewall-topologies.html"/>
		<published>2011-05-29T23:07:13+10:00</published>
		<updated>2011-05-29T23:07:13+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/firewall-topologies.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In this section we are going to talk about the different ways a firewall can be set up. Depending on your needs, you can have a very simple firewall setup which will provide enough protection for your personal computer or small network, or you can choose a more complicated setup which will provide more protection and security.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Let's have a look starting from the simple solutions, and then move on to the more complicated ones. Just keep in mind we are not talking about a firewall which is only a piece of software which runs on the same computer you use to connect to the internet and do your work, but we are talking about a physical computer which is a dedicated firewall.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;A Simple Dual-Homed Firewall&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The dual-homed firewall is one of the simplest and possibly most common way to use a firewall. The Internet comes into the firewall directly via a dial-up modem (like me :) ) or through some other type of connection like an ISDN line or cable modem. You can't have a DMZ (See the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/firewall-topologies-dmz-zone.html&quot; target=&quot;_blank&quot; title=&quot;DMZ Designs&quot;&gt;DMZ page&lt;/a&gt; for more info) in this type of a configuration.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/firewall_topologies-1.gif&quot; alt=&quot;firewall_topologies-1&quot; width=&quot;425&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The firewall takes care of passing packets that pass its filtering rules between the internal network and the Internet, and vice versa. It may use IP masquerading and that's all it does. This is known as a dual-homed host. The two &quot;homes&quot; refer to the two networks that the firewall machine is part of - one interface connected to the outside home, and the other connected to the inside home.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This particular setup has the advantage of simplicity and if your Internet connection is via a modem and you have only one IP address, it's what you're probably going to have to live with unless you create a more complex network like the one we are going to talk about.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;A Two-Legged Network with a Full Exposed DMZ&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In this more advanced configuration, shown in the picture below, the router that connects to the outside work is connected to a hub (or switch).&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/firewall_topologies-2.gif&quot; alt=&quot;firewall_topologies-2&quot; width=&quot;567&quot; height=&quot;312&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; name=&quot;firewall_2_dmz&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Machines that want direct access to the outside world, unfiltered by the firewall, connect to this hub. One of the firewall's network adapters also connects to this hub. The other network adapter connects to the internal hub. Machines that need to be protected by the firewall need to connect to this hub. Any of these hubs could be replaced with switches for added security and speed, and it would be more effective to use a switch for the internal hub.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;There are good things about the exposed DMZ configuration. The firewall needs only two network cards. This simplifies the configuration of the firewall. Additionally, if you control the router you have access to a second set of packet-filtering capabilities. Using these, you can give your DMZ some limited protection completely separate from your firewall.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;On the other hand, if you don't control the router, your DMZ is totally exposed to the Internet. Hardening a machine enough to live in the DMZ without getting regularly compromised can be tricky.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The exposed DMZ configuration depends on two things: 1) an external router, and 2) multiple IP addresses.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If you connect via PPP (modem dial-up), or you don't control your external router, or you want to masquerade your DMZ, or you have only 1 IP address, you'll need to do something else.There are two straightforward solutions to this, depending on your particular problem.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/firewall_topologies-2.2.gif&quot; alt=&quot;firewall_topologies-2.2&quot; width=&quot;553&quot; height=&quot;340&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;One solution is to build a second router/firewall. This is useful if you're connecting via PPP. One machine is the exterior router/ firewall (Firewall No.1). This machine is responsible for creating the PPP connection and controls the access to our DMZ zone. The other firewall (Firewall No.2) is a standard dual-homed host just like the one we spoke about at the beginning of the page, and its job is to protect the internal network. This is identical to the situation of a dual homed firewall where your PPP machine is the local exterior router.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The other solution is to create a three-legged firewall, which is what we are going to talk about next.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Three-Legged Firewall&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This means you need an additional network adapter in your firewall box for your DMZ. The firewall is then configured to route packets between the outside world and the DMZ differently than between the outside world and the internal network. This is a useful configuration, and I have seen many of our customers using it.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/firewall_topologies-3.gif&quot; alt=&quot;firewall_topologies-3&quot; width=&quot;425&quot; height=&quot;383&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The three-legged setup can also give you the ability to have a DMZ if you're stuck with the simple topology outlined first (dual homed firewall). Replace &quot;router&quot; with &quot;modem,&quot; and you can see how this is similar to the simple topology (dual homed firewall), but with a third leg stuck on the side :)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If you're being forced or have chosen to IP masquerade, you can masquerade the machine or machines in the DMZ too, while keeping them functionally separate from protected internal machines. People who have cable modems or static PPP connections can use this system to run various servers within a DMZ as well as an entire internal network off a single IP address. It's a very economic solution for small businesses or home offices.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The primary disadvantage to the three-legged firewall is the additional complexity. Access to and from the DMZ and to and from the internal network is controlled by one large set of rules. It's pretty easy to get these rules wrong if you're not careful !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;On the other hand, if you don't have any control over the Internet router, you can exert a lot more control over traffic to and from the DMZ this way. It's good to prevent access into the DMZ if you can.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In this section we are going to talk about the different ways a firewall can be set up. Depending on your needs, you can have a very simple firewall setup which will provide enough protection for your personal computer or small network, or you can choose a more complicated setup which will provide more protection and security.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Let's have a look starting from the simple solutions, and then move on to the more complicated ones. Just keep in mind we are not talking about a firewall which is only a piece of software which runs on the same computer you use to connect to the internet and do your work, but we are talking about a physical computer which is a dedicated firewall.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;A Simple Dual-Homed Firewall&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The dual-homed firewall is one of the simplest and possibly most common way to use a firewall. The Internet comes into the firewall directly via a dial-up modem (like me :) ) or through some other type of connection like an ISDN line or cable modem. You can't have a DMZ (See the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/firewall-topologies-dmz-zone.html&quot; target=&quot;_blank&quot; title=&quot;DMZ Designs&quot;&gt;DMZ page&lt;/a&gt; for more info) in this type of a configuration.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/firewall_topologies-1.gif&quot; alt=&quot;firewall_topologies-1&quot; width=&quot;425&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The firewall takes care of passing packets that pass its filtering rules between the internal network and the Internet, and vice versa. It may use IP masquerading and that's all it does. This is known as a dual-homed host. The two &quot;homes&quot; refer to the two networks that the firewall machine is part of - one interface connected to the outside home, and the other connected to the inside home.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This particular setup has the advantage of simplicity and if your Internet connection is via a modem and you have only one IP address, it's what you're probably going to have to live with unless you create a more complex network like the one we are going to talk about.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;A Two-Legged Network with a Full Exposed DMZ&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In this more advanced configuration, shown in the picture below, the router that connects to the outside work is connected to a hub (or switch).&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/firewall_topologies-2.gif&quot; alt=&quot;firewall_topologies-2&quot; width=&quot;567&quot; height=&quot;312&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; name=&quot;firewall_2_dmz&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Machines that want direct access to the outside world, unfiltered by the firewall, connect to this hub. One of the firewall's network adapters also connects to this hub. The other network adapter connects to the internal hub. Machines that need to be protected by the firewall need to connect to this hub. Any of these hubs could be replaced with switches for added security and speed, and it would be more effective to use a switch for the internal hub.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;There are good things about the exposed DMZ configuration. The firewall needs only two network cards. This simplifies the configuration of the firewall. Additionally, if you control the router you have access to a second set of packet-filtering capabilities. Using these, you can give your DMZ some limited protection completely separate from your firewall.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;On the other hand, if you don't control the router, your DMZ is totally exposed to the Internet. Hardening a machine enough to live in the DMZ without getting regularly compromised can be tricky.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The exposed DMZ configuration depends on two things: 1) an external router, and 2) multiple IP addresses.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If you connect via PPP (modem dial-up), or you don't control your external router, or you want to masquerade your DMZ, or you have only 1 IP address, you'll need to do something else.There are two straightforward solutions to this, depending on your particular problem.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/firewall_topologies-2.2.gif&quot; alt=&quot;firewall_topologies-2.2&quot; width=&quot;553&quot; height=&quot;340&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;One solution is to build a second router/firewall. This is useful if you're connecting via PPP. One machine is the exterior router/ firewall (Firewall No.1). This machine is responsible for creating the PPP connection and controls the access to our DMZ zone. The other firewall (Firewall No.2) is a standard dual-homed host just like the one we spoke about at the beginning of the page, and its job is to protect the internal network. This is identical to the situation of a dual homed firewall where your PPP machine is the local exterior router.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The other solution is to create a three-legged firewall, which is what we are going to talk about next.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Three-Legged Firewall&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This means you need an additional network adapter in your firewall box for your DMZ. The firewall is then configured to route packets between the outside world and the DMZ differently than between the outside world and the internal network. This is a useful configuration, and I have seen many of our customers using it.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/firewall_topologies-3.gif&quot; alt=&quot;firewall_topologies-3&quot; width=&quot;425&quot; height=&quot;383&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The three-legged setup can also give you the ability to have a DMZ if you're stuck with the simple topology outlined first (dual homed firewall). Replace &quot;router&quot; with &quot;modem,&quot; and you can see how this is similar to the simple topology (dual homed firewall), but with a third leg stuck on the side :)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If you're being forced or have chosen to IP masquerade, you can masquerade the machine or machines in the DMZ too, while keeping them functionally separate from protected internal machines. People who have cable modems or static PPP connections can use this system to run various servers within a DMZ as well as an entire internal network off a single IP address. It's a very economic solution for small businesses or home offices.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The primary disadvantage to the three-legged firewall is the additional complexity. Access to and from the DMZ and to and from the internal network is controlled by one large set of rules. It's pretty easy to get these rules wrong if you're not careful !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;On the other hand, if you don't have any control over the Internet router, you can exert a lot more control over traffic to and from the DMZ this way. It's good to prevent access into the DMZ if you can.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Controlling Broadcasts and Multicasts</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/network-broadcast-multicast-control.html"/>
		<published>2011-04-18T10:00:00+10:00</published>
		<updated>2011-04-18T10:00:00+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/network-broadcast-multicast-control.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;The first step in controlling broadcast and multicast traffic is to identify which devices are involved in a broadcast or multicast storm. The following protocols can send broadcast or multicast packets:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Address Resolution Protocol (ARP)&lt;/li&gt;
&lt;li&gt;Open Shortest Path First (OSPF)&lt;/li&gt;
&lt;li&gt;IP Routing Information Protocol Version 1 (RIP1)&lt;/li&gt;
&lt;li&gt;Service Advertising Protocol (SAP)&lt;/li&gt;
&lt;li&gt;IPX Routing Information Protocol (RIP)&lt;/li&gt;
&lt;li&gt;NetWare Link Services Protocol (NLSP)&lt;/li&gt;
&lt;li&gt;AppleTalk Address Resolution Protocol (AARP)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;After identifying the source of the broadcast or multicast storm, you must examine the packets to find out which protocol or application triggered the broadcast or multicast storm. For example, if a single device is responsible for a broadcast storm, you can examine the device's broadcast traffic to determine exactly what the device was doing. For example, you can find out what the device was looking for or what the device was announcing.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Broadcast or multicast storms are often caused by a fault that occurs during the device discovery process. For example, if an IPX-based printing environment has been misconfigured, a print driver client may continually send SAP packets to locate a specific print server. Unanswered broadcast or multicast requests usually indicate that a device is missing or has been misconfigured.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Examine the broadcast traffic on your company's network. Do you see numerous unanswered, repeat queries? Do you see protocols (such as IP RIP1, SAP, and IPX RIP) that just &quot;blab&quot; all day even when no other devices may be listening?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Or, is the majority of the broadcast and multicast traffic on your company's network purposeful? That is, does the broadcast and multicast traffic have a request-reply communication pattern? For example, are broadcast lookups answered?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Do broadcast packets contain meaningful information? For example, if a network has numerous routers, do broadcast packets contain routing update information?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Is the broadcast rate acceptable? Does your company's network need RIP updates every 30 seconds, or can you increase the interval to one minute?&lt;/p&gt;
