Technology Tap

Unlocking the Power of Managed Switches in Networking

October 29, 2023 Juan Rodriguez Season 4 Episode 58
Technology Tap
Unlocking the Power of Managed Switches in Networking
Technology Tap Premium
Exclusive access to premium content!
Starting at $5/month Subscribe
Show Notes Transcript

What if you had the power to control and optimize your network traffic? Picture this: a network under your command that guarantees low latency and the necessary bandwidth for your critical applications. Welcome to our latest podcast episode that breaks down the complex world of managed switches in computer networking. We start off by unraveling the primary purpose of a switch, guiding you through its intelligent routing of data using unique MAC addresses. We then highlight how managed switches empower network administrators with a user-friendly web-based interface or a traditional command line interface. The episode also sheds light on the creation of Virtual LANs (VLANs) that can enhance your network organization, security, and traffic management.

Ever wondered how you can maximize your network security and traffic monitoring? Tune in as we delve into the remarkable security features of a managed switch. Understand the intricacies of 802.1x port-based authentication, dynamic ARP inspection, IP source guard, and more. We also cover the important facets of traffic monitoring and analysis supported by managed switches. Spoiler alert: It's not only about port statistics and traffic prioritization! Finally, we unveil the pros and cons of owning a managed switch, taking into account its complexity, the necessary security measures, cost considerations, and a lot more. So, buckle up for an enlightening journey through the world of managed switches!

Support the Show.

If you want to help me with my research please e-mail me.
Professorjrod@gmail.com

If you want to join my question/answer zoom class e-mail me at
Professorjrod@gmail.com

Art By Sarah/Desmond
Music by Joakim Karud
Little chacha Productions

Juan Rodriguez can be reached at
TikTok @ProfessorJrod
ProfessorJRod@gmail.com
@Prof_JRod
Instagram ProfessorJRod

Speaker 1:

I, and welcome to the technology tap. I'm professor Jay Rod. On this episode we are going to talk about managed switches. Let's get into it Now, right, as always, let's do a little bit of housekeeping before we start. First of all, welcome. I'm professor Jay Rod. Professor J R O D, you can reach me at professor Jay rod at gmailcom. Second, I Know the last episode might have sound a little bit different than today. I was trying new equipment In the last episode, I don't know, I ended up having to go back to the old one, so I spent a lot of time, almost the whole day, trying to fix it. I couldn't do it. So Sometimes, just because it's new, guys as a mean is better, right, I learned that a long time ago. And the third thing is I Almost in the process of getting some merch shirts and if you guys are interested in that With the logo, you know I'll give it away for free. I might end up giving it away to some of my students as Maybe contests. That I do. But if you're interested in a shirt, just let me know, professor Jay Rod, professor J R O D, edgmailcom, and I try to see if I could send you one. I had cups before, but then they got ruined, doing a flood that I had here in In New Jersey one time. But yeah, let's see how the shirts work, so we'll see. All right, let's get to it.

Speaker 1:

Managed switches and the remote computer networking. A switch is a fundamental and critical network device that operates primary at data link layer, which is the layer 2 of the OSI model. The primary function of a switch is to facilitate Efficient and intelligent transfer of data within a land. Like older network devices, like a hub, which simply broadcast data packets to all connected devices, switches are intelligent Devices that make decisions about where to send data packets. They achieve this by examining the unique MAC address or media access control. So, say, the one device is connected to the network. Each device had on a network has a distinct MAC address. Right by the else, everybody has their own unique MAC address, akin to a digital fingerprint when data sent. A switch utilizes these MAC address to determine which specific port To send the data packet, to ensuring that it reaches into the recipient and isn't broadcast unnecessary to all devices. Managed switches are an advanced network device that provide network administrators with a high degree of Control and configurability. They offer the following features user interface managed switches come with a web-based interface or a command line access that allows network administrators To configure and monitor the switch.

Speaker 1:

This interface provides detail control over various aspects, and let's take a look at some of them. Web-based interface managed switches are equipped with a built-in web-based GUI or graphic user interface. This web interface is accessible through a web browser, making it user friendly and accessible to network administrators. It allows you to configure and manage various aspects of the switch's operation. To access the web interface, you typically need to know the IP address of the switch very different from unmanaged right and the login credentials provided by the manufacturers Within the log. Within the web interface, you can do the following Configure ports.

