United Kingdom
Catalog   /   Computing   /   Networking   /   Switches

Comparison MikroTik CRS328-24P-4S+RM vs MikroTik CSS326-24G-2S+RM

Add to comparison
MikroTik CRS328-24P-4S+RM
MikroTik CSS326-24G-2S+RM
MikroTik CRS328-24P-4S+RMMikroTik CSS326-24G-2S+RM
Compare prices 8Compare prices 6
TOP sellers
Main
Supports MAC address filtering and port forwarding.
Typemanaged 3 level (L3)managed 2 level (L2)
Mountrack-mountrack-mount
Bandwidth64 Gbps
MAC address table size16K16K
Ports
Gigabit Ethernet2424
SFP+ (optics)42
Uplink42
Uplink typeSFP+SFP+
Console port
Features
Control
SSH
Telnet
Web interface
SNMP
 
 
Web interface
SNMP
Basic features
DHCP server
Link Aggregation
VLAN
loop protection
access rate limit
 
 
VLAN
loop protection
access rate limit
Routing
Static
Standards
RIP
OSPF
BGP, VRRP, ECMP
 
 
 
PoE
PoE (output)802.3af/at
PoE outputs24
PoE output power30 W
Total PoE power450 W
General
PSUbuilt-inexternal
Supply voltage100 – 240 В8 – 30 В
Power consumption19 W
Operating temperature-20 °C ~ +60 °C-20 °C ~ +70 °C
Dimensions (WxDxH)443x305x44 mm440x144x44 mm
Weight1650 g1083 g
Added to E-Catalognovember 2018november 2017

Type

Unmanaged. The simplest kind of switch that does not have, as the name suggests, the ability to manage; and the possibilities of monitoring the state of the device are usually limited to the simplest indicators in the form of light bulbs (power supply, port activity). The advantages of such models are battery life, ease of use and low cost. The main disadvantage of this type is obvious — the impossibility of configuring the operation parameters. Unmanaged switches are well suited for small LANs like a home or small office where little administration tricks are required; but for large organizations they should not be used.

Customizable. This category includes switches that allow you to change some of the operating parameters. At the same time, the possibilities for such changes are much narrower than in managed models, and the matter is usually limited to disabling individual ports, switching standard speeds for Ethernet connectors (for example, from 100 Mbps to 10 Mbps) and simple monitoring tools like browsing the network statistics. In addition, after reconfiguration, the device, usually, needs to be rebooted — in other words, it is impossible to control the operation of the switch on the fly. However, professional models designed for large networks can also belong to this type.

Managed 2 levels. The term "managed" means that the switch has the ab...ility to reconfigure "on the fly" — in contrast to the configurable models described above. In addition, the overall functionality of such devices in most cases is noticeably wider. And "layer 2" means that the device supports only the second layer of the OSI network model — the channel, which is responsible for physical addressing. In fact, this means that the switch is able to work with the MAC addresses of connected devices, but IP addressing is beyond its capabilities.

— Managed 3 levels. A kind of managed switches (see above) that supports the third level of the OSI network model. This layer is responsible for logical addressing and route definition, which allows the device to work with IP addresses. Due to this, models of this type are considered the most advanced, they often provide not only the traditional features for "switches", but also individual functions of routers. On the other hand, the abundance of features significantly affects the price. These switches are commonly used in data centers, telecommunications companies, and other professional networking environments; it hardly makes sense to purchase such a device for a home or small office.

Bandwidth

The bandwidth of a switch is the maximum amount of traffic that it can handle. Specified in gigabits per second.

This parameter directly depends on the number of network ports in the device (excluding Uplink). Actually, even if the bandwidth is not given in the specifications, it can still be calculated using the following formula: the number of ports multiplied by the bandwidth of an individual port and multiplied by two (since both incoming and outgoing traffic are taken into account). For example, a model with 8 Gigabit Ethernet connectors and 2 SFP ports will have a bandwidth of (8*1 + 2*1)*2 = 20 Gbps.

The choice for this indicator is quite obvious: you need to evaluate the expected traffic volumes in the serviced network segment and make sure that the switch's bandwidth will cover it with a margin of at least 10-15% (this will give an additional guarantee in case of emergency situations). At the same time, if you plan to often work at high, close to maximum, loads, it will not hurt to clarify such a characteristic as the internal bandwidth of the switch. It is usually given in a detailed technical description, and if this value is less than the total throughput, serious problems may arise under significant loads.

SFP+ (optics)

The number of optical SFP+ ports provided in the design of the switch. Let's clarify right away that we are talking about ordinary network ports; Uplink inputs can also use this interface, however their number is specified separately even in this case (see below).

The general advantages of optical fiber over conventional Ethernet cable are longer communication range and insensitivity to electromagnetic interference. Specifically, SFP+ is a development of the original SFP standard; in switches, such connectors typically operate at a speed of 10 Gbps. As for the number of such ports, for all its advantages, fiber optics in network equipment is still used quite rarely. Therefore, the most common switches are 1 - 2, less often 4 SFP + connectors, although there are more. It is also worth considering that the so-called combo connectors can be used in switches, combining SFP + and RJ-45; the presence of such ports is specified in the notes, they are taken into account both in the calculation of RJ-45 and in the calculation of SFP+.

Uplink

The number of Uplink connectors provided in the design of the switch.

“Uplink” in this case is not a type, but a connector specialization: this is the name of the network interface through which the switch (and network devices connected to it) communicate with external networks (including the Internet) or network segments. In other words, this is a kind of "gate" through which all traffic from the network segment served by the switch is transmitted further. Uplink, in particular, can be used to connect to a similar "switch" (for horizontal network expansion) or to a higher level device (like a core switch).

Accordingly, the number of Uplink connectors is the maximum number of external connections that the switch can provide without using additional equipment. The specific type of such a connector may be different, but this is usually one of the varieties of LAN or SFP; see "Uplink type" for details.

Console port

The switch has a console port. This connector is used to control the device settings from a separate computer, which plays the role of a control panel — a console. The advantage of this format of operation is that access to the functions of the switch does not depend on the state of the network; in addition, special utilities can be used on the console that provide more extensive capabilities than a regular web interface or network protocols (see "Management"). Most often, the console port uses an RS-232 connector.

Control

Management methods and protocols supported by the switch.

SSH. Abbreviation for Secure Shell, i.e. "Safe shell". The SSH protocol provides a fairly high degree of security, because. encrypts all transmitted data, including passwords. Suitable for managing almost all major network protocols, but requires a special utility on the host computer.

Telnet. A network management protocol that provides configuration using a text-based command line. It does not use encryption and does not protect transmitted data, and is also devoid of a graphical interface, which is why in many areas it has been supplanted by more secure (SSH) or more convenient (web interface) options. However, it is still used in modern network equipment.

Web interface. This function allows you to open the management interface of the switch in a common Internet browser. The main convenience of the web interface is that it does not require additional software — a browser is enough (and it is available in any "self-respecting" modern OS). Thus, knowing the device address, login and password, you can manage the settings from almost any computer on the network (unless, of course, otherwise specified in the access parameters).

SNMP. Abbreviation for Simple Network Management Protocol, i.e. "simple network control protocol". It is a stan...dard part of the common TCP/IP protocol on which both the Internet and many local networks are built. It uses two types of software — "managers" on control computers and "agents" on managed computers (in this case, on a router). The degree of security is relatively low, but SNMP can be used for simple management tasks.

Note that this list is not exhaustive — modern switches may provide other management options, for example, support for proprietary utilities and special technologies from the same manufacturer.

Basic features

DHCP server. A feature that makes it easy to manage the IP addresses of devices connected to the switch. Without its own IP address, the correct operation of the network device is impossible; and DHCP support allows you to assign these addresses both manually and fully automatically. At the same time, the administrator can set additional parameters for the automatic mode (range of addresses, maximum time for using one address). And even in fully manual mode, work with addresses is performed only by means of the switch itself (whereas without DHCP, these parameters would also have to be specified in the settings of each device on the network).

Stacking support. The ability to operate the device in stack mode. A stack consists of several switches that are perceived by the network as one “switch”, with one MAC address, one IP address, and with a total number of connectors equal to the total number of ports in all involved devices. This feature is useful if you want to build an extensive network that lacks the capabilities of a single switch, but do not want to complicate the topology.

Link Aggregation. Switch support for link aggregation technology. This technology allows you to combine several parallel physical communication channels into one logical one, which increases the speed and reliability of the connection. Simply put, a switch with such a fun...ction can be connected to another device (for example, a router) not with one cable, but with two or even more at once. The increase in speed in this case occurs due to the summation of the throughput of all physical channels; however, the total speed may be less than the sum of the speeds — on the other hand, combining several relatively slow connectors is often cheaper than using equipment with a more advanced single interface. And the increase in reliability is carried out, firstly, by distributing the total load over individual physical channels, and secondly, by means of "hot" redundancy: the failure of one port or cable can reduce the speed, but does not lead to a complete disconnection, and when the channel is restored, the channel is switched on automatically.
Note that both the standard LACP protocol and non-standard proprietary technologies can be used for Link Aggregation (the latter is typical, for example, for Cisco switches). In addition, there are quite a few alternative names for this technology — port trunking, link bundling, etc.; sometimes the difference is only in the name, sometimes there are technical nuances. All these details should be clarified separately.

VLAN. Support of the VLAN function by the switch — virtual local area networks. In this case, the meaning of this function is the ability to create separate logical (virtual) local networks within the physical "local area". Thus, it is possible, for example, to separate departments in a large organization, creating for each of them its own local network. The organization of VLAN allows you to reduce the load on network equipment, as well as increase the degree of data protection.

— Protection against loops. The switch has a loop protection function. The loop in this case can be described as a situation where the same signal is launched in the network in an endless loop. This may be due to incorrect cable connection, the use of redundant links and some other reasons, but anyway, such a phenomenon can “put down” the network, which means it is highly undesirable. Security prevents loops, usually by disabling looped ports.