&lt;h2&gt;BROADCAST/MULTICAST DOMAINS&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If your company's network is experiencing excessive broadcast or multicast traffic, you should also check the scope of the broadcast or multicast domain. (A broadcast or multicast domain is the range of devices that are affected by a broadcast or a multicast packet.) Understanding broadcast and multicast domains can help you determine how harmful a broadcast storm can be from any point on the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The scope of a broadcast and multicast domain depends, to some degree, on the network design. For example, the picture below shows two networks, a switched network and a routed network:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/control-b-u.gif&quot; alt=&quot;&quot; width=&quot;317&quot; height=&quot;264&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; data-alt=&quot;control-b-u&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;On a switched network, Device 1 sends a broadcast or multicast packet that is propagated to all ports of the switch. (A typical layer-2 switch does not filter either broadcast or multicast traffic.)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;On a routed network, however, a router does not forward broadcast traffic. If Device 1 sends a broadcast packet, only Device 2 and the router see the broadcast packet. If appropriate, the router processes the broadcast packet and sends a reply. Because the broadcast packet is not forwarded, it does not affect Devices 3 or 4.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;The first step in controlling broadcast and multicast traffic is to identify which devices are involved in a broadcast or multicast storm. The following protocols can send broadcast or multicast packets:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Address Resolution Protocol (ARP)&lt;/li&gt;
&lt;li&gt;Open Shortest Path First (OSPF)&lt;/li&gt;
&lt;li&gt;IP Routing Information Protocol Version 1 (RIP1)&lt;/li&gt;
&lt;li&gt;Service Advertising Protocol (SAP)&lt;/li&gt;
&lt;li&gt;IPX Routing Information Protocol (RIP)&lt;/li&gt;
&lt;li&gt;NetWare Link Services Protocol (NLSP)&lt;/li&gt;
&lt;li&gt;AppleTalk Address Resolution Protocol (AARP)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;After identifying the source of the broadcast or multicast storm, you must examine the packets to find out which protocol or application triggered the broadcast or multicast storm. For example, if a single device is responsible for a broadcast storm, you can examine the device's broadcast traffic to determine exactly what the device was doing. For example, you can find out what the device was looking for or what the device was announcing.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Broadcast or multicast storms are often caused by a fault that occurs during the device discovery process. For example, if an IPX-based printing environment has been misconfigured, a print driver client may continually send SAP packets to locate a specific print server. Unanswered broadcast or multicast requests usually indicate that a device is missing or has been misconfigured.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Examine the broadcast traffic on your company's network. Do you see numerous unanswered, repeat queries? Do you see protocols (such as IP RIP1, SAP, and IPX RIP) that just &quot;blab&quot; all day even when no other devices may be listening?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Or, is the majority of the broadcast and multicast traffic on your company's network purposeful? That is, does the broadcast and multicast traffic have a request-reply communication pattern? For example, are broadcast lookups answered?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Do broadcast packets contain meaningful information? For example, if a network has numerous routers, do broadcast packets contain routing update information?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Is the broadcast rate acceptable? Does your company's network need RIP updates every 30 seconds, or can you increase the interval to one minute?&lt;/p&gt;
&lt;h2&gt;BROADCAST/MULTICAST DOMAINS&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If your company's network is experiencing excessive broadcast or multicast traffic, you should also check the scope of the broadcast or multicast domain. (A broadcast or multicast domain is the range of devices that are affected by a broadcast or a multicast packet.) Understanding broadcast and multicast domains can help you determine how harmful a broadcast storm can be from any point on the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The scope of a broadcast and multicast domain depends, to some degree, on the network design. For example, the picture below shows two networks, a switched network and a routed network:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/control-b-u.gif&quot; alt=&quot;&quot; width=&quot;317&quot; height=&quot;264&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; data-alt=&quot;control-b-u&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;On a switched network, Device 1 sends a broadcast or multicast packet that is propagated to all ports of the switch. (A typical layer-2 switch does not filter either broadcast or multicast traffic.)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;On a routed network, however, a router does not forward broadcast traffic. If Device 1 sends a broadcast packet, only Device 2 and the router see the broadcast packet. If appropriate, the router processes the broadcast packet and sends a reply. Because the broadcast packet is not forwarded, it does not affect Devices 3 or 4.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Network Broadcast</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html"/>
		<published>2011-04-18T06:23:57+10:00</published>
		<updated>2011-04-18T06:23:57+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The term &quot;&lt;strong&gt;Broadcast&lt;/strong&gt;&quot; is used very frequently in the networking world . You will see it in most networking books and articles, or see it happening on your hub/switch when all the LED's start flashing at the same time !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If you have been into networking for a while you most probably have come across the terms &quot;broadcast&quot; and &quot;subnet broadcast&quot; . When I first dived into the networking world, I was constantly confused between the two, because they both carried the &quot;broadcast&quot; term in them. We will analyse both of them here, to help you understand exactly what they are and how they are used !&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Broadcast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A Broadcast means that the network delivers one copy of a packet to each destination. On bus technologies like Ethernet, broadcast delivery can be accomplished with a single packet transmission. On networks composed of switches with point-to-point connections, software must implement broadcasting by forwarding copies of the packet across individual connections until all switches have received a copy. We will be focusing only on Ethernet broadcasts.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The picture below illustrates a router which has sent a broadcast to all devices on its network:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast-network.gif&quot; alt=&quot;broadcast-network&quot; width=&quot;480&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Normally, when the computers on the network receive a packet, they will first try to match the MAC address of the packet with their own and if that is successful, they process the packet and hand it to the OSI layer above (Network Layer), if the MAC address is not matched, then the packet is discarded and not processed. However, when they see a MAC address of FF:FF:FF:FF:FF:FF, they will process this packet because they recognise it as a broadcast.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;But what does a &quot;broadcast&quot; look like ?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The screenshot below was taken from the packet sniffer application and shows the basic information contained within a network broadcast:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast%202.gif&quot; alt=&quot;broadcast 2&quot; width=&quot;507&quot; height=&quot;37&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&amp;nbsp;Let's now have a closer look at the above captured packet.&lt;/p&gt;
&lt;p&gt;The image below shows a broadcast packet. You can clearly see that the &quot;MAC destination address&quot; is set to &lt;span style=&quot;color: #3366ff;&quot;&gt;FF:FF:FF:FF:FF:FF&lt;/span&gt;. The &quot;Address IP destination&quot; is set to &lt;span style=&quot;color: #3366ff;&quot;&gt;255.255.255.255&lt;/span&gt;, this is the IP broadcast address and ensures that no matter what IP address the receiving computer(s) have, they will not reject the data but process it.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast-3.gif&quot; alt=&quot;broadcast-3&quot; width=&quot;291&quot; height=&quot;422&quot; style=&quot;margin: 5px auto; display: block; border: 1px solid #000000;&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&amp;nbsp;Now you might ask yourself &quot;Why would a workstation want to create a broadcast packet ?&quot;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The answer to that lies within the various protocols used on our networks !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Let's take for example Address Resolution Protocol, or ARP. ARP is used to find out which MAC address (effectively , which network card or computer) has a particular IP address bound to it. You will find a detailed example of the whole process in the &lt;a href=&quot;https://www.firewall.cx//networking-topics/routing/181-routing-process.html&quot; target=&quot;_blank&quot;&gt;IP Routing section&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;For a network device such as a router to ask &quot;Who has IP address 192.168.0.100?&quot;, it must &quot;shout&quot; it out so it can grab everyone's attention, which is why it will use a broadcast address to make sure everyone on the network listens and processes the packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In the example image above, the particular machine was looking for a DHCP server (notice the &quot;bootps&quot; protocol under the UDP Header - Layer 4, which is basically DHCP).&lt;/p&gt;
&lt;h2&gt;Subnet Broadcast or Direct Broadcast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A Subnet or Direct broadcast is targetted not to all hosts on a network, but to all hosts on a subnet. Since a physical network can contain different subnets/networks e.g 192.168.0.0 and 200.200.200.0, the purpose of this special broadcast is to send a message to all the hosts in a particular subnet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In the example below, Router A sends a subnet broadcast onto the network. Hosts A,B,C and the Server are configured to be part of the 192.168.0.0 network so they will receive and process the data, but Host D is configured with a different IP Adress, so it's part of a different network, it will accept the packet cause of its broadcast MAC address, but will drop the packet when it reaches its Network Layer, where it will see that this packet was for a different IP network.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast-subnet-brdcst-3.gif&quot; alt=&quot;broadcast-subnet-brdcst-3&quot; width=&quot;624&quot; height=&quot;312&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;It is very similar to the network broadcast we just talked about but varies slightly in the sense that its IP broadcast is not set to 255.255.255.255 , but is set to the subnet broadcast address. For example, my home network is a Class C network : 192.168.0.0 with a subnetmask of 255.255.255.0 or, if you like to keep it simple, : 192.168.0.0/24.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This means that the available valid hosts for this network are from 192.168.0.1 to 192.168.0.254. In this Class C network, as in every other network, there are 2 addresses which I can't use. The first one is preserved to identify the network (192.168.0.0) and the second one for the subnet broadcast (192.168.0.255).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast-subnet-brdcst-2.gif&quot; alt=&quot;broadcast-subnet-brdcst-2&quot; width=&quot;686&quot; height=&quot;38&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The above packet, captured from my packet sniffer, shows my workstation broadcasting to the subnet 192.168.0.0. From the broadcast address you can tell that I am using a full Class C network range, otherwise the Destination IP wouldn't be 192.168.0.255.&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast-subnet-brdcst.gif&quot; alt=&quot;broadcast-subnet-brdcst&quot; width=&quot;290&quot; height=&quot;359&quot; style=&quot;border: 1px solid #000000; margin: 5px auto; display: block;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Packet decoder on the right shows you the contents of each header from the above packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking at the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC Header&quot;&gt;MAC Header&lt;/a&gt; (Datalink Layer), the destination MAC address is set to &lt;strong&gt;FF:FF:FF:FF:FF:FF&lt;/strong&gt; and the IP Header (Network Layer) has the Destination IP set to &lt;strong&gt;192.168.0.255&lt;/strong&gt; which is, as I said, the Subnet Broadcast Address. Again, all computers on the network which are part of the 192.168.0.0 subnet will process this packet, the rest will drop the packet once they see it's for a network to which they do not belong.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this example, I double clicked at my &quot;Network Places&quot; and was searching for a computer, this forced my workstation to send out a Subnet Broadcast on the network asking if a particular computer existed on the network.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The term &quot;&lt;strong&gt;Broadcast&lt;/strong&gt;&quot; is used very frequently in the networking world . You will see it in most networking books and articles, or see it happening on your hub/switch when all the LED's start flashing at the same time !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If you have been into networking for a while you most probably have come across the terms &quot;broadcast&quot; and &quot;subnet broadcast&quot; . When I first dived into the networking world, I was constantly confused between the two, because they both carried the &quot;broadcast&quot; term in them. We will analyse both of them here, to help you understand exactly what they are and how they are used !&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Broadcast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A Broadcast means that the network delivers one copy of a packet to each destination. On bus technologies like Ethernet, broadcast delivery can be accomplished with a single packet transmission. On networks composed of switches with point-to-point connections, software must implement broadcasting by forwarding copies of the packet across individual connections until all switches have received a copy. We will be focusing only on Ethernet broadcasts.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The picture below illustrates a router which has sent a broadcast to all devices on its network:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast-network.gif&quot; alt=&quot;broadcast-network&quot; width=&quot;480&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Normally, when the computers on the network receive a packet, they will first try to match the MAC address of the packet with their own and if that is successful, they process the packet and hand it to the OSI layer above (Network Layer), if the MAC address is not matched, then the packet is discarded and not processed. However, when they see a MAC address of FF:FF:FF:FF:FF:FF, they will process this packet because they recognise it as a broadcast.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;But what does a &quot;broadcast&quot; look like ?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The screenshot below was taken from the packet sniffer application and shows the basic information contained within a network broadcast:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast%202.gif&quot; alt=&quot;broadcast 2&quot; width=&quot;507&quot; height=&quot;37&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&amp;nbsp;Let's now have a closer look at the above captured packet.&lt;/p&gt;
