SlideShare una empresa de Scribd logo
1 de 6
The history of how Ethernet handles
collisions and collision domains dates
back to research at the University of
Hawaii in 1970. In its attempts to
develop a wireless communication
system for the islands of Hawaii,
university researchers developed a
protocol called Aloha. The Ethernet
protocol is actually based on the Aloha
protocol.
Segmentation
 One important skill for a networking professional is the ability to recognize collision
    domains. Connecting several computers to a single shared-access medium that has
    no other networking devices attached creates a collision domain. This situation limits
    the number of computers that can use the medium, also called a segment. Layer 1
    devices extend but do not control collision domains.
   Layer 2 devices segment or divide collision domains. Controlling frame propagation
    using the MAC address assigned to every Ethernet device performs this function.
    Layer 2 devices, bridges, and switches, keep track of the MAC addresses and which
    segment they are on. By doing this these devices can control the flow of traffic at the
    Layer 2 level. This function makes networks more efficient by allowing data to be
    transmitted on different segments of the LAN at the same time without the frames
    colliding. By using bridges and switches, the collision domain is effectively broken
    up into smaller parts, each becoming its own collision domain.
   These smaller collision domains will have fewer hosts and less traffic than the
    original domain. The fewer hosts that exist in a collision domain, the more likely the
    media will be available. As long as the traffic between bridged segments is not too
    heavy a bridged network works well. Otherwise, the Layer 2 device can actually slow
    down communication and become a bottleneck itself.
   Layer 3 devices, like Layer 2 devices, do not forward collisions. Because of this, the
    use of Layer 3 devices in a network has the effect of breaking up collision domains
    into smaller domains.
   Layer 3 devices perform more functions than just breaking up a collision domain.
    Layer 3 devices and their functions will be covered in more depth in the section on
    broadcast domains.
Layer 2 broadcasts
                     To communicate with all
                     collision domains, protocols
                     use broadcast and multicast
                     frames at Layer 2 of the OSI
                     model. When a node needs
                     to communicate with all
                     hosts on the network, it sends
                     a broadcast frame with a
                     destination MAC address
                     0xFFFFFFFFFFFF. This is an
                     address to which the network
                     interface card (NIC) of every
                     host must respond.
Layer 2 Broadcast
   Layer 2 devices must flood all broadcast and multicast traffic. The accumulation of broadcast and
    multicast traffic from each device in the network is referred to as broadcast radiation. In some cases,
    the circulation of broadcast radiation can saturate the network so that there is no bandwidth left for
    application data. In this case, new network connections cannot be established, and existing
    connections may be dropped, a situation known as a broadcast storm. The probability of broadcast
    storms increases as the switched network grows.
   Because the NIC must interrupt the CPU to process each broadcast or multicast group it belongs to,
    broadcast radiation affects the performance of hosts in the network. Figure shows the results of tests
    that Cisco conducted on the effect of broadcast radiation on the CPU performance of a Sun
    SPARCstation 2 with a standard built-in Ethernet card. As indicated by the results shown, an IP
    workstation can be effectively shut down by broadcasts flooding the network. Although extreme,
    broadcast peaks of thousands of broadcasts per second have been observed during broadcast storms.
    Testing in a controlled environment with a range of broadcasts and multicasts on the network shows
    measurable system degradation with as few as 100 broadcasts or multicasts per second.
   Most often, the host does not benefit from processing the broadcast, as it is not the destination being
    sought. The host does not care about the service that is being advertised, or it already knows about
    the service. High levels of broadcast radiation can noticeably degrade host performance. The three
    sources of broadcasts and multicasts in IP networks are workstations, routers, and multicast
    applications.
Broadcast domains   A broadcast domain is a grouping of collision
                    domains that are connected by Layer 2
                    devices. Breaking up a LAN into multiple
                    collision domains increases the opportunity for
                    each host in the network to gain access to the
                    media. This effectively reduces the chance of
                    collisions and increases available bandwidth
                    for every host. But broadcasts are forwarded by
                    Layer 2 devices and if excessive, can reduce the
                    efficiency of the entire LAN. Broadcasts have to
                    be controlled at Layer 3, as Layer 2 and Layer 1
                    devices have no way of controlling them. The
                    total size of a broadcast domain can be
                    identified by looking at all of the collision
                    domains that the same broadcast frame is
                    processed by. In other words, all the nodes that
                    are a part of that network segment bounded by
                    a layer three device. Broadcast domains are
                    controlled at Layer 3 because routers do not
                    forward broadcasts. Routers actually work at
                    Layers 1, 2, and 3. They, like all Layer 1 devices,
                    have a physical connection to, and transmit
                    data onto, the media. They have a Layer 2
                    encapsulation on all interfaces and perform
                    just like any other Layer 2 device. It is Layer 3
                    that allows the router to segment broadcast
                    domains.
Broadcast domains
 In order for a packet to be forwarded through a router
 it must have already been processed by a Layer 2
 device and the frame information stripped off. Layer 3
 forwarding is based on the destination IP address and
 not the MAC address. For a packet to be forwarded it
 must contain an IP address that is outside of the range
 of addresses assigned to the LAN and the router must
 have a destination to send the specific packet to in its
 routing table.

Más contenido relacionado

La actualidad más candente

Wired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link LayerWired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link Layer
Taimoor Muzaffar Gondal
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
Chandra Meena
 
Networking Related
Networking RelatedNetworking Related
Networking Related
ZunAib Ali
 

La actualidad más candente (20)

20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
19 24 cn practicals
19 24 cn practicals19 24 cn practicals
19 24 cn practicals
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
Wired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link LayerWired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link Layer
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systems
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Circuit Switching
Circuit SwitchingCircuit Switching
Circuit Switching
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
Network devices
Network devicesNetwork devices
Network devices
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
10 circuit-packet
10 circuit-packet10 circuit-packet
10 circuit-packet
 
Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switching
 

Destacado

My Training Report
My Training ReportMy Training Report
My Training Report
Omar Awada
 

Destacado (12)

Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
 
Tomorrow will be better than today...
Tomorrow will be better than today...Tomorrow will be better than today...
Tomorrow will be better than today...
 
Top 10 it security architect interview questions and answers
Top 10 it security architect interview questions and answersTop 10 it security architect interview questions and answers
Top 10 it security architect interview questions and answers
 
Mobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn'tMobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn't
 
PACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network SegmentationPACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network Segmentation
 
Pci dss v2
Pci dss v2Pci dss v2
Pci dss v2
 
My Training Report
My Training ReportMy Training Report
My Training Report
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
In Search of Segmentation
In Search of SegmentationIn Search of Segmentation
In Search of Segmentation
 
Segmentation / Targeting / Positioning
Segmentation / Targeting / PositioningSegmentation / Targeting / Positioning
Segmentation / Targeting / Positioning
 
Segmentation, Targeting, and Positioning
Segmentation, Targeting, and PositioningSegmentation, Targeting, and Positioning
Segmentation, Targeting, and Positioning
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 

Similar a Networking Technologies : Segmentation

Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
abdnazar2003
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networks
Phu Nguyen
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
kuramartin
 

Similar a Networking Technologies : Segmentation (20)

Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
 
Networking Technologies : Introduction to data flow
Networking Technologies : Introduction to data flowNetworking Technologies : Introduction to data flow
Networking Technologies : Introduction to data flow
 
5 Lan
5 Lan5 Lan
5 Lan
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
 
A computer network
A computer networkA computer network
A computer network
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networks
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
Networkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukarNetworkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukar
 
Networking
NetworkingNetworking
Networking
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Data Communication Class Note
Data Communication Class NoteData Communication Class Note
Data Communication Class Note
 
Networks
Networks   Networks
Networks
 
Networking devices
Networking  devices Networking  devices
Networking devices
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Networking Technologies : Segmentation

  • 1. The history of how Ethernet handles collisions and collision domains dates back to research at the University of Hawaii in 1970. In its attempts to develop a wireless communication system for the islands of Hawaii, university researchers developed a protocol called Aloha. The Ethernet protocol is actually based on the Aloha protocol.
  • 2. Segmentation  One important skill for a networking professional is the ability to recognize collision domains. Connecting several computers to a single shared-access medium that has no other networking devices attached creates a collision domain. This situation limits the number of computers that can use the medium, also called a segment. Layer 1 devices extend but do not control collision domains.  Layer 2 devices segment or divide collision domains. Controlling frame propagation using the MAC address assigned to every Ethernet device performs this function. Layer 2 devices, bridges, and switches, keep track of the MAC addresses and which segment they are on. By doing this these devices can control the flow of traffic at the Layer 2 level. This function makes networks more efficient by allowing data to be transmitted on different segments of the LAN at the same time without the frames colliding. By using bridges and switches, the collision domain is effectively broken up into smaller parts, each becoming its own collision domain.  These smaller collision domains will have fewer hosts and less traffic than the original domain. The fewer hosts that exist in a collision domain, the more likely the media will be available. As long as the traffic between bridged segments is not too heavy a bridged network works well. Otherwise, the Layer 2 device can actually slow down communication and become a bottleneck itself.  Layer 3 devices, like Layer 2 devices, do not forward collisions. Because of this, the use of Layer 3 devices in a network has the effect of breaking up collision domains into smaller domains.  Layer 3 devices perform more functions than just breaking up a collision domain. Layer 3 devices and their functions will be covered in more depth in the section on broadcast domains.
  • 3. Layer 2 broadcasts To communicate with all collision domains, protocols use broadcast and multicast frames at Layer 2 of the OSI model. When a node needs to communicate with all hosts on the network, it sends a broadcast frame with a destination MAC address 0xFFFFFFFFFFFF. This is an address to which the network interface card (NIC) of every host must respond.
  • 4. Layer 2 Broadcast  Layer 2 devices must flood all broadcast and multicast traffic. The accumulation of broadcast and multicast traffic from each device in the network is referred to as broadcast radiation. In some cases, the circulation of broadcast radiation can saturate the network so that there is no bandwidth left for application data. In this case, new network connections cannot be established, and existing connections may be dropped, a situation known as a broadcast storm. The probability of broadcast storms increases as the switched network grows.  Because the NIC must interrupt the CPU to process each broadcast or multicast group it belongs to, broadcast radiation affects the performance of hosts in the network. Figure shows the results of tests that Cisco conducted on the effect of broadcast radiation on the CPU performance of a Sun SPARCstation 2 with a standard built-in Ethernet card. As indicated by the results shown, an IP workstation can be effectively shut down by broadcasts flooding the network. Although extreme, broadcast peaks of thousands of broadcasts per second have been observed during broadcast storms. Testing in a controlled environment with a range of broadcasts and multicasts on the network shows measurable system degradation with as few as 100 broadcasts or multicasts per second.  Most often, the host does not benefit from processing the broadcast, as it is not the destination being sought. The host does not care about the service that is being advertised, or it already knows about the service. High levels of broadcast radiation can noticeably degrade host performance. The three sources of broadcasts and multicasts in IP networks are workstations, routers, and multicast applications.
  • 5. Broadcast domains A broadcast domain is a grouping of collision domains that are connected by Layer 2 devices. Breaking up a LAN into multiple collision domains increases the opportunity for each host in the network to gain access to the media. This effectively reduces the chance of collisions and increases available bandwidth for every host. But broadcasts are forwarded by Layer 2 devices and if excessive, can reduce the efficiency of the entire LAN. Broadcasts have to be controlled at Layer 3, as Layer 2 and Layer 1 devices have no way of controlling them. The total size of a broadcast domain can be identified by looking at all of the collision domains that the same broadcast frame is processed by. In other words, all the nodes that are a part of that network segment bounded by a layer three device. Broadcast domains are controlled at Layer 3 because routers do not forward broadcasts. Routers actually work at Layers 1, 2, and 3. They, like all Layer 1 devices, have a physical connection to, and transmit data onto, the media. They have a Layer 2 encapsulation on all interfaces and perform just like any other Layer 2 device. It is Layer 3 that allows the router to segment broadcast domains.
  • 6. Broadcast domains  In order for a packet to be forwarded through a router it must have already been processed by a Layer 2 device and the frame information stripped off. Layer 3 forwarding is based on the destination IP address and not the MAC address. For a packet to be forwarded it must contain an IP address that is outside of the range of addresses assigned to the LAN and the router must have a destination to send the specific packet to in its routing table.