Packet Switching Technique in Computer NetworkNiharikaDubey17
This document discusses different packet switching paradigms including virtual circuit switching, datagram switching, and source routing. It describes how bridges and extended local area networks (LANs) connect multiple LANs using a spanning tree algorithm to prevent loops. Finally, it covers limitations of bridges and how virtual LANs (VLANs) increase scalability and security by separating broadcast domains.
The document discusses data link layer concepts including frame format, switching, and virtual circuit switching. It provides details on:
- The components of an Ethernet frame including preamble, start frame delimiter, destination/source addresses, length/type field, and data.
- How layer 2 switches work by looking at frame addresses rather than network layer headers to decide whether to forward, flood, or drop frames.
- Virtual circuit switching which establishes a connection between source and destination before sending data and uses a virtual circuit identifier in packet headers to route packets through switches along the established path.
This document discusses different methods for switching data in communication networks. It describes circuit switching, packet switching, message switching, and fast packet switching. Circuit switching establishes a dedicated connection for transmission. Packet switching divides data into packets that are routed independently. Message switching stores data at switches before transmission. Fast packet switching reduces overhead to increase throughput. The document provides details on the characteristics and advantages and disadvantages of each switching method.
The document summarizes the key points covered in a lecture on computer networks. It discusses different types of devices that operate at different layers, including repeaters and hubs that operate at the physical layer, bridges and switches that operate at the link layer, and routers that operate at the network layer. It also covers topics like switch operation, spanning trees, virtual LANs (VLANs), and self-learning in switches.
This document provides an overview of network technologies including computer networks, types of networks (LAN and WAN), networking concepts like circuit switching and packet switching, and the OSI model. It compares LANs and WANs, discusses virtual circuits and datagrams, and describes common networking devices like hubs, bridges, and routers.
This chapter discusses different techniques for interconnecting networks, including switching, bridging, and routing. It covers store-and-forward switching using switches to connect networks. There are two main approaches for switching - connectionless switching using datagrams and connection-oriented switching using virtual circuits. Connectionless switching forwards each packet independently based on the destination address, while connection-oriented switching establishes paths through the network before transmitting data packets.
Packet switching refers to protocols where messages are divided into packets before being transmitted. Each packet is transmitted individually and can take different routes to the destination. Once all packets arrive, they are recompiled into the original message. There are two main approaches: virtual circuits establish a pre-planned route before transmission, while datagrams treat each packet independently without connection setup. Virtual circuits provide sequencing but are less reliable if a node fails, while datagrams are more flexible but packets may arrive out of order.
Dc ch10 : circuit switching and packet switchingSyaiful Ahdan
This document discusses different communication switching techniques for networks, including circuit switching and packet switching. Circuit switching establishes a dedicated communication path between stations but is inefficient for bursty data traffic. Packet switching divides messages into packets that are transmitted independently through the network, allowing dynamic sharing of network bandwidth. It supports data rate conversion and priority handling. Packet switching can use either a datagram approach, treating each packet independently, or a virtual circuit approach, pre-establishing routes for packets.
This document discusses network topologies, switching, and routing algorithms. It defines different network topologies including mesh, star, bus, ring, tree, and hybrid topologies. It also describes hubs, switches, circuit switching, message switching, packet switching, datagram networks, and virtual circuit networks. For routing algorithms, it explains distance vector routing which uses hop count as the routing metric and link state routing which uses weighted metrics to calculate the shortest path.
The document discusses packet switching and computer networks. It describes how packet switches enable packets to travel between hosts even without a direct connection by using buffers and queues. It explains the two main approaches to packet switching - connectionless datagram switching which uses destination addresses, and connection-oriented virtual circuit switching which establishes connections using labels. The key aspects of each approach like forwarding tables, signaling process, and connection setup and teardown are outlined.
Wide area networks connect smaller networks over large geographical areas. Packet switching is the dominant switching method used, breaking data into packets that are routed independently to their destination. There are two main types of packet switching: connection-oriented uses virtual circuits to establish dedicated paths for packets to follow, while connectionless treats each packet independently without pre-establishing paths. Packet switching provides more efficient use of network bandwidth compared to circuit switching.
This document discusses layer 2 switching and VLANs. It begins by explaining how switching breaks up large collision domains into smaller ones by creating individual collision domains per switch port. It then discusses how VLANs allow further segmentation of the network by logically grouping ports regardless of their physical location. VLANs create separate broadcast domains to limit broadcast traffic to specific groups of users. The document provides examples of creating, assigning ports to, and deleting VLANs on a switch to segmented the network.
This document discusses layer 2 switching and VLANs. It begins by explaining how switching breaks up large collision domains into smaller ones by creating individual collision domains per switch port. It then discusses how VLANs allow further segmentation of the network by logically grouping ports regardless of their physical location. VLANs create separate broadcast domains to limit broadcast traffic to specific groups of users. The document provides examples of creating, assigning ports to, and deleting VLANs on a switch to segmented the network.
This document discusses layer 2 switching and VLANs. It provides information on:
- How layer 2 switches break up large collision domains into smaller ones by creating separate collision domains for each switch port. This improves network performance over hub-based networks.
- The two main types of VLAN membership - static VLANs where ports are manually assigned to VLANs, and dynamic VLANs where VLAN assignments are determined automatically based on device MAC addresses.
- How VLANs simplify network management by allowing logical segmentation of broadcast domains independent of physical port locations, and improve network security by restricting communication between VLANs.
Here are the key tasks for initial configuration of a Cisco switch:
- Setting the enable and console passwords to secure access to privileged modes (Password must be between 4 and 8 characters)
- Setting the hostname to identify the switch
- Configuring the IP address and subnet mask on VLAN 1 to allow remote management via SSH/Telnet
- Configuring basic security settings like disabling unused ports, protocols, and services
- Configuring spanning tree protocol (STP) for redundancy and loop prevention in switched networks
- Verifying port status and connectivity using show commands
Here are the key tasks for initial configuration of a Cisco switch:
- Set the enable and console passwords to secure access to privileged modes. The passwords must be between 4-8 characters.
- Configure the hostname to identify the switch.
- Configure the IP address and subnet mask on VLAN 1 for management access.
- Verify port status and configure basic settings like speed and duplex.
- Configure SNMP, syslog servers for remote monitoring if needed.
- Configure spanning tree protocol for redundancy.
- Save the running configuration to startup for automation on reboot.
- Test connectivity to verify the base configuration is functioning properly.
Circuit and Packet Switching Methods PresentationNiharikaDubey17
This document discusses two main types of switching technologies used in communications networks: circuit switching and packet switching. Circuit switching establishes a dedicated communication path for the duration of a connection, while packet switching breaks messages into packets that are transmitted individually and reassembled at the destination. Packet switching provides better line efficiency since the bandwidth is shared dynamically between users, and allows for variable data rates and prioritization of packets. Virtual circuits are a form of packet switching that pre-establishes a route for packets to follow, avoiding per-packet routing decisions.
This document discusses different types of switching techniques used in computer networks, including circuit switching, message switching, packet switching, and cell switching. It describes the key differences between connection-oriented and connectionless networks, as well as virtual circuits and datagrams. Specific switching techniques like circuit switching, store-and-forward networks, message switching, and packet switching are explained in terms of how data is transferred between nodes.
This document discusses different types of communication networks including traditional and high-speed LANs and WANs, as well as MANs. It describes key characteristics of these networks such as speed, distance, scope, and data rates. The document also covers switching techniques used in networks including circuit switching, packet switching, and asynchronous transfer mode (ATM). It provides examples and diagrams to illustrate how these different switching techniques work.
