There are five categories of connecting devices based on the layer(s) in which they operate:
1. Those below the physical layer like a passive hub. 2. Those at the physical layer like a repeater or active hub. 3. Those at the physical and data link layers like a bridge or two-layer switch. 4. Those at the physical, data link, and network layers like a router or three-layer switch. 5. Those that can operate at all five layers like a gateway.
Interconnecting devices allow computers to exchange data on a network and form the backbone of a network. Common interconnecting devices include hubs, repeaters, bridges, switches, routers, and gateways. Hubs operate at the physical layer and replicate and broadcast all data to all ports. Repeaters extend network distance by regenerating weak signals. Bridges operate at the data link layer and filter traffic between connected segments. Switches learn MAC addresses and filter traffic at the data link layer. Routers filter at the network layer using IP addresses and can connect different network types. Gateways connect heterogeneous networks using protocol translation at all seven OSI layers.
This document discusses different types of connecting devices used to connect local area networks (LANs) or segments of LANs. It describes five categories of connecting devices based on the layer of the Internet model in which they operate: 1) passive hubs and repeaters that operate below or at the physical layer, 2) bridges that operate at the physical and data link layers, 3) routers that operate at the physical, data link, and network layers, and 4) gateways that can operate at all five layers. Specific devices like hubs, bridges, and routers are explained in terms of their functions, capabilities, and how they differ from each other.
This document discusses various networking devices and how they operate at different layers of the OSI model. It describes network interface cards, repeaters, hubs, bridges, switches, routers, and how they function at layers 1, 2, or 3. Hubs operate at layer 1 and repeat/regenerate signals. Bridges and switches operate at layer 2 and filter traffic by MAC address. Routers operate at layer 3 and can route traffic between networks. VLAN switches can segment traffic into multiple broadcast domains to improve bandwidth utilization.
This document provides an overview of network devices and protocols including repeaters, bridges, routers, gateways, TCP/IP, and applications like DNS, SMTP, HTTP. It describes the functions of repeaters, hubs, bridges, switches, routers, and gateways. Repeaters extend network length while hubs connect multiple devices. Bridges and switches filter traffic between segments/ports. Routers route packets between networks and gateways translate between different protocols. It also summarizes the layers of the TCP/IP protocol suite including network interface, internet, transport, and application layers, and describes protocols like IPv4, IPv6, TCP, UDP, and applications like DNS, SMTP, HTTP.
Network devices like repeaters, hubs, bridges, switches, wireless access points, and routers were discussed.
Repeaters and hubs operate at the physical layer and broadcast signals to all ports. Bridges and switches operate at the data link layer and can filter traffic between specific ports based on MAC addresses. Wireless access points allow devices to connect to a network without wires. Network interface cards install into devices to connect them to a network. Routers operate at the network layer and can connect multiple networks and select the best path for traffic between networks.
This document discusses different types of networking devices used to connect local area networks (LANs). It describes hubs, repeaters, bridges, routers, and gateways. Hubs and repeaters operate at the physical layer, bridges operate at the physical and data link layers, and routers and gateways operate at the network layer and above to connect multiple networks and perform protocol conversion. The document provides details on the functions and characteristics of each type of device.
A hub is a networking device that connects multiple devices on a local area network (LAN). It receives data packets through one port and broadcasts them to all other ports so all connected devices can see the packets. Hubs operate in half duplex mode and have no bandwidth management or collision detection. Switches are more advanced devices that can connect more devices than hubs. Switches have buffers and port-to-MAC address tables that allow them to send frames to specific ports faster than hubs. Routers connect multiple networks like LANs and WANs. Routers use IP addresses to route packets between networks and can run routing protocols to dynamically learn routes.
Network devices like hubs, switches, and routers connect computers in a network and help manage traffic flow. Hubs broadcast all received data to all ports but have limited bandwidth. Switches can connect more devices than hubs and have features like VLANs. Routers connect different networks and use IP addresses to direct traffic. Other devices like firewalls, VPNs, and IDS/IPS provide network security functions.
The document discusses topics related to the network layer, including:
1) The network layer is responsible for routing packets between hosts and networks, addressing devices and networks, and internetworking between subnets with different addressing schemes or protocols.
2) Key functions of the network layer include routing, addressing, queueing and forwarding packets according to quality of service, and providing connection-oriented and connectionless mechanisms.
3) The document discusses various networking devices that operate at the network layer like routers, switches, bridges, repeaters, and gateways, and their functions in routing packets between networks and subnets.
decide on matters related to placement, in consultation with the Academic Dean.