Speaker 1:

Enable or disable specific ports. Set port speed and duplex settings and configure port security features. Create VLANs. Segment your network into different virtual lands and configure the settings. Setup quality of service. Prioritize network traffic ensuring that critical applications Get the necessary bandwidth and low latency. Monitor traffic. View real-time and historical data on a network traffic, including port statistics and air logs. Security configuration Configure access control list Mac address filtering and other security settings. Firmware updates check for firmware updates and apply them to keep the switch up to date. Can't really do that with unmanaged switch Command line interface.

Speaker 1:

For network administrators who prefer a more traditional and text-based interface, a managed switch often provides a command line interface. This allows you to configure and manage the switch by entering commands, much like using a text-based terminal. Access to the CLI may require a direct serial connection or, more commonly, connecting via telnet or secure share over the network. Within the CLI, you can perform tasks like configure VLANs, create and manage virtual lines for network segmentation, set port configurations, configure port settings such as speed, duplex and port security, implement QoS policies, define quality of service policies to prioritize traffic, monitor traffic and diagnose issues. Run command to check port statistics, view error logs and troubleshoot network problems. Security settings, configure access control, mac address filtering and other security measures. The choice between the web-based interface and the CLI or command line often depends on the administrator's familiarity and preferences. Some network administrators prefer the convenience of a graphic web interface, while others opt for the command line interface for more precise control and automation capabilities. Managed switches typically provide both options to cater to the various user preference and requirements.

Speaker 1:

Vlans managed switches enable the creation of virtual LANs. Vlans allows you to segment your network into multiple virtual networks, enhancing network security and traffic management. Let's take a little bit further but deep dive into this. Network segmentation. Vlans enable the creation of isolated logical networks within a physical networks. The segmentation enhances network organization, security and traffic management. For example, in a business network you can have separate VLANs for different departments like HR, finance and IT, isolating their traffic from each other. Enhanced security by segmenting a network into VLANs you can improve security. Devices within the same VLAN can communicate with each other, but they are prevented from directly communicating with devices in other VLANs, unless routing is configured to allow it. This isolation adds a layer of security and helps prevent unauthorized access. Traffic isolation VLAN prevents broadcast traffic from flooding the entire network. Broadcasts are limited to the VLAN in which they originate, reducing network congestions and improving performance. Optimized network traffic VLANs allow network administrators to prioritize traffic within each VLAN. Quality of service settings can be applied to ensure that critical applications within a VLAN received a necessary bandwidth and low latency, even when the network is congested. Ease of management network management is simplified when network segments are based on VLANs. For instance, changes in network configurations and security policies can be applied at the VLAN level rather than affecting the entire network.

Speaker 1:

Configuring VLANs in a managed switch involves assigning specific ports to a particular VLAN. A managed switch offers the flexibility to configure VLANs using either a web-based graphic user interface or a command line interface. Here is a basic overview of configuring VLANs on a managed switch Using a web-based interface. You access the switch web-based interface through a web browser by entering the switch IP and logging credentials. You navigate to the VLAN configuration settings. They may be level as VLANs or VLAN management or something similar. Create VLANs and assign specific ports to each VLAN. You can define the VLANs ID names and other settings. Apply your changes and the switch will reconfigure its port assignments based on your VLAN configurations Using a command line interface. Connect to the switch's command line using a terminal emulation program or SSH, slash telnet. Access the VLAN configuration mode within the command line. Define VLANs and assign ports to VLANs using command lines. These commands will specify the VLANs ID names and port membership. Save your configurations and the switch will implement the changes.

Speaker 1:

In summary, vlan support in managed switches is a crucial feature for creating segmented, secure and efficiently managed network. It allows network administrations to tailor network configurations to the specific needs of the organization, improving network organizations performance and security. Next, let's talk about quality of service. Managed switches support quality of service settings allowing you to prioritize network traffic. This is critical for ensuring that critical applications receive the necessary bandwidth and low latency, even during network congestions. Here are key components and aspects of quality of service.