&lt;p&gt;The image below shows a broadcast packet. You can clearly see that the &quot;MAC destination address&quot; is set to &lt;span style=&quot;color: #3366ff;&quot;&gt;FF:FF:FF:FF:FF:FF&lt;/span&gt;. The &quot;Address IP destination&quot; is set to &lt;span style=&quot;color: #3366ff;&quot;&gt;255.255.255.255&lt;/span&gt;, this is the IP broadcast address and ensures that no matter what IP address the receiving computer(s) have, they will not reject the data but process it.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast-3.gif&quot; alt=&quot;broadcast-3&quot; width=&quot;291&quot; height=&quot;422&quot; style=&quot;margin: 5px auto; display: block; border: 1px solid #000000;&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&amp;nbsp;Now you might ask yourself &quot;Why would a workstation want to create a broadcast packet ?&quot;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The answer to that lies within the various protocols used on our networks !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Let's take for example Address Resolution Protocol, or ARP. ARP is used to find out which MAC address (effectively , which network card or computer) has a particular IP address bound to it. You will find a detailed example of the whole process in the &lt;a href=&quot;https://www.firewall.cx//networking-topics/routing/181-routing-process.html&quot; target=&quot;_blank&quot;&gt;IP Routing section&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;For a network device such as a router to ask &quot;Who has IP address 192.168.0.100?&quot;, it must &quot;shout&quot; it out so it can grab everyone's attention, which is why it will use a broadcast address to make sure everyone on the network listens and processes the packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In the example image above, the particular machine was looking for a DHCP server (notice the &quot;bootps&quot; protocol under the UDP Header - Layer 4, which is basically DHCP).&lt;/p&gt;
&lt;h2&gt;Subnet Broadcast or Direct Broadcast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A Subnet or Direct broadcast is targetted not to all hosts on a network, but to all hosts on a subnet. Since a physical network can contain different subnets/networks e.g 192.168.0.0 and 200.200.200.0, the purpose of this special broadcast is to send a message to all the hosts in a particular subnet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In the example below, Router A sends a subnet broadcast onto the network. Hosts A,B,C and the Server are configured to be part of the 192.168.0.0 network so they will receive and process the data, but Host D is configured with a different IP Adress, so it's part of a different network, it will accept the packet cause of its broadcast MAC address, but will drop the packet when it reaches its Network Layer, where it will see that this packet was for a different IP network.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast-subnet-brdcst-3.gif&quot; alt=&quot;broadcast-subnet-brdcst-3&quot; width=&quot;624&quot; height=&quot;312&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;It is very similar to the network broadcast we just talked about but varies slightly in the sense that its IP broadcast is not set to 255.255.255.255 , but is set to the subnet broadcast address. For example, my home network is a Class C network : 192.168.0.0 with a subnetmask of 255.255.255.0 or, if you like to keep it simple, : 192.168.0.0/24.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This means that the available valid hosts for this network are from 192.168.0.1 to 192.168.0.254. In this Class C network, as in every other network, there are 2 addresses which I can't use. The first one is preserved to identify the network (192.168.0.0) and the second one for the subnet broadcast (192.168.0.255).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast-subnet-brdcst-2.gif&quot; alt=&quot;broadcast-subnet-brdcst-2&quot; width=&quot;686&quot; height=&quot;38&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The above packet, captured from my packet sniffer, shows my workstation broadcasting to the subnet 192.168.0.0. From the broadcast address you can tell that I am using a full Class C network range, otherwise the Destination IP wouldn't be 192.168.0.255.&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/broadcast-subnet-brdcst.gif&quot; alt=&quot;broadcast-subnet-brdcst&quot; width=&quot;290&quot; height=&quot;359&quot; style=&quot;border: 1px solid #000000; margin: 5px auto; display: block;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Packet decoder on the right shows you the contents of each header from the above packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking at the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC Header&quot;&gt;MAC Header&lt;/a&gt; (Datalink Layer), the destination MAC address is set to &lt;strong&gt;FF:FF:FF:FF:FF:FF&lt;/strong&gt; and the IP Header (Network Layer) has the Destination IP set to &lt;strong&gt;192.168.0.255&lt;/strong&gt; which is, as I said, the Subnet Broadcast Address. Again, all computers on the network which are part of the 192.168.0.0 subnet will process this packet, the rest will drop the packet once they see it's for a network to which they do not belong.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this example, I double clicked at my &quot;Network Places&quot; and was searching for a computer, this forced my workstation to send out a Subnet Broadcast on the network asking if a particular computer existed on the network.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Multicast - Understand How IP Multicast Works</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/network-multicast.html"/>
		<published>2011-04-18T05:13:35+10:00</published>
		<updated>2011-04-18T05:13:35+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/network-multicast.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/multicast-intro.webp&quot; alt=&quot;How Multicast Works&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro.webp&quot; alt=&quot;Introduction to Network Multicast&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to Network Multicast&quot; /&gt;Multicast&lt;/strong&gt; is a communication method used in computer networking where data is sent from a single sender to a group of destination devices. In this method, the sender sends the data packet to a specific multicast address, which is assigned to a group of devices. The data packet is then forwarded by network devices to all devices that have subscribed to the multicast group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Multicasting&lt;/strong&gt; is an efficient method of sending data to a &lt;strong&gt;group of devices&lt;/strong&gt;, as it reduces network traffic and ensures that data is delivered to all devices in the group &lt;strong&gt;simultaneously&lt;/strong&gt;. Multicasting is widely used in various network protocols, such as &lt;strong&gt;IPTV&lt;/strong&gt;, &lt;strong&gt;video conferencing&lt;/strong&gt;, and &lt;strong&gt;online gaming&lt;/strong&gt;. In this article, we will discuss the &lt;strong&gt;importance and benefits of multicasting&lt;/strong&gt;, as well as its use in different network applications.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: left;&quot;&gt;Note: Understanding Multicast requires solid knowledge on the structure and purpose of &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC Addresses&quot;&gt;MAC Addresses&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some describe a multicast similar to a &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;network broadcast&quot;&gt;broadcast&lt;/a&gt; in that it targets a number of devices or hosts on a network, but not all. While a &lt;strong&gt;broadcast&lt;/strong&gt; is directed to &lt;strong&gt;all hosts&lt;/strong&gt; on the local segment, a multicast is directed to a group of hosts. With multicast, the hosts can select whether they wish to participate in the multicast group with the use of the &lt;strong&gt; Internet Group Management Protocol&lt;/strong&gt; (IGMP) protocol.&lt;/p&gt;
&lt;p&gt;Below is a simple example of a group of hosts (host A and D) being part of a multicast group who receive and process a stream of data:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-1.gif&quot; alt=&quot;multicast-intro-1&quot; width=&quot;480&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Multicast Fundamentals&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;To help explain how multicast works, we've split this section into three different topics:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Hardware/Ethernet Multicasting&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IP Multicasting&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Mapping IP Multicast to Ethernet Multicast&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A typical multicast on an Ethernet network, using the TCP/IP protocol, consists of two parts: Hardware/Ethernet multicast and IP Multicast. Later on I will talk about Mapping IP Multicast to Ethernet Multicast which is really what happens with multicasting on our Ethernet network using the TCP/IP protocol.&lt;/p&gt;
&lt;p&gt;The brief diagram below shows you the relationship between the 3 and how they complete the multicasting model:&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-2.gif&quot; alt=&quot;multicast-intro-2&quot; width=&quot;425&quot; height=&quot;213&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Hardware/Ethernet Multicasting&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;When a computer joins a multicast group, it needs to be able to distinguish between normal unicasts (which are packets directed to one computer or one MAC address) and multicasts. With hardware multicasting, the network card is configured, via its drivers, to watch out for particular &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC addresses&quot;&gt;MAC addresses&lt;/a&gt; (in this case, multicast MAC addresses) apart from its own. When the network card picks up a packet which has a destination MAC that matches any of the multicast MAC addresses, it will pass it to the upper layers for further processing.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;And this is how they do it:&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;Ethernet uses the low-order bit of the high-order octet to distinguish conventional unicast addresses from multicast addresses. A unicast would have this bit set to &lt;strong&gt;ZERO&lt;/strong&gt; (&lt;strong&gt;0&lt;/strong&gt;), whereas a multicast would be set to &lt;strong&gt;ONE&lt;/strong&gt; &lt;strong&gt;(1&lt;/strong&gt;)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;To understand this, we need to analyse the destination MAC address of a unicast and multicast packet, so you can see what we are talking about:&lt;/p&gt;
&lt;p&gt;When a normal (unicast) packet is put on the network by a computer, it contains the Source and Destination MAC address, found in the 2nd Layer of the OSI model. The following picture is an example of my workstation (192.168.0.6) sending a packet to my network's gateway (192.168.0.5):&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-3.gif&quot; alt=&quot;multicast-intro-3&quot; width=&quot;537&quot; height=&quot;41&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;br /&gt;&lt;br /&gt;Now let's analyse the destination MAC address:&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-4.gif&quot; alt=&quot;multicast-intro-4&quot; width=&quot;468&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;When my gateway receives the packet, it knows it's a unicast packet as explained in the above image.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Let's now have a look at the &lt;strong&gt;destination&lt;/strong&gt; &lt;strong&gt;MAC address&lt;/strong&gt; of a &lt;strong&gt;multicast packet&lt;/strong&gt;. Keep in mind, a multicast packet is not directed to one host but a group of hosts, so the destination MAC address will not match the unique MAC address of any computer, but the computers which are part of the multicast group will recognise the &lt;strong&gt;destination MAC address&lt;/strong&gt; and accept it for processing.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The following multicast packet was sent from our multicast server. Notice the &lt;strong&gt;destination MAC address&lt;/strong&gt; (it's a multicast):&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-5.gif&quot; alt=&quot;multicast-intro-5&quot; width=&quot;540&quot; height=&quot;37&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Analysis of the multicast destination MAC address will help make things clearer:&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-6.gif&quot; alt=&quot;multicast-intro-6&quot; width=&quot;468&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;So now you should be able to understand how computers can differentiate between a normal or &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-unicast.html&quot; target=&quot;_blank&quot; title=&quot;unicast packet&quot;&gt;unicast packet&lt;/a&gt; and a &lt;strong&gt;multicast packet&lt;/strong&gt;. Remember, the &lt;strong&gt;destination&lt;/strong&gt; MAC address &lt;strong&gt;01-00-5E-00-00-05&lt;/strong&gt; does not belong to a host, and is recognised by computers that are part of the &lt;strong&gt;multicast group&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;strong&gt;Multicast MAC addresses&lt;/strong&gt; are always used in the &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Destination MAC address&quot;&gt;destination MAC address field&lt;/a&gt; of an &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet packet&quot;&gt;Ethernet packet&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The IEEE group used a special &lt;em&gt;Rule&lt;/em&gt; to determine the various MAC addresses that will be considered for multicasting. This rule is covered in the last section of this page, but you don't need to know it now in order to understand Hardware multicasting. Using this special rule it was determined that &lt;strong&gt;MAC address 01:00:5E:00:00:05&lt;/strong&gt; will be used for the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;OSPF protocol&quot;&gt;OSPF protocol&lt;/a&gt;, which happens to be a routing protocol, and then this MAC address also maps to an IP address which is analysed in &lt;strong&gt;IP Multicast&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;IP Multicast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The &lt;strong&gt;IP Multicast&lt;/strong&gt; is the second part of multicasting which, combined with the hardware multicasting, gives us a multicasting model that works for our Ethernet network. If hardware multicasting fails to work, then the packet will never arrive at the network layer upon which IP multicasting is based, so the whole model fails.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;With IP multicasting the hardware multicasting MAC address is mapped to an IP Address. Once Layer 2 (Datalink) picks the multicast packet from the network (because it recognises it, as the destination MAC address is a multicast) it will strip the MAC addresses off and send the rest to the above layer, which is the Network Layer. At that point, the Network Layer needs to be able to understand it's dealing with a multicast, so the IP address is set in a way that allows the computer to see it as a multicast datagram. A host may send multicast datagrams to a multicast group without being a member.&lt;/p&gt;
&lt;p&gt;Multicasts are used a lot between routers so they can discover each other on an IP network. For example, an &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Open Shortest Path First (OSPF)&quot;&gt;Open Shortest Path First (OSPF)&lt;/a&gt; router sends a &quot;hello&quot; packet to other OSPF routers on the network. The OSPF router must send this &quot;hello&quot; packet to an assigned multicast address, which is &lt;strong&gt;224.0.0.5&lt;/strong&gt;, and the other routers will respond.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;IP Multicast uses &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol/protocols-ip-network-id.html&quot; target=&quot;_blank&quot; title=&quot;Class D IP Addresses&quot;&gt;Class D IP Addresses&lt;/a&gt;:&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-7.gif&quot; alt=&quot;multicast-intro-7&quot; width=&quot;425&quot; height=&quot;213&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;br /&gt;Let's have a look at an example so we can understand that a bit better:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The picture below is a screenshot from my packet sniffer, it shows a multicast packet which was sent from my NetWare server, notice the destination IP address:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-8.gif&quot; alt=&quot;multicast-intro-8&quot; width=&quot;540&quot; height=&quot;37&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;The screenshot above shows the packet which was captured, it's simply displaying a quick summary of what was caught. But, when we look on the left, we see the above packet in much more detail.&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-9.gif&quot; alt=&quot;multicast-intro-9&quot; width=&quot;272&quot; height=&quot;326&quot; style=&quot;border-color: #000000; margin: 5px; float: right;&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;You can clearly see the markings I have put at the bottom which show you that the destination IP for this packet is IP Address 224.0.0.5. This corresponds to a multicast IP and therefore is a multicast packet.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;The MAC header also shows a destination MAC address of 01-00-5E-00-00-05 which we analysed in the previous section to show you how this is identified as a multicast packet at Layer 2 (Datalink Layer).&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Some examples of IP multicast addresses:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;224.0.0.0 Base Address (Reserved) [RFC1112,JBP]&lt;br /&gt; 224.0.0.1 All Systems on this Subnet [RFC1112,JBP]&lt;br /&gt; 224.0.0.2 All Routers on this Subnet [JBP]&lt;br /&gt; 224.0.0.3 Unassigned [JBP]&lt;br /&gt; 224.0.0.4 DVMRP Routers [RFC1075,JBP]&lt;br /&gt; 224.0.0.5 OSPFIGP OSPFIGP All Routers [RFC2328,JXM1]&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Remember that these IP Addresses have been assigned by the IEEE !&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Now all that's left is to explain how the IP multicast and MAC multicast map between each other...&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;h4 align=&quot;left&quot;&gt;Mapping IP Multicast to Ethernet Multicast&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The last part of multicast which combines the Hardware Multicasting and IP Multicasting is the Mapping between them. There is a rule for the mapping, and this is it:&lt;/p&gt;
