SlideShare a Scribd company logo
Chapter 15 Connecting LANs,  Backbone Networks,  and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
15-1  CONNECTING DEVICES In this section, we divide connecting devices into five different categories based on the layer in which they operate in a network. Passive Hubs Active Hubs Bridges Two-Layer Switches Routers Three-Layer Switches Gateways Topics discussed in this section:
Figure 15.1  Five categories of connecting devices
Figure 15.2  A repeater connecting two segments of a LAN
A repeater connects segments of a LAN. Note
A repeater forwards every frame;  it has no filtering capability. Note
A repeater is a regenerator,  not an amplifier. Note
Figure 15.3  Function of a repeater
Figure 15.4  A hierarchy of hubs
A bridge has a table used in  filtering decisions. Note
Figure 15.5  A bridge connecting two LANs
A bridge does not change the physical (MAC) addresses in a frame. Note
Figure 15.6  A learning bridge and the process of learning
Figure 15.7  Loop problem in a learning bridge
Figure 15.8  A system of connected LANs and its graph representation
Figure 15.9  Finding the shortest paths and the spanning    tree in a system of bridges
Figure 15.10  Forwarding and blocking ports after using spanning    tree algorithm
Figure 15.11  Routers connecting independent LANs and WANs
15-2  BACKBONE NETWORKS A backbone network allows several LANs to be connected. In a backbone network, no station is directly connected to the backbone; the stations are part of a LAN, and the backbone connects the LANs.  Bus Backbone Star Backbone Connecting Remote LANs Topics discussed in this section:
In a bus backbone, the topology  of the backbone is a bus. Note
Figure 15.12  Bus backbone
In a star backbone, the topology of the backbone is a star; the backbone is just one switch. Note
Figure 15.13  Star backbone
Figure 15.14  Connecting remote LANs with bridges
A point-to-point link acts as a LAN in a remote backbone connected by  remote bridges. Note
15-3  VIRTUAL LANs We can roughly define a  virtual local area network  (VLAN) as a local area network configured by software, not by physical wiring. Membership Configuration Communication between Switches IEEE Standard Advantages Topics discussed in this section:
Figure 15.15  A switch connecting three LANs
Figure 15.16  A switch using VLAN software
Figure 15.17  Two switches in a backbone using VLAN software
VLANs create broadcast domains. Note

More Related Content

What's hot

Aloha
AlohaAloha
Aloha
mangal das
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
kavish dani
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
balasubramani p
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
Peter R. Egli
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
Faisal Mehmood
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layer
PREMAL GAJJAR
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Faisal Mehmood
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
sonangrai
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
Faisal Mehmood
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
Respa Peter
 
Chapter 25
Chapter 25Chapter 25
Chapter 25
Faisal Mehmood
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
Faisal Mehmood
 
Physical Layer Numericals - Data Communication & Networking
Physical Layer  Numericals - Data Communication & NetworkingPhysical Layer  Numericals - Data Communication & Networking
Physical Layer Numericals - Data Communication & Networking
Drishti Bhalla
 
Submarine line termination equipment (SLTE) for open cables
Submarine line termination equipment (SLTE) for open cablesSubmarine line termination equipment (SLTE) for open cables
Submarine line termination equipment (SLTE) for open cables
ADVA
 
Ieee 1588 ptp
Ieee 1588 ptpIeee 1588 ptp
Ieee 1588 ptp
Tasuka Hsu
 

What's hot (20)

Aloha
AlohaAloha
Aloha
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
Ch12
Ch12Ch12
Ch12
 
Ch19
Ch19Ch19
Ch19
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Ch24
Ch24Ch24
Ch24
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layer
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Chapter 25
Chapter 25Chapter 25
Chapter 25
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Physical Layer Numericals - Data Communication & Networking
Physical Layer  Numericals - Data Communication & NetworkingPhysical Layer  Numericals - Data Communication & Networking
Physical Layer Numericals - Data Communication & Networking
 
Submarine line termination equipment (SLTE) for open cables
Submarine line termination equipment (SLTE) for open cablesSubmarine line termination equipment (SLTE) for open cables
Submarine line termination equipment (SLTE) for open cables
 
Ieee 1588 ptp
Ieee 1588 ptpIeee 1588 ptp
Ieee 1588 ptp
 

Viewers also liked

Data transmission
Data transmissionData transmission
Analog transmission
Analog transmissionAnalog transmission
Analog transmission
Engr Ginna
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
Md Abdus Sobur Sikdar
 
2[1].1 data transmission
2[1].1 data transmission2[1].1 data transmission
2[1].1 data transmissionHattori Sidek
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
Shiraz316
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
bjp4642
 
Digital & analog transmission
Digital & analog transmissionDigital & analog transmission
Digital & analog transmission
Jeffery Vava
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferWayne Jones Jnr
 
Data communications
Data communicationsData communications
Data communicationsUMaine
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
Mukesh Tekwani
 
Digital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shapingDigital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shaping
Aayush Kumar
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
Zafar Ayub
 

Viewers also liked (20)

Ch09
Ch09Ch09
Ch09
 
Data transmission
Data transmissionData transmission
Data transmission
 
Serial transmission
Serial transmissionSerial transmission
Serial transmission
 
Ch21
Ch21Ch21
Ch21
 
Ch10
Ch10Ch10
Ch10
 
Ch25
Ch25Ch25
Ch25
 
Analog transmission
Analog transmissionAnalog transmission
Analog transmission
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 
2[1].1 data transmission
2[1].1 data transmission2[1].1 data transmission
2[1].1 data transmission
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
Digital & analog transmission
Digital & analog transmissionDigital & analog transmission
Digital & analog transmission
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Data communications
Data communicationsData communications
Data communications
 
Ch31
Ch31Ch31
Ch31
 
Ch06
Ch06Ch06
Ch06
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
 
Ch18
Ch18Ch18
Ch18
 
Digital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shapingDigital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shaping
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 

Similar to Ch15

Ch15
Ch15Ch15
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
Ahmar Hashmi
 
connecting devices.ppt
connecting devices.pptconnecting devices.ppt
connecting devices.ppt
Jayaprasanna4
 
lan connecting device
lan connecting devicelan connecting device
lan connecting device
AKSHIT KOHLI
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networkskavish dani
 
CSD PRESENTATION, connecting LANs, Backbone Networks, virtual LANs.pptx
CSD PRESENTATION, connecting LANs, Backbone Networks, virtual LANs.pptxCSD PRESENTATION, connecting LANs, Backbone Networks, virtual LANs.pptx
CSD PRESENTATION, connecting LANs, Backbone Networks, virtual LANs.pptx
JahanzebSuhriani1
 
Chap 03
Chap 03Chap 03
Chap 03
IGNOU
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
MelkamtseganewTigabi1
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccnaRahul Kumar
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccnaRahul Kumar
 
connecting LANs.pptx
connecting LANs.pptxconnecting LANs.pptx
connecting LANs.pptx
Jayaprasanna4
 
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptxChapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
WillianApaza
 
High level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptxHigh level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptx
MullaiVendan8
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
abdnazar2003
 
Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010irbas
 
Ccna 3 v4.0 final-exam-17-07-2010
Ccna 3 v4.0  final-exam-17-07-2010Ccna 3 v4.0  final-exam-17-07-2010
Ccna 3 v4.0 final-exam-17-07-2010irbas
 
Ch6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wirelessCh6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wirelesskratos2424
 

Similar to Ch15 (20)

Ch15
Ch15Ch15
Ch15
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
connecting devices.ppt
connecting devices.pptconnecting devices.ppt
connecting devices.ppt
 
lan connecting device
lan connecting devicelan connecting device
lan connecting device
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
 
Ch 16
Ch 16Ch 16
Ch 16
 
CSD PRESENTATION, connecting LANs, Backbone Networks, virtual LANs.pptx
CSD PRESENTATION, connecting LANs, Backbone Networks, virtual LANs.pptxCSD PRESENTATION, connecting LANs, Backbone Networks, virtual LANs.pptx
CSD PRESENTATION, connecting LANs, Backbone Networks, virtual LANs.pptx
 
Chap 03
Chap 03Chap 03
Chap 03
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
connecting LANs.pptx
connecting LANs.pptxconnecting LANs.pptx
connecting LANs.pptx
 
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptxChapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
 
High level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptxHigh level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptx
 