Speaker 1:

Traffic prioritization QoS allows network administrations to assign different levels of priority to different types of network traffic. This is typically done by classifying packets into different traffic classes based on the characteristics, such as the type of application generating traffic. Traffic classification Network devices include managed switches that can classify network traffic based on various criteria, such as source and destination, ip address, source, destination, port numbers and application signatures. This classification helps in determining how packets should be treated. Q management Once packets are classified, they are placed into specific Qs based on the priority or service class. Qs are managed by the switch to ensure that higher priority traffic gets serviced before lower priority traffic. Bandwidth allocation Quality of service allows for allocation of specific amounts of bandwidth to prevent traffic classes or queues. This ensures that critical traffic receives its required share of available bandwidth.

Speaker 1:

Traffic shaping Some QoS implementations include traffic shaping, which is a mechanism for controlling the rate at which traffic is transmitted. Traffic shaping can prevent network congestion and ensure that traffic adheres to the predetermined profile. Congestion controls. In times of network congestions, qos can help manage and control traffic to prevent network saturation. This may involve dropping or delaying lower priority traffic to ensure that higher priority applications continue to function smoothly.

Speaker 1:

Video and voice quality QoS is crucial for real-time applications like VoIP and video conferencing. It ensures that voice and video packets are prioritized to minimize latency and jitter, improving the quality of communication. Application optimization QoS can be used to optimize the performance of specific applications, such as ensuring low latency for online gambling or fast response time for critical business applications. Security Quality of service can be employed to improve network security by controlling the flow of traffic and preventing certain type of traffic from consuming ex-if network resources. Qos settings are typically configured in managed switch. Through their web-based graphical user interface or command line interface, network administration administrators define policies and rules to manage traffic based on the requirements of the network and the applications running it. The implementation of QoS can significantly enhance the user experience, particularly in network with diverse traffic profiles. It ensures that critical applications, the services and networks with diverse traffic profiles and ensure that critical applications and services are not negatively impacted by non-essential or less sensitive traffic, contributing to improved network performance and user satisfaction.

Speaker 1:

The next feature we're going to talk about is security features. Managed switch offers advanced security features, such as port level access control, mac address filtering and the ability to configure security policies. These features enhance network security. Let's start off with port security. Port security allows you to control which devices can connect to the specific switch ports based on their MAC address. You can configure the switch to allow specific MAC address to a port or preventing or authorize devices from connecting. Access control list Access control list is a list that is formed by that you could create a used-to-control network traffic by defining rules that permit or deny specific packets based on the source and destination, ip address, port numbers and other criteria. Acls are powerful tools for securing a network by filtering traffic at the switch level. Again, mac address filtering manages, which is support. Mac address filtering, which enables you to specify which MAC address are allowed or deny access to the network. These cells prevent or authorize access.

Speaker 1:

802.1 port based authentication. This feature requires device to authenticate themselves before gaining access to the network. It is commonly used in enterprise where security is a top priority, such as enterprise networks. Device must provide valid credentials, such as username and password, before that granted access. Radius authentication remote authentication darling user service is often used in conjunction with 802.1x authentication to provide centralized authentication, authorization and accounting services. It allows for a higher level of security by validating user credentials through a central server.

Speaker 1:

Dynamic ARP inspection helps prevent ARP DAI or a dynamic ARP inspection helps prevent ARP address resolution protocols spoofing attack. It verifies that ARP packets contain valid IP to MAC address bindings, reducing the risk for a man of middle attack. Ip source guard limits IP traffic on untrusted ports to only traffic with valid source IP address. This feature helps prevent IP address spoofing attacks. Spatic tree protocol or STP security manage switches often offer security features related to STP, such as root guard and BPDU or bridge protocol data unit, which protect against unauthorized changes in the network topology. Dhcp snooping is a security feature that ensures that only authorized DHCP servers can assign IP address to the device on the network. It helps prevent rogue DHCP servers from distributing incorrect or malicious IP configurations. Secure management interface manage switches allows you to secure access to the management interface, such as web-based GUI or CLI or command line, with features like SSL and TLS encryption, secure shell access and role-based access control. Vlag segmentation creating VLANs can also be considered a security feature, as it isolates network segments and limits the communication between devices in different VLANs.

Speaker 1:

Event logging and alerts. Manage switches often offer the ability to log security related events and send alerts to administrators when suspicious activities are detected. They include logging failed authentication attempts or unusual traffic patterns. These security features collectively help protect network infrastructure, data and the devices connected to the network. They are particularly important for organizations with stringent security requirements, such as business, government agencies and educational institutions, where network integrity and confidentiality are paramount. Security features in a managed switch provide a robust defense against various network security threats and vulnerability.

Speaker 1:

Next, we have traffic monitoring. Managed switch provides tools for network traffic monitoring and analysis. You can track network performance, identify bottlenecks and troubleshoot issues effectively. How do you do that? By port statistics. Managed switches provide detailed statistics for each port, including the number of packets transmitted and received, error counts, bandwidth usage and link status. Port statistics are valuable for identifying issues like network congestions or underutilized ports. Traffic analysis traffic analysis tools within managed switches can capture and analyze network traffic, providing insights in the type of packets and protocols being used. Disinformation is essential for diagnosing network issues, identifying potential security threats and optimizing network performance.

Speaker 1:

Jumbo frames Some managed switches support the use of jumbo frames, which are larger Ethernet frames that the standard size Jumbo frames can reduce the overhead associated with smaller frames, leading to improved network efficiency. Traffic monitoring can help track the performance and impact of jumbo frame usage. Flow monitoring, often based on protocols like NetFlow or SFlow, it tracks the flow of data between devices and provides detailed information on data sources, destinations and communication patterns. Flow data is available for identifying network congestion, unusual behavior and bandwidth intensive applications. Traffic prioritization managed switches with quality of service capabilities can monitor traffic and prioritize packets according to configured QoS rules. This ensures that critical applications receive necessary bandwidth and low latency.

Speaker 1:

Security analysis Traffic monitoring can be used to detect suspicious on or authorized network activities. By analyzing traffic patterns, network administrators can identify anomalies and potential security threats, such as unusual data transfer or unauthorized access attempts. Historical data Managed switches often maintain historical data and logs of network activity. This historical data is essential for tracking trends, identifying recurring issues and troubleshooting intermittent problems. Real-time alerts Some managed switches support real-time alerts and notifications based on specific events or thresholds. Network administrators can configure alerts to inform them of critical network conditions such as link failures and traffic spikes. Bad utilization Traffic monitoring helps administrators track how network bandwidth is being used. Disinformation is available for optimizing network resources and planning for capacity upgrades. Troubleshooting when network issues arrive. Traffic monitoring tools assist in diagnostic problems and identifying their root cause. By examining traffic patterns, administrator can pinpoint bottlenecks, misconfigurations of performance-related issues. Managed switches often arrange tools and capabilities for traffic monitoring and the specific features available may vary depending on the switch model and the manufacturer. Network administrators can use these features to proactively manage and optimize network performance, maintain network security and ensure that the network meets the requirements of all different applications and services.

Speaker 1:

Now let's take a look at the pros and cons of having a managed switch. The pros control right. Managed switch offers extensive control over network settings. Network administrators can configure VLANs, qos and security measures. You also have port control, quality of service control, security control, traffic monitoring analysis, your spanning tree control, access control, virtualization and segmentation. Administrator have control of creating, configuring and managing virtualized network environments through VLAN. The firmware and software control manage switches often allow administrators to control the firmware or the software running on the switch. This includes checking for updates, which is a good thing that you need to do. Right, that's our very first episode. Right Updating on devices. Also, traffic shaping and bandwidth control and logging and events and alerts I'm sorry, the level control provided by Managed Switch gives the network administrator the flexibility to tailor network needs. This controls particularly beneficial in complex network environments.

Speaker 1:

Next, scalability is another pro Right. These switches are highly scalable and can adapt to growing network needs. You can expand your network by adding more Managed Switches and configuring them to work together. You have port scalability, stacking. Managed Switches support stacking, which is a practice of physically interconnecting multiple switches to create a single logical switch entity. This enhances scalability by allowing you to manage multiple switch as a unified system. Stacking simplifies network expansion because you can add more switches to stack, increasing port count and capability.

Speaker 1:

Again, vlan scalability, traffic parallelization, secure scalability, advanced features managed switches often price advanced features such as level three routing capabilities Right, so you turn your switch to a level three switch. These features are scalable in enabling the switch to perform routing between multiple VLANs or support more complex network configurations as the network expands. Then power over Ethernet scalability PoE capable managed switches can power network connected devices such as IP phones, wireless access points and security cameras. Scalability is the context means. In this context means you can add more PoE devices to the network by expanding the number of PoE ports on the switch. Scalability is essential for ensuring that your network can accommodate the growth of devices, applications and services over time and without undergoing a disruptive network overhaul. Managed switches are designed with capability in mind, providing the flexibility and features necessary to expand your network infrastructure. This scalability is especially valuable for business and enterprise experience growth or planning for future expansion.