&lt;p class=&quot;box-info&quot; align=&quot;left&quot;&gt;To map an &lt;strong&gt;IP Multicast address&lt;/strong&gt; to the corresponding Hardward/Ethernet multicast address, place the &lt;strong&gt;low-order 23 bits&lt;/strong&gt; of the IP multicast address into the &lt;strong&gt;low-order 23 bits&lt;/strong&gt; of the special Ethernet multicast address. The rest of the high-order bits are defined by the IEEE (yellow colour in the example)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The above rule basically determines the Hardware MAC address. Let's have a look at a real example to understand this.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We are going to use Multicast IP Address 224.0.0.5 - a multicast for the OSPF routing protocol. The picture below shows us the analysis of the IP address in binary so we can clearly see all the bits:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-10.gif&quot; alt=&quot;multicast-intro-10&quot; width=&quot;468&quot; height=&quot;383&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;It might seem a bit confusing at first, but let's break it down:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We have an IP Address of 224.0.0.5, this is then converted into binary so we can clearly see the mapping of the 23 bits to the MAC address of the computer. The MAC Address part which is in yellow has been defined by the IEEE group. So the &lt;strong&gt;yellow&lt;/strong&gt; and &lt;strong&gt;pink&lt;/strong&gt; line make the one MAC Address as shown in binary mode, then we convert it from binary to hex and that's about it !&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;You should keep in mind that multicast routers should not forward any multicast datagram with destination addresses in the following &lt;strong&gt;224.0.0.0&lt;/strong&gt; and &lt;strong&gt;224.0.0.255&lt;/strong&gt;. The next page (multicasting list) gives a bit more information on this.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Internet Multicast Addressess&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Host Extensions for IP Multicasting [&lt;a href=&quot;https://datatracker.ietf.org/doc/html/rfc1112&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;RFC1112&quot;&gt;RFC1112&lt;/a&gt;] specifies the extensions required of a host implementation of the Internet Protocol (IP) to support multicasting. Current addresses are listed below.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The range of addresses between &lt;strong&gt;224.0.0.0&lt;/strong&gt; and &lt;strong&gt;224.0.0.255&lt;/strong&gt;, inclusive, is reserved for the use of routing protocols and other low-level topology discovery or maintenance protocols, such as gateway discovery and group membership reporting. Multicast routers should not forward&lt;br /&gt; any multicast datagram with destination addresses in this range, regardless of its TTL.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.0.0.0&lt;/strong&gt; Base Address (Reserved) [RFC1112,JBP]&lt;br /&gt; &lt;strong&gt;224.0.0.1&lt;/strong&gt; All Systems on this Subnet [RFC1112,JBP]&lt;br /&gt; &lt;strong&gt;224.0.0.2&lt;/strong&gt; All Routers on this Subnet [JBP]&lt;br /&gt; &lt;strong&gt;224.0.0.3&lt;/strong&gt; Unassigned [JBP]&lt;br /&gt; &lt;strong&gt;224.0.0.4&lt;/strong&gt; DVMRP Routers [RFC1075,JBP]&lt;br /&gt; &lt;strong&gt;224.0.0.5&lt;/strong&gt; OSPF - IGP All Routers [RFC1583,JXM1]&lt;br /&gt; &lt;strong&gt;224.0.0.6&lt;/strong&gt; OSPF - IGP Designated Routers [RFC1583,JXM1]&lt;br /&gt; &lt;strong&gt;224.0.0.7&lt;/strong&gt; ST Routers [RFC1190,KS14]&lt;br /&gt; &lt;strong&gt;224.0.0.8&lt;/strong&gt; ST Hosts [RFC1190,KS14]&lt;br /&gt; &lt;strong&gt;224.0.0.9&lt;/strong&gt; RIP2 Routers [RFC1723,GSM11]&lt;br /&gt; &lt;strong&gt;224.0.0.10&lt;/strong&gt; IGRP Routers [Dino Farinacci]&lt;br /&gt; &lt;strong&gt;224.0.0.11&lt;/strong&gt; Mobile-Agents [Bill Simpson]&lt;br /&gt; &lt;strong&gt;224.0.0.12&lt;/strong&gt; DHCP Server / Relay Agent [RFC1884]&lt;br /&gt; &lt;strong&gt;224.0.0.12&lt;/strong&gt; - 224.0.0.255 Unassigned [JBP]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.0.1.23&lt;/strong&gt; XINGTV&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.0.2.1&lt;/strong&gt; &quot;rwho&quot; Group (BSD) (unofficial) [JBP]&lt;br /&gt; &lt;strong&gt;224.0.2.2&lt;/strong&gt; SUN RPC PMAPPROC_CALLIT [BXE1]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.0.3.000-224.0.3.255&lt;/strong&gt; RFE Generic Service [DXS3]&lt;br /&gt; &lt;strong&gt;224.0.4.000-224.0.4.255&lt;/strong&gt; RFE Individual Conferences [DXS3]&lt;br /&gt; &lt;strong&gt;224.0.5.000-224.0.5.127&lt;/strong&gt; CDPD Groups [Bob Brenner]&lt;br /&gt; &lt;strong&gt;224.0.5.128-224.0.5.255&lt;/strong&gt; Unassigned [IANA]&lt;br /&gt; &lt;strong&gt;224.0.6.000-224.0.6.127&lt;/strong&gt; Cornell ISIS Project [Tim Clark]&lt;br /&gt; &lt;strong&gt;224.0.6.128-224.0.6.255&lt;/strong&gt; Unassigned [IANA]&lt;br /&gt; &lt;strong&gt;224.0.7.000-224.0.7.255&lt;/strong&gt; Where-Are-You [Simpson]&lt;br /&gt; &lt;strong&gt;224.0.8.000-224.0.8.255&lt;/strong&gt; INTV [Tynan]&lt;br /&gt; &lt;strong&gt;224.0.9.000-224.0.9.255&lt;/strong&gt; Internet Railroad [Malamud]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.1.0.0-224.1.255.255&lt;/strong&gt; ST Multicast Groups [RFC1190,KS14]&lt;br /&gt; &lt;strong&gt;224.2.0.0-224.2.255.255&lt;/strong&gt; Multimedia Conference Calls [SC3]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.252.0.0-224.255.255.255&lt;/strong&gt; DIS transient groups [Joel Snyder]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;232.0.0.0-232.255.255.255&lt;/strong&gt; VMTP transient groups [RFC1045,DRC3]&lt;/p&gt;
&lt;p&gt;These addresses are listed in the &lt;strong&gt;Domain Name Service&lt;/strong&gt; under &lt;strong&gt;MCAST.NET &lt;/strong&gt;and &lt;strong&gt;224.IN-ADDR.ARPA.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Note that when used on an &lt;strong&gt;Ethernet&lt;/strong&gt; or &lt;strong&gt;IEEE 802 network&lt;/strong&gt;, the &lt;strong&gt;23 low-order bits&lt;/strong&gt; of the &lt;strong&gt;IP Multicast address&lt;/strong&gt; are placed in the &lt;strong&gt;low-order&lt;br /&gt; 23 bits&lt;/strong&gt; of the &lt;strong&gt;Ethernet&lt;/strong&gt; or &lt;strong&gt;IEEE 802 net multicast address 1.0.94.0.0.0&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This article explained what multicasting is, &lt;strong&gt;how it works&lt;/strong&gt; and its importance within a network and the internet. We analyzed the &lt;strong&gt;structure&lt;/strong&gt; of a &lt;strong&gt;multicast address&lt;/strong&gt;, the &lt;strong&gt;concept&lt;/strong&gt; of &lt;strong&gt;multicast groups&lt;/strong&gt;, purpose of &lt;strong&gt;IGMP&lt;/strong&gt; and more. We talked about &lt;strong&gt;IP multicasting&lt;/strong&gt;,&amp;nbsp; Ethernet multicasting and their role. Finally we provided a list of &lt;strong&gt;IP multicast addresses&lt;/strong&gt; and related &lt;strong&gt;RFCs&lt;/strong&gt;. For more information on network protocols, analysis and functionality, please visit our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Network Protocols&quot;&gt;Network Protocols&lt;/a&gt; or &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals.html&quot; target=&quot;_blank&quot; title=&quot;Network Fundamentals&quot;&gt;Network Fundamentals&lt;/a&gt; section.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/multicast-intro.webp&quot; alt=&quot;How Multicast Works&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro.webp&quot; alt=&quot;Introduction to Network Multicast&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to Network Multicast&quot; /&gt;Multicast&lt;/strong&gt; is a communication method used in computer networking where data is sent from a single sender to a group of destination devices. In this method, the sender sends the data packet to a specific multicast address, which is assigned to a group of devices. The data packet is then forwarded by network devices to all devices that have subscribed to the multicast group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Multicasting&lt;/strong&gt; is an efficient method of sending data to a &lt;strong&gt;group of devices&lt;/strong&gt;, as it reduces network traffic and ensures that data is delivered to all devices in the group &lt;strong&gt;simultaneously&lt;/strong&gt;. Multicasting is widely used in various network protocols, such as &lt;strong&gt;IPTV&lt;/strong&gt;, &lt;strong&gt;video conferencing&lt;/strong&gt;, and &lt;strong&gt;online gaming&lt;/strong&gt;. In this article, we will discuss the &lt;strong&gt;importance and benefits of multicasting&lt;/strong&gt;, as well as its use in different network applications.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: left;&quot;&gt;Note: Understanding Multicast requires solid knowledge on the structure and purpose of &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC Addresses&quot;&gt;MAC Addresses&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some describe a multicast similar to a &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;network broadcast&quot;&gt;broadcast&lt;/a&gt; in that it targets a number of devices or hosts on a network, but not all. While a &lt;strong&gt;broadcast&lt;/strong&gt; is directed to &lt;strong&gt;all hosts&lt;/strong&gt; on the local segment, a multicast is directed to a group of hosts. With multicast, the hosts can select whether they wish to participate in the multicast group with the use of the &lt;strong&gt; Internet Group Management Protocol&lt;/strong&gt; (IGMP) protocol.&lt;/p&gt;
&lt;p&gt;Below is a simple example of a group of hosts (host A and D) being part of a multicast group who receive and process a stream of data:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-1.gif&quot; alt=&quot;multicast-intro-1&quot; width=&quot;480&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Multicast Fundamentals&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;To help explain how multicast works, we've split this section into three different topics:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Hardware/Ethernet Multicasting&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IP Multicasting&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Mapping IP Multicast to Ethernet Multicast&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A typical multicast on an Ethernet network, using the TCP/IP protocol, consists of two parts: Hardware/Ethernet multicast and IP Multicast. Later on I will talk about Mapping IP Multicast to Ethernet Multicast which is really what happens with multicasting on our Ethernet network using the TCP/IP protocol.&lt;/p&gt;
&lt;p&gt;The brief diagram below shows you the relationship between the 3 and how they complete the multicasting model:&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-2.gif&quot; alt=&quot;multicast-intro-2&quot; width=&quot;425&quot; height=&quot;213&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Hardware/Ethernet Multicasting&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;When a computer joins a multicast group, it needs to be able to distinguish between normal unicasts (which are packets directed to one computer or one MAC address) and multicasts. With hardware multicasting, the network card is configured, via its drivers, to watch out for particular &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC addresses&quot;&gt;MAC addresses&lt;/a&gt; (in this case, multicast MAC addresses) apart from its own. When the network card picks up a packet which has a destination MAC that matches any of the multicast MAC addresses, it will pass it to the upper layers for further processing.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;And this is how they do it:&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;Ethernet uses the low-order bit of the high-order octet to distinguish conventional unicast addresses from multicast addresses. A unicast would have this bit set to &lt;strong&gt;ZERO&lt;/strong&gt; (&lt;strong&gt;0&lt;/strong&gt;), whereas a multicast would be set to &lt;strong&gt;ONE&lt;/strong&gt; &lt;strong&gt;(1&lt;/strong&gt;)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;To understand this, we need to analyse the destination MAC address of a unicast and multicast packet, so you can see what we are talking about:&lt;/p&gt;
&lt;p&gt;When a normal (unicast) packet is put on the network by a computer, it contains the Source and Destination MAC address, found in the 2nd Layer of the OSI model. The following picture is an example of my workstation (192.168.0.6) sending a packet to my network's gateway (192.168.0.5):&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-3.gif&quot; alt=&quot;multicast-intro-3&quot; width=&quot;537&quot; height=&quot;41&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;br /&gt;&lt;br /&gt;Now let's analyse the destination MAC address:&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-4.gif&quot; alt=&quot;multicast-intro-4&quot; width=&quot;468&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;When my gateway receives the packet, it knows it's a unicast packet as explained in the above image.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Let's now have a look at the &lt;strong&gt;destination&lt;/strong&gt; &lt;strong&gt;MAC address&lt;/strong&gt; of a &lt;strong&gt;multicast packet&lt;/strong&gt;. Keep in mind, a multicast packet is not directed to one host but a group of hosts, so the destination MAC address will not match the unique MAC address of any computer, but the computers which are part of the multicast group will recognise the &lt;strong&gt;destination MAC address&lt;/strong&gt; and accept it for processing.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The following multicast packet was sent from our multicast server. Notice the &lt;strong&gt;destination MAC address&lt;/strong&gt; (it's a multicast):&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-5.gif&quot; alt=&quot;multicast-intro-5&quot; width=&quot;540&quot; height=&quot;37&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Analysis of the multicast destination MAC address will help make things clearer:&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-6.gif&quot; alt=&quot;multicast-intro-6&quot; width=&quot;468&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;So now you should be able to understand how computers can differentiate between a normal or &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-unicast.html&quot; target=&quot;_blank&quot; title=&quot;unicast packet&quot;&gt;unicast packet&lt;/a&gt; and a &lt;strong&gt;multicast packet&lt;/strong&gt;. Remember, the &lt;strong&gt;destination&lt;/strong&gt; MAC address &lt;strong&gt;01-00-5E-00-00-05&lt;/strong&gt; does not belong to a host, and is recognised by computers that are part of the &lt;strong&gt;multicast group&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;strong&gt;Multicast MAC addresses&lt;/strong&gt; are always used in the &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Destination MAC address&quot;&gt;destination MAC address field&lt;/a&gt; of an &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet packet&quot;&gt;Ethernet packet&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The IEEE group used a special &lt;em&gt;Rule&lt;/em&gt; to determine the various MAC addresses that will be considered for multicasting. This rule is covered in the last section of this page, but you don't need to know it now in order to understand Hardware multicasting. Using this special rule it was determined that &lt;strong&gt;MAC address 01:00:5E:00:00:05&lt;/strong&gt; will be used for the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;OSPF protocol&quot;&gt;OSPF protocol&lt;/a&gt;, which happens to be a routing protocol, and then this MAC address also maps to an IP address which is analysed in &lt;strong&gt;IP Multicast&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;IP Multicast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The &lt;strong&gt;IP Multicast&lt;/strong&gt; is the second part of multicasting which, combined with the hardware multicasting, gives us a multicasting model that works for our Ethernet network. If hardware multicasting fails to work, then the packet will never arrive at the network layer upon which IP multicasting is based, so the whole model fails.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;With IP multicasting the hardware multicasting MAC address is mapped to an IP Address. Once Layer 2 (Datalink) picks the multicast packet from the network (because it recognises it, as the destination MAC address is a multicast) it will strip the MAC addresses off and send the rest to the above layer, which is the Network Layer. At that point, the Network Layer needs to be able to understand it's dealing with a multicast, so the IP address is set in a way that allows the computer to see it as a multicast datagram. A host may send multicast datagrams to a multicast group without being a member.&lt;/p&gt;