Packet-switching networks transfer information as packets that may experience random delays and loss. There are two main approaches: connectionless datagram service which routes packets independently, and connection-oriented virtual circuits which establish paths for packets belonging to a connection. Routing determines the best paths for packets using distributed algorithms that adapt to network changes. Large packet switches use techniques like self-routing, shared memory, and crossbar switches to efficiently route high volumes of packets.
Classification of mental disorder in 5th semester bsc. nursing and also used ...parmarjuli1412
Classification of mental disorder in 5th semester Bsc. Nursing and also used in 2nd year GNM Nursing Included topic is ICD-11, DSM-5, INDIAN CLASSIFICATION, Geriatric-psychiatry, review of personality development, different types of theory, defense mechanism, etiology and bio-psycho-social factors, ethics and responsibility, responsibility of mental health nurse, practice standard for MHN, CONCEPTUAL MODEL and role of nurse, preventive psychiatric and rehabilitation, Psychiatric rehabilitation,
This chapter discusses different techniques for interconnecting networks, including switching, bridging, and routing. It covers store-and-forward switching using switches to connect networks. There are two main approaches for switching - connectionless switching using datagrams and connection-oriented switching using virtual circuits. Connectionless switching forwards each packet independently based on the destination address, while connection-oriented switching establishes paths through the network before transmitting data packets.
Packet switching refers to protocols where messages are divided into packets before being transmitted. Each packet is transmitted individually and can take different routes to the destination. Once all packets arrive, they are recompiled into the original message. There are two main approaches: virtual circuits establish a pre-planned route before transmission, while datagrams treat each packet independently without connection setup. Virtual circuits provide sequencing but are less reliable if a node fails, while datagrams are more flexible but packets may arrive out of order.
Dc ch10 : circuit switching and packet switchingSyaiful Ahdan
This document discusses different communication switching techniques for networks, including circuit switching and packet switching. Circuit switching establishes a dedicated communication path between stations but is inefficient for bursty data traffic. Packet switching divides messages into packets that are transmitted independently through the network, allowing dynamic sharing of network bandwidth. It supports data rate conversion and priority handling. Packet switching can use either a datagram approach, treating each packet independently, or a virtual circuit approach, pre-establishing routes for packets.
This document discusses network topologies, switching, and routing algorithms. It defines different network topologies including mesh, star, bus, ring, tree, and hybrid topologies. It also describes hubs, switches, circuit switching, message switching, packet switching, datagram networks, and virtual circuit networks. For routing algorithms, it explains distance vector routing which uses hop count as the routing metric and link state routing which uses weighted metrics to calculate the shortest path.
The document discusses packet switching and computer networks. It describes how packet switches enable packets to travel between hosts even without a direct connection by using buffers and queues. It explains the two main approaches to packet switching - connectionless datagram switching which uses destination addresses, and connection-oriented virtual circuit switching which establishes connections using labels. The key aspects of each approach like forwarding tables, signaling process, and connection setup and teardown are outlined.
Wide area networks connect smaller networks over large geographical areas. Packet switching is the dominant switching method used, breaking data into packets that are routed independently to their destination. There are two main types of packet switching: connection-oriented uses virtual circuits to establish dedicated paths for packets to follow, while connectionless treats each packet independently without pre-establishing paths. Packet switching provides more efficient use of network bandwidth compared to circuit switching.
This document discusses layer 2 switching and VLANs. It begins by explaining how switching breaks up large collision domains into smaller ones by creating individual collision domains per switch port. It then discusses how VLANs allow further segmentation of the network by logically grouping ports regardless of their physical location. VLANs create separate broadcast domains to limit broadcast traffic to specific groups of users. The document provides examples of creating, assigning ports to, and deleting VLANs on a switch to segmented the network.
This document discusses layer 2 switching and VLANs. It begins by explaining how switching breaks up large collision domains into smaller ones by creating individual collision domains per switch port. It then discusses how VLANs allow further segmentation of the network by logically grouping ports regardless of their physical location. VLANs create separate broadcast domains to limit broadcast traffic to specific groups of users. The document provides examples of creating, assigning ports to, and deleting VLANs on a switch to segmented the network.
