SlideShare a Scribd company logo
1 of 39
Fundamentals of Business Data
      Communications
                11th Edition

Alan Dennis & Alexandra Durcikova

         John Wiley & Sons, Inc


         Dwayne Whitten, D.B.A
         Mays Business School
         Texas A&M University
          Copyright 2011 John Wiley & Sons, Inc   7-1
Chapter 7

Backbones



Copyright 2011 John Wiley & Sons, Inc   7-2
Chapter 7: Outline
7.1 - Introduction
7.2 - Backbone Network Components
  – Switches, Routers, Gateways
7.3 - Backbone Network Architectures
7.4 - The Best Practice Backbone Design
7.5 - Improving Backbone Performance
7.6 – Implications for Management


             Copyright 2011 John Wiley & Sons, Inc   7-3
7.1 Introduction




          Copyright 2011 John Wiley & Sons, Inc
Backbone Networks
• High speed networks linking an
  organization’s LANs
  – Making information transfer possible between
    departments
  – Use high speed circuits to connect LANs
  – Provide connections to other backbones,
    MANs, and WANs
• Sometimes referred to as
  – An enterprise network
  – A campus-wide network
             Copyright 2011 John Wiley & Sons, Inc   7-5
7.2 Backbone Network Components
 • Network cable
   – Functions in the same way as in LANs
   – Optical fiber - more commonly chosen
     because it provides higher data rates
 • Hardware devices
   – Computers or special purpose devices used
     for interconnecting networks
      • Switches
      • Routers
      • Gateways
              Copyright 2011 John Wiley & Sons, Inc   7-6
Backbone Network Devices




     Copyright 2011 John Wiley & Sons, Inc   7-7
Switches




Copyright 2011 John Wiley & Sons, Inc   7-8
Switches
• Most switches operate at the data link
  layer
• They connect two or more network
  segments that use the same data link and
  network protocol
• They may connect the same or different
  types of cable
• These use the data link layer address to
  forward packets between network
  segments

            Copyright 2011 John Wiley & Sons, Inc   7-9
Routers




Copyright 2011 John Wiley & Sons, Inc   7 - 10
Routers
• Operations
  –   Operates at the network layer
  –   Examines the destination address of the network layer
  –   Strips off the data link layer packet
  –   Chooses the “best” route for a packet (via routing tables)
  –   Forwards only those messages that need to go to other
      networks
• Compared to Switches
  – Performs more processing
  – Processes only messages specifically addressed to it
  – Recognizes that message is specifically addressed to it
    before message is passed to network layer for processing
  – Builds new data link layer packet for transmitted packets

                  Copyright 2011 John Wiley & Sons, Inc     7 - 11
Gateways




Copyright 2011 John Wiley & Sons, Inc   7 - 12
Gateways
• Operate at network layer and use network
  layer addresses in processing
• More complex than switches or routers
• Connect two or more networks that use
  the same or different data link and
  network protocols
• Some work at the application layer
• Process only those messages addressed
  to them
            Copyright 2011 John Wiley & Sons, Inc   7 - 13
Other Backbone Network Devices
• Terminology in marketplace is variable by vendor


• Layer-3 switches
   – Similar to L2 switches, but switch messages based on
     network layer addresses (usually IP address)
   – Have the best of both switches and routers
   – Can support more simultaneously active ports than
     routers




                 Copyright 2011 John Wiley & Sons, Inc   7 - 14
7.3 Backbone Network Architectures
  •   Identifies the way backbone interconnects
      LANs
  •   Manages way packets from one network
      move through the backbone to other
      networks
  •   Three layers:
      1. Access layer: used in LANs attached to BB
      2. Distribution layer: connects LANs together
      3. Core layer: connects different backbone
         networks together in enterprise network

                 Copyright 2011 John Wiley & Sons, Inc   7 - 15
Backbone Network Design Layers




        Copyright 2011 John Wiley & Sons, Inc   7 - 16
Fundamental Backbone Architectures
• Switched Backbones: most common type
  of backbone, used in distribution layer,
  used in new buildings, sometimes in core
  layer, can be rack or chassis based.
• Routed Backbones: move packets along
  backbone on basis of network layer address,
  typically using bus, Ethernet 100Base-T,
  sometimes called subnetted backbone
• Virtual LANs: networks in which computers are
  assigned into LAN segments by software rather
  than by hardware; can be single switch or
  multiswitch VLANs. Very popular technology.
              Copyright 2011 John Wiley & Sons, Inc   8 - 17
Switched Backbone