&lt;p&gt;Multicasts are used a lot between routers so they can discover each other on an IP network. For example, an &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Open Shortest Path First (OSPF)&quot;&gt;Open Shortest Path First (OSPF)&lt;/a&gt; router sends a &quot;hello&quot; packet to other OSPF routers on the network. The OSPF router must send this &quot;hello&quot; packet to an assigned multicast address, which is &lt;strong&gt;224.0.0.5&lt;/strong&gt;, and the other routers will respond.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;IP Multicast uses &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol/protocols-ip-network-id.html&quot; target=&quot;_blank&quot; title=&quot;Class D IP Addresses&quot;&gt;Class D IP Addresses&lt;/a&gt;:&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-7.gif&quot; alt=&quot;multicast-intro-7&quot; width=&quot;425&quot; height=&quot;213&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;br /&gt;Let's have a look at an example so we can understand that a bit better:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The picture below is a screenshot from my packet sniffer, it shows a multicast packet which was sent from my NetWare server, notice the destination IP address:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-8.gif&quot; alt=&quot;multicast-intro-8&quot; width=&quot;540&quot; height=&quot;37&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;The screenshot above shows the packet which was captured, it's simply displaying a quick summary of what was caught. But, when we look on the left, we see the above packet in much more detail.&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-9.gif&quot; alt=&quot;multicast-intro-9&quot; width=&quot;272&quot; height=&quot;326&quot; style=&quot;border-color: #000000; margin: 5px; float: right;&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;You can clearly see the markings I have put at the bottom which show you that the destination IP for this packet is IP Address 224.0.0.5. This corresponds to a multicast IP and therefore is a multicast packet.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;The MAC header also shows a destination MAC address of 01-00-5E-00-00-05 which we analysed in the previous section to show you how this is identified as a multicast packet at Layer 2 (Datalink Layer).&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Some examples of IP multicast addresses:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;224.0.0.0 Base Address (Reserved) [RFC1112,JBP]&lt;br /&gt; 224.0.0.1 All Systems on this Subnet [RFC1112,JBP]&lt;br /&gt; 224.0.0.2 All Routers on this Subnet [JBP]&lt;br /&gt; 224.0.0.3 Unassigned [JBP]&lt;br /&gt; 224.0.0.4 DVMRP Routers [RFC1075,JBP]&lt;br /&gt; 224.0.0.5 OSPFIGP OSPFIGP All Routers [RFC2328,JXM1]&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Remember that these IP Addresses have been assigned by the IEEE !&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Now all that's left is to explain how the IP multicast and MAC multicast map between each other...&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;h4 align=&quot;left&quot;&gt;Mapping IP Multicast to Ethernet Multicast&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The last part of multicast which combines the Hardware Multicasting and IP Multicasting is the Mapping between them. There is a rule for the mapping, and this is it:&lt;/p&gt;
&lt;p class=&quot;box-info&quot; align=&quot;left&quot;&gt;To map an &lt;strong&gt;IP Multicast address&lt;/strong&gt; to the corresponding Hardward/Ethernet multicast address, place the &lt;strong&gt;low-order 23 bits&lt;/strong&gt; of the IP multicast address into the &lt;strong&gt;low-order 23 bits&lt;/strong&gt; of the special Ethernet multicast address. The rest of the high-order bits are defined by the IEEE (yellow colour in the example)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The above rule basically determines the Hardware MAC address. Let's have a look at a real example to understand this.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;We are going to use Multicast IP Address 224.0.0.5 - a multicast for the OSPF routing protocol. The picture below shows us the analysis of the IP address in binary so we can clearly see all the bits:&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/multicast-intro-10.gif&quot; alt=&quot;multicast-intro-10&quot; width=&quot;468&quot; height=&quot;383&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;It might seem a bit confusing at first, but let's break it down:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We have an IP Address of 224.0.0.5, this is then converted into binary so we can clearly see the mapping of the 23 bits to the MAC address of the computer. The MAC Address part which is in yellow has been defined by the IEEE group. So the &lt;strong&gt;yellow&lt;/strong&gt; and &lt;strong&gt;pink&lt;/strong&gt; line make the one MAC Address as shown in binary mode, then we convert it from binary to hex and that's about it !&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;You should keep in mind that multicast routers should not forward any multicast datagram with destination addresses in the following &lt;strong&gt;224.0.0.0&lt;/strong&gt; and &lt;strong&gt;224.0.0.255&lt;/strong&gt;. The next page (multicasting list) gives a bit more information on this.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Internet Multicast Addressess&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Host Extensions for IP Multicasting [&lt;a href=&quot;https://datatracker.ietf.org/doc/html/rfc1112&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;RFC1112&quot;&gt;RFC1112&lt;/a&gt;] specifies the extensions required of a host implementation of the Internet Protocol (IP) to support multicasting. Current addresses are listed below.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The range of addresses between &lt;strong&gt;224.0.0.0&lt;/strong&gt; and &lt;strong&gt;224.0.0.255&lt;/strong&gt;, inclusive, is reserved for the use of routing protocols and other low-level topology discovery or maintenance protocols, such as gateway discovery and group membership reporting. Multicast routers should not forward&lt;br /&gt; any multicast datagram with destination addresses in this range, regardless of its TTL.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.0.0.0&lt;/strong&gt; Base Address (Reserved) [RFC1112,JBP]&lt;br /&gt; &lt;strong&gt;224.0.0.1&lt;/strong&gt; All Systems on this Subnet [RFC1112,JBP]&lt;br /&gt; &lt;strong&gt;224.0.0.2&lt;/strong&gt; All Routers on this Subnet [JBP]&lt;br /&gt; &lt;strong&gt;224.0.0.3&lt;/strong&gt; Unassigned [JBP]&lt;br /&gt; &lt;strong&gt;224.0.0.4&lt;/strong&gt; DVMRP Routers [RFC1075,JBP]&lt;br /&gt; &lt;strong&gt;224.0.0.5&lt;/strong&gt; OSPF - IGP All Routers [RFC1583,JXM1]&lt;br /&gt; &lt;strong&gt;224.0.0.6&lt;/strong&gt; OSPF - IGP Designated Routers [RFC1583,JXM1]&lt;br /&gt; &lt;strong&gt;224.0.0.7&lt;/strong&gt; ST Routers [RFC1190,KS14]&lt;br /&gt; &lt;strong&gt;224.0.0.8&lt;/strong&gt; ST Hosts [RFC1190,KS14]&lt;br /&gt; &lt;strong&gt;224.0.0.9&lt;/strong&gt; RIP2 Routers [RFC1723,GSM11]&lt;br /&gt; &lt;strong&gt;224.0.0.10&lt;/strong&gt; IGRP Routers [Dino Farinacci]&lt;br /&gt; &lt;strong&gt;224.0.0.11&lt;/strong&gt; Mobile-Agents [Bill Simpson]&lt;br /&gt; &lt;strong&gt;224.0.0.12&lt;/strong&gt; DHCP Server / Relay Agent [RFC1884]&lt;br /&gt; &lt;strong&gt;224.0.0.12&lt;/strong&gt; - 224.0.0.255 Unassigned [JBP]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.0.1.23&lt;/strong&gt; XINGTV&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.0.2.1&lt;/strong&gt; &quot;rwho&quot; Group (BSD) (unofficial) [JBP]&lt;br /&gt; &lt;strong&gt;224.0.2.2&lt;/strong&gt; SUN RPC PMAPPROC_CALLIT [BXE1]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.0.3.000-224.0.3.255&lt;/strong&gt; RFE Generic Service [DXS3]&lt;br /&gt; &lt;strong&gt;224.0.4.000-224.0.4.255&lt;/strong&gt; RFE Individual Conferences [DXS3]&lt;br /&gt; &lt;strong&gt;224.0.5.000-224.0.5.127&lt;/strong&gt; CDPD Groups [Bob Brenner]&lt;br /&gt; &lt;strong&gt;224.0.5.128-224.0.5.255&lt;/strong&gt; Unassigned [IANA]&lt;br /&gt; &lt;strong&gt;224.0.6.000-224.0.6.127&lt;/strong&gt; Cornell ISIS Project [Tim Clark]&lt;br /&gt; &lt;strong&gt;224.0.6.128-224.0.6.255&lt;/strong&gt; Unassigned [IANA]&lt;br /&gt; &lt;strong&gt;224.0.7.000-224.0.7.255&lt;/strong&gt; Where-Are-You [Simpson]&lt;br /&gt; &lt;strong&gt;224.0.8.000-224.0.8.255&lt;/strong&gt; INTV [Tynan]&lt;br /&gt; &lt;strong&gt;224.0.9.000-224.0.9.255&lt;/strong&gt; Internet Railroad [Malamud]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.1.0.0-224.1.255.255&lt;/strong&gt; ST Multicast Groups [RFC1190,KS14]&lt;br /&gt; &lt;strong&gt;224.2.0.0-224.2.255.255&lt;/strong&gt; Multimedia Conference Calls [SC3]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;224.252.0.0-224.255.255.255&lt;/strong&gt; DIS transient groups [Joel Snyder]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;232.0.0.0-232.255.255.255&lt;/strong&gt; VMTP transient groups [RFC1045,DRC3]&lt;/p&gt;
&lt;p&gt;These addresses are listed in the &lt;strong&gt;Domain Name Service&lt;/strong&gt; under &lt;strong&gt;MCAST.NET &lt;/strong&gt;and &lt;strong&gt;224.IN-ADDR.ARPA.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Note that when used on an &lt;strong&gt;Ethernet&lt;/strong&gt; or &lt;strong&gt;IEEE 802 network&lt;/strong&gt;, the &lt;strong&gt;23 low-order bits&lt;/strong&gt; of the &lt;strong&gt;IP Multicast address&lt;/strong&gt; are placed in the &lt;strong&gt;low-order&lt;br /&gt; 23 bits&lt;/strong&gt; of the &lt;strong&gt;Ethernet&lt;/strong&gt; or &lt;strong&gt;IEEE 802 net multicast address 1.0.94.0.0.0&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This article explained what multicasting is, &lt;strong&gt;how it works&lt;/strong&gt; and its importance within a network and the internet. We analyzed the &lt;strong&gt;structure&lt;/strong&gt; of a &lt;strong&gt;multicast address&lt;/strong&gt;, the &lt;strong&gt;concept&lt;/strong&gt; of &lt;strong&gt;multicast groups&lt;/strong&gt;, purpose of &lt;strong&gt;IGMP&lt;/strong&gt; and more. We talked about &lt;strong&gt;IP multicasting&lt;/strong&gt;,&amp;nbsp; Ethernet multicasting and their role. Finally we provided a list of &lt;strong&gt;IP multicast addresses&lt;/strong&gt; and related &lt;strong&gt;RFCs&lt;/strong&gt;. For more information on network protocols, analysis and functionality, please visit our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Network Protocols&quot;&gt;Network Protocols&lt;/a&gt; or &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals.html&quot; target=&quot;_blank&quot; title=&quot;Network Fundamentals&quot;&gt;Network Fundamentals&lt;/a&gt; section.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Network Unicast - Its role and Importance</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/network-unicast.html"/>
		<published>2011-04-18T00:38:14+10:00</published>
		<updated>2011-04-18T00:38:14+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/network-unicast.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/unicast-intro.webp&quot; alt=&quot;Network Unicast&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;div class=&quot;flex flex-grow flex-col gap-3&quot;&gt;
&lt;div class=&quot;min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap break-words&quot;&gt;
&lt;div class=&quot;markdown prose w-full break-words dark:prose-invert dark&quot;&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/unicast-intro.webp&quot; alt=&quot;Network Unicast&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Network Unicast&quot; /&gt;Unicast&lt;/strong&gt; is a communication method used in computer networking where data is sent from a single sender to a specific destination device. In this method, the sender sends the data packet to a unique IP address, which is assigned to the destination device. This is in contrast to broadcast or multicast communication methods, where data is sent to all devices on the network or to a group of devices, respectively.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Unicast&lt;/strong&gt; is a widely used communication method in computer networking, and it plays a critical role in ensuring efficient communication between devices on a network. Some of the important aspects of unicast communication are discussed below:&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;The Purpose of Unicast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The purpose of unicast communication is to enable one-to-one communication between devices on a network. This is useful when the sender wants to send data to a specific destination device, without broadcasting the data to all devices on the network. For example, when you access a website, your computer sends a unicast message to the web server requesting data, and the web server sends a unicast message back to your computer with the requested data.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/unicast-1.gif&quot; alt=&quot;Network Unicast and its purpose&quot; width=&quot;354&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Network Unicast and its purpose&quot; /&gt;The Importance of Unicast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast communication is an essential part of network infrastructure, as it is used in various &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols.html&quot; target=&quot;_blank&quot; title=&quot;network protocols&quot;&gt;network protocols&lt;/a&gt; such as &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;TCP&quot;&gt;TCP&lt;/a&gt;, HTTP, and SMTP. It plays a crucial role in ensuring efficient data transfer between devices on a network, as data packets are sent directly to the destination device, without causing network congestion or unnecessary data transmission.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Unicast Addressing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In unicast communication, devices are identified by their unique IP addresses. An &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol.html&quot; target=&quot;_blank&quot; title=&quot;IP address&quot;&gt;IP address&lt;/a&gt; is a &lt;strong&gt;32-bit number&lt;/strong&gt; that identifies a device on a network. In IPv4, which is the most widely used Internet Protocol, IP addresses are represented as four sets of decimal numbers separated by dots. For example, 192.168.1.1 is an IP address that identifies a device on a network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Unicast's Role in Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast communication relies on &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols.html&quot; target=&quot;_blank&quot; title=&quot;Routing Protocols&quot;&gt;routing protocols&lt;/a&gt; to ensure that data packets are sent to the correct destination device. Routing protocols are algorithms used by network devices, such as routers, to determine the best path for data packets to reach their destination. They use various metrics, such as hop count, link speed, and network congestion, to determine the optimal path for data packets.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Unicast's role in Communication Efficiency&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast communication is a highly efficient method of data transfer, as data packets are sent directly to the destination device. This reduces network congestion and ensures that data is delivered to the intended recipient without unnecessary delay. It also allows for efficient use of network resources, as only the intended recipient receives the data packet, and not all devices on the network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Unicast Security&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast communication is more secure than &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;broadcast communication&quot;&gt;broadcast communication&lt;/a&gt;, as data packets are only sent to the intended recipient. This reduces the risk of data interception and eavesdropping, which can occur in broadcast communication, where data packets are sent to all devices on the network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast communication is an essential part of network infrastructure, enabling efficient and secure communication between devices on a network. It plays a critical role in ensuring efficient data transfer, reducing network congestion, and &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-performance-testing.html&quot; target=&quot;_blank&quot; title=&quot;improving network performance&quot;&gt;improving network performance&lt;/a&gt;. By using unique IP addresses to identify devices on a network, and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols.html&quot; target=&quot;_blank&quot; title=&quot;routing protocols&quot;&gt;routing protocols&lt;/a&gt; to determine the best path for data packets, unicast communication allows for efficient and secure communication between devices on a network.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals.html&quot; title=&quot;Back to Network Fundamentals Section&quot;&gt;Back to Network Fundamentals Section&lt;/a&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/unicast-intro.webp&quot; alt=&quot;Network Unicast&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;div class=&quot;flex flex-grow flex-col gap-3&quot;&gt;
&lt;div class=&quot;min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap break-words&quot;&gt;
&lt;div class=&quot;markdown prose w-full break-words dark:prose-invert dark&quot;&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/unicast-intro.webp&quot; alt=&quot;Network Unicast&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Network Unicast&quot; /&gt;Unicast&lt;/strong&gt; is a communication method used in computer networking where data is sent from a single sender to a specific destination device. In this method, the sender sends the data packet to a unique IP address, which is assigned to the destination device. This is in contrast to broadcast or multicast communication methods, where data is sent to all devices on the network or to a group of devices, respectively.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Unicast&lt;/strong&gt; is a widely used communication method in computer networking, and it plays a critical role in ensuring efficient communication between devices on a network. Some of the important aspects of unicast communication are discussed below:&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;The Purpose of Unicast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The purpose of unicast communication is to enable one-to-one communication between devices on a network. This is useful when the sender wants to send data to a specific destination device, without broadcasting the data to all devices on the network. For example, when you access a website, your computer sends a unicast message to the web server requesting data, and the web server sends a unicast message back to your computer with the requested data.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/unicast-1.gif&quot; alt=&quot;Network Unicast and its purpose&quot; width=&quot;354&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Network Unicast and its purpose&quot; /&gt;The Importance of Unicast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast communication is an essential part of network infrastructure, as it is used in various &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols.html&quot; target=&quot;_blank&quot; title=&quot;network protocols&quot;&gt;network protocols&lt;/a&gt; such as &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;TCP&quot;&gt;TCP&lt;/a&gt;, HTTP, and SMTP. It plays a crucial role in ensuring efficient data transfer between devices on a network, as data packets are sent directly to the destination device, without causing network congestion or unnecessary data transmission.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Unicast Addressing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In unicast communication, devices are identified by their unique IP addresses. An &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol.html&quot; target=&quot;_blank&quot; title=&quot;IP address&quot;&gt;IP address&lt;/a&gt; is a &lt;strong&gt;32-bit number&lt;/strong&gt; that identifies a device on a network. In IPv4, which is the most widely used Internet Protocol, IP addresses are represented as four sets of decimal numbers separated by dots. For example, 192.168.1.1 is an IP address that identifies a device on a network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Unicast's Role in Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast communication relies on &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols.html&quot; target=&quot;_blank&quot; title=&quot;Routing Protocols&quot;&gt;routing protocols&lt;/a&gt; to ensure that data packets are sent to the correct destination device. Routing protocols are algorithms used by network devices, such as routers, to determine the best path for data packets to reach their destination. They use various metrics, such as hop count, link speed, and network congestion, to determine the optimal path for data packets.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Unicast's role in Communication Efficiency&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast communication is a highly efficient method of data transfer, as data packets are sent directly to the destination device. This reduces network congestion and ensures that data is delivered to the intended recipient without unnecessary delay. It also allows for efficient use of network resources, as only the intended recipient receives the data packet, and not all devices on the network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Unicast Security&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast communication is more secure than &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;broadcast communication&quot;&gt;broadcast communication&lt;/a&gt;, as data packets are only sent to the intended recipient. This reduces the risk of data interception and eavesdropping, which can occur in broadcast communication, where data packets are sent to all devices on the network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast communication is an essential part of network infrastructure, enabling efficient and secure communication between devices on a network. It plays a critical role in ensuring efficient data transfer, reducing network congestion, and &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-performance-testing.html&quot; target=&quot;_blank&quot; title=&quot;improving network performance&quot;&gt;improving network performance&lt;/a&gt;. By using unique IP addresses to identify devices on a network, and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols.html&quot; target=&quot;_blank&quot; title=&quot;routing protocols&quot;&gt;routing protocols&lt;/a&gt; to determine the best path for data packets, unicast communication allows for efficient and secure communication between devices on a network.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals.html&quot; title=&quot;Back to Network Fundamentals Section&quot;&gt;Back to Network Fundamentals Section&lt;/a&gt;&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Media Access Control - MAC Addresses</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html"/>
		<published>2011-04-17T23:46:33+10:00</published>
		<updated>2011-04-17T23:46:33+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/mac-addresses-intro.webp&quot; alt=&quot;Introduction to MAC Addresses&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/mac-addresses-intro.webp&quot; alt=&quot;introduction to MAC addresses&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;introduction to MAC addresses&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;MAC address&lt;/strong&gt;, or &lt;strong&gt;Media Access Control address&lt;/strong&gt;, is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. It is a &lt;strong&gt;48-bit address&lt;/strong&gt; consisting of &lt;strong&gt;six sets&lt;/strong&gt; of &lt;strong&gt;two hexadecimal digits&lt;/strong&gt;, separated by colons or hyphens.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;MAC addresses&lt;/strong&gt; are essential in the functioning of &lt;a href=&quot;https://www.firewall.cx/networking/ethernet.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet&quot;&gt;Ethernet&lt;/a&gt; and Wi-Fi networks, as they are used to ensure that data packets are sent to the correct destination device. Every NIC has a unique MAC address, which is assigned by the device manufacturer and cannot be changed. MAC addresses are used by network switches and routers to forward data packets to the correct destination, and they play a crucial role in preventing network collisions and ensuring efficient network traffic management. MAC addresses are an essential part of network infrastructure and are used in almost all network communication protocols.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Reason for MAC&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The purpose of MAC addresses is to provide a &lt;strong&gt;unique identifier&lt;/strong&gt; for network devices and enable efficient and accurate communication between them within a network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below provides a visual representation how important MAC Addresses are on our network and at which layer of the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI Model&quot;&gt;OSI Model&lt;/a&gt; they exist:&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/mac-addresses-1.gif&quot; alt=&quot;mac-addresses-1&quot; width=&quot;431&quot; height=&quot;287&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You see, the IP address of a machine exists on the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer3.html&quot; target=&quot;_blank&quot; title=&quot;Network Layer&quot;&gt;Network Layer &lt;/a&gt;of the OSI model and, when a packet reaches the computer, it will travel from Layer 1 upwards, so we need to be able to identify the computer before Layer 3.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is where the &lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;MAC address - Layer 2&lt;/span&gt;&lt;/strong&gt; comes into the picture. All machines on a network will listen for packets that have their MAC address in the destination field of the packet (they also listen for broadcasts and other stuff, but that's analysed in other sections). The &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer1.html&quot; target=&quot;_blank&quot; title=&quot;Physical Layer&quot;&gt;Physical Layer&lt;/a&gt; understands the electrical signals on the network and creates the frame which gets passed to the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;Datalink layer&quot;&gt;Datalink layer&lt;/a&gt;. If the packet is destined for the computer then the MAC address in the destination field of the packet will match, so it will accept it and pass it onto the Layer above (3) which, in turn, will check the network address of the packet (IP Address), to make sure it matches with the network address to which the computer has been configured.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Examining a MAC Address&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Let's now have a look at a MAC address and see what it looks like! We will use our workstation's MAC address as an example:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/mac-addresses-2.gif&quot; alt=&quot;mac-addresses-2&quot; width=&quot;313&quot; height=&quot;94&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As mentioned previously, &lt;strong&gt;MAC Addresses&lt;/strong&gt; are always presented in &lt;strong&gt;HEX format&lt;/strong&gt;, just as our example above. It is very rare that a MAC address is represented in &lt;strong&gt;Binary format&lt;/strong&gt; because it is simply too long and difficult to understand, as we will see futher on.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;When a vendor, e.g Intel, produces network cards for computers, they don't just assign them any MAC address they like, this would create a big confusion in identifying who is the vendor of each network card and could possibly result in clashing with another MAC address from another vendor e.g D-link, who happened to choose the same MAC address for their network card!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;To avoid these kind of problems, the &lt;strong&gt;IEEE group&lt;/strong&gt; split the MAC address in half, and used the &lt;strong&gt;first half&lt;/strong&gt; to &lt;strong&gt;identify the vendor&lt;/strong&gt;, and the &lt;strong&gt;second half&lt;/strong&gt; is used by the vendor to allocate&amp;nbsp;&lt;strong&gt;serial numbers&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/mac-addresses-3.gif&quot; alt=&quot;mac-addresses-3&quot; width=&quot;248&quot; height=&quot;118&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Vendor code&lt;/strong&gt; is specified by &lt;a href=&quot;https://datatracker.ietf.org/doc/html/rfc1700&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;RFC - 1700&quot;&gt;RFC - 1700&lt;/a&gt;. You might find a particular vendor having more than just one code; this is because of the wide range of products they might have. They just apply for more, as they need !&lt;/p&gt;
&lt;p&gt;Keep in mind that even tho the MAC address is &quot;burnt-in&quot; to the network card's memory, some vendors will allow you to download special programs to change the &lt;strong&gt;second half of the MAC address&lt;/strong&gt; on the card. This is because the vendors actually reuse the same MAC addresses for their network cards because they create so many that they run out of numbers ! But at the same time, the chances of you buying two network cards which have the same MAC address are so small that it's almost impossible !&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Let's start talking bits and bytes!&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Now that we know what a MAC address looks like, we need to start analysing it. A MAC address of any network card is always the &lt;strong&gt;same length&lt;/strong&gt;, that is, &lt;strong&gt;6 Bytes long&lt;/strong&gt; or &lt;strong&gt;48 Bits long&lt;/strong&gt;. If you're scratching your head wondering where these figures came from, then just have a look at the picture below which makes it a bit easier to understand:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/mac-addresses-4.gif&quot; alt=&quot;mac-addresses-4&quot; width=&quot;482&quot; height=&quot;312&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Summary&lt;/h2&gt;
&lt;p&gt;In this article we explained the purpose and importance of &lt;strong&gt;MAC address&lt;/strong&gt;, or &lt;strong&gt;Media Access Control address&lt;/strong&gt;. We examined the 48-bit MAC address structure and how vendors assign serial numbers to their MAC address ranges.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/mac-addresses-intro.webp&quot; alt=&quot;Introduction to MAC Addresses&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/mac-addresses-intro.webp&quot; alt=&quot;introduction to MAC addresses&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;introduction to MAC addresses&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;MAC address&lt;/strong&gt;, or &lt;strong&gt;Media Access Control address&lt;/strong&gt;, is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. It is a &lt;strong&gt;48-bit address&lt;/strong&gt; consisting of &lt;strong&gt;six sets&lt;/strong&gt; of &lt;strong&gt;two hexadecimal digits&lt;/strong&gt;, separated by colons or hyphens.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;MAC addresses&lt;/strong&gt; are essential in the functioning of &lt;a href=&quot;https://www.firewall.cx/networking/ethernet.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet&quot;&gt;Ethernet&lt;/a&gt; and Wi-Fi networks, as they are used to ensure that data packets are sent to the correct destination device. Every NIC has a unique MAC address, which is assigned by the device manufacturer and cannot be changed. MAC addresses are used by network switches and routers to forward data packets to the correct destination, and they play a crucial role in preventing network collisions and ensuring efficient network traffic management. MAC addresses are an essential part of network infrastructure and are used in almost all network communication protocols.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Reason for MAC&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The purpose of MAC addresses is to provide a &lt;strong&gt;unique identifier&lt;/strong&gt; for network devices and enable efficient and accurate communication between them within a network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below provides a visual representation how important MAC Addresses are on our network and at which layer of the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI Model&quot;&gt;OSI Model&lt;/a&gt; they exist:&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/mac-addresses-1.gif&quot; alt=&quot;mac-addresses-1&quot; width=&quot;431&quot; height=&quot;287&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You see, the IP address of a machine exists on the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer3.html&quot; target=&quot;_blank&quot; title=&quot;Network Layer&quot;&gt;Network Layer &lt;/a&gt;of the OSI model and, when a packet reaches the computer, it will travel from Layer 1 upwards, so we need to be able to identify the computer before Layer 3.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is where the &lt;strong&gt;&lt;span style=&quot;color: #000000;&quot;&gt;MAC address - Layer 2&lt;/span&gt;&lt;/strong&gt; comes into the picture. All machines on a network will listen for packets that have their MAC address in the destination field of the packet (they also listen for broadcasts and other stuff, but that's analysed in other sections). The &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer1.html&quot; target=&quot;_blank&quot; title=&quot;Physical Layer&quot;&gt;Physical Layer&lt;/a&gt; understands the electrical signals on the network and creates the frame which gets passed to the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;Datalink layer&quot;&gt;Datalink layer&lt;/a&gt;. If the packet is destined for the computer then the MAC address in the destination field of the packet will match, so it will accept it and pass it onto the Layer above (3) which, in turn, will check the network address of the packet (IP Address), to make sure it matches with the network address to which the computer has been configured.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Examining a MAC Address&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Let's now have a look at a MAC address and see what it looks like! We will use our workstation's MAC address as an example:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/mac-addresses-2.gif&quot; alt=&quot;mac-addresses-2&quot; width=&quot;313&quot; height=&quot;94&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As mentioned previously, &lt;strong&gt;MAC Addresses&lt;/strong&gt; are always presented in &lt;strong&gt;HEX format&lt;/strong&gt;, just as our example above. It is very rare that a MAC address is represented in &lt;strong&gt;Binary format&lt;/strong&gt; because it is simply too long and difficult to understand, as we will see futher on.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;When a vendor, e.g Intel, produces network cards for computers, they don't just assign them any MAC address they like, this would create a big confusion in identifying who is the vendor of each network card and could possibly result in clashing with another MAC address from another vendor e.g D-link, who happened to choose the same MAC address for their network card!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;To avoid these kind of problems, the &lt;strong&gt;IEEE group&lt;/strong&gt; split the MAC address in half, and used the &lt;strong&gt;first half&lt;/strong&gt; to &lt;strong&gt;identify the vendor&lt;/strong&gt;, and the &lt;strong&gt;second half&lt;/strong&gt; is used by the vendor to allocate&amp;nbsp;&lt;strong&gt;serial numbers&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/mac-addresses-3.gif&quot; alt=&quot;mac-addresses-3&quot; width=&quot;248&quot; height=&quot;118&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Vendor code&lt;/strong&gt; is specified by &lt;a href=&quot;https://datatracker.ietf.org/doc/html/rfc1700&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;RFC - 1700&quot;&gt;RFC - 1700&lt;/a&gt;. You might find a particular vendor having more than just one code; this is because of the wide range of products they might have. They just apply for more, as they need !&lt;/p&gt;
&lt;p&gt;Keep in mind that even tho the MAC address is &quot;burnt-in&quot; to the network card's memory, some vendors will allow you to download special programs to change the &lt;strong&gt;second half of the MAC address&lt;/strong&gt; on the card. This is because the vendors actually reuse the same MAC addresses for their network cards because they create so many that they run out of numbers ! But at the same time, the chances of you buying two network cards which have the same MAC address are so small that it's almost impossible !&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Let's start talking bits and bytes!&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Now that we know what a MAC address looks like, we need to start analysing it. A MAC address of any network card is always the &lt;strong&gt;same length&lt;/strong&gt;, that is, &lt;strong&gt;6 Bytes long&lt;/strong&gt; or &lt;strong&gt;48 Bits long&lt;/strong&gt;. If you're scratching your head wondering where these figures came from, then just have a look at the picture below which makes it a bit easier to understand:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/mac-addresses-4.gif&quot; alt=&quot;mac-addresses-4&quot; width=&quot;482&quot; height=&quot;312&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Summary&lt;/h2&gt;
&lt;p&gt;In this article we explained the purpose and importance of &lt;strong&gt;MAC address&lt;/strong&gt;, or &lt;strong&gt;Media Access Control address&lt;/strong&gt;. We examined the 48-bit MAC address structure and how vendors assign serial numbers to their MAC address ranges.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Network Data Transmission</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/network-data-transmission.html"/>
		<published>2011-04-17T23:28:57+10:00</published>
		<updated>2011-04-17T23:28:57+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/network-data-transmission.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/network-data-transmission-intro.webp&quot; alt=&quot;Network Data Transmission&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/network-data-transmission-intro.webp&quot; alt=&quot;network data transmission&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;network data transmission&quot; /&gt;&lt;strong&gt;Network data transmission&lt;/strong&gt; refers to the process of sending and receiving information between two or more devices connected to a network. It is a critical aspect of modern-day networking, and it enables devices to communicate with each other over long distances. There are several ways in which data can be transmitted over a network, including &lt;strong&gt;broadcast&lt;/strong&gt;, &lt;strong&gt;unicast&lt;/strong&gt;, and &lt;strong&gt;multicast&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; Each method has its own advantages and disadvantages, and the choice of transmission method depends on the specific requirements of the network. For example, &lt;strong&gt;broadcast transmission&lt;/strong&gt; is useful for sending messages that need to be received by &lt;strong&gt;every device on the network&lt;/strong&gt;, while&lt;strong&gt; unicast transmission&lt;/strong&gt; is useful for sending messages between &lt;strong&gt;specific devices&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Broadcast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;Broadcast Transmission&quot;&gt;Broadcast transmission&lt;/a&gt; is a network communication technique in which data packets are sent to all devices on the network. In this method, the sender sends a single message, which is then received and processed by every device on the network. This method is often used for sending important notifications or messages that need to be received by every device on the network. For example, when a device joins or leaves a network, the network administrator may send a broadcast message to inform all devices on the network of the change.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, broadcast transmission can be inefficient because all devices on the network receive the message, even if the message is not intended for them. This can lead to a significant amount of network traffic, which can slow down the network and reduce its performance.&lt;/p&gt;
&lt;h2&gt;Unicast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-unicast.html&quot; target=&quot;_blank&quot; title=&quot;Unicast transmission&quot;&gt;Unicast transmission&lt;/a&gt; is a network communication technique in which data packets are sent from one device to a specific destination device. In this method, the sender sends a message to a single recipient, and the message is only received and processed by the intended recipient. This method is often used for sending private or confidential messages between devices on a network. For example, when a user sends an email to another user on the same network, the email is sent using unicast transmission.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast transmission is much more efficient than broadcast transmission because only the intended recipient receives the message. This reduces the amount of network traffic and improves the network's performance. However, unicast transmission can be slower than broadcast transmission because the sender has to address each packet to the intended recipient.&lt;/p&gt;
&lt;h2&gt;Multicast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;Multicast transmission&quot;&gt;Multicast transmission&lt;/a&gt; is a network communication technique in which data packets are sent from one device to a group of devices on the network. In this method, the sender sends a message to a multicast group, and the message is received and processed by all devices that are members of the group. This method is often used for sending messages to a specific group of users or devices on a network. For example, when a user wants to send a message to all devices on a specific network segment, multicast transmission can be used.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Multicast transmission is more efficient than unicast transmission because it enables the sender to send a message to multiple recipients simultaneously. This reduces the amount of network traffic and improves the network's performance. However, multicast transmission requires support from the network infrastructure, and not all network devices or protocols support multicast transmission.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In summary, network data transmission is a critical aspect of modern-day networking, and it enables devices to communicate with each other over long distances. There are several ways in which data can be transmitted over a network, including &lt;strong&gt;broadcast&lt;/strong&gt;, &lt;strong&gt;unicast&lt;/strong&gt;, and &lt;strong&gt;multicast&lt;/strong&gt;. Each of these methods has its advantages and disadvantages, and the choice of transmission method depends on the specific requirements of the network.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/network-data-transmission-intro.webp&quot; alt=&quot;Network Data Transmission&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/network-data-transmission-intro.webp&quot; alt=&quot;network data transmission&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;network data transmission&quot; /&gt;&lt;strong&gt;Network data transmission&lt;/strong&gt; refers to the process of sending and receiving information between two or more devices connected to a network. It is a critical aspect of modern-day networking, and it enables devices to communicate with each other over long distances. There are several ways in which data can be transmitted over a network, including &lt;strong&gt;broadcast&lt;/strong&gt;, &lt;strong&gt;unicast&lt;/strong&gt;, and &lt;strong&gt;multicast&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; Each method has its own advantages and disadvantages, and the choice of transmission method depends on the specific requirements of the network. For example, &lt;strong&gt;broadcast transmission&lt;/strong&gt; is useful for sending messages that need to be received by &lt;strong&gt;every device on the network&lt;/strong&gt;, while&lt;strong&gt; unicast transmission&lt;/strong&gt; is useful for sending messages between &lt;strong&gt;specific devices&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Broadcast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;Broadcast Transmission&quot;&gt;Broadcast transmission&lt;/a&gt; is a network communication technique in which data packets are sent to all devices on the network. In this method, the sender sends a single message, which is then received and processed by every device on the network. This method is often used for sending important notifications or messages that need to be received by every device on the network. For example, when a device joins or leaves a network, the network administrator may send a broadcast message to inform all devices on the network of the change.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, broadcast transmission can be inefficient because all devices on the network receive the message, even if the message is not intended for them. This can lead to a significant amount of network traffic, which can slow down the network and reduce its performance.&lt;/p&gt;
&lt;h2&gt;Unicast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-unicast.html&quot; target=&quot;_blank&quot; title=&quot;Unicast transmission&quot;&gt;Unicast transmission&lt;/a&gt; is a network communication technique in which data packets are sent from one device to a specific destination device. In this method, the sender sends a message to a single recipient, and the message is only received and processed by the intended recipient. This method is often used for sending private or confidential messages between devices on a network. For example, when a user sends an email to another user on the same network, the email is sent using unicast transmission.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unicast transmission is much more efficient than broadcast transmission because only the intended recipient receives the message. This reduces the amount of network traffic and improves the network's performance. However, unicast transmission can be slower than broadcast transmission because the sender has to address each packet to the intended recipient.&lt;/p&gt;
&lt;h2&gt;Multicast&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;Multicast transmission&quot;&gt;Multicast transmission&lt;/a&gt; is a network communication technique in which data packets are sent from one device to a group of devices on the network. In this method, the sender sends a message to a multicast group, and the message is received and processed by all devices that are members of the group. This method is often used for sending messages to a specific group of users or devices on a network. For example, when a user wants to send a message to all devices on a specific network segment, multicast transmission can be used.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Multicast transmission is more efficient than unicast transmission because it enables the sender to send a message to multiple recipients simultaneously. This reduces the amount of network traffic and improves the network's performance. However, multicast transmission requires support from the network infrastructure, and not all network devices or protocols support multicast transmission.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In summary, network data transmission is a critical aspect of modern-day networking, and it enables devices to communicate with each other over long distances. There are several ways in which data can be transmitted over a network, including &lt;strong&gt;broadcast&lt;/strong&gt;, &lt;strong&gt;unicast&lt;/strong&gt;, and &lt;strong&gt;multicast&lt;/strong&gt;. Each of these methods has its advantages and disadvantages, and the choice of transmission method depends on the specific requirements of the network.&lt;/p&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>LAN Network Topologies</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/network-topologies.html"/>
		<published>2011-04-17T20:35:47+10:00</published>
		<updated>2011-04-17T20:35:47+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/network-topologies.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/network-topologies-intro.webp&quot; alt=&quot;Network Topologies&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/network-topologies-intro.webp&quot; alt=&quot;network topologies intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to Network Topologies&quot; /&gt;Network topologies can take a bit of time to understand when you're all new to this kind of cool stuff, but it's very important to fully understand them as they are key elements to understanding and troubleshooting networks and will help you decide what actions to take when you're faced with network problems.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This article explains the different network topologies found in today's networks. We examine Bus Topology, Ring Topology, Star Topology, Mesh Topology, Hybrid Topology and many more.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Physical and Logical Topologies&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;There are two types of topologies: &lt;strong&gt;Physical&lt;/strong&gt; and &lt;strong&gt;Logical&lt;/strong&gt;. The physical topology of a network refers to the layout of cables, computers and other peripherals. Try to imagine yourself in a room with a small network, you can see network cables coming out of every computer that is part of the network, then those cables plug into a hub or switch. What you're looking at is the physical topology of that network !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Logical topology is the method used to pass the information between the computers. In other words, looking at that same room, if you were to try to see how the network works with all the computers talking (think of the computers generating traffic and packets of data going everywhere on the network) you would be looking at the logical part of the network. The way the computers will be talking to each other and the direction of the traffic is controlled by the various protocols (like Ethernet) or, if you like, rules.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If we used token ring, then the physical topology would have to change to meet the requirements of the way the token ring protocol works (logically).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If it's all still confusing, consider this: The physical topology describes the layout of the network, just like a map shows the layout of various roads, and the logical topology describes how the data is sent accross the network or how the cars are able to travel (the direction and speed) at every road on the map.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The most common types of physical topologies, which we are going to analyse, are: &lt;strong&gt;Bus&lt;/strong&gt;, &lt;strong&gt;Hub/Star&lt;/strong&gt; and &lt;strong&gt;Ring&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Physical Bus Topology&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Bus topology is fairly old news and you probably won't be seeing much of these around in any modern office or home.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;With the Bus topology, all workstations are connect directly to the main backbone that carries the data. Traffic generated by any computer will travel across the backbone and be received by all workstations. This works well in a small network of 2-5 computers, but as the number of computers increases so will the network traffic and this can greatly decrease the performance and available bandwidth of your network.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-bus.gif&quot; alt=&quot;topologies-bus&quot; width=&quot;567&quot; height=&quot;227&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As you can see in the above example, all computers are attached to a continuous cable which connects them in a straight line. The arrows clearly indicate that the packet generated by Node 1 is transmitted to all computers on the network, regardless the destination of this packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Also, because of the way the electrical signals are transmitted over this cable, its ends must be terminated by special terminators that work as &quot;shock absorbers&quot;, absorbing the signal so it won't reflect back to where it came from. The value of 50Ohms has been selected after carefully taking in consideration all the electrical characteristics of the cable used, the voltage that the signal which runs through the cables, the maximum and minimum length of the bus and a few more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If the bus (the long yellow cable) is damaged anywhere in its path, then it will most certainly cause the network to stop working or, at the very least, cause big communication problems between the workstations.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Thinnet - 10 Base2, also known as coax cable (Black in colour) and Thicknet - 10 Base 5 (Yellow in colour) is used in these type of topologies.&lt;/p&gt;