This document discusses layer 2 switching and VLANs. It provides information on:
- How layer 2 switches break up large collision domains into smaller ones by creating separate collision domains for each switch port. This improves network performance over hub-based networks.
- The two main types of VLAN membership - static VLANs where ports are manually assigned to VLANs, and dynamic VLANs where VLAN assignments are determined automatically based on device MAC addresses.
- How VLANs simplify network management by allowing logical segmentation of broadcast domains independent of physical port locations, and improve network security by restricting communication between VLANs.
Here are the key tasks for initial configuration of a Cisco switch:
- Setting the enable and console passwords to secure access to privileged modes (Password must be between 4 and 8 characters)
- Setting the hostname to identify the switch
- Configuring the IP address and subnet mask on VLAN 1 to allow remote management via SSH/Telnet
- Configuring basic security settings like disabling unused ports, protocols, and services
- Configuring spanning tree protocol (STP) for redundancy and loop prevention in switched networks
- Verifying port status and connectivity using show commands
Here are the key tasks for initial configuration of a Cisco switch:
- Set the enable and console passwords to secure access to privileged modes. The passwords must be between 4-8 characters.
- Configure the hostname to identify the switch.
- Configure the IP address and subnet mask on VLAN 1 for management access.
- Verify port status and configure basic settings like speed and duplex.
- Configure SNMP, syslog servers for remote monitoring if needed.
- Configure spanning tree protocol for redundancy.
- Save the running configuration to startup for automation on reboot.
- Test connectivity to verify the base configuration is functioning properly.
Circuit and Packet Switching Methods PresentationNiharikaDubey17
This document discusses two main types of switching technologies used in communications networks: circuit switching and packet switching. Circuit switching establishes a dedicated communication path for the duration of a connection, while packet switching breaks messages into packets that are transmitted individually and reassembled at the destination. Packet switching provides better line efficiency since the bandwidth is shared dynamically between users, and allows for variable data rates and prioritization of packets. Virtual circuits are a form of packet switching that pre-establishes a route for packets to follow, avoiding per-packet routing decisions.
This document discusses different types of switching techniques used in computer networks, including circuit switching, message switching, packet switching, and cell switching. It describes the key differences between connection-oriented and connectionless networks, as well as virtual circuits and datagrams. Specific switching techniques like circuit switching, store-and-forward networks, message switching, and packet switching are explained in terms of how data is transferred between nodes.
This document discusses different types of communication networks including traditional and high-speed LANs and WANs, as well as MANs. It describes key characteristics of these networks such as speed, distance, scope, and data rates. The document also covers switching techniques used in networks including circuit switching, packet switching, and asynchronous transfer mode (ATM). It provides examples and diagrams to illustrate how these different switching techniques work.
Packet-switching networks transfer information as packets that may experience random delays and loss. There are two main approaches: connectionless datagram service which routes packets independently, and connection-oriented virtual circuits which establish paths for packets belonging to a connection. Routing determines the best paths for packets using distributed algorithms that adapt to network changes. Large packet switches use techniques like self-routing, shared memory, and crossbar switches to efficiently route high volumes of packets.
Classification of mental disorder in 5th semester bsc. nursing and also used ...parmarjuli1412
Classification of mental disorder in 5th semester Bsc. Nursing and also used in 2nd year GNM Nursing Included topic is ICD-11, DSM-5, INDIAN CLASSIFICATION, Geriatric-psychiatry, review of personality development, different types of theory, defense mechanism, etiology and bio-psycho-social factors, ethics and responsibility, responsibility of mental health nurse, practice standard for MHN, CONCEPTUAL MODEL and role of nurse, preventive psychiatric and rehabilitation, Psychiatric rehabilitation,
How to Change Sequence Number in Odoo 18 Sale OrderCeline George
In this slide, we’ll discuss on how to change sequence number in Odoo 18 Sale Order. In Odoo, sequences are used to generate unique identifiers for records. These identifiers are often displayed as reference numbers, such as invoice numbers, purchase order numbers, or customer numbers.