3 2
3 23 2
3 2
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
 
Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010
 
Ccna 3 v4.0 final-exam-17-07-2010
Ccna 3 v4.0  final-exam-17-07-2010Ccna 3 v4.0  final-exam-17-07-2010
Ccna 3 v4.0 final-exam-17-07-2010
 
Ch6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wirelessCh6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wireless
 
Connecting devices ece 702
Connecting devices ece 702Connecting devices ece 702
Connecting devices ece 702
 

More from Wayne Jones Jnr

Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05Wayne Jones Jnr
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
Wayne Jones Jnr
 
Chapter 3 - Data and Signals
Chapter 3 - Data and SignalsChapter 3 - Data and Signals
Chapter 3 - Data and Signals
Wayne Jones Jnr
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - Introduction
Wayne Jones Jnr
 

More from Wayne Jones Jnr (18)

Ch23
Ch23Ch23
Ch23
 
Ch22
Ch22Ch22
Ch22
 
Ch20
Ch20Ch20
Ch20
 
Ch17
Ch17Ch17
Ch17
 
Ch16
Ch16Ch16
Ch16
 
Ch14
Ch14Ch14
Ch14
 
Ch13
Ch13Ch13
Ch13
 
Ch07
Ch07Ch07
Ch07
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05
 
Ch32
Ch32Ch32
Ch32
 
Chapter 30 - Cry
Chapter 30 - CryChapter 30 - Cry
Chapter 30 - Cry
 
Chapter 29 - Mutimedia
Chapter 29 - MutimediaChapter 29 - Mutimedia
Chapter 29 - Mutimedia
 
Ch28
Ch28Ch28
Ch28
 
Ch27
Ch27Ch27
Ch27
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
 
Chapter 3 - Data and Signals
Chapter 3 - Data and SignalsChapter 3 - Data and Signals
Chapter 3 - Data and Signals
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - Introduction
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

Ch15

  • 1. Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 15-1 CONNECTING DEVICES In this section, we divide connecting devices into five different categories based on the layer in which they operate in a network. Passive Hubs Active Hubs Bridges Two-Layer Switches Routers Three-Layer Switches Gateways Topics discussed in this section:
  • 3. Figure 15.1 Five categories of connecting devices
  • 4. Figure 15.2 A repeater connecting two segments of a LAN
  • 5. A repeater connects segments of a LAN. Note
  • 6. A repeater forwards every frame; it has no filtering capability. Note
  • 7. A repeater is a regenerator, not an amplifier. Note
  • 8. Figure 15.3 Function of a repeater
  • 9. Figure 15.4 A hierarchy of hubs
  • 10. A bridge has a table used in filtering decisions. Note
  • 11. Figure 15.5 A bridge connecting two LANs
  • 12. A bridge does not change the physical (MAC) addresses in a frame. Note
  • 13. Figure 15.6 A learning bridge and the process of learning
  • 14. Figure 15.7 Loop problem in a learning bridge
  • 15. Figure 15.8 A system of connected LANs and its graph representation
  • 16. Figure 15.9 Finding the shortest paths and the spanning tree in a system of bridges
  • 17. Figure 15.10 Forwarding and blocking ports after using spanning tree algorithm
  • 18. Figure 15.11 Routers connecting independent LANs and WANs
  • 19. 15-2 BACKBONE NETWORKS A backbone network allows several LANs to be connected. In a backbone network, no station is directly connected to the backbone; the stations are part of a LAN, and the backbone connects the LANs. Bus Backbone Star Backbone Connecting Remote LANs Topics discussed in this section:
  • 20. In a bus backbone, the topology of the backbone is a bus. Note
  • 21. Figure 15.12 Bus backbone
  • 22. In a star backbone, the topology of the backbone is a star; the backbone is just one switch. Note
  • 23. Figure 15.13 Star backbone
  • 24. Figure 15.14 Connecting remote LANs with bridges
  • 25. A point-to-point link acts as a LAN in a remote backbone connected by remote bridges. Note
  • 26. 15-3 VIRTUAL LANs We can roughly define a virtual local area network (VLAN) as a local area network configured by software, not by physical wiring. Membership Configuration Communication between Switches IEEE Standard Advantages Topics discussed in this section:
  • 27. Figure 15.15 A switch connecting three LANs
  • 28. Figure 15.16 A switch using VLAN software
  • 29. Figure 15.17 Two switches in a backbone using VLAN software
  • 30. VLANs create broadcast domains. Note