SlideShare una empresa de Scribd logo
1 de 103
Descargar para leer sin conexión
Computer Networks -LAN 
Deepak John 
Department Of MCA,SJCET-Pala
Local Area Network
Attributes Of A LAN 
i. Transmission technology 
ii. Signalling methods 
iii. Transmission medium 
iv. Access Control 
v. Topologies
i. Transmission Technology 
Two Transmission Technologies used by LANs are : 
a. Broad cast: A single communication channel is shared by all the 
machines on the network 
b. Point to Point: consists of many connections between individual 
pairs of machines.Packets have to follow multiple 
routes of different lengths 
ii. Signalling Methods 
 Two signaling methods used by LANs are : 
a. Broadband: The bandwidth of the transmission medium is subdivided 
by frequency to form two or more sub-channels 
b. Base-Band: only one signal is transmitted at any point in time
iii. Transmission Medium 
 Transmission medium can be classified into 4 from physical cable 
connection to wireless systems. 
a. Twisted Pair: consists of two individual insulated copper wires 
physically twisted together to minimize unwanted 
electromagnetic signals from interfering with or 
radiating from the pair 
b. Coaxial cables: consists of a central copper core surrounded by a 
layer of insulating material. 
c. Optical fiber cables: contains glass fiber and signals are transmitted 
in the form of light pulses . 
d.Wireless transmission
iv. Access control 
 represents how the devices get permission to communicate on the 
network. 
 Some of the access methods primarily employed in local area 
networks are : 
 Polling 
 Token-passing 
 Slotted ring 
 CSMA/CD 
 Switching
v. Topology 
 refers to the way in which the end points, or stations, attached to 
the network are interconnected. 
The common topologies for LANs are: 
i. Bus 
ii. Tree 
iii. Ring 
iv. Star
LAN PROTOCOL ARCHITECTURE 
 The LAN protocol architecture consists of layering of protocols that 
contribute to the basic functions of a LAN 
 The standardized LAN protocol architecture encompasses 3 layers 
i. Physical layer 
ii. Medium Access control layer (MAC) 
iii.Logical Link control
IEEE 802 Reference Model 
 The layers of OSI Reference Model can be classified as Network 
Support Layers and User support layers 
 LAN protocols are concerned with the network support layers, 
mainly Physical and Data Link Layer 
 IEEE 802 Reference Model is a modified reference model suitable 
for LANs built by IEEE. 
 It corresponds to the lower 2 layers of OSI reference model 
 Here the data link layer has been divided into two sub layers: 
logical link control (LLC) and media access control (MAC)
Physical layer 
 includes functions such as : 
i. Encoding/decoding of signals 
ii. Specification of the transmission medium and the topology 
Logical Link Layer 
Acts as the interface between the Network layer and the MAC sub-layer 
 Functions: 
i. Error Control 
ii. Flow Control 
iii. Sequencing & User Addressing Functions
 LLC standard is common to all LAN’s and offers three types of 
services for controlling the exchange of data between two users. 
i. Unacknowledged connectionless service: does not involve any of 
the flow- and error control mechanisms and delivery of data is not 
guaranteed. 
ii. Connection-mode service:A logical connection is set up between 
two users exchanging data, and flow control and error control are 
provided. 
iii. Acknowledged connectionless service:datagram are to be 
acknowledged, but no prior logical connection is set up.
LLC Protocol Data Unit (PDU) 
 which contains 4 fields 
 Destination Service Access Point (DSAP), Source Service Access 
Point (SSAP) : address fields which specify the destination and 
source users of LLC.These identify the network protocol entities 
which use the link layer service 
 LLC control field: describes type of PDU(U,I and S) and includes 
other information such as sequencing and flow control information
Medium Access Control 
 It is lower sub-layer of data link layer closer to the physical layer 
 Key parameters of MAC technique is where and how 
 a.Where: refers to whether control is exercised in a centralized or 
distributed fashion. 
 Central: A controller is designated that has the authority to 
grant access to the network. 
 Distributed:The stations collectively perform a MAC function to 
determine the order in which stations transmit. 
 b. How: is constrained by the topology and competing factors like 
cost, performance, and complexity.
Basic functions of MAC Sub Layer are: 
i. Media Access Control 
ii. Error Detection 
iii. Station Addressing 
 Defines two medium access control techniques specific for each 
LAN. 
i. Synchronous techniques: a specific capacity is dedicated to a 
connection. 
ii. Asynchronous: allocate capacity in an asynchronous (dynamic) 
fashion, more or less in response to immediate demand.
Asynchronous techniques can be classified into three: 
i. Round Robin 
ii. Reservation 
iii. Contention 
i.Round Robin 
 Each station in turn is given the opportunity to transmit. 
 When it is finished, relinquishes its turn, and the right to transmit 
passes to the next station in logical sequence. 
 Control of sequence may be centralized or distributed. 
 Efficient when many stations have data to transmit over an 
extended period of time
ii. Reservation 
Time on the medium is divided into slots. 
A station wishing to transmit reserves future slots for an 
extended or even an indefinite period. 
 Reservations may be made in a centralized or distributed 
fashion. 
iii. Contention 
 Useful for bursty type traffic 
 No control is exercised to determine whose turn it is. 
 Stations send data by taking risk of collision (with others’ 
packets).however they understand collisions by listening to the 
channel, so that they can retransmit. 
 Efficient under light or moderate load,bad under heavy load 
 Round-Robin and Contention techniques are the most commonly 
used in LANs.
MAC- Frame Format 
 The MAC layer is responsible for performing functions related to 
medium access and for transmitting the data. 
 MAC Control: contains any protocol control information needed for 
the functioning of the MAC protocol 
 Destination MAC Address: The destination physical attachment 
point on the LAN for this frame. 
 Source MAC Address: The source physical attachment point on the 
LAN for this frame. 
 LLC PDU: The LLC data from the next higher layer. 
 CRC: The Cyclic Redundancy Check field
Standard Title Description 
802.1 High-level Interface Specification of standards for LAN architecture, 
interconnection, management 
802.2 Logical Link Control Specification of standards for the LLC layer 
802.3 Ethernet(CSMA/CD) Specification of standards for CSMA/CD architectures 
802.4 Token Bus Specification of standards for token bus architectures 
802.5 Token Ring Specification of standards for token ring architectures 
802.6 Metropolitan Area 
Networks 
Specification of standards for MANs 
802.7 Broadband Technical 
Advisory Group 
Provision of guidance to other groups working on 
broadband LANs 
802.8 Fiber Optic Technical P i i f id h ki 
Advisory Group 
Provision of guidance to other groups working on 
fiber optic-based LANs 
802.9 Integrated Data and Specification of standards for interfaces to ISDN 
Voice Networks
Multiple Access Protocols 
 A MAC (Media Access Control) protocol is a set of rules to control 
access to a shared communication medium among various users.
RANDOMACCESS 
 In random access or contention methods, no station is superior to 
another station and none is assigned the control over another. 
 Two features give this method its name: 
 First, there is no scheduled time for a station to transmit. 
 Second, no rules specify which station should send next. Stations 
compete with one another to access the medium
ALOHA 
 When the user simply transmits a frame, there are chances of 
collision 
 The user could simply retransmit, but this would not help, other user 
involved in the collision will also retransmit, resulting in another 
collision 
 One way to avoid this is to wait a random amount of time before 
retransmitting which forms the basis of ALOHA 
 There are two versions of ALOHA: pure and slotted.
Pure ALOHA 
The system is working as follows: 
1. let users transmit whenever they have data to be sent. 
2. collisions will occur. 
3. using a feedback mechanism to know about the status of frame. 
4. the collided frames will be destroyed. 
5. retransmit the destroyed frame. 
 the number of collisions rise rapidly with increased load. 
 After a maximum number of retransmission attempts Kmax 
station must give up and try later.
Frames in a pure ALOHA network
Suppose L: the average frame length, 
R: rate, 
X=L/R: frame time 
1. Transmit a frame at t=t0 (and finish transmission of the frame at t0+X ) 
2. If ACK does not come after t0+X+2tprop or detect collision, wait for 
random time: B 
3. Retransmit the frame at t0+X+2tprop+B 
First transmission Retransmission 
t 
t0-X t0 t0+X t +X+2t t0+X+2tprop +B 
0+2tprop t0 X Vulnerable Time-out Backoff period: B Retransmission 
period if necessary
Vulnerable period: t0-X to t0+X, if any other frames are transmitted 
during the period, the collision will occur. 
Therefore the probability of a successful transmission is the probability 
that there is no additional transmissions in the vulnerable period. 
Therefore, if a station generates only one frame in this vulnerable time 
(and no other stations generate a frame during this time), the frame 
will reach its destination successfully. 
 Max channel utilization is 18% - very bad
Slotted ALOHA 
 Slotted ALOHA was invented to improve the efficiency of pure 
ALOHA. 
 Here, we divide the time into slots and force the station to send only 
at the beginning of the time slot 
 If a station misses this moment, it must wait until the beginning of the 
next time slot. 
 There is still the possibility of collision if two stations try to send at 
the beginning of the same time slot
First transmission Retransmission 
t 
t0 -X t0 t0+X+2tprop t0+X t0+X+2tprop +B 
Time-out Backoff period: 
B 
Retransmission 
if necessary 
Vulnerable period: t0-X to t0 , i.e., X seconds long 
 Max channel utilization is 37%,doubles Normal ALOHA, but still low
Carrier Sense Multiple Access(CSMA) 
 A station wishing to transmit first listens to the medium if another 
transmission is in progress (carrier sense). 
 If the medium is in use, station waits 
 if the medium is idle, station may transmit 
 Collision probability depends on the propagation delay 