Struggling with complex aerospace engineering concepts? This comprehensive guide is designed to support students tackling assignments, homework, and projects in Aerospace Engineering. From aerodynamics and propulsion systems to orbital mechanics and structural analysis, we cover all the essential topics that matter.
Whether you're facing challenges in understanding principles or simply want to improve your grades, this guide outlines the key areas of study, common student hurdles, tips for success, and the benefits of professional tutoring and assignment help services.
WhatsApp:- +91-9878492406
Email:- [email protected]
Visit:- https://onlinecollegehomeworkhelp.com/aerospace-engineering-assignment-help
Rebuilding the library community in a post-Twitter worldNed Potter
My keynote from the #LIRseminar2025 in Dublin, from April 2025.
Exploring the online communities for both libraries and librarians now that Twitter / X is no longer an option for most - with a focus on Bluesky amd how to get the most out of the platform.
The particular emphasis in this presentation is on academic libraries / Higher Ed.
Thanks to LIR and HEAnet for inviting me to speak!
How to Add Button in Chatter in Odoo 18 - Odoo SlidesCeline George
Improving user experience in Odoo often involves customizing the chatter, a central hub for communication and updates on specific records. Adding custom buttons can streamline operations, enabling users to trigger workflows or generate reports directly.
The Quiz Club of PSGCAS brings to you a battle...
Get ready to unleash your inner know-it-all! 🧠💥 We're diving headfirst into a quiz so epic, it makes Mount Everest look like a molehill! From chart-topping pop sensations that defined generations and legendary sports moments that still give us goosebumps, to ancient history that shaped the world and, well, literally EVERYTHING in between! Prepare for a whirlwind tour of trivia that will stretch your brain cells to their absolute limits and crown the ultimate quiz champion. This isn't just a quiz; it's a battle of wits, a test of trivia titans! Are you ready to conquer it all?
QM: VIKASHINI G
THE QUIZ CLUB OF PSGCAS(2022-25)
LDMMIA: 2024 Crystal Gold Lecture 1 (L1). A Bonus Workshop Lesson.
We also have a Fam Bday. My Next Session (7) is late. Make sure to catch our new series. The last one was Money Part 2.
♥LDMMIA & Depts: are fusing the fan clubs so do welcome. Welcome all fan groups and visitors.
We are timeless and a safe haven / Cyber Space. That’s the design of our Fan/Reader/Loyal Blog.
I hope to continue that rule for all fan groups. You are loved / appreciated always.♥
LDMMIA CORP, LDM YOGA BRAND PRESENTS ‘SEXY YOGA’ Studio Media/Artist: Yogi Goddess
TEACHER: REV LEZ MICHELLE, YOGA ND, REIKI MASTER, & (Decades) METAPHYSICIAN
This is both LDM Yoga brand with Yogi Goddess.
No grades, No Signups needed. This is a Public vs Private Class attendance.
No communications Needed. All students have privacy. Theres no reporting in, uncomfortable introductions to the public.
How to Manage Manual Reordering Rule in Odoo 18 InventoryCeline George
Reordering rules in Odoo 18 help businesses maintain optimal stock levels by automatically generating purchase or manufacturing orders when stock falls below a defined threshold. Manual reordering rules allow users to control stock replenishment based on demand.
GUESS WHO'S HERE TO ENTERTAIN YOU DURING THE INNINGS BREAK OF IPL.
THE QUIZ CLUB OF PSGCAS BRINGS YOU A QUESTION SUPER OVER TO TRIUMPH OVER IPL TRIVIA.
GET BOWLED OR HIT YOUR MAXIMUM!
Unleash your inner trivia titan! Our upcoming quiz event is your chance to shine, showcasing your knowledge across a spectrum of fascinating topics. Get ready for a dynamic evening filled with challenging questions designed to spark your intellect and ignite some friendly rivalry. Gather your smartest companions and form your ultimate quiz squad – the competition is on! From the latest headlines to the classics, prepare for a mental workout that's as entertaining as it is engaging. So, sharpen your wits, prepare your answers, and get ready to battle it out for bragging rights and maybe even some fantastic prizes. Don't miss this exciting opportunity to test your knowledge and have a blast!
QUIZMASTER : GOWTHAM S, BCom (2022-25 BATCH), THE QUIZ CLUB OF PSGCAS
Slides from a Doctoral Virtual Information Session presented by staff and faculty of Capitol Technology University. Covers program details, admissions, tuition, financial aid and other information needed to consider earning a doctorate from Capitol. Presented May 18, 2025.
3. Scalable Networks
• Switch
– forwards packets from input port to output port
– port selected based on address in packet header
• Advantages
– cover large geographic area (tolerate latency)
– support large numbers of hosts (scalable bandwidth)
Input
ports
T3
T3
STS-1
T3
T3
STS-1
Switch
Output
ports
5. Source Routing
• The information to route the packet is provided by the
source host and included in the packet
• Example of implementing source routing:
– Assign a number to each switch output port
– Include the list of output ports that the packet has to go through
– The list is rotated by the intermediate switches before forwarding
• Disadvantage:
– Packet initiators need to have a sufficient information about the
network topology
– The header has a variable length
7. Virtual Circuit (VC) Switching
• Explicit connection setup (and tear-down) phase
• Subsequent packets follow same circuit (path)
• Sometimes called connection-oriented model
0
1
3
2
0
1 3
2
0
1
3
2
5
11
4
7
Switch 3
Host B
Switch 2
Host A
Switch 1
• Analogy: phone call
• Each switch
maintains a VC
table
8. Virtual Circuit Switching
• Connection Setup approaches:
– Permanent Virtual Circuits (PVC): manually setup/removed by network
administrators
– Switched Virtual Circuits (SVC): dynamically setup through signaling
over some control channels
• Connection state => VC table
– incoming interface, VC Identifier (VCI), outgoing interface, outgoing VCI
• SVC:
– The setup message is forwarded over the network
– New entries are created in the VC table and destination switches choose
incoming VCI
– When the setup message reaches the destination, connection
acknowledgements and chosen VCI are communicated back to the source
9. Virtual Circuits
• Examples of Virtual Circuit Technology:
– Frame Relay, X.25, Asynchronous Transfer
Mode (ATM)
• Frame Relay was popular for creating
virtual private networks (VPNs) using PVC.
• ATM is a more complex technology that
provides mechanisms for supporting quality
of service
10. Datagram Switching
• No connection setup phase
• Each packet forwarded independently
• Sometimes called connectionless model
0
1
3
2
0
1 3
2
0
1
3
2
Switch 3
Switch 2
Host A
Switch 1
Host C
Host D
Host E
Host G
Host H
• Analogy: postal
system
• Each switch
maintains a
forwarding (routing)
table
Switch 4
11. Virtual Circuit Model
• Setup: Typically wait full RTT for connection setup
before sending first data packet.
• Header: While the connection request contains the
full destination address, each data packet contains
only a small identifier, making the per-packet header
overhead small.
• Quality of Service (QoS):
– Connection setup allows resource reservation
– If a switch or a link in a connection fails, the connection is
broken and a new one needs to be established.
12. Datagram Model
• Setup: There is no round trip time delay waiting for
connection setup; a host can send data as soon as it is
ready.
• Header: Since every packet must carry the full address
of the destination, the overhead per packet is higher than
for the connection-oriented model.
• Quality of Service (QoS):
– Source host has no way of knowing if the network is capable
of delivering a packet or if the destination host is even up.
– Since packets are treated independently, it is possible to route
around link and node failures.