Speaker 1:

Network optimization with QoS and traffic monitoring capabilities managed switch help optimize network performance. They ensure that the critical applications run smoothly and effective. Managed network traffic Again, right quality of service. Traffic management. You have low balancing. In network with high traffic loads, low balancing distributes network traffic across multiple paths or links, improving network efficiency and preventing congestions. Managed switch can be configured to support low balancing to optimize performance. You also have jumble frames again, monitoring analysis, redundancy and failover. Network optimization often involves implementing redundancy and failover mechanism. Managed switch support features like rapid spanning tree and link aggregation to ensure network continuity and, in case of link or switch failures.

Speaker 1:

Energy efficiency some managed switch are designed with energy efficiency features, such as ability to put unused ports or devices into low power states. Optimizing energy usage reduces the operational costs and minimize the environment footprint of the network. And security optimization by implementing security features on managed switch, you protect the network from vulnerabilities and threats, ultimately contributing to optimized network performance. You have latency reduction. Managing and optimizing the network infrastructure, including reducing the number of network cops, helps maintain latency. Low latency networks are critical for real time applications and services. Bandwidth allocation managed switches enable administrators to allocate bandwidth Based on the application agency requirements. This help optimize network performance by ensuring the bandwidth hungry application do not impact the performance of other switches, of other services and scaling network resources, and provide the flexibility to scale network resources as the organization grows. The scalability is essential for ensuring that the network can handle increased demands without a significant decrease in performance. Network optimization is an ongoing process that requires continuously monitoring adjustment to adapt to changing network conditions, applications and user requirements and ensure that the network operates at peak efficiency, providing a seamless and high quality experience for users by supporting the organization's goal and objectives.

Speaker 1:

Another problem is security. Advanced security features like port level access control and MAC address filtering improve network security, making managed switches suitable for business with strict security requirements. You have access control. You have port security access control list. You have VLANs, mac address, 802.1, secure management features, firmware software security, monitoring, physical security, radius, dynamic ARP, ip source guard. These security measures help to protect the network infrastructure, data and device connected to the network. They're especially important for business, businesses, organizations and institutions with strict security requirements, when network integrity and confidentiality are critical. Implementing these security features on managed switch can help safeguard the network against various threats and vulnerabilities. Now here are the cons. We just talked about the pros of having a managed switch. Let's talk about the cons Complexity the increased configurability of managed switches also means they can be more complex to set up and maintain.

Speaker 1:

This requires skilled network administrators with the knowledge of network concepts, which also means you gotta pay them. They have advanced features. Configuration right the configuration management switch involves a multitude of settings and parameters and may vary depending on the specific switch model and manufacturer. Properly configuring VLANs, qos policies, security settings and routing can be complex. That requires careful planning and execution. A managed switch typically provides web-based and command-line interfaces for configuration and management. Learning how to navigate and utilizing these interfaces effectively can take time, especially for those new to network administration. Troubleshooting, diagnostic and resolving network issues on managed switch can be complex. Administrators need to understand how to interpret error logs, monitor network traffic and use diagnostic tools efficiently to pinpoint the problem. Security configurations features on managed switch, such as access control. Poor security and ACLs require careful configuration to protect network from threats. Misconfigurations can have serious security implications, making proper setup essential or complex.

Speaker 1:

Interoperability and larger network environment. Integrating multiple managed switch and ensuring that they work seamlessly can be complex. Compatibility, blan configurations and routing settings all need to be coordinated Documentation keeping comprehensive documentation of which configuration and network topologies is critical and can be complex In large, dynamic networks. Accurate records are essential for troubleshooting and maintaining network interface. Being in skill set, network administrators responsible for managing managed switches must acquire the knowledge and skills required to handle the complexities involved. This often includes formal training, certification and ongoing education. While managed switch offers powerful tools and capabilities, the complexity means they are typically best suited for organizations with experienced network administrators well well versed in networking principles. For organizations or those with less experienced IT staff might find a learning curve associated with managed switches to be steep. In such cases, hiring or consulting with network experts can be a valuable solution. To ensure proper configuration and management Costs.