Applicants are responsible for submitting applications for admission, and should be aware
of the following:
1. All admitted students must attend a new student orientation session prior to the
beginning of the semester. Information about orientation dates will be announced by
the Registrar’s Office after admission has been determined.
2. Academic credentials become the property of the University College and cannot
be returned, copied or forwarded.
3. Applicants are encouraged to apply at least three to four weeks prior to first
semester of attendance. This will allow adequate time for the student to request any
academic credentials needed to complete the application file, and participate in new
student orientation and registration.
Application Procedure
Receipt
of the
following
credentials
in the
Office
of Registrar
constitutes a complete application for admission
i.
Application Form - The application form may be obtained from the
Registrar’s Office or from the University College’s website where online
submission is also possible. The completed and signed application form should be
returned to the Office of the Registrar. The appropriate application fee in
i am student Cash/Checks should be made payable to
ii. College/University Transcripts - who have attended a college or university, must
request that an official transcript be sent directly from each institution to the ii. Students shall present the completed forms in triplicate to their academic advisor
and get his/her signature.
iii. Students must produce the cash receipt indicating the amount of money they have paid
for registration and first semester courses fee.
iv.
Students shall then take the forms to the registration desk and get the registrar’s
seal on the forms filled in triplicate; and submit one of the forms to the Office of the
Registrar, one to his/her department and should keep one with him/her.
v.
The registration would be incomplete if a student misses any one of the above
stages in the registration process.
vi.
The registration process is only considered complete when the seal of the registrar is
stamped on the registration slip.
Registration of All Other (Non Freshman) Students
i. The Office of the Registrar shall issue grade reports for the semester and submit them
to the respective departments at least a day before the registration.
ii. A student shall collect his/her grade report from his/her respective department
by presenting a valid ID.
iii. A student shall complete the registration slip in triplicate consisting of the courses that
he/she will take in that particular semester.
iv.
Then, he/she shall pay for the courses listed in the registration slip and present the
cash receipt along with the forms to his/her academic advisor and get his signature.
v.
Finally, he/she shall take the forms to the Office of the Registrar to get the seal. The
registration process shall be
This document discusses various networking devices and topologies. It describes physical topologies like bus, star, ring, and mesh. It also discusses logical topologies like broadcast and token passing. The document explains how devices like repeaters, hubs, bridges, and switches operate at different layers and work to extend networks and reduce collisions. Routers are also introduced as layer 3 devices that can connect different networks.
this is a presentation i made to give some introduction to the backward learning algorithm hope it would be use full.Many places were referred to get information here
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
This document discusses different types of internetworking devices used to connect local area networks (LANs). It describes hubs, bridges, switches and routers in increasing order of complexity. Hubs simply repeat and broadcast data to all ports, while bridges learn and filter traffic between connected LANs. Switches operate similarly to bridges but provide dedicated connections for each workstation. Routers connect distinct networks like a LAN to the Internet, and make routing decisions based on IP addresses. The document outlines reasons for interconnecting LANs and the functions of various internetworking devices.
Networking devices can be categorized into five groups based on the OSI layer in which they operate: hubs, repeaters, bridges, routers, and gateways. Hubs and repeaters operate at the physical layer, bridges operate at the data link layer, and routers and gateways operate at the network layer or above. Bridges connect local area networks (LANs) by filtering and forwarding traffic between them based on MAC addresses, while routers connect LANs and wide area networks by routing packets based on logical network layer addresses.
The document discusses networking concepts such as protocols, protocol layering, and network devices. It describes how protocols define rules for communication and how protocol layering separates networking functions into layers. The key networking layers and their responsibilities are outlined, such as the physical layer handling signal transmission and the network layer handling routing. Common network devices like switches, routers, and wireless access points are also explained in terms of their functions.
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.pptabdnazar2003
This document provides an overview of connecting devices in computer networks and virtual local area networks (VLANs). It discusses different types of connecting devices like hubs, bridges, switches and routers. It explains how bridges and switches work at the data link layer to forward frames based on MAC addresses. The document also covers spanning tree protocol which is used to prevent switching loops. VLANs are defined as virtual networks configured by software rather than physical wiring which can create multiple broadcast domains within a physical network.
The document discusses contention networks, carrier sense multiple access (CSMA), components of routers, modular network interfaces in routers, differences between hubs, layer 2 switches and layer 3 switches, packet tunneling, shortest path routing, packet fragmentation, functions of routing processors, evolution of router construction, minimum spanning trees, routing protocols for mobile hosts, TCP/IP tunneling over ATM, distance vector routing, link state routing, hierarchical routing, ATM networks, creating ATM virtual circuits, segmentation and reassembly in ATM, internetworking using concatenated virtual circuits and connectionless internetworking, network properties, and an example of the TCP/IP protocol in action.
Networking and Internetworking Devices21viveksingh
This document provides information on various networking and internetworking devices. It discusses hubs, which connect multiple networking cables together but do not amplify or filter signals. It covers bridges, which operate at the physical and data link layers to filter traffic between network segments. Routers are described as connecting LANs and WANs by routing packets based on logical addresses using routing tables. Gateways link different network types and protocols by translating between formats. Finally, switches and brouters are introduced, with switches offering intelligence beyond hubs to reduce congestion, and brouters combining routing and bridging capabilities.
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...Infopitaara
A feed water heater is a device used in power plants to preheat water before it enters the boiler. It plays a critical role in improving the overall efficiency of the power generation process, especially in thermal power plants.
🔧 Function of a Feed Water Heater:
It uses steam extracted from the turbine to preheat the feed water.
This reduces the fuel required to convert water into steam in the boiler.
It supports Regenerative Rankine Cycle, increasing plant efficiency.
🔍 Types of Feed Water Heaters:
Open Feed Water Heater (Direct Contact)
Steam and water come into direct contact.
Mixing occurs, and heat is transferred directly.
Common in low-pressure stages.
Closed Feed Water Heater (Surface Type)
Steam and water are separated by tubes.
Heat is transferred through tube walls.
Common in high-pressure systems.
⚙️ Advantages:
Improves thermal efficiency.
Reduces fuel consumption.
Lowers thermal stress on boiler components.
Minimizes corrosion by removing dissolved gases.
Network devices like repeaters, hubs, bridges, switches, wireless access points, and routers were discussed.
Repeaters and hubs operate at the physical layer and broadcast signals to all ports. Bridges and switches operate at the data link layer and can filter traffic between specific ports based on MAC addresses. Wireless access points allow devices to connect to a network without wires. Network interface cards install into devices to connect them to a network. Routers operate at the network layer and can connect multiple networks and select the best path for traffic between networks.
This document discusses different types of networking devices used to connect local area networks (LANs). It describes hubs, repeaters, bridges, routers, and gateways. Hubs and repeaters operate at the physical layer, bridges operate at the physical and data link layers, and routers and gateways operate at the network layer and above to connect multiple networks and perform protocol conversion. The document provides details on the functions and characteristics of each type of device.
A hub is a networking device that connects multiple devices on a local area network (LAN). It receives data packets through one port and broadcasts them to all other ports so all connected devices can see the packets. Hubs operate in half duplex mode and have no bandwidth management or collision detection. Switches are more advanced devices that can connect more devices than hubs. Switches have buffers and port-to-MAC address tables that allow them to send frames to specific ports faster than hubs. Routers connect multiple networks like LANs and WANs. Routers use IP addresses to route packets between networks and can run routing protocols to dynamically learn routes.
Network devices like hubs, switches, and routers connect computers in a network and help manage traffic flow. Hubs broadcast all received data to all ports but have limited bandwidth. Switches can connect more devices than hubs and have features like VLANs. Routers connect different networks and use IP addresses to direct traffic. Other devices like firewalls, VPNs, and IDS/IPS provide network security functions.
The document discusses topics related to the network layer, including:
1) The network layer is responsible for routing packets between hosts and networks, addressing devices and networks, and internetworking between subnets with different addressing schemes or protocols.
2) Key functions of the network layer include routing, addressing, queueing and forwarding packets according to quality of service, and providing connection-oriented and connectionless mechanisms.
3) The document discusses various networking devices that operate at the network layer like routers, switches, bridges, repeaters, and gateways, and their functions in routing packets between networks and subnets.
decide on matters related to placement, in consultation with the Academic Dean.
Applicants are responsible for submitting applications for admission, and should be aware
of the following:
1. All admitted students must attend a new student orientation session prior to the
beginning of the semester. Information about orientation dates will be announced by
the Registrar’s Office after admission has been determined.
2. Academic credentials become the property of the University College and cannot
be returned, copied or forwarded.
3. Applicants are encouraged to apply at least three to four weeks prior to first
semester of attendance. This will allow adequate time for the student to request any
academic credentials needed to complete the application file, and participate in new
student orientation and registration.
Application Procedure
Receipt
of the
following
credentials
in the
Office
of Registrar
constitutes a complete application for admission
i.
Application Form - The application form may be obtained from the
Registrar’s Office or from the University College’s website where online
submission is also possible. The completed and signed application form should be
returned to the Office of the Registrar. The appropriate application fee in
i am student Cash/Checks should be made payable to
ii. College/University Transcripts - who have attended a college or university, must
request that an official transcript be sent directly from each institution to the ii. Students shall present the completed forms in triplicate to their academic advisor
and get his/her signature.
iii. Students must produce the cash receipt indicating the amount of money they have paid
for registration and first semester courses fee.
iv.
Students shall then take the forms to the registration desk and get the registrar’s
seal on the forms filled in triplicate; and submit one of the forms to the Office of the
Registrar, one to his/her department and should keep one with him/her.
v.
The registration would be incomplete if a student misses any one of the above
stages in the registration process.
vi.
The registration process is only considered complete when the seal of the registrar is
stamped on the registration slip.
Registration of All Other (Non Freshman) Students
i. The Office of the Registrar shall issue grade reports for the semester and submit them
to the respective departments at least a day before the registration.
ii. A student shall collect his/her grade report from his/her respective department
by presenting a valid ID.
iii. A student shall complete the registration slip in triplicate consisting of the courses that
he/she will take in that particular semester.
iv.
Then, he/she shall pay for the courses listed in the registration slip and present the
cash receipt along with the forms to his/her academic advisor and get his signature.
v.
Finally, he/she shall take the forms to the Office of the Registrar to get the seal. The
registration process shall be
This document discusses various networking devices and topologies. It describes physical topologies like bus, star, ring, and mesh. It also discusses logical topologies like broadcast and token passing. The document explains how devices like repeaters, hubs, bridges, and switches operate at different layers and work to extend networks and reduce collisions. Routers are also introduced as layer 3 devices that can connect different networks.
this is a presentation i made to give some introduction to the backward learning algorithm hope it would be use full.Many places were referred to get information here
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
This document discusses different types of internetworking devices used to connect local area networks (LANs). It describes hubs, bridges, switches and routers in increasing order of complexity. Hubs simply repeat and broadcast data to all ports, while bridges learn and filter traffic between connected LANs. Switches operate similarly to bridges but provide dedicated connections for each workstation. Routers connect distinct networks like a LAN to the Internet, and make routing decisions based on IP addresses. The document outlines reasons for interconnecting LANs and the functions of various internetworking devices.
Networking devices can be categorized into five groups based on the OSI layer in which they operate: hubs, repeaters, bridges, routers, and gateways. Hubs and repeaters operate at the physical layer, bridges operate at the data link layer, and routers and gateways operate at the network layer or above. Bridges connect local area networks (LANs) by filtering and forwarding traffic between them based on MAC addresses, while routers connect LANs and wide area networks by routing packets based on logical network layer addresses.
The document discusses networking concepts such as protocols, protocol layering, and network devices. It describes how protocols define rules for communication and how protocol layering separates networking functions into layers. The key networking layers and their responsibilities are outlined, such as the physical layer handling signal transmission and the network layer handling routing. Common network devices like switches, routers, and wireless access points are also explained in terms of their functions.
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.pptabdnazar2003
This document provides an overview of connecting devices in computer networks and virtual local area networks (VLANs). It discusses different types of connecting devices like hubs, bridges, switches and routers. It explains how bridges and switches work at the data link layer to forward frames based on MAC addresses. The document also covers spanning tree protocol which is used to prevent switching loops. VLANs are defined as virtual networks configured by software rather than physical wiring which can create multiple broadcast domains within a physical network.
The document discusses contention networks, carrier sense multiple access (CSMA), components of routers, modular network interfaces in routers, differences between hubs, layer 2 switches and layer 3 switches, packet tunneling, shortest path routing, packet fragmentation, functions of routing processors, evolution of router construction, minimum spanning trees, routing protocols for mobile hosts, TCP/IP tunneling over ATM, distance vector routing, link state routing, hierarchical routing, ATM networks, creating ATM virtual circuits, segmentation and reassembly in ATM, internetworking using concatenated virtual circuits and connectionless internetworking, network properties, and an example of the TCP/IP protocol in action.
Networking and Internetworking Devices21viveksingh
This document provides information on various networking and internetworking devices. It discusses hubs, which connect multiple networking cables together but do not amplify or filter signals. It covers bridges, which operate at the physical and data link layers to filter traffic between network segments. Routers are described as connecting LANs and WANs by routing packets based on logical addresses using routing tables. Gateways link different network types and protocols by translating between formats. Finally, switches and brouters are introduced, with switches offering intelligence beyond hubs to reduce congestion, and brouters combining routing and bridging capabilities.
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...Infopitaara
A feed water heater is a device used in power plants to preheat water before it enters the boiler. It plays a critical role in improving the overall efficiency of the power generation process, especially in thermal power plants.
🔧 Function of a Feed Water Heater:
It uses steam extracted from the turbine to preheat the feed water.
This reduces the fuel required to convert water into steam in the boiler.
It supports Regenerative Rankine Cycle, increasing plant efficiency.
🔍 Types of Feed Water Heaters:
Open Feed Water Heater (Direct Contact)
Steam and water come into direct contact.
Mixing occurs, and heat is transferred directly.
Common in low-pressure stages.
Closed Feed Water Heater (Surface Type)
Steam and water are separated by tubes.
Heat is transferred through tube walls.
Common in high-pressure systems.
⚙️ Advantages:
Improves thermal efficiency.
Reduces fuel consumption.
Lowers thermal stress on boiler components.
Minimizes corrosion by removing dissolved gases.
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYijscai
With the increased use of Artificial Intelligence (AI) in malware analysis there is also an increased need to
understand the decisions models make when identifying malicious artifacts. Explainable AI (XAI) becomes
the answer to interpreting the decision-making process that AI malware analysis models use to determine
malicious benign samples to gain trust that in a production environment, the system is able to catch
malware. With any cyber innovation brings a new set of challenges and literature soon came out about XAI
as a new attack vector. Adversarial XAI (AdvXAI) is a relatively new concept but with AI applications in
many sectors, it is crucial to quickly respond to the attack surface that it creates. This paper seeks to
conceptualize a theoretical framework focused on addressing AdvXAI in malware analysis in an effort to
balance explainability with security. Following this framework, designing a machine with an AI malware
detection and analysis model will ensure that it can effectively analyze malware, explain how it came to its
decision, and be built securely to avoid adversarial attacks and manipulations. The framework focuses on
choosing malware datasets to train the model, choosing the AI model, choosing an XAI technique,
implementing AdvXAI defensive measures, and continually evaluating the model. This framework will
significantly contribute to automated malware detection and XAI efforts allowing for secure systems that
are resilient to adversarial attacks.
International Journal of Distributed and Parallel systems (IJDPS)samueljackson3773
The growth of Internet and other web technologies requires the development of new
algorithms and architectures for parallel and distributed computing. International journal of
Distributed and parallel systems is a bimonthly open access peer-reviewed journal aims to
publish high quality scientific papers arising from original research and development from
the international community in the areas of parallel and distributed systems. IJDPS serves
as a platform for engineers and researchers to present new ideas and system technology,
with an interactive and friendly, but strongly professional atmosphere.
Passenger car unit (PCU) of a vehicle type depends on vehicular characteristics, stream characteristics, roadway characteristics, environmental factors, climate conditions and control conditions. Keeping in view various factors affecting PCU, a model was developed taking a volume to capacity ratio and percentage share of particular vehicle type as independent parameters. A microscopic traffic simulation model VISSIM has been used in present study for generating traffic flow data which some time very difficult to obtain from field survey. A comparison study was carried out with the purpose of verifying when the adaptive neuro-fuzzy inference system (ANFIS), artificial neural network (ANN) and multiple linear regression (MLR) models are appropriate for prediction of PCUs of different vehicle types. From the results observed that ANFIS model estimates were closer to the corresponding simulated PCU values compared to MLR and ANN models. It is concluded that the ANFIS model showed greater potential in predicting PCUs from v/c ratio and proportional share for all type of vehicles whereas MLR and ANN models did not perform well.
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxRishavKumar530754
LiDAR-Based System for Autonomous Cars
Autonomous Driving with LiDAR Tech
LiDAR Integration in Self-Driving Cars
Self-Driving Vehicles Using LiDAR
LiDAR Mapping for Driverless Cars
π0.5: a Vision-Language-Action Model with Open-World GeneralizationNABLAS株式会社
今回の資料「Transfusion / π0 / π0.5」は、画像・言語・アクションを統合するロボット基盤モデルについて紹介しています。
拡散×自己回帰を融合したTransformerをベースに、π0.5ではオープンワールドでの推論・計画も可能に。
This presentation introduces robot foundation models that integrate vision, language, and action.
Built on a Transformer combining diffusion and autoregression, π0.5 enables reasoning and planning in open-world settings.
its all about Artificial Intelligence(Ai) and Machine Learning and not on advanced level you can study before the exam or can check for some information on Ai for project
Analysis of reinforced concrete deep beam is based on simplified approximate method due to the complexity of the exact analysis. The complexity is due to a number of parameters affecting its response. To evaluate some of this parameters, finite element study of the structural behavior of the reinforced self-compacting concrete deep beam was carried out using Abaqus finite element modeling tool. The model was validated against experimental data from the literature. The parametric effects of varied concrete compressive strength, vertical web reinforcement ratio and horizontal web reinforcement ratio on the beam were tested on eight (8) different specimens under four points loads. The results of the validation work showed good agreement with the experimental studies. The parametric study revealed that the concrete compressive strength most significantly influenced the specimens’ response with the average of 41.1% and 49 % increment in the diagonal cracking and ultimate load respectively due to doubling of concrete compressive strength. Although the increase in horizontal web reinforcement ratio from 0.31 % to 0.63 % lead to average of 6.24 % increment on the diagonal cracking load, it does not influence the ultimate strength and the load-deflection response of the beams. Similar variation in vertical web reinforcement ratio leads to an average of 2.4 % and 15 % increment in cracking and ultimate load respectively with no appreciable effect on the load-deflection response.
In tube drawing process, a tube is pulled out through a die and a plug to reduce its diameter and thickness as per the requirement. Dimensional accuracy of cold drawn tubes plays a vital role in the further quality of end products and controlling rejection in manufacturing processes of these end products. Springback phenomenon is the elastic strain recovery after removal of forming loads, causes geometrical inaccuracies in drawn tubes. Further, this leads to difficulty in achieving close dimensional tolerances. In the present work springback of EN 8 D tube material is studied for various cold drawing parameters. The process parameters in this work include die semi-angle, land width and drawing speed. The experimentation is done using Taguchi’s L36 orthogonal array, and then optimization is done in data analysis software Minitab 17. The results of ANOVA shows that 15 degrees die semi-angle,5 mm land width and 6 m/min drawing speed yields least springback. Furthermore, optimization algorithms named Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Genetic Algorithm (GA) are applied which shows that 15 degrees die semi-angle, 10 mm land width and 8 m/min drawing speed results in minimal springback with almost 10.5 % improvement. Finally, the results of experimentation are validated with Finite Element Analysis technique using ANSYS.
some basics electrical and electronics knowledgenguyentrungdo88
Ad
Switches, Routers and different routing protocols
1. LANs, CANs & WANs
LAN (Local Area Network)
Usually, a single LAN technology with multiple
segments connected via switches. One router
connection to the Internet.
CAN (Campus Area Network)
Usually, many switched LANs operating as sub-
networks through VLANs (Virtual LANs) or sub-
netting. Some routers used.
WAN (Wide Area Network)
Multiple routers interconnected by
point-to-point links. Routers can also
connect to local CANs and LANs.
2. CONNECTING DEVICES
Connecting devices divided into five different
categories based on the layer in which they operate
in a network.:
1.Below the physical layer: passive hub
2.At the physical layer: repeater or active hub
3.At the physical and data link layers: bridge or two-
layer switch
4.At the physical, data link, network layers: router or
three-layer switch
5.At all five layers: gateway
3. Repeaters & Hubs
A repeater is a network interconnection device with two interfaces that
regenerates signals coming in one interface onto the other.
Repeaters:
• Use no logic in regenerating signals, thus data and noise are both regenerated
by the repeater.
• Can be used to extend the range of a single LAN.
• Operate at Layer 1 (Physical Layer) of the TCP/IP Stack.
4. Repeaters & Hubs (Cont’d)
A hub is a network interconnection device with multiple interfaces that accepts an
incoming signal from an interface and repeats it onto all other interfaces.
Physically, hubs are:
• Small electronic devices.
• Have connections for several computers (e.g., 4, 8, or 20).
Logically, hubs:
• Operate only on signals.
• Propagate each incoming signal to all connections.
• Are similar to connecting segments with repeaters.
• Do not understand frames (Layer 2 packets) so cannot filter them.
Hubs have extremely low cost and are becoming obsolete.
5. Passive Hubs
Passive hub is just a connector.
In a star-topology Ethernet LAN, it is just a point where signals
coming from different stations collide.
The hub is the collision point.
This type of hub is part of the media
its location in the Internet model is below the physical layer.
7. Active Hub
Actually a multiport repeater
• Used to create connections between stations in a physical star
topology
• Can also be used to create tree topology to removes the length
limitation of 10Base -T (100 m)
9. repeater
A repeater operates only in the physical layers
Can extend the physical length of a LAN
Receive the signal before it becomes too weak or corrupted and
regenerates the original bit pattern
• Do not actually connect two LANs
• connects two segments of the same LAN
• segments connected are still part of one single LAN
A repeater cannot connect two LANs of different protocols
10. repeater
Repeater Amplifier
regenerates the signal
receives a
weakened or corrupted
signal, creates a copy, bit
for bit, at the original
strength
Cannot discriminate
between the intended
signal and noise.
It amplifies equally
everything fed into it
Repeaters is a regenerator, not an amplifier
11. 10.
A repeater connects segments of a
LAN.
A repeater forwards every frame; it
has no filtering capability.
A repeater is a regenerator, not an
amplifier.
Note
12. Bridge
Operates in both the physical and the data link layer
• physical layer : regenerates the signal
• data link layer : check the physical (MAC) addresses (source and
destination) contained in the frame
Bridge has filtering capability, but repeaters has not.
• checks the MAC (physical) address of the destination when receives a
frame, and decide if the frame should be forwarded or dropped
• forwards the new copy only to the segment (specific port) to which the
address belongs
• bridge has a table that maps addresses to the port.
14. Two-Layer Switch
Performs at the physical and data link layers.
• Is a bridge with many ports (multi port bridge) Design that allows better
(faster) performance
• No collision
• Filtering based on the MAC address of the frame it received (like bridge)
• Builds switching table by “learning” MAC host addresses from source
addresses of incoming packets
• Unknown destination addresses are flooded out other ports
• Broadcast frames are flooded out other ports.
• have been designed to forward the frame as soon as they check the MAC
addresses in the header of the frame( first 6-bytes).
15. Routers
Three-layer devices that routes packets based on their logical
addresses (IP)
• Connects LANs and WANs in the Internet.
• Has a routing table that is used for making decisions about the
route.
• Routing table are dynamic and updated using routing protocol.
• Builds routing table by neighbor routers using routing protocols
16. Three layer switch
Is a router, but a faster and more
sophisticated.
•The switching fabric in a three-layer switch
allows faster table lookup and forwarding.
•We can use the terms router and three-layer
switch interchangeably.
18. Layer 2 Frames
A frame is a packet of data passed across the network at Layer 2 of the TCP/IP Stack.
At Layer 2, media access control (MAC) addresses are used to send messages from
one computer to another.
• MAC addresses are also known as physical addresses or hardware
addresses.
• MAC addresses are not the same an IP addresses. IP addresses are software
addresses that can be changed. MAC addresses are hardware addresses
associated with the network interface card (NIC) and cannot be changed.
Frames have two MAC addresses in their header: (1) the MAC address of the source
computer, and (2) the MAC address of the destination computer.
Ethernet Frame Format
19. Bridges & Switches
A bridge is a network interconnection device (with only two interfaces) that forwards
frames coming in from an interface to the outgoing interface corresponding to the
MAC destination address in the frame.
A bridge:
• Is a hardware device.
• Connects two LAN segments.
• Forwards frames.
• Does not forward noise or collisions from the incoming connection.
• Learns addresses and filters frames based on those addresses.
A bridge is used to connect two local-area
networks (LANs) of the same type.
20. Bridges & Switches (Cont’d)
A switch is a network interconnection device (with multiple interfaces) that accepts
a frame from an interface and forwards the frame to the interface corresponding to
the MAC destination address in the frame.
A switch:
• Is physically similar to a hub.
• Is logically similar to a bridge.
• Operates on frames.
• Understands MAC addresses.
• Only forwards frames when necessary.
Switches allow separate pairs of computers to communicate at the same time.
Switches can be used in heavily loaded networks to isolate data flow and
improve performance.
Switches are the Layer 2 Ethernet device of choice.
22. Layer 3 Datagrams
An IP datagram is a packet of data passed across the network at
Layer 3 of the network protocol stack.
At Layer 3 (and above), IP addresses are used to send messages from one computer
to another.
IP addresses are software addresses that can be changed according to the network
subnet to which they belong.
IP datagrams have two IP addresses in their header: (1) the IP address of the source
computer, and (2) the IP address of the destination computer.
23. Routers
A router is a network interconnection device that accepts an IP datagram from an
incoming port and forwards the datagram to the outgoing link that corresponds to
the IP destination address in the frame.
A router:
• Forwards data depending on IP
addresses, not Hardware (MAC)
addresses.
• Isolates each LAN into a separate
subnet, with separate IP addresses.
• Can route between different LAN
technologies.
