0% found this document useful (0 votes)
23 views41 pages

D C Chapter 16 Topic 213 To 220

Uploaded by

jan375996
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views41 pages

D C Chapter 16 Topic 213 To 220

Uploaded by

jan375996
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

Connecting Devices

• Hosts and networks do


not normally operate in
isolation

• Connecting devices
connect hosts together
to make a network or
connect networks
together to make an
internet

• Connecting devices can


operate in different
layers of the Internet
model
Connecting Devices
• Three kinds of
connecting devices:

 Hubs
 Link-layer switches
 Routers
Three Categories of Connecting Devices
Hubs
• Hub is a device that
operates only in the
physical layer
• Signals that carry
information within a
network can travel a
fixed distance before
attenuation impacts the
data
• A hub (repeater)
receives a signal and,
before it becomes too
weak or corrupted,
regenerates it
Hubs
• Hub is a device that
operates only in the
physical layer
Hub
Link-Layer Switches
• A link-layer switch (or
switch) operates in both
the physical and the
data-link layers
• As a physical-layer
device, it regenerates
the signal it receives
• As a link-layer device,
the link-layer switch can
check the MAC
addresses (source and
destination) contained
in the frame
Switch versus Hub
• Switch has the
‘Filtering’ capability
• Unlike hub, a switch
can check the
destination address of
a frame and decide on
outgoing port
• Switch eliminates
collisions and does not
require carrier sensing
• Switches connect
heterogeneous devices
Link-Layer Switch
Link-Layer Switches
• A link-layer switch (or
switch) operates in both
the physical and the
data-link layers
Learning Switch
Loop Problem in a Switch
• Redundant switches
create Loops in the
system

• Created when two or


more broadcasting LANs
are connected by more
than one switch
Loop Problem in a Learning Switch (Part a)
Loop Problem in a Learning Switch (Part b)
Loop Problem in a Learning Switch (Part c)
Loop Problem in a Learning Switch (part d)
Spanning Tree Algorithm
• In graph theory,
Spanning Tree is a graph
in which there is no loop
• In a switched LAN, this
means creating a
topology in which each
LAN can be reached
from any other LAN
through one path only
(no loop)
• To find the spanning
tree, we assign a cost
(metric) to each LAN link
A system of Connected LANs and its Graph (Part a)
A System of Connected LANs and its Graph (Part b)
Finding Shortest Path/Spanning Tree for a Switch
Forwarding & Blocking Ports after using Spanning Tree
Routers
• We compare routers to
two-layer switch and a
hub

• A router is a three-
layer device; it
operates in the
physical, data-link, and
network layers
Router vs. Switch
Three differences between a router and a repeater or a switch:
1. A router has a physical and logical (IP) address for each of its interfaces.
2. A router acts only on those packets in which the link-layer destination
address matches the address of the interface at which the packet
arrives.
3. A router changes the link-layer address of the packet (both source and
destination) when it forwards the packet.
VIRTUAL LANS (VLAN)
• A VLAN is a LAN
configured by software,
not by physical wiring
• A station is considered
part of a LAN if it
physically belongs to
that LAN i.e. The
criterion of membership
is geographic
• Provides a virtual
connection between
two stations belonging
to two different physical
LANs
A Switch Connecting three LANs
A Switch using VLAN Software
Two Switches in a Backbone using VLAN Software
Membership of a VLAN
• What characteristic can
be used to group
stations in a VLAN?

• Vendors use different


characteristics such as
interface numbers, port
numbers, MAC
addresses, IP addresses,
IP multicast addresses,
or a combination of two
or more of these
Configuration of a VLAN
• How are the stations
grouped into different
VLANs?

• Stations are configured


in one of three ways:

 Manually
 Semi-Automatically
 Automatically
Communication between Switches
• In a multi-switched
backbone, each switch
must know:

 Which station
belongs to which
VLAN; and

 The membership
of stations
connected to other
switches
Communication between Switches

Switch A must know the membership status of stations connected to switch B,


and switch B must know the same about switch A. Three methods have been
devised for this purpose: table maintenance, frame tagging, and time-division
multiplexing.
Advantages of using VLANs
• Cost and Time
Reduction

• Creating virtual
Workgroups

• Security
Comparison of Modern Access Technologies
• Telco

• HFC

• FTTx
Comparison of Modern Access Technologies
Fiber – The Medium of the Future!
Fiber To The Curb (FTTC)
• An access network in
which fiber is used for
part, but not the entire
link from the provider to
the end-user
• An optical to electrical
(O/E) conversion takes
place somewhere near
the end-user
• The terminal network
segment of a FTTC
network is usually
twisted pair or coaxial
cable
Fiber To The Curb (FTTC)
• The final optical receiver
in a FTTC network
typically serves several
customers
Fiber To The Curb (FTTC)
Fiber To The Home (FTTH)
• Need: High-speed data,
reliable voice and high-
quality video

• Problems:
 How to get high
speed lines out to
each customer?
 How to future-proof
the architecture?

• Solution: FTTH
Fiber To The Home (FTTH)
• Fiber-to-the-home
(FTTH) is the installation
of optical fiber from a
telephone switch directly
into the subscriber’s
home

• It is one of the latest


access technologies

• FTTH is also referred to


as Fiber-to-the-Building
(FTTB)
Fiber To The Home (FTTH)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy