SlideShare a Scribd company logo
1 of 54
Chapter  3 Objectives  Upon completion you will be able to: Underlying Technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 3.1   Internet model
3.1  Local Area Networks A  local area network (LAN)  is a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic area such as a single department, a single building, or a campus. A large organization may need several connected LANs.The most popular LANs are Ethernet and wireless LANs. We briefly review these technologies in this section.  The topics discussed in this section include: Wired LANs: Ethernet  Wireless LANs: IEEE 802.11
Figure 3.2   CSMA/CD
Figure 3.3   Ethernet layers
Figure 3.4   Ethernet frame
Figure 3.5   Ethernet implementations
Figure 3.6   Fast Ethernet implementations
Figure 3.7   Gigabit Ethernet implementations
Figure 3.8   BSSs
Figure 3.9   ESS
Figure 3.10   Physical layer
Figure 3.11   FHSS
Figure 3.12   DSSS
Figure 3.13   MAC layers in IEEE 802.11 standard
Figure 3.14   CSMA/CA
Figure 3.15   Frame
Table 3.1  Addresses in IEEE 802.11
3.2  Point-to-Point WANs A second type of network we encounter in the Internet is the point-to-point wide area network. A  point-to-point WAN  connects two remote devices using a line available from a public network such as a telephone network. We discuss the physical and data link layers of these technologies here.. The topics discussed in this section include: Physical Layer Data Link Layer
Figure 3.16   56K modem
ADSL is an asymmetric communication technology designed for residential users; it is not suitable for businesses. Note:
Figure 3.17   Bandwidth division
Figure 3.18   ADSL and DSLAM
Figure 3.19   Cable bandwidth
Figure 3.20   Cable modem configurations
Table 3.2  T line rates
Table 3.3  SONET rates
Figure 3.21   PPP frame
3.3  Switched WANs The backbone networks in the Internet are usually switched WANs. A  switched WAN  is a wide area network that covers a large area (a state or a country) and provides access at several points to the users. Inside the network, there is a mesh of point-to-point networks that connects switches. The switches, multiple port connectors, allow the connection of several inputs and outputs.  The topics discussed in this section include: X.25 Frame Relay ATM
Figure 3.22   Frame Relay network
A cell network uses the cell as the basic unit of data exchange. A cell is defined as a small, fixed-size block of information. Note:
Figure 3.23   ATM multiplexing
Figure 3.24   Architecture of an ATM network
Figure 3.25   Virtual circuits
Note that a virtual connection is defined by a pair of numbers:  the  VPI  and the  VCI . Note:
Figure 3.26   An ATM cell
Figure 3.27   ATM layers
The IP protocol uses the  AAL5  sublayer. Note:
We will discuss IP over ATM in Chapter 23. Note:
3.4  Connecting Devices LANs or WANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs or WANs, we use  connecting devices . Connecting devices can operate in different layers of the Internet model. We discuss three kinds of connecting devices:  repeaters (or hubs),   bridges (or two-layer switches),  and  routers (or three-layer switches ). Repeaters and hubs operate in the first layer of the Internet model. Bridges and two-layer switches operate in the first two layers. Routers and three-layer switches operate in the first three layers The topics discussed in this section include: Repeaters Hubs Bridges Router
Figure 3.28   Connecting devices
Figure 3.29   Repeater
A repeater connects segments of a LAN. Note:
A repeater forwards every bit;  it has no filtering capability. Note:
A repeater is a regenerator, not an amplifier. Note:
Figure 3.30   Function of a repeater
A bridge has a table used in filtering decisions. Note:
Figure 3.31   Bridge
A bridge does not change the physical (MAC) addresses in a frame. Note:
Figure 3.32   Learning bridge
A router is a three-layer  (physical, data link, and network)  device . Note:
A repeater or a bridge connects segments of a LAN. A router connects independent LANs or WANs to create an internetwork (internet). Note:
Figure 3.33   Routing example
A router changes the physical addresses in a packet. Note:

More Related Content

What's hot (20)

Ch20
Ch20Ch20
Ch20
 
Chapeter 2
Chapeter 2Chapeter 2
Chapeter 2
 
Network layer,ipv4, Classful Addressing,notations, Classless addressing,class...
Network layer,ipv4, Classful Addressing,notations, Classless addressing,class...Network layer,ipv4, Classful Addressing,notations, Classless addressing,class...
Network layer,ipv4, Classful Addressing,notations, Classless addressing,class...
 