– Successive packets may follow different paths and be received
out of order.
14. Bridges and Extended LANs
• LANs have physical limitations (e.g., 2500m)
• Connect two or more LANs with a bridge
– accept and forward strategy
– level 2 connection (does not add packet header)
• Ethernet Switch is a LAN Switch = Bridge
A
Bridge
B C
X Y Z
Port 1
Port 2
15. Learning Bridges
• Do not forward when unnecessary
• Maintain forwarding table
Host Port
A 1
B 1
C 1
X 2
Y 2
Z 2
• Learn table entries based on source address
• Table is an optimization; need not be complete
• Always forward broadcast frames
A
Bridge
B C
X Y Z
Port 1
Port 2
16. Spanning Tree Algorithm
• Problem: loops
• Bridges run a distributed spanning tree algorithm
– select which bridges actively forward
– developed by Radia Perlman
– now IEEE 802.1 specification
B3
A
C
E
D
B2
B5
B
B7 K
F
H
B4
J
B1
B6
G
I
17. Algorithm Overview
• Each bridge has unique id (e.g., B1, B2, B3)
• Select bridge with smallest id as root
• Select bridge on each LAN closest to root as
designated bridge (use id to break ties)
B3
A
C
E
D
B2
B5
B
B7 K
F
H
B4
J
B1
B6
G
I
• Each bridge forwards
frames over each LAN
for which it is the
designated bridge
18. Algorithm Details
• Bridges exchange configuration messages
– id for bridge sending the message
– id for what the sending bridge believes to be root
bridge
– distance (hops) from sending bridge to root bridge
• Each bridge records current best configuration
message for each port
• Initially, each bridge believes it is the root
19. Algorithm Detail (cont)
• When learn not root, stop generating config messages
– in steady state, only root generates configuration messages
• When learn not designated bridge, stop forwarding
config messages
– in steady state, only designated bridges forward config
messages
• Root continues to periodically send config messages
• If any bridge does not receive config message after a
period of time, it starts generating config messages
claiming to be the root
20. Broadcast and Multicast
• Forward all broadcast/multicast frames
– current practice
• Learn when no group members downstream
• Accomplished by having each member of
group G send a frame to bridge multicast
address with G in source field
21. Limitations of Bridges
• Do not scale
– spanning tree algorithm does not scale
– broadcast does not scale
• Do not accommodate heterogeneity
• Caution: beware of transparency
– Bridged LANs do not always behave as single
shared medium LAN: they drop packets when
congested, higher latency
22. Virtual LANs (VLAN)
• VLANs are used to:
– increase scalability: reduce broadcast messages
– provide some basic security by separating LANs
• VLANs have an ID (color).
• Bridges insert the VLAN ID between the ethernet
header and its payload
• Packets (unicast and multicast) are only forwarded
to VLAN with the same ID as the source VLAN
Editor's Notes
#1: Review of Direct Link Networks. Should have seen them in COM3510.
Focus on results and practical considerations and not on how they were obtained.
#3: Limitation in number of input/output ports doesn’t mean that we cannot build large networks. Interconnection of switches allows to connect a large number of hosts.
Ethernet like networks do not scale to large distances. Switches can be connected by point-to-point links thus providing large geographic scope.
Adding new hosts doesn’t necessarily reduce the performance of other nodes.
#5: What techniques can be used to communicate between hosts in a switched network:
Source routing (could be used in some IP routing and in some cases in wireless ad hoc networks)
Virtual Circuit or connection-oriented approach.
Datagram approach or connectionless approach.
Instead of rotation, use a pointer
Used in the IP, loose source routing, wireless, connection setup
#8: Connection setup: to establish a connection state at intermediate switches
#9:
Quality of service: throughput, congestion avoidance
#14: How do we extend bridges? Repeater, bridges, routers…
Scalability: 10Mbps + switches => ?
#21: One advantage of LANs is that you don’t have to run higher layer protocols: routing etc.