0% found this document useful (0 votes)
16 views

Module2 - Network Devices

Uploaded by

Prarthana S
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Module2 - Network Devices

Uploaded by

Prarthana S
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 38

Internetworking Devices

15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CONNECTING DEVICES

In this section, we divide connecting devices into five


different categories based on the layer in which they
operate in a network.

Topics discussed in this section:


Passive Hubs
Active Hubs
Bridges
Two-Layer Switches
Routers

15.2
Figure 15.1 Five categories of connecting devices

15.3
Device Categories
 Operate below the physical layer
 Passive hub
 Operate at the physical layer
 Repeater or an Active hub
 Operate at the physical and data link layers
 a bridge or a two-layer switch
 Operate at the physical, data link, and network layers
 a Router or a three-layer switch
 Operate at all five layers
 a Gateway

2.4
Passive Hubs
 Just a connector
 Connects the wires coming from different branches
 In Star-topology LAN
 Just a point where signals coming from different stations collide
 Hub is the collision point
 It is part of the media
 Below the physical layer

2.5
Repeater
A repeater is a network device used to regenerate a signal.
Repeaters regenerate analog or digital signals distorted by
transmission loss due to attenuation.
Repeater is a Physical Layer device

6
Figure 15.2 A repeater connecting two segments of a LAN

15.7
Note

A repeater forwards every frame;


it has no filtering capability.

15.8
Note

A repeater is a regenerator,
not an amplifier.

15.9
Note

A repeater connects segments of a LAN.

15.10
Repeater
 Signals that carry information within a network can travel a
fixed distance before attenuation endangers the integrity of
the data.
 Avoid too weak or corrupted signals
 Regenerates and retimes the original bit pattern.
 Extend the physical length of a LAN.
 Not a device that can connect two LANs of different protocols
 Two-port node
 Receives a frame from any of the ports, it regenerates and
forwards it to the other port
 Does not amplify as it cannot discriminate noise and signal
 Weakened or corrupted signal – creates copy, bit for bit at original
strength
 Location is vital as signal reaches it before any noise changes
meaning of bit, original voltage not recoverable.

2.11
Figure 15.3 Function of a repeater

15.12
17.1.1 Active Hubs

 Multiport repeater

Create connections between stations in a


physical star topology

Can also be used to create multiple levels of


hierarchy

17.13
Figure 15.4 A hierarchy of hubs

15.14
Figure 17.2: Hub

17.15
Bridges
 Regenerates the signal it receives. (PHY)

 Check the physical (MAC) addresses (source and


destination) contained in the frame. (DL)

 Filtering capability
 Forwarded or Dropped?
 Which port to forward?

 Table that maps addresses to ports


 Transparent Bridges
 Source Routing Bridges

2.16
Note

A bridge has a table used in


filtering decisions.

15.17
Figure 15.5 A bridge connecting two LANs

15.18
Note

A bridge does not change the physical


(MAC) addresses in a frame.

15.19
Transparent Bridges
 Stations completely unaware of bridge's
existence.
 IEEE 802.1 d specification
1. Frames must be forwarded from one station to another
2. The forwarding table is automatically made by learning
frame movements in the network
3. Loops in the system must be prevented

 Learning Process
 Static Entries
 Dynamic Table

2.20
Figure 15.6 A learning bridge and the process of learning

15.21
Transparent Bridges – Looping
Problem
 Problem - redundant bridges bet pair of LANS ?
 Reliability?

 Each frame is handled separately because bridges


 2 Nodes on a network sharing the medium, use an access
method such as CSMA/CD

 In each iteration, there are newly generated fresh


copies of the frames

 Bridges use the spanning tree algorithm to create a


loopless topology.

2.22
Figure 15.7 Loop problem in a learning bridge

15.23
Spanning Tree Algorithm
 Broadcast Storms
 Frames Flooding bringing down entire network

 Each LAN to reach other LAN thro one path only

 IEEE 802.1 Committee


 Spanning Tree
 Automatically Disabling Bridges (Logical Topology)
 Not Physical Change

 Requirements
 Unique Bridge ID
 Each port in Bridge – Unique Port ID

2.24
Spanning Tree Algorithm
contd..
 Bridge Algorithm
1. Selection of Root Bridge (Lowest Bridge ID)
2. Determination of Root port of Each Bridge
 Except Root Bridge
 Port with Least-Cost Path to the Root Bridge
 TIE – Choose the one with Lowest port ID
 Cost to each LAN (Ex : Higher Cost to Lower Speed LAN)
 Path Cost = Sum of Cost Along path from one bridge to Another
3. Selection of Designated Bridge for each LAN
 Least Cost Path from LAN to Root Bridge
 TIE – Choose the Lowest Bridge ID
 Designated Port – Port that connects Designated Bridge and LAN
4. “Forwarding State” – All Root Ports & Designated ports
5. “Blocking State” – Other ports

2.25
15.26
15.27
Figure 15.8 A system of connected LANs and its graph representation

15.28
Spanning Tree Algorithm
 Dynamic Algorithm.

 Bridges send special messages to one other


 Bridge Protocol Data Units (BPDU)

 Spanning Trees are updated when there is change


in system
 Failure in Bridge
 Addition/Deletion of Bridges

2.29
Source Routing Bridges
 Another way to prevent loops in a system with
redundant bridges.

 Sending station defines the bridges that the


frame must visit.

 Prior to sending the data frame – Special Frame


exchanges.

 Ex : used in Token Ring LANs

2.30
Source Routing Bridges

15.31
Switch

Switches are Data Link


layer devices.

Connected host MAC


addresses are learned
and stored on a MAC
address table.
Switch
 Switches operate comparatively higher speeds that
Bridges.
 Normally a Switch has more ports than a Bridge
 Method of switching
 Bridge is store and forward.
 Switch can be store and forward, cut-through or fragment-free.
 Bridges can operate only in half duplex mode, but a
Switch can operate both in half duplex or full duplex
mode.
 Packet forwarding
 Bridges are performed using software.
 Switches using ASICs (Application Specific Integrated Circuits).

2.33
Switching Modes
cut-through
A switch starts to transfer the frame as soon as the destination MAC
address is received. No error checking is available.

store-and-forward
At the other extreme, the switch can receive the entire frame before
sending it out the destination port. This gives the switch software an
opportunity to verify the Frame Check Sum (FCS) to ensure that the
frame was reliably received before sending it to the destination.

fragment-free
A compromise between the cut-through and store-and-forward
modes.
Fragment-free reads the first 64 bytes, which includes the frame
header, and switching begins before the entire data field and
checksum are read.
17.17.3 Routers
1. A router is a three-layer device; it operates in the
physical, data-link, and network layers.

2. Routes packets based on logical Addressing

3. Host – Host Addressing

4. Connects LANs and WANs in Internet

5. Routing Table – Dynamic - Routing Protocols

6. Faster Table Lookup & Forwarding

17.35
Figure 17.9: Routing example

17.36
Figure 15.11 Routers connecting independent LANs and WANs

15.37
Figure 2.8: Encapsulation / Decapsulation

2.38

You might also like