Ch2 network models
Ch2 network modelsCh2 network models
Ch2 network models
 
Day 5.5 subnetting
Day 5.5 subnettingDay 5.5 subnetting
Day 5.5 subnetting
 
Ch13
Ch13Ch13
Ch13
 
Ch32
Ch32Ch32
Ch32
 
Ch14
Ch14Ch14
Ch14
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
 
Expt no.3
Expt no.3Expt no.3
Expt no.3
 
Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)
 
Ch2
Ch2Ch2
Ch2
 
Network Layer Part 1
Network Layer Part 1Network Layer Part 1
Network Layer Part 1
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
 
Ch19
Ch19Ch19
Ch19
 
10 wired lan
10 wired lan10 wired lan
10 wired lan
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 

Viewers also liked

Chap 01
Chap 01Chap 01
Chap 01IGNOU
 
Chap 04
Chap 04Chap 04
Chap 04IGNOU
 
Chap 05
Chap 05Chap 05
Chap 05IGNOU
 
Modeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By ApModeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By ApEr. Ashish Pandey
 
Sept 2017 introduction
Sept 2017   introductionSept 2017   introduction
Sept 2017 introductionshahin raj
 
Sept 2017 static routing and packet forwarding
Sept 2017    static routing and packet forwardingSept 2017    static routing and packet forwarding
Sept 2017 static routing and packet forwardingshahin raj
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Ali Usman
 

Viewers also liked (10)

Chap 01
Chap 01Chap 01
Chap 01
 
Chap 04
Chap 04Chap 04
Chap 04
 
Chap 05
Chap 05Chap 05
Chap 05
 
Network delay
Network delayNetwork delay
Network delay
 
Modeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By ApModeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By Ap
 
Chap 14 rip, ospf
Chap 14 rip, ospfChap 14 rip, ospf
Chap 14 rip, ospf
 
Chap 17 dns
Chap 17 dnsChap 17 dns
Chap 17 dns
 
Sept 2017 introduction
Sept 2017   introductionSept 2017   introduction
Sept 2017 introduction
 
Sept 2017 static routing and packet forwarding
Sept 2017    static routing and packet forwardingSept 2017    static routing and packet forwarding
Sept 2017 static routing and packet forwarding
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
 

Similar to Chap 03

Similar to Chap 03 (20)

2. network elements
2. network elements2. network elements
2. network elements
 
Ch03
Ch03Ch03
Ch03
 
Chapter7 l1
Chapter7 l1Chapter7 l1
Chapter7 l1
 
Swiching
SwichingSwiching
Swiching
 
Ch08
Ch08Ch08
Ch08
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Data Communication and Computer Networks
Data Communication and Computer NetworksData Communication and Computer Networks
Data Communication and Computer Networks
 
lecture2829atmframerelay-180429142508 (1).pptx
lecture2829atmframerelay-180429142508 (1).pptxlecture2829atmframerelay-180429142508 (1).pptx
lecture2829atmframerelay-180429142508 (1).pptx
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Wireless LANs
Wireless LANsWireless LANs
Wireless LANs
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Experimental Analysis of Small Internetwork using OPNET 9.1
Experimental Analysis of Small Internetwork using OPNET 9.1Experimental Analysis of Small Internetwork using OPNET 9.1
Experimental Analysis of Small Internetwork using OPNET 9.1
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Assembling And Cabling Cisco Devices
Assembling And Cabling Cisco DevicesAssembling And Cabling Cisco Devices
Assembling And Cabling Cisco Devices
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Chap 03

