19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

- For this reason a bridge also raises the data throughput in each segment, as<br />

data can be transmitted independently on either side of the bridge, thus<br />

achieving a separation of loads.<br />

Switches (Ethernet, Token-Ring, ATM)<br />

A switch is a variant of a bridge which links several logical LAN segments<br />

(multi-port bridge), and operates on layer 2 of the OSI model. Some new<br />

products also implement a switching functionality on layer 3 of the OSI<br />

model, thus allowing segmentation on this layer.<br />

An Ethernet switch consists of several bridges connected together internally in<br />

an appropriate manner (e.g. via a switching matrix).<br />

An Ethernet switch provides the advantages of a bridge for several ports (8 to<br />

32 ports per switch are standard at present), i.e. every subscriber and every<br />

segment at a switch port comprises a separate collision domain, and<br />

connections are established on demand. This allows every connected segment<br />

to communicate with any other segment, irrespective of the network traffic<br />

and load, provided that it is not already busy. Switches are particularly<br />

suitable for load separation and as central coupling elements for several subsegments.<br />

Cascading switches, i.e. connecting secondary switches to a central<br />

switch, allow the formation of extremely high-performance networks, given<br />

that an appropriate, logical network structure has been selected.<br />

Ethernet switches which operate in accordance with the IEEE standard for<br />

bridges use the store-and-forward technique. With this technique, the entire<br />

Ethernet packet of the source port is first read in and checked for correctness.<br />

Only packets which have been received correctly and completely are<br />

forwarded to the target segment. Such switches generate relatively long delay<br />

times, but also guarantee that no faulty packets are routed to other segments.<br />

<strong>The</strong> use of such store-and-forward switches is advisable in situations where<br />

maximum availability and integrity are of greater importance than bandwidth.<br />

In contrast, alternative techniques which have also been developed increase<br />

the throughput of an Ethernet switch, i.e. shorten the delay times involved in<br />

the processing of data packets. One such technique, termed on-the-fly or cutthrough,<br />

does not read in and check entire data packets; instead, it just<br />

evaluates the target address of a packet and then sends the whole packet<br />

immediately to this address. On-the-fly switches are thus up to 20 times faster<br />

than store-and-forward switches. However, they can also route faulty packets<br />

to other segments, thus impairing the bandwidth and, under certain<br />

circumstances, the availability of the segments in question. For this reason,<br />

on-the-fly switches should be used in networks characterised by an infrequent<br />

occurrence of faulty packets and requiring the maximum throughput. Most<br />

manufacturers now offer switches which incorporate both technologies and<br />

can thus be configured as required.<br />

Some products now also support switching on layer 3 of the OSI model. In<br />

this case, network subscribers are no longer distinguished by their MAC<br />

address (layer 2 switching), but by the addresses on layer 3 (for the TCP/IP<br />

protocol stack, this is the IP address). Layer-3 switching can further enhance<br />

performance; for this though, the switch must be able to process the protocols<br />

used on layer 3, similar to a router.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!