Speaker 1:

Managed switch are typically more expensive than unmanaged switch, both in terms of initial investment and the ongoing maintenance. This can be a drawback for smaller companies with tighter budgets. Brand and manufacturer well-known networking equipment manufacturers such as Cisco, hp and Aruba tend to offer premium price managed switches. Lesson on generic brands might provide more cost-effective options. Model and port count this the specific model of the managed switch and the number of ports that offer significantly effective costs. Smaller switches with fewer ports are generally less expensive than the larger high-port count switches. Port speeds and types managed switches come from a range of port speeds 1 gig, 10 gigabytes, 40 gigabytes per second, 100, and different types copper or fiber. The speed and type of ports you would need would impact the price.

Speaker 1:

Advanced features managed switches offer various features. Switches are more with more advanced features tend to be more expensive. If you want to do stacking, some managed switches support stacking, which allows multiple switches to be managed in single entity. That also can add to the cost. Relentlessly and high availability features like features like redundancy protocols and failover mechanisms tend to be more expensive. Management interfaces switches with user-friendly web-based graphic user interface and comprehensive management capability might charge a more premium price.

Speaker 1:

Certifications and compliance which is designed for specific industry standards, such as those needed for government or highly regulated environment, can be more costly due to the rigorous testing and certification processes that you need to have Warranty and support the link. In terms of the warranty, as well as availability of support and service contract, can influence the overall cost of the managed switch. You have also used or refurbished options. If a cost is significant concern, you might want to consider used or refurbished managed switches. These can offer cost savings, but it's important to ensure that equipment is in good working conditions and supported by the manufacturer. In general, the price range for managed switch can vary from a few hundred dollars for small basic models with limited reports to several thousand dollars for high-end enterprise gray switches with numerous advanced features and capabilities. When selecting a managed switch, it's important to consider your organization's specific network requirements, such as number of devices to be connected, the need for advanced features and the budget available. Careful consideration of these factors will help you choose a managed switch that provides the desired functionality and a cost that aligns with your budget.

Speaker 1:

The last con is the learning curve. Using the advanced features of managed switch can have a steep learning curve. Network administrators need to invest time in understanding and configuring these switches properly. Network experience your existing knowledge and experience in networking play a significant role in the learning curve. Network administrators with a background in networking may find it easier to adapt to managed switch, while those new to networking may experience a steeper learning curve.

Speaker 1:

Switch complexity the complexity of a managed switch can vary widely. Some managed switch are related to straightforward and often basic features, while others are more sophisticated with advanced capabilities like day three routing, v-line management and so on. The more complex the switch, the steeper the learning curve is going to be. User interface the switch user interface can greatly impact the learning curve. Managed switch typically offered web-based GUIs or command line interface. A user friendly GUI may be easier for beginners, while network experts might prefer the command lines for their flexibility. Training and resources access to training material and documentation that support resources can significantly impact your learning experience. Network manufacturers offer a comprehensive documentation. Online courses and certification programs help users become proficient with their managed switches.

Speaker 1:

Network size and complexity the size and complexity of the network you are managing with the switch also contributes to the learning curve. Larger and more complex network offering more intricate configurations and troubleshooting scenarios. Specific requirements of your organization and network can affect the learning curve. If your network requires particular features or security measures, you may need to learn how to configure and manage them on the switch. To minimize the learning curve when working with the managed switch. Start with the basics. Use available resources, training and certifications. Consider former training and certification programs related to managed switch. You are using Practice in a lab environment. You can set up a lab environment where you experiment with switch configurations. These hands-on practice can reaffirm your learning. Peer and expert support connect with peers and experts in the field for advice, guidance and problem solving.

Speaker 1:

Gradual implementation If you are responsible for production network, consider making gradual changes and configurations to avoid unexpected disruption. Implementing changes incrementally allow you to learn and adapt. Remember the learning curve is a natural part of requiring new skills and knowledge. It can be managed effectively with time, dedication and the right resources. As you gain experience and confidence working with managed switches, you become more familiar and you can be better to optimize and manage your network efficiently. So that's going to be it, guys, on this on network resource managed switches. I want to thank you for your time today and you got two for two you know, the same week. So consider yourselves lucky or me lazy, whichever one you want to think of, but I thank you and until next time. We'll see you then. Bye, bye, bye, bye.