 Insert Figure 7.6




  Copyright 2011 John Wiley & Sons, Inc   7 - 18
Switched Backbones
• Replaces the many routers of other designs
   – Backbone has more cables, but fewer devices
   – No backbone cable used; switch is the backbone.
• Advantages:
   – Improved performance (200-600% higher) due to
     simultaneous access of switched operations
   – A simpler more easily managed network – less devices




                Copyright 2011 John Wiley & Sons, Inc   7 - 19
Rack-Mounted Switched Backbones




        Insert Figure 7.7




         Copyright 2011 John Wiley & Sons, Inc   7 - 20
Rack-Mounted Switched Backbones




         Copyright 2011 John Wiley & Sons, Inc
Rack-Based Switched Backbones
• Places all network switch equipment physically in
  one “rack” room
   – Easy maintenance and upgrade
   – Requires more cable, but usually small part of overall
     cost
• Main Distribution Facility (MDF) or Central
  Distribution Facility (CDF)
   – Another name for the rack room
   – Place where many cables come together
   – Patch cables used to connect devices on the rack
• Easier to move computers among LANs


                 Copyright 2011 John Wiley & Sons, Inc        7 - 22
Main Distribution Facility (MDF)




        Copyright 2011 John Wiley & Sons, Inc   7 - 23
Chassis-Based Switched Backbones
• Use a “chassis” switch instead of a rack
   – Enables administrators to plug modules into switch
   – Modules can vary in nature, router or 4-port 100Base T
     switch
      • Example of a chassis switch with 710 Mbps capacity
          – 5 10Base-T hubs, 2 10Base-T switches (8 ports each)
          – 1 100Base-T switch (4 ports), 100Base-T router
            ( 5 x 10) + (2 x 10 x 8) + (4 x 100) + 100 = 710 Mbps

• Advantage is flexibility
   – Enables users to plug modules directly into the switch
   – Simple to add new modules

                  Copyright 2011 John Wiley & Sons, Inc           7 - 24
Switched Backbone at Indiana Univ.
 • Add Figure 7-10




             Copyright 2011 John Wiley & Sons, Inc
Routed Backbone




 Copyright 2011 John Wiley & Sons, Inc
Routed Backbones
• Move packets using network layer addresses
• Commonly used at the core layer
   – Connecting LANs in different buildings in the campus
   – Can be used at the distribution layer as well
• LANs can use different data link layer protocols
• Main advantage: LAN segmentation
   – Each message stays in one LAN; unless addressed
     outside the LAN
   – Easier to manage, LANs are separate entities, segments
• Main disadvantages
   – Tend to impose time delays
   – Require more management than switches
                 Copyright 2011 John Wiley & Sons, Inc   7 - 27
Virtual LANs (VLANs)
• A new type of LAN-BN architecture
   – Made possible by high-speed intelligent switches
   – Computers assigned to LAN segments by software
• Often faster and provide more flexible network
  management
   – Much easier to assign computers to different segments
• More complex and so far usually used for larger
  networks
• Basic VLAN designs:
   – Single switch VLANs
   – Multi-switch VLANs
                 Copyright 2011 John Wiley & Sons, Inc   7 - 28
VLAN-based Backbone




  Insert Figure 7.12




   Copyright 2011 John Wiley & Sons, Inc   7 - 29
Multi-switch VLAN-Based Backbone




       Insert Figure 7.13




        Copyright 2011 John Wiley & Sons, Inc   7 - 30
How VLANs Work
• Each computer is assigned into a VLAN that has a VLAN ID
• Each VLAN ID is matched to a traditional IP subnet
   •   Each computer gets an IP address from that switch
        • Similar to how DHCP operates
• Computers are assigned into the VLAN based on physical
  port they are plugged into




                  Copyright 2011 John Wiley & Sons, Inc    7 - 31
Multiswitch VLAN Operations
• Same as single switch VLAN, except uses several
  switches, perhaps in core between buildings
• Inter-switch protocols
  – Must be able to identify the VLAN to which the packet
    belongs
• Use IEEE 802.1q (an emerging standard)
  – When a packet needs to go from one switch to another
     • 16-byte VLAN tag inserted into the 802.3 packet by
       the sending switch
  – When the IEEE 802.1q packet reaches its destination
    switch
     • Its header (VLAN tag) stripped off and Ethernet
       packet inside is sent to its destination computer
                Copyright 2011 John Wiley & Sons, Inc       7 - 32
VLAN Operating Characteristics
• Advantages of VLANs
  – Faster performance: Allow precise management of
    traffic flow and ability to allocate resources to different
    type of applications
  – Traffic prioritization (via 802.1q VLAN tag)
      • Include in the tag: a priority code based on 802.1q
      • Can have QoS capability at MAC level
          – Similar to RSVP and QoS capabilities at network and
            transport layers
• Drawbacks
  – Cost
  – Management complexity
  – Some “bleeding edge” technology issues to consider
                 Copyright 2011 John Wiley & Sons, Inc        7 - 33
7.4 Best Practice Backbone Design
  • Architectures
    – At distribution layer  switched backbone because of
      performance and cost
    – At core layer  routed backbone
    – VLANs closer but more costly and complex




                 Copyright 2011 John Wiley & Sons, Inc   7 - 34
Recommendations for BB Design
• Best architecture
   – Switched backbone or VLAN at distribution layer
   – Routed backbone at core layer
• Best technology - Gigabit Ethernet
• Ideal design
   – A mixture of layer-2 and layer-3 Ethernet switches
   – Access Layer
      • 100Base-T Later 2 switches with cat5e or cat6
   – Distribution Layer
      • 100base-T or 1000BaseT/F Layer 3 switches
   – Core Layer
      • Layer 3 switches running 10GbE or 40GbE over fiber
                 Copyright 2011 John Wiley & Sons, Inc    7 - 35
Best Practice Network Design




      Insert Figure 7.14




       Copyright 2011 John Wiley & Sons, Inc   7 - 36
7.5 Improving Backbone Performance
 •   Improve computer and device performance
     – Upgrade them to faster devices
     – Change to a more appropriate routing protocol
         • Distance vector – typically used on BNs
         • Link state – typically used on WANs and MANs
     – Use gigabit Ethernet as BB (eliminate translations)
     – Increase memory in devices
 •   Improve circuit capacity
     – Upgrade to a faster circuit; Add additional circuits
     – Replace shared circuit BB with a switched BB
 •   Reduce network demand
     – Restrict applications that use a lot of network capacity
     – Reduce broadcast messages (placing filters at switches)

                     Copyright 2011 John Wiley & Sons, Inc        7 - 37
7.6 Implications for Management
• Amount of traffic backbone needs to support is
  increasing at faster rate
   – May require that BN be replaced
   – Design BN to be easily upgradeable
• ATM is legacy technology
   – Vendors stopping the production of these
   – Begin to invest more funds to replace these
• Ethernet moving into backbone extensively
   – One standard technology used for both LANs and BN
   – Cost of equipment decreasing while management is
     becoming easier
   – Performance of Ethernet in backbone increasing quickly

                 Copyright 2011 John Wiley & Sons, Inc   7 - 38
Copyright 2011 John W iley & Sons, Inc.

 All rights reserved. Reproduction or translation of
 this work beyond that permitted in section 117 of
 the 1976 United States Copyright Act without
 express permission of the copyright owner is
 unlawful. Request for further information should
 be addressed to the Permissions Department,
 John Wiley & Sons, Inc. The purchaser may make
 back-up copies for his/her own use only and not
 for distribution or resale. The Publisher assumes
 no responsibility for errors, omissions, or
 damages caused by the use of these programs or
 from the use of the information herein.

              Copyright 2011 John Wiley & Sons, Inc   7 - 39

More Related Content

What's hot

Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4APSU
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5APSU
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8APSU
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1WedgeB
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12APSU
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13APSU
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7APSU
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)trayyoo
 
Networks - Lecture D
Networks - Lecture DNetworks - Lecture D
Networks - Lecture DCMDLearning
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11APSU
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingRanjan K.M.
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALASaikiran Panjala
 

What's hot (20)

Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Networks
NetworksNetworks
Networks
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
 
Ch02
Ch02Ch02
Ch02
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)
 
Networks - Lecture D
Networks - Lecture DNetworks - Lecture D
Networks - Lecture D
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Chap1 networking
Chap1 networkingChap1 networking
Chap1 networking
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Wdf222 cep ii
Wdf222 cep iiWdf222 cep ii
Wdf222 cep ii
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALA
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Networking introduction
Networking introductionNetworking introduction
Networking introduction
 

Viewers also liked

WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAAharon Aharon
 
Prepare A Resume That Can Fetch An Interview
Prepare A Resume That Can Fetch An InterviewPrepare A Resume That Can Fetch An Interview
Prepare A Resume That Can Fetch An InterviewDr. Trilok Kumar Jain
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)Raaz Shrestha
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentationmrtheodisthorne2
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 

Viewers also liked (8)

WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Prepare A Resume That Can Fetch An Interview
Prepare A Resume That Can Fetch An InterviewPrepare A Resume That Can Fetch An Interview
Prepare A Resume That Can Fetch An Interview
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 

Similar to Ch07

Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client AdaptersYaser Rahmati
 
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching PROIDEA
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12mlrbrown
 
Local area network
Local area networkLocal area network
Local area networkSEDYK
 
VirtuaL area network (VLAN)
VirtuaL area network (VLAN)  VirtuaL area network (VLAN)
VirtuaL area network (VLAN) VipulSharma328
 
MathWork Network Architecture
MathWork Network ArchitectureMathWork Network Architecture
MathWork Network ArchitectureRobert Muliero
 
Openstack Neutron Insights
Openstack Neutron InsightsOpenstack Neutron Insights
Openstack Neutron InsightsAtul Pandey
 
Presentation1
Presentation1Presentation1
Presentation1huzaifag1
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Designnakomuri
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overviewSyaiful Ahdan
 
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...AssocaKazama
 

Similar to Ch07 (20)

ch08.pptx
ch08.pptxch08.pptx
ch08.pptx
 
Ch08
Ch08Ch08
Ch08
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
 
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Lan & vlan
Lan & vlanLan & vlan
Lan & vlan
 
Media Access Layer
Media Access LayerMedia Access Layer
Media Access Layer
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 
Local area network
Local area networkLocal area network
Local area network
 
VirtuaL area network (VLAN)
VirtuaL area network (VLAN)  VirtuaL area network (VLAN)
VirtuaL area network (VLAN)
 
MathWork Network Architecture
MathWork Network ArchitectureMathWork Network Architecture
MathWork Network Architecture
 
Openstack Neutron Insights
Openstack Neutron InsightsOpenstack Neutron Insights
Openstack Neutron Insights
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Presentation1
Presentation1Presentation1
Presentation1
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Design
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
 
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Ch07

  • 1. Fundamentals of Business Data Communications 11th Edition Alan Dennis & Alexandra Durcikova John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University Copyright 2011 John Wiley & Sons, Inc 7-1
  • 2. Chapter 7 Backbones Copyright 2011 John Wiley & Sons, Inc 7-2
  • 3. Chapter 7: Outline 7.1 - Introduction 7.2 - Backbone Network Components – Switches, Routers, Gateways 7.3 - Backbone Network Architectures 7.4 - The Best Practice Backbone Design 7.5 - Improving Backbone Performance 7.6 – Implications for Management Copyright 2011 John Wiley & Sons, Inc 7-3
  • 4. 7.1 Introduction Copyright 2011 John Wiley & Sons, Inc
  • 5. Backbone Networks • High speed networks linking an organization’s LANs – Making information transfer possible between departments – Use high speed circuits to connect LANs – Provide connections to other backbones, MANs, and WANs • Sometimes referred to as – An enterprise network – A campus-wide network Copyright 2011 John Wiley & Sons, Inc 7-5
  • 6. 7.2 Backbone Network Components • Network cable – Functions in the same way as in LANs – Optical fiber - more commonly chosen because it provides higher data rates • Hardware devices – Computers or special purpose devices used for interconnecting networks • Switches • Routers • Gateways Copyright 2011 John Wiley & Sons, Inc 7-6
  • 7. Backbone Network Devices Copyright 2011 John Wiley & Sons, Inc 7-7
  • 8. Switches Copyright 2011 John Wiley & Sons, Inc 7-8
  • 9. Switches • Most switches operate at the data link layer • They connect two or more network segments that use the same data link and network protocol • They may connect the same or different types of cable • These use the data link layer address to forward packets between network segments Copyright 2011 John Wiley & Sons, Inc 7-9
  • 10. Routers Copyright 2011 John Wiley & Sons, Inc 7 - 10
  • 11. Routers • Operations – Operates at the network layer – Examines the destination address of the network layer – Strips off the data link layer packet – Chooses the “best” route for a packet (via routing tables) – Forwards only those messages that need to go to other networks • Compared to Switches – Performs more processing – Processes only messages specifically addressed to it – Recognizes that message is specifically addressed to it before message is passed to network layer for processing – Builds new data link layer packet for transmitted packets Copyright 2011 John Wiley & Sons, Inc 7 - 11
  • 12. Gateways Copyright 2011 John Wiley & Sons, Inc 7 - 12
  • 13. Gateways • Operate at network layer and use network layer addresses in processing • More complex than switches or routers • Connect two or more networks that use the same or different data link and network protocols • Some work at the application layer • Process only those messages addressed to them Copyright 2011 John Wiley & Sons, Inc 7 - 13
  • 14. Other Backbone Network Devices • Terminology in marketplace is variable by vendor • Layer-3 switches – Similar to L2 switches, but switch messages based on network layer addresses (usually IP address) – Have the best of both switches and routers – Can support more simultaneously active ports than routers Copyright 2011 John Wiley & Sons, Inc 7 - 14
  • 15. 7.3 Backbone Network Architectures • Identifies the way backbone interconnects LANs • Manages way packets from one network move through the backbone to other networks • Three layers: 1. Access layer: used in LANs attached to BB 2. Distribution layer: connects LANs together 3. Core layer: connects different backbone networks together in enterprise network Copyright 2011 John Wiley & Sons, Inc 7 - 15
  • 16. Backbone Network Design Layers Copyright 2011 John Wiley & Sons, Inc 7 - 16
  • 17. Fundamental Backbone Architectures • Switched Backbones: most common type of backbone, used in distribution layer, used in new buildings, sometimes in core layer, can be rack or chassis based. • Routed Backbones: move packets along backbone on basis of network layer address, typically using bus, Ethernet 100Base-T, sometimes called subnetted backbone • Virtual LANs: networks in which computers are assigned into LAN segments by software rather than by hardware; can be single switch or multiswitch VLANs. Very popular technology. Copyright 2011 John Wiley & Sons, Inc 8 - 17
  • 18. Switched Backbone Insert Figure 7.6 Copyright 2011 John Wiley & Sons, Inc 7 - 18
  • 19. Switched Backbones • Replaces the many routers of other designs – Backbone has more cables, but fewer devices – No backbone cable used; switch is the backbone. • Advantages: – Improved performance (200-600% higher) due to simultaneous access of switched operations – A simpler more easily managed network – less devices Copyright 2011 John Wiley & Sons, Inc 7 - 19
  • 20. Rack-Mounted Switched Backbones Insert Figure 7.7 Copyright 2011 John Wiley & Sons, Inc 7 - 20
  • 21. Rack-Mounted Switched Backbones Copyright 2011 John Wiley & Sons, Inc
  • 22. Rack-Based Switched Backbones • Places all network switch equipment physically in one “rack” room – Easy maintenance and upgrade – Requires more cable, but usually small part of overall cost • Main Distribution Facility (MDF) or Central Distribution Facility (CDF) – Another name for the rack room – Place where many cables come together – Patch cables used to connect devices on the rack • Easier to move computers among LANs Copyright 2011 John Wiley & Sons, Inc 7 - 22
  • 23. Main Distribution Facility (MDF) Copyright 2011 John Wiley & Sons, Inc 7 - 23
  • 24. Chassis-Based Switched Backbones • Use a “chassis” switch instead of a rack – Enables administrators to plug modules into switch – Modules can vary in nature, router or 4-port 100Base T switch • Example of a chassis switch with 710 Mbps capacity – 5 10Base-T hubs, 2 10Base-T switches (8 ports each) – 1 100Base-T switch (4 ports), 100Base-T router   ( 5 x 10) + (2 x 10 x 8) + (4 x 100) + 100 = 710 Mbps • Advantage is flexibility – Enables users to plug modules directly into the switch – Simple to add new modules Copyright 2011 John Wiley & Sons, Inc 7 - 24
  • 25. Switched Backbone at Indiana Univ. • Add Figure 7-10 Copyright 2011 John Wiley & Sons, Inc
  • 26. Routed Backbone Copyright 2011 John Wiley & Sons, Inc
  • 27. Routed Backbones • Move packets using network layer addresses • Commonly used at the core layer – Connecting LANs in different buildings in the campus – Can be used at the distribution layer as well • LANs can use different data link layer protocols • Main advantage: LAN segmentation – Each message stays in one LAN; unless addressed outside the LAN – Easier to manage, LANs are separate entities, segments • Main disadvantages – Tend to impose time delays – Require more management than switches Copyright 2011 John Wiley & Sons, Inc 7 - 27
  • 28. Virtual LANs (VLANs) • A new type of LAN-BN architecture – Made possible by high-speed intelligent switches – Computers assigned to LAN segments by software • Often faster and provide more flexible network management – Much easier to assign computers to different segments • More complex and so far usually used for larger networks • Basic VLAN designs: – Single switch VLANs – Multi-switch VLANs Copyright 2011 John Wiley & Sons, Inc 7 - 28
  • 29. VLAN-based Backbone Insert Figure 7.12 Copyright 2011 John Wiley & Sons, Inc 7 - 29
  • 30. Multi-switch VLAN-Based Backbone Insert Figure 7.13 Copyright 2011 John Wiley & Sons, Inc 7 - 30
  • 31. How VLANs Work • Each computer is assigned into a VLAN that has a VLAN ID • Each VLAN ID is matched to a traditional IP subnet • Each computer gets an IP address from that switch • Similar to how DHCP operates • Computers are assigned into the VLAN based on physical port they are plugged into Copyright 2011 John Wiley & Sons, Inc 7 - 31
  • 32. Multiswitch VLAN Operations • Same as single switch VLAN, except uses several switches, perhaps in core between buildings • Inter-switch protocols – Must be able to identify the VLAN to which the packet belongs • Use IEEE 802.1q (an emerging standard) – When a packet needs to go from one switch to another • 16-byte VLAN tag inserted into the 802.3 packet by the sending switch – When the IEEE 802.1q packet reaches its destination switch • Its header (VLAN tag) stripped off and Ethernet packet inside is sent to its destination computer Copyright 2011 John Wiley & Sons, Inc 7 - 32
  • 33. VLAN Operating Characteristics • Advantages of VLANs – Faster performance: Allow precise management of traffic flow and ability to allocate resources to different type of applications – Traffic prioritization (via 802.1q VLAN tag) • Include in the tag: a priority code based on 802.1q • Can have QoS capability at MAC level – Similar to RSVP and QoS capabilities at network and transport layers • Drawbacks – Cost – Management complexity – Some “bleeding edge” technology issues to consider Copyright 2011 John Wiley & Sons, Inc 7 - 33
  • 34. 7.4 Best Practice Backbone Design • Architectures – At distribution layer  switched backbone because of performance and cost – At core layer  routed backbone – VLANs closer but more costly and complex Copyright 2011 John Wiley & Sons, Inc 7 - 34
  • 35. Recommendations for BB Design • Best architecture – Switched backbone or VLAN at distribution layer – Routed backbone at core layer • Best technology - Gigabit Ethernet • Ideal design – A mixture of layer-2 and layer-3 Ethernet switches – Access Layer • 100Base-T Later 2 switches with cat5e or cat6 – Distribution Layer • 100base-T or 1000BaseT/F Layer 3 switches – Core Layer • Layer 3 switches running 10GbE or 40GbE over fiber Copyright 2011 John Wiley & Sons, Inc 7 - 35
  • 36. Best Practice Network Design Insert Figure 7.14 Copyright 2011 John Wiley & Sons, Inc 7 - 36
  • 37. 7.5 Improving Backbone Performance • Improve computer and device performance – Upgrade them to faster devices – Change to a more appropriate routing protocol • Distance vector – typically used on BNs • Link state – typically used on WANs and MANs – Use gigabit Ethernet as BB (eliminate translations) – Increase memory in devices • Improve circuit capacity – Upgrade to a faster circuit; Add additional circuits – Replace shared circuit BB with a switched BB • Reduce network demand – Restrict applications that use a lot of network capacity – Reduce broadcast messages (placing filters at switches) Copyright 2011 John Wiley & Sons, Inc 7 - 37
  • 38. 7.6 Implications for Management • Amount of traffic backbone needs to support is increasing at faster rate – May require that BN be replaced – Design BN to be easily upgradeable • ATM is legacy technology – Vendors stopping the production of these – Begin to invest more funds to replace these • Ethernet moving into backbone extensively – One standard technology used for both LANs and BN – Cost of equipment decreasing while management is becoming easier – Performance of Ethernet in backbone increasing quickly Copyright 2011 John Wiley & Sons, Inc 7 - 38
  • 39. Copyright 2011 John W iley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information herein. Copyright 2011 John Wiley & Sons, Inc 7 - 39