• Needs to be set up before they are
used. Once set up, they can
communicate with other routers and
learn the way to parts of a network
that are added after a router is
initially configured. A Home Router
45. FORWARDING APPROACHES
Three possible forwarding approaches: Cut-through, Collision-free and Fully-buffered as briefly
explained below
Cut-through: A switch forwards a frame immediately after receiving the destination address. As a
consequence, the switch forwards the frame without collision and error detection.
Collision-free: In this case, the switch forwards the frame after receiving 64 bytes, which allows
detection of collision. However, error detection is not possible because switch is yet to receive the
entire frame.
Fully buffered: In this case, the switch forwards the frame only after receiving the entire frame. So,
the switch can detect both collision and error free frames are forwarded
46. 46
Cut-Through Switching
Start transmitting as soon as possible
Inspect the frame header and do the look-up
If outgoing link is idle, start forwarding the frame
Overlapping transmissions
Transmit the head of the packet via the outgoing link
… while still receiving the tail via the incoming link
Analogy: different folks crossing different intersections
A B
switches
47. 47
Self Learning: Building the Table
When a frame arrives
Inspect the source MAC address
Associate the address with the incoming interface
Store the mapping in the switch table
Use a time-to-live field to eventually forget the mapping
A
B
C
D
Switch learns
how to reach A.
48. 48
Self Learning: Handling Misses
When frame arrives with unfamiliar destination
Forward the frame out all of the interfaces
… except for the one where the frame arrived
Hopefully, this case won’t happen very often
A
B
C
D
When in
doubt,
shout!
49. 49
Flooding Can Lead to Loops
Switches sometimes need to broadcast frames
Upon receiving a frame with an unfamiliar destination
Upon receiving a frame sent to the broadcast address
Broadcasting is implemented by flooding
Transmitting frame out every interface
… except the one where the frame arrived
Flooding can lead to forwarding loops
E.g., if the network contains a cycle of switches
Either accidentally, or by design for higher reliability
77. 77
Solution: Spanning Trees
Ensure the topology has no loops
Avoid using some of the links when flooding
… to avoid forming a loop
Spanning tree
Sub-graph that covers all vertices but contains no cycles
Links not in the spanning tree do not forward frames
78. 78
Constructing a Spanning Tree
Need a distributed algorithm
Switches cooperate to build the spanning tree
… and adapt automatically when failures occur
Key ingredients of the algorithm
Switches need to elect a “root”
The switch with the smallest identifier
Each switch identifies if its interface
is on the shortest path from the root
And it exclude from the tree if not
Messages (Y, d, X)
From node X
Claiming Y is the root
And the distance is d
root
One hop
Three hops
79. 79
Steps in Spanning Tree Algorithm
Initially, each switch thinks it is the root
Switch sends a message out every interface
… identifying itself as the root with distance 0
Example: switch X announces (X, 0, X)
Switches update their view of the root
Upon receiving a message, check the root id
If the new id is smaller, start viewing that switch as root
Switches compute their distance from the root
Add 1 to the distance received from a neighbor
Identify interfaces not on a shortest path to the root
… and exclude them from the spanning tree
80. 80
Example From Switch #4’s Viewpoint
Switch #4 thinks it is the root
Sends (4, 0, 4) message to 2 and 7
Then, switch #4 hears from #2
Receives (2, 0, 2) message from 2
… and thinks that #2 is the root
And realizes it is just one hop away
Then, switch #4 hears from #7
Receives (2, 1, 7) from 7
And realizes this is a longer path
So, prefers its own one-hop path
And removes 4-7 link from the tree
1
2
3
4
5
6
7
81. 81
Example From Switch #4’s Viewpoint
Switch #2 hears about switch #1
Switch 2 hears (1, 1, 3) from 3
Switch 2 starts treating 1 as root
And sends (1, 2, 2) to neighbors
Switch #4 hears from switch #2
Switch 4 starts treating 1 as root
And sends (1, 3, 4) to neighbors
Switch #4 hears from switch #7
Switch 4 receives (1, 3, 7) from 7
And realizes this is a longer path
So, prefers its own three-hop path
And removes 4-7 Iink from the tree
1
2
3
4
5
6
7
82. 82
Robust Spanning Tree Algorithm
Algorithm must react to failures
Failure of the root node
Need to elect a new root, with the next lowest identifier
Failure of other switches and links
Need to recompute the spanning tree
Root switch continues sending messages
Periodically reannouncing itself as the root (1, 0, 1)
Other switches continue forwarding messages
Detecting failures through timeout (soft state!)
Switch waits to hear from others
Eventually times out and claims to be the root
See Section 3.2.2 in the textbook for details and another example