Course Hero Logo

Port bonding there are times when the data capacity

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 698 - 700 out of 760 pages.

Port BondingThere are times when the data capacity of a connection betweena switch and another device isn’t enough to meet demand.Situations like these are encountered regularly in large datacenters where tremendous amounts of data must be movedbetween racks of storage devices to vast numbers of users.Sometimes the solution is simple, like changing from a low-capacity standard like 100-megabit Ethernet to Gigabit Ethernet.But there are other ways to achieve high-speed links betweendevices without having to upgrade the infrastructure. One ofthose ways is to join two or more connections’ ports logically in aswitch so that the resulting bandwidth is treated as a singleconnection and the throughput is multiplied by the number oflinked connectors. All of the cables from the joined ports must goto the same device—another switch, a storage area network(SAN), a station, or whatever. That device must also support thelogical joining of all of the involved ports. This is calledportbonding.Elsewhere, port bonding goes by a pile of different names,includinglink aggregation,NIC bonding,NIC teaming,portaggregation—the last two terms you’ll see on the CompTIANetwork+ exam—and a bunch of others. The Cisco protocol foraccomplishing aggregation is calledPort Aggregation Protocol(PAgP). You may also run across it in a very commonimplementation calledLink Aggregation Control Protocol(LACP), which is an IEEE specification. As it stands now, LACP is
designated as IEEE 802.1AX-2014. LACP specifies a number offeatures and options to automate the negotiation, management,load balancing, and failure modes of aggregated ports.Network ProtectionThe last area where you’re likely to encounter advancednetworking devices is network protection.Network protectionismy term to describe four different areas:Intrusion protection/intrusion preventionPort mirroringProxy servingAAAIntrusion Detection/Intrusion PreventionIntrusion detection and intrusion prevention detect thatsomething has intruded into a network and then do somethingabout it. Odds are good you’ve heard the termfirewall. Firewallsare hardware or software tools that filter traffic based on variouscriteria, such as port number, IP address, or protocol. A firewallworks at the border of your network, between the outside and theinside. (Ahost-based firewall, one installed on a single computer,similarly works on the border of that system.)Several companies enablesignature managementin the cloud, tohelp monitor and protect network traffic from malicious code,picking out known and suspect malware signatures withcontinuously updating definition files. Checkoutfor a prototypical example. And lookfor a signature management question on the CompTIA Network+exam.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 760 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture