NC 4 Networking Devices
NC 4 Networking Devices
Devices
Chapter 3
The Networking Devices
#2
Lectur
e3
MAC Address
MAC address is 48 bits in length and expressed as twelve hexadecimal
digits.MAC addresses are sometimes referred to as burned-in addresses
(BIA) because they are burned into read-only memory (ROM) and are
copied into random-access memory (RAM) when the NIC initializes.
Repeater
A repeater is a network device used to regenerate a signal.
Repeaters regenerate analog or digital signals distorted by
transmission loss due to attenuation.Repeater is a Physical
Layer device
Hub
Hubs concentrate
connections.In other words,
they take a group of hosts
and allow the network to see
them as a single unit.
Hub is a physical layer
device.
Hubs
Physical Layer devices: essentially repeaters
Lecture 3
#8
Hubs (more)
Each connected LAN referred to as LAN segment
Hubs do not isolate collision domains: node may
collide with any node residing at any segment in
LAN
Hub Advantages:
o simple, inexpensive device
o Multi-tier provides graceful degradation: portions
of the LAN continue to operate if one hub
malfunctions
o extends maximum distance between node pairs
(100m per Hub)
Lecture 3
#9
Hub limitations
single collision domain results in no increase in
max throughput
o multi-tier throughput same as single segment
throughput
individual LAN restrictions pose limits on number
of nodes in same collision domain and on total
allowed geographical coverage
cannot connect different Ethernet types (e.g.,
10BaseT and 100baseT) Why?
Lecture 3
#10
Bridge
Bridges are Data Link layer devices.Connected host
addresses are learned and stored on a MAC address
table.Each bridge port has a unique MAC address
11
Bridges
12
Bridging Graphic
13
Bridges
Link Layer devices: operate on Ethernet
frames, examining frame header and
selectively forwarding frame based on its
destination
Bridge isolates collision domains since it
buffers frames
When frame is to be forwarded on
segment, bridge uses CSMA/CD to access
segment and transmit
Lecture 3
#14
forwarding:
o how to know on which LAN segment to forward
frame?
Lecture 3
#15
Lecture 3
#16
Bridge Filtering
Lecture 3
#17
Ethernet Switches
layer 2 (frame)
forwarding, filtering using
LAN addresses
Switching: A-to-B and Ato-B simultaneously, no
collisions
large number of
interfaces
often: individual hosts,
star-connected into
switch
o Ethernet, but no
Lecture 3collisions!
#18
Switch
Switches are Data Link
layer devices.
Each Switch port has a
unique MAC address.
Connected host MAC
addresses are learned and
stored on a MAC address
table.
19
Switching Modes
cut-through
A switch starts to transfer the frame as soon as the destination MAC
address is received. No error checking is available.
Must use synchronous switching.
store-and-forward
At the other extreme, the switch can receive the entire frame before
sending it out the destination port. This gives the switch software an
opportunity to verify the Frame Check Sum (FCS) to ensure that the frame
was reliably received before sending it to the destination.
Must be used with asynchronous switching.
fragment-free
A compromise between the cut-through and store-and-forward modes.
Fragment-free reads the first 64 bytes, which includes the frame header,
and switching begins before the entire data field and checksum are read.
20
Ethernet Switches
cut-through switching: frame forwarded
from input to output port without awaiting
for assembly of entire frame
o slight reduction in latency
combinations of shared/dedicated,
10/100/1000 Mbps interfaces
Lecture 3
#21
Full Duplex
Another capability emerges when only two nodes are connected. In a network that
uses twisted-pair cabling, one pair is used to carry the transmitted signal from one
node to the other node. A separate pair is used for the return or received signal. It is
possible for signals to pass through both pairs simultaneously. The capability of
communication in both directions at once is known as full duplex.
22
23
24
Microsegmentation
A switch is simply a bridge with many ports. When only one node is connected to a
switch port, the collision domain on the shared media contains only two nodes.
The two nodes in this small segment, or collision domain, consist of the switch port
and the host connected to it. These small physical segments are called micro
segments.
25
Peer-to-Peer Network
In a peer-to-peer network, networked computers act as equal partners, or peers.
As peers, each computer can take on the client function or the server function.
At one time, computer A may make a request for a file from computer B, which
responds by serving the file to computer A. Computer A functions as client, while B
functions as the server. At a later time, computers A and B can reverse roles.
In a peer-to-peer network, individual users control their own resources. Peer-topeer networks are relatively easy to install and operate. As networks grow, peer-topeer relationships become increasingly difficult to coordinate.
26
Client/Server Network
In a client/server arrangement, network services are located on a dedicated
computer called a server.
The server responds to the requests of clients.
The server is a central computer that is continuously available to respond to
requests from clients for file, print, application, and other services.
Most network operating systems adopt the form of a client/server relationship.
27
#28
Lectur
e3
IEEE
802.11
Wireless
LAN
wireless LANs: untethered (often mobile)
networking
IEEE 802.11 standard:
o MAC protocol
o unlicensed frequency spectrum: 900Mhz,
Basic Service Set (BSS)
2.4Ghz
(a.k.a. cell) contains:
wireless hosts
access point (AP): base
station
BSSs combined to form
distribution system (DS)
Lecture 3
#29
Ad Hoc Networks
#30
#31
IEEE
802.11
MAC
Protocol
802.11 CSMA Protocol:
others
NAV: Network
Allocation
Vector
802.11 frame has
transmission time
field
others (hearing data)
defer access for NAV
time units
Lecture 3
#32
Lecture 3
#33
#34
Lecture 3
#35
#36
#37
PPP non-requirements
no error correction/recovery
no flow control
out of order delivery OK
no need to support multipoint links
(e.g., polling)
#38
Lecture 3
#39
Lecture 3
#40
Byte Stuffing
#41
Byte Stuffing
flag byte
pattern
in data
to send
#42
#43
#44
Configuration Messages:
BPDU
Lecture 3
#45
46
Lecture 3
#48
ISO
ISO - International Organization for
Standardization
ISO researched Different network models
and the result is the OSI-model which was
released in 1984.
Nowadays most vendors build networks
based on the OSI model and hardware
from different vendors is compatible
Slinetworks
49