— Limiting the speed of access. The ability to limit the data exchange rate for individual switch ports. Thus, it is possible to reduce the load on the network and prevent the "clogging" of the channel by individual terminals.

Note that the matter is not limited to this list: other features may be found in modern switches.

Static

Recall that routing is the definition of the best path through which each data packet can be delivered to the recipient. For this, special tables are used, stored in the memory of the control network device with the routing function. According to the method of filling these tables, this procedure is divided into two main varieties — static and dynamic.

Static routing is a method in which all data routes (entries in the routing table) are manually written by the administrator; this applies both to the initial creation of the table and to making changes to it when changes are made to the network configuration. The main advantage of this method is the minimum load on the switch processor, which has a positive effect on the speed and reliability of the network. The main disadvantages of static routing are associated with the need for manual control. So, the larger the network, the more complex and time-consuming it is to manage it; Administrator's inattention can become an additional cause of failures; and diagnosing some problems is noticeably more difficult — for example, if there is a failure at the link layer, the static route remains visible as active, although no data is transmitted.

Standards

Static routing is carried out according to the standard scheme, but different protocols are used for dynamic routing. The idea of dynamic is that the route table is constantly edited programmatically, in automatic mode. To do this, network devices (more precisely, routing programs running on them) exchange service information with each other, on the basis of which optimal addresses are written to the table. One of the fundamental concepts of dynamic routing is a metric — a complex indicator that determines the conditional distance to a specific address (in other words, how close this or that route is to the optimal one). Different protocols use different ways to define and share metrics; here are some of the most common options:

R.I.P. One of the most widely used dynamic routing protocols; was first applied back in 1969 on the ARPANET, which became the forerunner of the modern Internet. Refers to the so-called distance-vector algorithms: the metric in the RIP protocol is indicated by the distance vector between the router and the network node, and each such vector includes information about the direction of data transfer and the number of "hops" (sections between intermediate nodes) to the corresponding network device. When using RIP, metrics are sent over the network every 30 seconds; at the same time, having received from the "neighbor" data about the nodes known to it, the router makes a number of clarifications and add...itions to this data (in particular, information about itself and about directly connected network devices) and transmits further. After receiving up-to-date data throughout the network, the router selects for each individual node the shortest route from several received alternatives and writes it into the routing table.
The advantages of the RIP protocol include ease of implementation and undemanding. On the other hand, it is poorly suited for large networks: the maximum number of hops in RIP is limited to 15, and the complication of the topology leads to a significant increase in service traffic and the load on the computing part of the equipment — as a result, the actual network performance decreases. Thus, more advanced protocols such as (E)IGRP and OSPF (see below) have become more common for professional applications.

— IGRP. A proprietary routing protocol created by Cisco for autonomous systems (in other words, local networks with a single routing policy with the Internet). Also, like RIP (see above), it refers to distance vector protocols, however, it uses a much more complicated procedure for determining the metric: it takes into account not only the number of hops, but also delay, throughput, actual network congestion, etc. In addition, the protocol implements a number of specific mechanisms to improve communication reliability. Due to this, IGRP is well suited even for fairly complex networks with an extensive topology.

— EIGRP. An improved and modernized successor to the IGRP protocol described above, developed by the same Cisco. Created as an alternative to OSPF (see below), it combines the properties of distance vector protocols and standards with link state tracking. One of the main advantages over the original IGRP was the improvement in the algorithm for disseminating data about changes in the topology in the network, due to which the probability of looping (characteristic of all distance vector standards) was reduced to almost zero. And among the differences between this protocol and OSPF, higher performance and a more advanced algorithm for calculating the metrics are claimed with less configuration complexity and resource requirements.

OSPF. An open autonomous system routing protocol created by the IETF (Internet Design Council) and first implemented in 1988. Refers to protocols with link state tracking, uses the so-called Dijkstra algorithm (algorithm for finding the shortest paths) to build routes. The OSPF routing process is as follows. Initially, the router communicates with similar devices, establishing a "neighbor relationship"; neighbors are routers within the same autonomous zone. Then the neighbors exchange metrics among themselves, synchronizing the data, and after such synchronization, all routers receive a complete database of the state of all links in the network (LSDB). Already on the basis of this base, each of these devices builds its own route table using Dijkstra's algorithm. The main advantages of OSPF are high speed (speed of convergence), a high degree of optimization of the use of channels and the ability to work with network masks of variable length (which, in particular, is especially convenient with a limited resource of IP addresses). The disadvantages include the exactingness of the computing resources of routers, a significant increase in load with numerous such devices in the network, and the need to complicate the topology in large networks, dividing such networks into separate zones (area). In addition, OSPF does not have clear criteria for determining the metric: the “cost” of each hop can be calculated according to different parameters, depending on the switch manufacturer and the settings chosen by the administrator. This expands the possibilities for configuring routing and at the same time greatly complicates this procedure.

Modern switches may provide other routing protocols in addition to those described above.
MikroTik CRS328-24P-4S+RM often compared
MikroTik CSS326-24G-2S+RM often compared