&lt;h2&gt;The Physical HUB or STAR Topology&lt;/h2&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-star.gif&quot; alt=&quot;topologies-star&quot; width=&quot;420&quot; height=&quot;300&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The Star or Hub topology is one of the most common network topologies found in most offices and home networks. It has become very popular in contrast to the bus type (which we just spoke about), because of the cost and the ease of troubleshooting.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The advantage of the star topology is that if one computer on the star topology fails, then only the failed computer is unable to send or receive data. The remainder of the network functions normally.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The disadvantage of using this topology is that because each computer is connected to a central hub or switch, if this device fails, the entire network fails!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A classic example of this type of topology is the UTP (10 base T), which normaly has a blue colour.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Physical Ring Topology&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In the ring topology, computers are connected on a single circle of cable. Unlike the bus topology, there are no terminated ends. The signals travel around the loop in one direction and pass through each computer, which acts as a repeater to boost the signal and send it to the next computer. On a larger scale, multiple LANs can be connected to each other in a ring topology by using Thicknet coaxial or fiber-optic cable.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-ring.gif&quot; alt=&quot;topologies-ring&quot; width=&quot;420&quot; height=&quot;272&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The method by which the data is transmitted around the ring is called token passing. IBM's token ring uses this method. A &lt;em&gt;token&lt;/em&gt; is a special series of bits that contains control information. Possession of the token allows a network device to transmit data to the network. Each network has only one token.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Physical Mesh Topology&lt;/h2&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-mesh.gif&quot; alt=&quot;topologies-mesh&quot; width=&quot;420&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In a mesh topology, each computer is connected to every other computer by a separate cable. This configuration provides redundant paths through the new work, so if one computer blows up, you don't lose the network :) On a large scale, you can connect multiple LANs using mesh topology with leased telephone lines, Thicknet coaxial cable or fiber optic cable.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Again, the big advantage of this topology is its backup capabilities by providing multiple paths through the network.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Physical Hybrid Topology&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;With the &lt;strong&gt;hybrid topology&lt;/strong&gt;, two or more topologies are combined to form a complete network. For example, a hybrid topology could be the combination of a star and bus topology. These are also the most common in use.&lt;/p&gt;
&lt;h3 align=&quot;left&quot;&gt;Star-Bus&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-hybrid-star-bus.gif&quot; alt=&quot;topologies-hybrid-star-bus&quot; width=&quot;420&quot; height=&quot;269&quot; style=&quot;border: 1px solid #000000;&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;In a &lt;strong&gt;star-bus topology&lt;/strong&gt;, several star topology networks are linked to a bus connection. In this topology, if a computer fails, it will not affect the rest of the network. However, if the central component, or hub, that attaches all computers in a star, fails, then you have big problems since no computer will be able to communicate.&lt;/p&gt;
&lt;h3 align=&quot;left&quot;&gt;Star-Ring&lt;/h3&gt;
&lt;/div&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-hybrid-star-ring.gif&quot; alt=&quot;topologies-hybrid-star-ring&quot; width=&quot;437&quot; height=&quot;351&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In the &lt;strong&gt;Star-Ring topology&lt;/strong&gt;, the computers are connected to a central component as in a star network. These components, however, are wired to form a ring network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Like the &lt;strong&gt;star-bus topology&lt;/strong&gt;, if a single computer fails, it will not affect the rest of the network. By using token passing, each computer in a star-ring topology has an equal chance of communicating. This allows for greater network traffic between segments than in a star-bus topology.&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot; align=&quot;left&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals.html&quot; title=&quot;Back to Network Fundamentals&quot;&gt;Back to Network Fundamentals&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/network-topologies-intro.webp&quot; alt=&quot;Network Topologies&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/network-topologies-intro.webp&quot; alt=&quot;network topologies intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to Network Topologies&quot; /&gt;Network topologies can take a bit of time to understand when you're all new to this kind of cool stuff, but it's very important to fully understand them as they are key elements to understanding and troubleshooting networks and will help you decide what actions to take when you're faced with network problems.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;This article explains the different network topologies found in today's networks. We examine Bus Topology, Ring Topology, Star Topology, Mesh Topology, Hybrid Topology and many more.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;Physical and Logical Topologies&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;There are two types of topologies: &lt;strong&gt;Physical&lt;/strong&gt; and &lt;strong&gt;Logical&lt;/strong&gt;. The physical topology of a network refers to the layout of cables, computers and other peripherals. Try to imagine yourself in a room with a small network, you can see network cables coming out of every computer that is part of the network, then those cables plug into a hub or switch. What you're looking at is the physical topology of that network !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Logical topology is the method used to pass the information between the computers. In other words, looking at that same room, if you were to try to see how the network works with all the computers talking (think of the computers generating traffic and packets of data going everywhere on the network) you would be looking at the logical part of the network. The way the computers will be talking to each other and the direction of the traffic is controlled by the various protocols (like Ethernet) or, if you like, rules.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If we used token ring, then the physical topology would have to change to meet the requirements of the way the token ring protocol works (logically).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If it's all still confusing, consider this: The physical topology describes the layout of the network, just like a map shows the layout of various roads, and the logical topology describes how the data is sent accross the network or how the cars are able to travel (the direction and speed) at every road on the map.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The most common types of physical topologies, which we are going to analyse, are: &lt;strong&gt;Bus&lt;/strong&gt;, &lt;strong&gt;Hub/Star&lt;/strong&gt; and &lt;strong&gt;Ring&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Physical Bus Topology&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Bus topology is fairly old news and you probably won't be seeing much of these around in any modern office or home.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;With the Bus topology, all workstations are connect directly to the main backbone that carries the data. Traffic generated by any computer will travel across the backbone and be received by all workstations. This works well in a small network of 2-5 computers, but as the number of computers increases so will the network traffic and this can greatly decrease the performance and available bandwidth of your network.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-bus.gif&quot; alt=&quot;topologies-bus&quot; width=&quot;567&quot; height=&quot;227&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;As you can see in the above example, all computers are attached to a continuous cable which connects them in a straight line. The arrows clearly indicate that the packet generated by Node 1 is transmitted to all computers on the network, regardless the destination of this packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Also, because of the way the electrical signals are transmitted over this cable, its ends must be terminated by special terminators that work as &quot;shock absorbers&quot;, absorbing the signal so it won't reflect back to where it came from. The value of 50Ohms has been selected after carefully taking in consideration all the electrical characteristics of the cable used, the voltage that the signal which runs through the cables, the maximum and minimum length of the bus and a few more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;If the bus (the long yellow cable) is damaged anywhere in its path, then it will most certainly cause the network to stop working or, at the very least, cause big communication problems between the workstations.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Thinnet - 10 Base2, also known as coax cable (Black in colour) and Thicknet - 10 Base 5 (Yellow in colour) is used in these type of topologies.&lt;/p&gt;
&lt;h2&gt;The Physical HUB or STAR Topology&lt;/h2&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-star.gif&quot; alt=&quot;topologies-star&quot; width=&quot;420&quot; height=&quot;300&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The Star or Hub topology is one of the most common network topologies found in most offices and home networks. It has become very popular in contrast to the bus type (which we just spoke about), because of the cost and the ease of troubleshooting.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The advantage of the star topology is that if one computer on the star topology fails, then only the failed computer is unable to send or receive data. The remainder of the network functions normally.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The disadvantage of using this topology is that because each computer is connected to a central hub or switch, if this device fails, the entire network fails!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;A classic example of this type of topology is the UTP (10 base T), which normaly has a blue colour.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Physical Ring Topology&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In the ring topology, computers are connected on a single circle of cable. Unlike the bus topology, there are no terminated ends. The signals travel around the loop in one direction and pass through each computer, which acts as a repeater to boost the signal and send it to the next computer. On a larger scale, multiple LANs can be connected to each other in a ring topology by using Thicknet coaxial or fiber-optic cable.&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-ring.gif&quot; alt=&quot;topologies-ring&quot; width=&quot;420&quot; height=&quot;272&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;The method by which the data is transmitted around the ring is called token passing. IBM's token ring uses this method. A &lt;em&gt;token&lt;/em&gt; is a special series of bits that contains control information. Possession of the token allows a network device to transmit data to the network. Each network has only one token.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Physical Mesh Topology&lt;/h2&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-mesh.gif&quot; alt=&quot;topologies-mesh&quot; width=&quot;420&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In a mesh topology, each computer is connected to every other computer by a separate cable. This configuration provides redundant paths through the new work, so if one computer blows up, you don't lose the network :) On a large scale, you can connect multiple LANs using mesh topology with leased telephone lines, Thicknet coaxial cable or fiber optic cable.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Again, the big advantage of this topology is its backup capabilities by providing multiple paths through the network.&lt;/p&gt;
&lt;h2 align=&quot;left&quot;&gt;The Physical Hybrid Topology&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;With the &lt;strong&gt;hybrid topology&lt;/strong&gt;, two or more topologies are combined to form a complete network. For example, a hybrid topology could be the combination of a star and bus topology. These are also the most common in use.&lt;/p&gt;
&lt;h3 align=&quot;left&quot;&gt;Star-Bus&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-hybrid-star-bus.gif&quot; alt=&quot;topologies-hybrid-star-bus&quot; width=&quot;420&quot; height=&quot;269&quot; style=&quot;border: 1px solid #000000;&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;In a &lt;strong&gt;star-bus topology&lt;/strong&gt;, several star topology networks are linked to a bus connection. In this topology, if a computer fails, it will not affect the rest of the network. However, if the central component, or hub, that attaches all computers in a star, fails, then you have big problems since no computer will be able to communicate.&lt;/p&gt;
&lt;h3 align=&quot;left&quot;&gt;Star-Ring&lt;/h3&gt;
&lt;/div&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/topologies-hybrid-star-ring.gif&quot; alt=&quot;topologies-hybrid-star-ring&quot; width=&quot;437&quot; height=&quot;351&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;In the &lt;strong&gt;Star-Ring topology&lt;/strong&gt;, the computers are connected to a central component as in a star network. These components, however, are wired to form a ring network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Like the &lt;strong&gt;star-bus topology&lt;/strong&gt;, if a single computer fails, it will not affect the rest of the network. By using token passing, each computer in a star-ring topology has an equal chance of communicating. This allows for greater network traffic between segments than in a star-bus topology.&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot; align=&quot;left&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals.html&quot; title=&quot;Back to Network Fundamentals&quot;&gt;Back to Network Fundamentals&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;</content>
		<category term="Network Fundamentals" />
	</entry>
	<entry>
		<title>Introduction To Networking</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-fundamentals/introduction-networking.html"/>
		<published>2011-04-17T11:45:51+10:00</published>
		<updated>2011-04-17T11:45:51+10:00</updated>
		<id>https://www.firewall.cx/networking/network-fundamentals/introduction-networking.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/intro-introduction-to-networking.webp&quot; alt=&quot;&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/intro-introduction-to-networking.webp&quot; alt=&quot;introduction to networking&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to Networking&quot; /&gt;A network is simply a group of two or more Personal Computers linked together. Many types of networks exist, but the most common types of networks are Local-Area Networks (LANs), and Wide-Area Networks (WANs).&lt;/p&gt;
&lt;p&gt;In a LAN, computers are connected together within a &quot;local&quot; area (for example, an office or home). In a WAN, computers are further apart and are connected via telephone/communication lines, radio waves or other means of connection.&lt;/p&gt;
</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/intro-introduction-to-networking.webp&quot; alt=&quot;&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/intro-introduction-to-networking.webp&quot; alt=&quot;introduction to networking&quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Introduction to Networking&quot; /&gt;A network is simply a group of two or more Personal Computers linked together. Many types of networks exist, but the most common types of networks are Local-Area Networks (LANs), and Wide-Area Networks (WANs).&lt;/p&gt;
&lt;p&gt;In a LAN, computers are connected together within a &quot;local&quot; area (for example, an office or home). In a WAN, computers are further apart and are connected via telephone/communication lines, radio waves or other means of connection.&lt;/p&gt;
</content>
		<category term="Network Fundamentals" />
	</entry>
</feed>