 Longer propagation delay, worse the utilization 
 Collisions can occur only when more than one user begins 
transmitting within the period of propagation delay. 
 The vulnerable time for CSMA is the propagation time . 
 If collision occurs 
 Wait random time and retransmit
 Suppose tprop is propagation delay from one extreme end to the other 
extreme end of the medium. When transmission is going on, a station 
Station A begins 
g g , 
can listen to the medium and detect it. Vulnerable period = tprop 
A 
g 
transmission at 
t=0 
sense sense 
Station A 
captures 
channel A 
at t=tprop CSMA random access scheme 
sense sense 
 After tprop, A’s transmission will arrive the other end; every station 
will hear it and refrain from the transmission, so A captures the 
medium and can finish its transmission.
 Following are some versions of CSMA protocol Based on how to 
do when medium is busy 
• 1-Persistent CSMA 
• Non-Persistent CSMA 
• p-Persistent CSMA
 1-persistent CSMA 
 if the medium is idle, transmit. 
 if the medium is busy, continue to 
listen until the channel is sensed 
idle; then transmit immediately. 
 If more than one station are 
Sense carrier 
yes 
Busy? 
sensing, then they will begin 
transmission the same time when 
no 
Send the frame 
h lb idl lli i channel becomes idle, so collision. 
At this time, each station wait for a 
random time and then re-senses 
with probability 1 
time, re the channel again. 
 Problem with 1-persistent CSMA is 
“high collision rate”.
 Nonpersistent 
 If the channel is busy the station does not continually check it for 
detecting the end of ongoing transmission. It waits for a random 
time then checks the channel. If the channel is idle, sends the frame. 
Sense carrier Wait random 
time… 
yes 
Busy? 
no 
Send the frame
 p-persistent CSMA 
 if medium is idle, station transmits with a probability p. otherwise 
it defers to the next slot with probability 1-p. the process repeat 
until either the frame has been transmitted or another station has 
begun transmission. 
Sense carrier 
Busy? 
yes 
no 
Send the frame 
with p probability p 
yp
Behaviour of three persistence methods
CSMA/CD 
(CSMA with Collision Detection) 
 Drawback of CSMA: when two frames collide, the medium remains 
unusable for the duration of transmission of both damaged frames. 
 CSMA/CD: 
 1. if the medium is idle, transmit; otherwise, go to step 2. 
 2. if the medium is busy, continue to listen until the channel is idle, 
then transmit. 
 3. if a collision is detected during transmission, transmit a brief 
jamming signal 
 4. after transmitting a jamming signal, wait a random amount of 
time, then attempt to transmit.
CSMA/CD efficiency 
 tprop = max prop between 2 nodes in LAN 
 ttrans = time to transmit max-size frame 
 Efficiency = 1/(1+5 * tprop / ttrans) 
 For 10 Mbit Ethernet, tprop = 51.2 us, ttrans = 1.2 ms 
 Efficiency is 82.6%! 
 Much better than ALOHA, 
 simple, and cheap 
 Efficiency goes to 1 as tprop goes to 0 
 Goes to 1 as ttrans goes to infinity
Exponential Back off Algorithm 
 used by a transmitting station to determine how long to wait following a 
collision before attempting to retransmit the frame 
 Each station generate a random number that falls within a specified 
range of values. which determines the length of time it must wait before 
testing the carrier. The range of values increases exponentially after 
each failed retransmission. 
 After c collisions, the range is between 0 and 2c – 1,It then waits that 
number of slot times before attempting retransmission. 
 If repeated collisions occur, the range continues to expand ,until after 
10 attempts when it reaches 1023. After that the range of values stays 
fixed .If a station is unsuccessful in transmitting after 16 attempts, then 
gives up if cannot transmit 
 low delay with small amount of waiting stations 
 large delay with large amount of waiting stations
Carrier Sense Multiple Access with Collision 
Avoidance (CSMA/CA) 
 In CSMA/CA once the channel is clear, it again waits for an additional 
time period before performing the transmission. 
 Before sending a frame, source senses the medium 
 Backoff until the channel is idle. 
 After the channel is found idle, the station waits for a period of time 
called the Distributed Inter Frame Space (DIFS); then the station 
sends a control frame called Request To Send (RTS). 
 After receiving RTS, the destination waits for a period called Short 
Inter Frame Space (SIFS), the destination station sends a control 
frame, called Clear To Send (CTS) to source. This control frame 
indicates that the destination station is ready to receive data. 
 Source sends data after waiting for SIFS 
 Destination sends ACK after waiting for SIFS.
 RTS frame indicates the 
duration of time that the 
source needs to occupy 
the channel. 
 Stations that are affected 
by this transmission 
create a timer called a 
Network Allocation 
Vector (NAV) that shows 
how much time must 
pass before these stations 
are allowed to check the 
channel for idleness.
CONTROLLED ACCESS 
 In controlled access, the stations consult one another to find which 
station has the right to send 
 A station cannot send unless it has been authorized by other stations. 
 Three popular control access methods are: 
 Polling 
 Reservation 
 Token Passing
Polling 
 Stations take turns accessing the medium 
 Two models: Centralized and distributed polling 
 Centralized polling 
 One device is assigned as primary station and the others as 
secondary stations 
 All data exchanges are done through the primary. 
 If the primary wants to receive data, it asks the secondary's if they 
have anything to send; this is called poll function. 
 If the primary wants to send data, it tells the secondary to get ready 
to receive; this is called select function 
 Polling can be done in order (Round-Robin) or based on 
predetermined order
Primary is sending to Secondary Secondary is sending to Primary 
 ACK is the acknowledgment of the secondary's ready status. 
 Secondary responds either with a NAK frame if it has nothing to send 
or with data (in the form of a data frame) if it does
 Distributed polling 
No primary and secondary 
Stations have a known polling order list which is made based on 
some protocol. 
station with the highest priority will have the access right first, 
then it passes the access right to the next station (it will send a 
pulling message to the next station in the pulling list), which will 
passes the access right to the following next station,…
Reservation 
 A station needs to make a reservation before sending data. 
 Transmissions are organized into variable length cycles. 
 Each cycle begins with a reservation interval that consists of (N) 
minislots. One minislot for each of the N stations. 
 When a station needs to send a data frame, it makes a reservation in 
its own minislot. 
 By listening to the reservation interval, every station knows which 
stations will transfer frames, and in which order. 
 The stations that made reservations can send their data frames after 
the reservation frame.
Token Passing 
 Here the stations in a network are organized in a logical ring. 
 In this method, a special packet called a token circulates through 
the ring. 
 token gives the station the right to access the channel and send its 
data 
 When a station receives the token and has no data to send, it just 
passes the data to the next station. 
token
LAN SYSTEMS
Ethernet 
 Ethernet is a dominant physical and data link layer technology for 
local area networks (LANs). 
 It is a bus based broadcast network using co-axial cable operating at 10 
or 100 Mbps. 
 It uses a control method called Carrier Sense Multiple 
Access/Collision Detection (CSMA/CD) to transmit data 
Ethernet Evolution 
Standard 
Ethernet 
Fast 
Ethernet 
Gigabit 
Ethernet 
Ten-Gigabit 
Ethernet 
100-Gigabit 
Ethernet 
(10 Mbps) (100 Mbps)
IEEE 802.3 MAC Frame
 Preamble: Alternating 0s and 1s; used for synchronizing; 7bytes 
(56 bits). 
 Start Frame Delimiter (SFD): 10101011 indicates the start of the 
frame. Last two bits alerts that the next field is destination address. 
 Destination Address (DA): 6 bytes (48 bits) physical address of 
destination station(s) 
 Source Address (SA): 6 bytes (48 bits) physical address of sender 
 Length/Type: if less than 1500, it indicates the length of data field. 
If greater than 1536, it indicates the type of PDU. 
 Data: 46 to 1500 bytes; 
 CRC: CRC-32 for error detection
Addressing 
 Each station on an Ethernet network has its own network interface 
card( NIC) fits inside and provides a 6-byte physical address 
Eg:06:01:02:01:2C:4B. 
First three bytes from left specify the vendor. (Cisco 00-00-0C, 3Com 
02-60-8C) and the last 24 bit should be created uniquely by the 
company
A source address is always a unicast address where as destination 
address can be unicast, multicast, or broadcast. 
Unicast: defines one recipient ,second digit from left is even 
 Multicast: defines a group of recipients ,Second digit from left is 
odd 
 Broadcast : defines a group of all stations in the same LAN ,All 
ones 
The transmission is left-to-right, byte by byte; however, for each 
byte, the least significant bit is sent first and the most significant bit 
is sent last.
Physical Layer Implementation 
 The Standard Ethernet defines several physical layer implementations; 
four of the most common, are
Physical Layer Signaling 
 Uses Manchester encoding. 
 At the sender, data are converted to a digital signal using the 
Manchester scheme; at the receiver, the received signal is interpreted 
as Manchester and decoded into data. 
 Helps synchronize sender and recvr.
10Base5: Thick Ethernet 
 use a bus topology with an external transceiver (transmitter/receiver) 
connected via a tap to a thick coaxial cable. 
 10-Mbps transmission speed and 5 represents 500 meters maximum 
cable segment length. 
 The transceiver is responsible for transmitting, receiving, and detecting 
collisions
10Base2: Thin Ethernet 
 uses a bus topology, but the cable is much thinner and more flexible. 
 The transceiver is normally part of the network interface card (NIC), 
which is installed inside the station. 
 can transmit 10 Mbps digital signals over coaxial cable. 
 more cost effective than 10Base5 because thin coaxial cable is less 
expensive than thick coaxial. 
 The length of each segment cannot exceed 185 m (close to 200 m).
10Base-T: Twisted-Pair Ethernet 
 Uses a physical star topology. 
 The stations are connected to a hub via two unshielded twisted pair 
cables; One for transmitting data, and the other for receiving data 
 Maximum length of the cable segment can be 100 meters.
10Base-F: Fiber Ethernet 
 Although there are several types of optical fiber l0-Mbps Ethernet, 
the most common is called 10Base-F. 
 It uses a star topology to connect stations to a hub. 
 The stations are connected to the hub using two fiber-optic cables.
Bridged Ethernet 
 LAN can be divided using bridges. Bridges have two effects on an 
Ethernet LAN: 
• They raise the bandwidth 
• They separate collision domains 
 Raising the Bandwidth 
 each network is independent. 
 Suppose there are 12 stations. And bandwidth is 10 Mbps. 
 If we divide the network into 2 networks using bridge, each network 
has a capacity of 10 Mbps. 
 The 10 Mbps capacity is shared between 7 stations, 6+1(bridge acts 
as a station in each segment), not 12 stations.
A network with and without a bridge
 Separating collision domains: 
 Collisions domains become much smaller and possibility of collision 
is reduced. 
 With bridging, lesser number of channels compete for access to the 
medium.
Switched Ethernet 
cards,  The heart of the system is a switch containing room for typically 4 to 
32 plug-in cards each containing one to eight connectors that allows 
faster handling of packets. 
 When a station wants to transmit a frame, it outputs a frame to 
switch. 
 Half duplex
 All ports on the same card are wired together to form a local on-card 
LAN. 
 Collisions on this on-card LAN are detected and handled using 
CSMA/CD protocol. 
 One transmission per card is possible at any instant. All the cards can 
transmit in parallel. 
 With this design each card forms its own collision domain.
Full-duplex switched Ethernet 
Each station is connected to the switch through two links: one to 
transmit and one to receive. 
increases the capacity of each domain from 10 to 20 Mbps. 
no chances of collision, so CSMA/CD is not used
Fast Ethernet 
 IEEE 802.3 u. 
 same frame format, media access, and collision detection rules as 10 
Mbps Ethernet 
 data transfer rate of 100 Mb/s . 
 compatible with Standard Ethernet.
MAC Sub Layer 
 The only two changes made in the MAC layer are the data rate and 
the collision domain 
 A new feature added called Auto negotiation;allows two devices to 
negotiate the mode or data rate of operation. 
 For example, a device with a maximum capacity of 10 Mbps can 
communicate with a device with a 100 Mbps capacity.
Physical Layer 
 Implementation
Topologies 
Fast Ethernet Topologies
Gigabit Ethernet 
 IEEE 802.3z. 
 All config rations of gigabit Ethernet are point to point 
configurations point. 
 Point-to-point, between two computers or one computer – to –switch. 
 Compatible with 100BASE-T and 10BASE-T 
MAC Sublayer
 It supports two different modes of medium access : full duplex 
mode and half duplex mode. 
 Half duplex is used when computers are connected by a hub. 
Collision in hub is possible and so CSMA/CD is required. 
 Full duplex is used when computers are connected by a switch. No 
collision is there and so CSMA/CD is not used.
 Carrier Extension tells the hardware to add its own padding bits after 
the normal frame to extend the frame to 512 bytes. 
RRRRRRRRRRRRR 
Carrier Extension 
Frame 
512 bytes 
 Frame Bursting allows a sender to transmit a concatenated sequence 
of multiple frames in a single transmission. If the total burst is less 
than 512 bytes, the hardware pads it again. 
Frame Extension Frame Frame Frame 
512 bytes 
Frame burst
Physical Layer 
 Topology.
LAN CONNECTING DEVICES
Connecting Devices 
Networking Devices 
Internetworking 
Devices 
Repeaters Bridges Routers Gateways
Network Connecting Devices
Repeaters 
 A repeater (or regenerator) is an electronic device that operates on 
only the physical layer of the OSI model. 
 A repeater installed on a link receives the signal before it becomes 
too weak or corrupted, regenerates the original pattern, and puts the 
refreshed copy back on the link.
 A repeater does not actually connect two LANS; it connects two 
segments of the same LAN. 
 A repeater forwards every frame; it has no filtering capability 
Function of repeater
Hubs 
Passive Hubs 
 A passive hub is just a connector which connects the wires coming 
from different branches 
Active Hub 
 A Hub is a multiport repeater. used to create connections between 
stations in a physical star topology. 
 Connection to the hub consists of two pairs of twisted pair wire one 
for transmission and the other for receiving. 
 it copy the received frame onto all other links
Bridges 
 Bridges operate in both the physical and the data link layers of the 
OSI model. 
 Bridges can divide a large network into smaller segments. 
 When a frame (or packet) enters a bridge, the bridge not only 
regenerates the signal but checks the destination address and 
forwards the new copy only to the segment the address belong. 
 This is done by a bridge table (forwarding table) that contains entries 
for the nodes on the LAN 
 The bridge table is initially empty and filled automatically by 
learning from frames movements in the network 
 A bridge runs CSMA/CD before sending a frame onto the channel
Types of Bridges 
1. Simple Bridge 
2. Multiport Bridge 
3. Transparent Bridge 
Simple Bridge 
 The address table must be entered manually 
 Whenever a new station is added or removed, the table must 
modified. 
 Installation and maintenance of simple bridges are time-consuming 
and potentially more. 
Multiport bridges 
 Amultiport bridge can be used to connect more than two LANs.
Transparent Bridges 
 A transparent, or learning, bridge builds its table of station addresses 
on its own as it performs its bridge functions. 
 the stations are completely unaware of the bridge’s existence. 
 A transparent bridge must meet three criteria: 
1. Frames must be forwarded from one station to another. 
2. The forwarding table is automatically made by learning frame 
movements in the network. 
3. Loops in the system must be prevented.
Learning Bridge
Loop Problem 
 multiple paths of bridges and local- 
local-area 
networks (LANs) exist between 
any two LANs in the internetwork. 
 Having more than one transparent 
bridge between a pair of LAN 
segments can create loops in the 
system. 
 Bridging Loops Can Result in 
Inaccurate Forwarding and Learning 
in Transparent Bridging 
Environments .
Step 1. Station-A sends a frame to Station-B. Both the bridges forward 
the frame to LAN Y and update the table with the source address of A. 
Step 2. Now there are two copies of the frame on LAN-Y. The copy sent 
by Bridge-a is received by Bridge-b and vice versa. As both the 
bridges have no information about Station B, both will forward the 
frames to LAN-X. 
Step 3. Again both the bridges will forward the frames to LAN-Y 
because of the lack of information of the Station B in their database 
and again Step-2 will be repeated, and so on. 
So, the frame will continue to loop around the two LANs 
indefinitely. 
 Looping problem Is avoided by using Blocking ports 
(no frame is send out of these ports).
Spanning Tree Algorithm 
 IEEE 802.1d 
 In graph theory, a spanning tree is a graph in which there is no loop 
 In a bridged LAN, this means creating a topology in which each LAN 
can be reached from any other LAN through one path only 
 A LAN can be depicted as a graph, whose nodes are bridges and 
LAN segments (or cables), and whose edges are the interfaces 
connecting the bridges to the LAN segments
STEPS 
 Every bridge has a built-in ID and the bridge with smallest ID is 
selected as the root bridge 
 The algorithm tries to find the shortest path (a path with the shortest 
cost) from the root bridge to every other bridge or LAN 
 The combination of the shortest paths creates the shortest tree 
 Based on the spanning tree, we mark the forwarding ports and 
blocking ports
The forwarding ports are shown as solid lines, whereas the blocked 
ports are shown as dotted lines. 
Spanning tree of a network of bridges
Two-Layer Switches 
 Two-layer switch performs at the physical and data link layers. 
 is a bridge, with many ports and allows better (faster) performance. 
 A bridge with many ports may be able to allocate a unique port to 
each station, with each station on its own independent entity. 
 It makes a filtering decision based on the MAC address of the frame 
it received. 
 It can have a buffer to hold the frames for processing. 
 More than one station transmitting at a time. 
 It can have a switching factor that forwards the frames faster.
Types 
Store-and-forward switch 
• Accepts frame on input line 
• Buffers it briefly, 
• Then routes it to appropriate output line 
• Delay between sender and receiver 
Cut-through switch 
• Takes advantage of destination address appearing at beginning of 
frame 
• Switch begins repeating frame onto output line as soon as it 
recognizes destination address
Routers 
 Capable of connecting networks of different types 
 Routers separate networks into different broadcast domains. 
 They use the “logical address” of packets and routing tables to 
determine the best path for data delivery. 
 RIP(Routing Information Protocol) 
98
Back Bone Networks 
 A backbone network allows several LANs to be connected. 
 In a backbone network, no station is directly connected to the 
backbone; the stations are part of a LAN, and the backbone 
connects the LANs. 
 The backbone is itself a LAN that uses a LAN protocol such as 
Ethernet and each connection to the backbone is itself another 
LAN. 
 The two most common architectures are the bus backbone and the 
star backbone.
Bus Backbone 
 In a bus backbone, the topology of the backbone is a bus. 
 Bus backbones are normally used as a distribution backbone to 
connect different buildings in an organization.
Star Backbone 
 the topology of the backbone is a star; the backbone is just a switch. 
 mostly used as a distribution backbone inside a building.
Connecting Remote LANs 
 Consider a situation where 2 LANS are located at some 
distance. 
 It is possible to connect these LANS by taking a full duplex leased 
connection from telephone network operator. 
 Use 2 bridges, one at each end of leased connection 
 These bridges are called remote bridges 
 Useful when a company has several offices with LANs and needs to 
connect them. 
 These bridges have ports that have data rate and signal levels 
compatible to telephone network standard. 
 The bridges establish a data link connection through the leased 
circuit and then carry out bridge operation
Computer networks lan

Más contenido relacionado

La actualidad más candente

Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided mediaHassan Osama
 
Data Communication & Computer Networks : Serial and parellel transmission
Data Communication & Computer Networks : Serial and parellel transmissionData Communication & Computer Networks : Serial and parellel transmission
Data Communication & Computer Networks : Serial and parellel transmissionDr Rajiv Srivastava
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)Anand Biradar
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)Karam Munir Butt
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)Pritom Chaki
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basicsRomeo Alonzo
 

La actualidad más candente (20)

Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided media
 
Data Communication & Computer Networks : Serial and parellel transmission
Data Communication & Computer Networks : Serial and parellel transmissionData Communication & Computer Networks : Serial and parellel transmission
Data Communication & Computer Networks : Serial and parellel transmission
 
Internetworking
InternetworkingInternetworking
Internetworking
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Data dissemination
Data disseminationData dissemination
Data dissemination
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Data link layer
Data link layerData link layer
Data link layer
 
Error control
Error controlError control
Error control
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
 
Error control
Error controlError control
Error control
 
HDLC
HDLCHDLC
HDLC
 

Destacado

Destacado (9)

Basic Computer Networking Tutorial
Basic Computer Networking TutorialBasic Computer Networking Tutorial
Basic Computer Networking Tutorial
 
Networking Devices & Its Advantages and Disadvantages
Networking Devices & Its Advantages and DisadvantagesNetworking Devices & Its Advantages and Disadvantages
Networking Devices & Its Advantages and Disadvantages
 
Hub presentation - ppt
Hub presentation - pptHub presentation - ppt
Hub presentation - ppt
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 

Similar a Computer networks lan

Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layerDeepak John
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxMeenaAnusha1
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Dân Chơi
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.pptabdnazar2003
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdfssuser3aa461
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
Communication Networks 2 marks q &answers
Communication Networks  2 marks q &answersCommunication Networks  2 marks q &answers
Communication Networks 2 marks q &answersRaja Madhuvanthi
 
An_overview_of_the_3G_network.pdf
An_overview_of_the_3G_network.pdfAn_overview_of_the_3G_network.pdf
An_overview_of_the_3G_network.pdfBrianJanAdela3
 
Lte protocol Stack
Lte protocol StackLte protocol Stack
Lte protocol StackShoeb Ahmed
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and InternetworkingN.Jagadish Kumar
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
 

Similar a Computer networks lan (20)

Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layer
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
 
Data link layer
Data link layerData link layer
Data link layer
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
Note 6
Note 6Note 6
Note 6
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdf
 
Networks
Networks   Networks
Networks
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
Communication Networks 2 marks q &answers
Communication Networks  2 marks q &answersCommunication Networks  2 marks q &answers
Communication Networks 2 marks q &answers
 
An_overview_of_the_3G_network.pdf
An_overview_of_the_3G_network.pdfAn_overview_of_the_3G_network.pdf
An_overview_of_the_3G_network.pdf
 
Lte protocol Stack
Lte protocol StackLte protocol Stack
Lte protocol Stack
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 

Más de Deepak John

Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fiDeepak John
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentationDeepak John
 
Information management
Information managementInformation management
Information managementDeepak John
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendarDeepak John
 
Module 2 instruction set
Module 2 instruction set Module 2 instruction set
Module 2 instruction set Deepak John
 
introduction to computers
 introduction to computers introduction to computers
introduction to computersDeepak John
 
Registers and counters
Registers and counters Registers and counters
Registers and counters Deepak John
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4Deepak John
 
Module 4 network and computer security
Module  4 network and computer securityModule  4 network and computer security
Module 4 network and computer securityDeepak John
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-Deepak John
 
Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3Deepak John
 
Module 4 registers and counters
Module 4 registers and counters Module 4 registers and counters
Module 4 registers and counters Deepak John
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer securityDeepak John
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2Deepak John
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1Deepak John
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer securityDeepak John
 
Combinational and sequential logic
Combinational and sequential logicCombinational and sequential logic
Combinational and sequential logicDeepak John
 
Module 2 logic gates
Module 2  logic gatesModule 2  logic gates
Module 2 logic gatesDeepak John
 

Más de Deepak John (20)

Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fi
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentation
 
Information management
Information managementInformation management
Information management
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendar
 
Module 1 8086
Module 1 8086Module 1 8086
Module 1 8086
 
Module 2 instruction set
Module 2 instruction set Module 2 instruction set
Module 2 instruction set
 
introduction to computers
 introduction to computers introduction to computers
introduction to computers
 
Registers and counters
Registers and counters Registers and counters
Registers and counters
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
Module 4 network and computer security
Module  4 network and computer securityModule  4 network and computer security
Module 4 network and computer security
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-
 
Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3
 
Module 4 registers and counters
Module 4 registers and counters Module 4 registers and counters
Module 4 registers and counters
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer security
 
Combinational and sequential logic
Combinational and sequential logicCombinational and sequential logic
Combinational and sequential logic
 
Module 2 logic gates
Module 2  logic gatesModule 2  logic gates
Module 2 logic gates
 

Último

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 

Último (20)

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 

Computer networks lan

  • 1. Computer Networks -LAN Deepak John Department Of MCA,SJCET-Pala
  • 3. Attributes Of A LAN i. Transmission technology ii. Signalling methods iii. Transmission medium iv. Access Control v. Topologies
  • 4. i. Transmission Technology Two Transmission Technologies used by LANs are : a. Broad cast: A single communication channel is shared by all the machines on the network b. Point to Point: consists of many connections between individual pairs of machines.Packets have to follow multiple routes of different lengths ii. Signalling Methods  Two signaling methods used by LANs are : a. Broadband: The bandwidth of the transmission medium is subdivided by frequency to form two or more sub-channels b. Base-Band: only one signal is transmitted at any point in time
  • 5. iii. Transmission Medium  Transmission medium can be classified into 4 from physical cable connection to wireless systems. a. Twisted Pair: consists of two individual insulated copper wires physically twisted together to minimize unwanted electromagnetic signals from interfering with or radiating from the pair b. Coaxial cables: consists of a central copper core surrounded by a layer of insulating material. c. Optical fiber cables: contains glass fiber and signals are transmitted in the form of light pulses . d.Wireless transmission
  • 6. iv. Access control  represents how the devices get permission to communicate on the network.  Some of the access methods primarily employed in local area networks are :  Polling  Token-passing  Slotted ring  CSMA/CD  Switching
  • 7. v. Topology  refers to the way in which the end points, or stations, attached to the network are interconnected. The common topologies for LANs are: i. Bus ii. Tree iii. Ring iv. Star
  • 8. LAN PROTOCOL ARCHITECTURE  The LAN protocol architecture consists of layering of protocols that contribute to the basic functions of a LAN  The standardized LAN protocol architecture encompasses 3 layers i. Physical layer ii. Medium Access control layer (MAC) iii.Logical Link control
  • 9. IEEE 802 Reference Model  The layers of OSI Reference Model can be classified as Network Support Layers and User support layers  LAN protocols are concerned with the network support layers, mainly Physical and Data Link Layer  IEEE 802 Reference Model is a modified reference model suitable for LANs built by IEEE.  It corresponds to the lower 2 layers of OSI reference model  Here the data link layer has been divided into two sub layers: logical link control (LLC) and media access control (MAC)
  • 10.
  • 11. Physical layer  includes functions such as : i. Encoding/decoding of signals ii. Specification of the transmission medium and the topology Logical Link Layer Acts as the interface between the Network layer and the MAC sub-layer  Functions: i. Error Control ii. Flow Control iii. Sequencing & User Addressing Functions
  • 12.  LLC standard is common to all LAN’s and offers three types of services for controlling the exchange of data between two users. i. Unacknowledged connectionless service: does not involve any of the flow- and error control mechanisms and delivery of data is not guaranteed. ii. Connection-mode service:A logical connection is set up between two users exchanging data, and flow control and error control are provided. iii. Acknowledged connectionless service:datagram are to be acknowledged, but no prior logical connection is set up.
  • 13. LLC Protocol Data Unit (PDU)  which contains 4 fields  Destination Service Access Point (DSAP), Source Service Access Point (SSAP) : address fields which specify the destination and source users of LLC.These identify the network protocol entities which use the link layer service  LLC control field: describes type of PDU(U,I and S) and includes other information such as sequencing and flow control information
  • 14. Medium Access Control  It is lower sub-layer of data link layer closer to the physical layer  Key parameters of MAC technique is where and how  a.Where: refers to whether control is exercised in a centralized or distributed fashion.  Central: A controller is designated that has the authority to grant access to the network.  Distributed:The stations collectively perform a MAC function to determine the order in which stations transmit.  b. How: is constrained by the topology and competing factors like cost, performance, and complexity.
  • 15. Basic functions of MAC Sub Layer are: i. Media Access Control ii. Error Detection iii. Station Addressing  Defines two medium access control techniques specific for each LAN. i. Synchronous techniques: a specific capacity is dedicated to a connection. ii. Asynchronous: allocate capacity in an asynchronous (dynamic) fashion, more or less in response to immediate demand.
  • 16. Asynchronous techniques can be classified into three: i. Round Robin ii. Reservation iii. Contention i.Round Robin  Each station in turn is given the opportunity to transmit.  When it is finished, relinquishes its turn, and the right to transmit passes to the next station in logical sequence.  Control of sequence may be centralized or distributed.  Efficient when many stations have data to transmit over an extended period of time
  • 17. ii. Reservation Time on the medium is divided into slots. A station wishing to transmit reserves future slots for an extended or even an indefinite period.  Reservations may be made in a centralized or distributed fashion. iii. Contention  Useful for bursty type traffic  No control is exercised to determine whose turn it is.  Stations send data by taking risk of collision (with others’ packets).however they understand collisions by listening to the channel, so that they can retransmit.  Efficient under light or moderate load,bad under heavy load  Round-Robin and Contention techniques are the most commonly used in LANs.
  • 18. MAC- Frame Format  The MAC layer is responsible for performing functions related to medium access and for transmitting the data.  MAC Control: contains any protocol control information needed for the functioning of the MAC protocol  Destination MAC Address: The destination physical attachment point on the LAN for this frame.  Source MAC Address: The source physical attachment point on the LAN for this frame.  LLC PDU: The LLC data from the next higher layer.  CRC: The Cyclic Redundancy Check field
  • 19. Standard Title Description 802.1 High-level Interface Specification of standards for LAN architecture, interconnection, management 802.2 Logical Link Control Specification of standards for the LLC layer 802.3 Ethernet(CSMA/CD) Specification of standards for CSMA/CD architectures 802.4 Token Bus Specification of standards for token bus architectures 802.5 Token Ring Specification of standards for token ring architectures 802.6 Metropolitan Area Networks Specification of standards for MANs 802.7 Broadband Technical Advisory Group Provision of guidance to other groups working on broadband LANs 802.8 Fiber Optic Technical P i i f id h ki Advisory Group Provision of guidance to other groups working on fiber optic-based LANs 802.9 Integrated Data and Specification of standards for interfaces to ISDN Voice Networks
  • 20. Multiple Access Protocols  A MAC (Media Access Control) protocol is a set of rules to control access to a shared communication medium among various users.
  • 21. RANDOMACCESS  In random access or contention methods, no station is superior to another station and none is assigned the control over another.  Two features give this method its name:  First, there is no scheduled time for a station to transmit.  Second, no rules specify which station should send next. Stations compete with one another to access the medium
  • 22. ALOHA  When the user simply transmits a frame, there are chances of collision  The user could simply retransmit, but this would not help, other user involved in the collision will also retransmit, resulting in another collision  One way to avoid this is to wait a random amount of time before retransmitting which forms the basis of ALOHA  There are two versions of ALOHA: pure and slotted.
  • 23. Pure ALOHA The system is working as follows: 1. let users transmit whenever they have data to be sent. 2. collisions will occur. 3. using a feedback mechanism to know about the status of frame. 4. the collided frames will be destroyed. 5. retransmit the destroyed frame.  the number of collisions rise rapidly with increased load.  After a maximum number of retransmission attempts Kmax station must give up and try later.
  • 24. Frames in a pure ALOHA network
  • 25.
  • 26. Suppose L: the average frame length, R: rate, X=L/R: frame time 1. Transmit a frame at t=t0 (and finish transmission of the frame at t0+X ) 2. If ACK does not come after t0+X+2tprop or detect collision, wait for random time: B 3. Retransmit the frame at t0+X+2tprop+B First transmission Retransmission t t0-X t0 t0+X t +X+2t t0+X+2tprop +B 0+2tprop t0 X Vulnerable Time-out Backoff period: B Retransmission period if necessary
  • 27. Vulnerable period: t0-X to t0+X, if any other frames are transmitted during the period, the collision will occur. Therefore the probability of a successful transmission is the probability that there is no additional transmissions in the vulnerable period. Therefore, if a station generates only one frame in this vulnerable time (and no other stations generate a frame during this time), the frame will reach its destination successfully.  Max channel utilization is 18% - very bad
  • 28. Slotted ALOHA  Slotted ALOHA was invented to improve the efficiency of pure ALOHA.  Here, we divide the time into slots and force the station to send only at the beginning of the time slot  If a station misses this moment, it must wait until the beginning of the next time slot.  There is still the possibility of collision if two stations try to send at the beginning of the same time slot
  • 29.
  • 30. First transmission Retransmission t t0 -X t0 t0+X+2tprop t0+X t0+X+2tprop +B Time-out Backoff period: B Retransmission if necessary Vulnerable period: t0-X to t0 , i.e., X seconds long  Max channel utilization is 37%,doubles Normal ALOHA, but still low
  • 31. Carrier Sense Multiple Access(CSMA)  A station wishing to transmit first listens to the medium if another transmission is in progress (carrier sense).  If the medium is in use, station waits  if the medium is idle, station may transmit  Collision probability depends on the propagation delay  Longer propagation delay, worse the utilization  Collisions can occur only when more than one user begins transmitting within the period of propagation delay.  The vulnerable time for CSMA is the propagation time .  If collision occurs  Wait random time and retransmit
  • 32.  Suppose tprop is propagation delay from one extreme end to the other extreme end of the medium. When transmission is going on, a station Station A begins g g , can listen to the medium and detect it. Vulnerable period = tprop A g transmission at t=0 sense sense Station A captures channel A at t=tprop CSMA random access scheme sense sense  After tprop, A’s transmission will arrive the other end; every station will hear it and refrain from the transmission, so A captures the medium and can finish its transmission.
  • 33.  Following are some versions of CSMA protocol Based on how to do when medium is busy • 1-Persistent CSMA • Non-Persistent CSMA • p-Persistent CSMA
  • 34.  1-persistent CSMA  if the medium is idle, transmit.  if the medium is busy, continue to listen until the channel is sensed idle; then transmit immediately.  If more than one station are Sense carrier yes Busy? sensing, then they will begin transmission the same time when no Send the frame h lb idl lli i channel becomes idle, so collision. At this time, each station wait for a random time and then re-senses with probability 1 time, re the channel again.  Problem with 1-persistent CSMA is “high collision rate”.
  • 35.  Nonpersistent  If the channel is busy the station does not continually check it for detecting the end of ongoing transmission. It waits for a random time then checks the channel. If the channel is idle, sends the frame. Sense carrier Wait random time… yes Busy? no Send the frame
  • 36.  p-persistent CSMA  if medium is idle, station transmits with a probability p. otherwise it defers to the next slot with probability 1-p. the process repeat until either the frame has been transmitted or another station has begun transmission. Sense carrier Busy? yes no Send the frame with p probability p yp
  • 37. Behaviour of three persistence methods
  • 38. CSMA/CD (CSMA with Collision Detection)  Drawback of CSMA: when two frames collide, the medium remains unusable for the duration of transmission of both damaged frames.  CSMA/CD:  1. if the medium is idle, transmit; otherwise, go to step 2.  2. if the medium is busy, continue to listen until the channel is idle, then transmit.  3. if a collision is detected during transmission, transmit a brief jamming signal  4. after transmitting a jamming signal, wait a random amount of time, then attempt to transmit.
  • 39.
  • 40. CSMA/CD efficiency  tprop = max prop between 2 nodes in LAN  ttrans = time to transmit max-size frame  Efficiency = 1/(1+5 * tprop / ttrans)  For 10 Mbit Ethernet, tprop = 51.2 us, ttrans = 1.2 ms  Efficiency is 82.6%!  Much better than ALOHA,  simple, and cheap  Efficiency goes to 1 as tprop goes to 0  Goes to 1 as ttrans goes to infinity
  • 41. Exponential Back off Algorithm  used by a transmitting station to determine how long to wait following a collision before attempting to retransmit the frame  Each station generate a random number that falls within a specified range of values. which determines the length of time it must wait before testing the carrier. The range of values increases exponentially after each failed retransmission.  After c collisions, the range is between 0 and 2c – 1,It then waits that number of slot times before attempting retransmission.  If repeated collisions occur, the range continues to expand ,until after 10 attempts when it reaches 1023. After that the range of values stays fixed .If a station is unsuccessful in transmitting after 16 attempts, then gives up if cannot transmit  low delay with small amount of waiting stations  large delay with large amount of waiting stations
  • 42. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)  In CSMA/CA once the channel is clear, it again waits for an additional time period before performing the transmission.  Before sending a frame, source senses the medium  Backoff until the channel is idle.  After the channel is found idle, the station waits for a period of time called the Distributed Inter Frame Space (DIFS); then the station sends a control frame called Request To Send (RTS).  After receiving RTS, the destination waits for a period called Short Inter Frame Space (SIFS), the destination station sends a control frame, called Clear To Send (CTS) to source. This control frame indicates that the destination station is ready to receive data.  Source sends data after waiting for SIFS  Destination sends ACK after waiting for SIFS.
  • 43.
  • 44.  RTS frame indicates the duration of time that the source needs to occupy the channel.  Stations that are affected by this transmission create a timer called a Network Allocation Vector (NAV) that shows how much time must pass before these stations are allowed to check the channel for idleness.
  • 45. CONTROLLED ACCESS  In controlled access, the stations consult one another to find which station has the right to send  A station cannot send unless it has been authorized by other stations.  Three popular control access methods are:  Polling  Reservation  Token Passing
  • 46. Polling  Stations take turns accessing the medium  Two models: Centralized and distributed polling  Centralized polling  One device is assigned as primary station and the others as secondary stations  All data exchanges are done through the primary.  If the primary wants to receive data, it asks the secondary's if they have anything to send; this is called poll function.  If the primary wants to send data, it tells the secondary to get ready to receive; this is called select function  Polling can be done in order (Round-Robin) or based on predetermined order
  • 47. Primary is sending to Secondary Secondary is sending to Primary  ACK is the acknowledgment of the secondary's ready status.  Secondary responds either with a NAK frame if it has nothing to send or with data (in the form of a data frame) if it does
  • 48.  Distributed polling No primary and secondary Stations have a known polling order list which is made based on some protocol. station with the highest priority will have the access right first, then it passes the access right to the next station (it will send a pulling message to the next station in the pulling list), which will passes the access right to the following next station,…
  • 49. Reservation  A station needs to make a reservation before sending data.  Transmissions are organized into variable length cycles.  Each cycle begins with a reservation interval that consists of (N) minislots. One minislot for each of the N stations.  When a station needs to send a data frame, it makes a reservation in its own minislot.  By listening to the reservation interval, every station knows which stations will transfer frames, and in which order.  The stations that made reservations can send their data frames after the reservation frame.
  • 50. Token Passing  Here the stations in a network are organized in a logical ring.  In this method, a special packet called a token circulates through the ring.  token gives the station the right to access the channel and send its data  When a station receives the token and has no data to send, it just passes the data to the next station. token
  • 51.
  • 53. Ethernet  Ethernet is a dominant physical and data link layer technology for local area networks (LANs).  It is a bus based broadcast network using co-axial cable operating at 10 or 100 Mbps.  It uses a control method called Carrier Sense Multiple Access/Collision Detection (CSMA/CD) to transmit data Ethernet Evolution Standard Ethernet Fast Ethernet Gigabit Ethernet Ten-Gigabit Ethernet 100-Gigabit Ethernet (10 Mbps) (100 Mbps)
  • 54. IEEE 802.3 MAC Frame
  • 55.  Preamble: Alternating 0s and 1s; used for synchronizing; 7bytes (56 bits).  Start Frame Delimiter (SFD): 10101011 indicates the start of the frame. Last two bits alerts that the next field is destination address.  Destination Address (DA): 6 bytes (48 bits) physical address of destination station(s)  Source Address (SA): 6 bytes (48 bits) physical address of sender  Length/Type: if less than 1500, it indicates the length of data field. If greater than 1536, it indicates the type of PDU.  Data: 46 to 1500 bytes;  CRC: CRC-32 for error detection
  • 56. Addressing  Each station on an Ethernet network has its own network interface card( NIC) fits inside and provides a 6-byte physical address Eg:06:01:02:01:2C:4B. First three bytes from left specify the vendor. (Cisco 00-00-0C, 3Com 02-60-8C) and the last 24 bit should be created uniquely by the company
  • 57. A source address is always a unicast address where as destination address can be unicast, multicast, or broadcast. Unicast: defines one recipient ,second digit from left is even  Multicast: defines a group of recipients ,Second digit from left is odd  Broadcast : defines a group of all stations in the same LAN ,All ones The transmission is left-to-right, byte by byte; however, for each byte, the least significant bit is sent first and the most significant bit is sent last.
  • 58. Physical Layer Implementation  The Standard Ethernet defines several physical layer implementations; four of the most common, are
  • 59. Physical Layer Signaling  Uses Manchester encoding.  At the sender, data are converted to a digital signal using the Manchester scheme; at the receiver, the received signal is interpreted as Manchester and decoded into data.  Helps synchronize sender and recvr.
  • 60. 10Base5: Thick Ethernet  use a bus topology with an external transceiver (transmitter/receiver) connected via a tap to a thick coaxial cable.  10-Mbps transmission speed and 5 represents 500 meters maximum cable segment length.  The transceiver is responsible for transmitting, receiving, and detecting collisions
  • 61. 10Base2: Thin Ethernet  uses a bus topology, but the cable is much thinner and more flexible.  The transceiver is normally part of the network interface card (NIC), which is installed inside the station.  can transmit 10 Mbps digital signals over coaxial cable.  more cost effective than 10Base5 because thin coaxial cable is less expensive than thick coaxial.  The length of each segment cannot exceed 185 m (close to 200 m).
  • 62. 10Base-T: Twisted-Pair Ethernet  Uses a physical star topology.  The stations are connected to a hub via two unshielded twisted pair cables; One for transmitting data, and the other for receiving data  Maximum length of the cable segment can be 100 meters.
  • 63. 10Base-F: Fiber Ethernet  Although there are several types of optical fiber l0-Mbps Ethernet, the most common is called 10Base-F.  It uses a star topology to connect stations to a hub.  The stations are connected to the hub using two fiber-optic cables.
  • 64. Bridged Ethernet  LAN can be divided using bridges. Bridges have two effects on an Ethernet LAN: • They raise the bandwidth • They separate collision domains  Raising the Bandwidth  each network is independent.  Suppose there are 12 stations. And bandwidth is 10 Mbps.  If we divide the network into 2 networks using bridge, each network has a capacity of 10 Mbps.  The 10 Mbps capacity is shared between 7 stations, 6+1(bridge acts as a station in each segment), not 12 stations.
  • 65. A network with and without a bridge
  • 66.  Separating collision domains:  Collisions domains become much smaller and possibility of collision is reduced.  With bridging, lesser number of channels compete for access to the medium.
  • 67. Switched Ethernet cards,  The heart of the system is a switch containing room for typically 4 to 32 plug-in cards each containing one to eight connectors that allows faster handling of packets.  When a station wants to transmit a frame, it outputs a frame to switch.  Half duplex
  • 68.  All ports on the same card are wired together to form a local on-card LAN.  Collisions on this on-card LAN are detected and handled using CSMA/CD protocol.  One transmission per card is possible at any instant. All the cards can transmit in parallel.  With this design each card forms its own collision domain.
  • 69. Full-duplex switched Ethernet Each station is connected to the switch through two links: one to transmit and one to receive. increases the capacity of each domain from 10 to 20 Mbps. no chances of collision, so CSMA/CD is not used
  • 70. Fast Ethernet  IEEE 802.3 u.  same frame format, media access, and collision detection rules as 10 Mbps Ethernet  data transfer rate of 100 Mb/s .  compatible with Standard Ethernet.
  • 71. MAC Sub Layer  The only two changes made in the MAC layer are the data rate and the collision domain  A new feature added called Auto negotiation;allows two devices to negotiate the mode or data rate of operation.  For example, a device with a maximum capacity of 10 Mbps can communicate with a device with a 100 Mbps capacity.
  • 72. Physical Layer  Implementation
  • 74. Gigabit Ethernet  IEEE 802.3z.  All config rations of gigabit Ethernet are point to point configurations point.  Point-to-point, between two computers or one computer – to –switch.  Compatible with 100BASE-T and 10BASE-T MAC Sublayer
  • 75.  It supports two different modes of medium access : full duplex mode and half duplex mode.  Half duplex is used when computers are connected by a hub. Collision in hub is possible and so CSMA/CD is required.  Full duplex is used when computers are connected by a switch. No collision is there and so CSMA/CD is not used.
  • 76.  Carrier Extension tells the hardware to add its own padding bits after the normal frame to extend the frame to 512 bytes. RRRRRRRRRRRRR Carrier Extension Frame 512 bytes  Frame Bursting allows a sender to transmit a concatenated sequence of multiple frames in a single transmission. If the total burst is less than 512 bytes, the hardware pads it again. Frame Extension Frame Frame Frame 512 bytes Frame burst
  • 77. Physical Layer  Topology.
  • 78.
  • 80. Connecting Devices Networking Devices Internetworking Devices Repeaters Bridges Routers Gateways
  • 82. Repeaters  A repeater (or regenerator) is an electronic device that operates on only the physical layer of the OSI model.  A repeater installed on a link receives the signal before it becomes too weak or corrupted, regenerates the original pattern, and puts the refreshed copy back on the link.
  • 83.  A repeater does not actually connect two LANS; it connects two segments of the same LAN.  A repeater forwards every frame; it has no filtering capability Function of repeater
  • 84. Hubs Passive Hubs  A passive hub is just a connector which connects the wires coming from different branches Active Hub  A Hub is a multiport repeater. used to create connections between stations in a physical star topology.  Connection to the hub consists of two pairs of twisted pair wire one for transmission and the other for receiving.  it copy the received frame onto all other links
  • 85.
  • 86. Bridges  Bridges operate in both the physical and the data link layers of the OSI model.  Bridges can divide a large network into smaller segments.  When a frame (or packet) enters a bridge, the bridge not only regenerates the signal but checks the destination address and forwards the new copy only to the segment the address belong.  This is done by a bridge table (forwarding table) that contains entries for the nodes on the LAN  The bridge table is initially empty and filled automatically by learning from frames movements in the network  A bridge runs CSMA/CD before sending a frame onto the channel
  • 87.
  • 88. Types of Bridges 1. Simple Bridge 2. Multiport Bridge 3. Transparent Bridge Simple Bridge  The address table must be entered manually  Whenever a new station is added or removed, the table must modified.  Installation and maintenance of simple bridges are time-consuming and potentially more. Multiport bridges  Amultiport bridge can be used to connect more than two LANs.
  • 89. Transparent Bridges  A transparent, or learning, bridge builds its table of station addresses on its own as it performs its bridge functions.  the stations are completely unaware of the bridge’s existence.  A transparent bridge must meet three criteria: 1. Frames must be forwarded from one station to another. 2. The forwarding table is automatically made by learning frame movements in the network. 3. Loops in the system must be prevented.
  • 91. Loop Problem  multiple paths of bridges and local- local-area networks (LANs) exist between any two LANs in the internetwork.  Having more than one transparent bridge between a pair of LAN segments can create loops in the system.  Bridging Loops Can Result in Inaccurate Forwarding and Learning in Transparent Bridging Environments .
  • 92. Step 1. Station-A sends a frame to Station-B. Both the bridges forward the frame to LAN Y and update the table with the source address of A. Step 2. Now there are two copies of the frame on LAN-Y. The copy sent by Bridge-a is received by Bridge-b and vice versa. As both the bridges have no information about Station B, both will forward the frames to LAN-X. Step 3. Again both the bridges will forward the frames to LAN-Y because of the lack of information of the Station B in their database and again Step-2 will be repeated, and so on. So, the frame will continue to loop around the two LANs indefinitely.  Looping problem Is avoided by using Blocking ports (no frame is send out of these ports).
  • 93. Spanning Tree Algorithm  IEEE 802.1d  In graph theory, a spanning tree is a graph in which there is no loop  In a bridged LAN, this means creating a topology in which each LAN can be reached from any other LAN through one path only  A LAN can be depicted as a graph, whose nodes are bridges and LAN segments (or cables), and whose edges are the interfaces connecting the bridges to the LAN segments
  • 94. STEPS  Every bridge has a built-in ID and the bridge with smallest ID is selected as the root bridge  The algorithm tries to find the shortest path (a path with the shortest cost) from the root bridge to every other bridge or LAN  The combination of the shortest paths creates the shortest tree  Based on the spanning tree, we mark the forwarding ports and blocking ports
  • 95. The forwarding ports are shown as solid lines, whereas the blocked ports are shown as dotted lines. Spanning tree of a network of bridges
  • 96. Two-Layer Switches  Two-layer switch performs at the physical and data link layers.  is a bridge, with many ports and allows better (faster) performance.  A bridge with many ports may be able to allocate a unique port to each station, with each station on its own independent entity.  It makes a filtering decision based on the MAC address of the frame it received.  It can have a buffer to hold the frames for processing.  More than one station transmitting at a time.  It can have a switching factor that forwards the frames faster.
  • 97. Types Store-and-forward switch • Accepts frame on input line • Buffers it briefly, • Then routes it to appropriate output line • Delay between sender and receiver Cut-through switch • Takes advantage of destination address appearing at beginning of frame • Switch begins repeating frame onto output line as soon as it recognizes destination address
  • 98. Routers  Capable of connecting networks of different types  Routers separate networks into different broadcast domains.  They use the “logical address” of packets and routing tables to determine the best path for data delivery.  RIP(Routing Information Protocol) 98
  • 99. Back Bone Networks  A backbone network allows several LANs to be connected.  In a backbone network, no station is directly connected to the backbone; the stations are part of a LAN, and the backbone connects the LANs.  The backbone is itself a LAN that uses a LAN protocol such as Ethernet and each connection to the backbone is itself another LAN.  The two most common architectures are the bus backbone and the star backbone.
  • 100. Bus Backbone  In a bus backbone, the topology of the backbone is a bus.  Bus backbones are normally used as a distribution backbone to connect different buildings in an organization.
  • 101. Star Backbone  the topology of the backbone is a star; the backbone is just a switch.  mostly used as a distribution backbone inside a building.
  • 102. Connecting Remote LANs  Consider a situation where 2 LANS are located at some distance.  It is possible to connect these LANS by taking a full duplex leased connection from telephone network operator.  Use 2 bridges, one at each end of leased connection  These bridges are called remote bridges  Useful when a company has several offices with LANs and needs to connect them.  These bridges have ports that have data rate and signal levels compatible to telephone network standard.  The bridges establish a data link connection through the leased circuit and then carry out bridge operation