  • 1.
  • 2. Figure 3.1 Internet model
  • 3. 3.1 Local Area Networks A local area network (LAN) is a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic area such as a single department, a single building, or a campus. A large organization may need several connected LANs.The most popular LANs are Ethernet and wireless LANs. We briefly review these technologies in this section. The topics discussed in this section include: Wired LANs: Ethernet Wireless LANs: IEEE 802.11
  • 4. Figure 3.2 CSMA/CD
  • 5. Figure 3.3 Ethernet layers
  • 6. Figure 3.4 Ethernet frame
  • 7. Figure 3.5 Ethernet implementations
  • 8. Figure 3.6 Fast Ethernet implementations
  • 9. Figure 3.7 Gigabit Ethernet implementations
  • 10. Figure 3.8 BSSs
  • 11. Figure 3.9 ESS
  • 12. Figure 3.10 Physical layer
  • 13. Figure 3.11 FHSS
  • 14. Figure 3.12 DSSS
  • 15. Figure 3.13 MAC layers in IEEE 802.11 standard
  • 16. Figure 3.14 CSMA/CA
  • 17. Figure 3.15 Frame
  • 18. Table 3.1 Addresses in IEEE 802.11
  • 19. 3.2 Point-to-Point WANs A second type of network we encounter in the Internet is the point-to-point wide area network. A point-to-point WAN connects two remote devices using a line available from a public network such as a telephone network. We discuss the physical and data link layers of these technologies here.. The topics discussed in this section include: Physical Layer Data Link Layer
  • 20. Figure 3.16 56K modem
  • 21. ADSL is an asymmetric communication technology designed for residential users; it is not suitable for businesses. Note:
  • 22. Figure 3.17 Bandwidth division
  • 23. Figure 3.18 ADSL and DSLAM
  • 24. Figure 3.19 Cable bandwidth
  • 25. Figure 3.20 Cable modem configurations
  • 26. Table 3.2 T line rates
  • 27. Table 3.3 SONET rates
  • 28. Figure 3.21 PPP frame
  • 29. 3.3 Switched WANs The backbone networks in the Internet are usually switched WANs. A switched WAN is a wide area network that covers a large area (a state or a country) and provides access at several points to the users. Inside the network, there is a mesh of point-to-point networks that connects switches. The switches, multiple port connectors, allow the connection of several inputs and outputs. The topics discussed in this section include: X.25 Frame Relay ATM
  • 30. Figure 3.22 Frame Relay network
  • 31. A cell network uses the cell as the basic unit of data exchange. A cell is defined as a small, fixed-size block of information. Note:
  • 32. Figure 3.23 ATM multiplexing
  • 33. Figure 3.24 Architecture of an ATM network
  • 34. Figure 3.25 Virtual circuits
  • 35. Note that a virtual connection is defined by a pair of numbers: the VPI and the VCI . Note:
  • 36. Figure 3.26 An ATM cell
  • 37. Figure 3.27 ATM layers
  • 38. The IP protocol uses the AAL5 sublayer. Note:
  • 39. We will discuss IP over ATM in Chapter 23. Note:
  • 40. 3.4 Connecting Devices LANs or WANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs or WANs, we use connecting devices . Connecting devices can operate in different layers of the Internet model. We discuss three kinds of connecting devices: repeaters (or hubs), bridges (or two-layer switches), and routers (or three-layer switches ). Repeaters and hubs operate in the first layer of the Internet model. Bridges and two-layer switches operate in the first two layers. Routers and three-layer switches operate in the first three layers The topics discussed in this section include: Repeaters Hubs Bridges Router
  • 41. Figure 3.28 Connecting devices
  • 42. Figure 3.29 Repeater
  • 43. A repeater connects segments of a LAN. Note:
  • 44. A repeater forwards every bit; it has no filtering capability. Note:
  • 45. A repeater is a regenerator, not an amplifier. Note:
  • 46. Figure 3.30 Function of a repeater
  • 47. A bridge has a table used in filtering decisions. Note:
  • 48. Figure 3.31 Bridge
  • 49. A bridge does not change the physical (MAC) addresses in a frame. Note:
  • 50. Figure 3.32 Learning bridge
  • 51. A router is a three-layer (physical, data link, and network) device . Note:
  • 52. A repeater or a bridge connects segments of a LAN. A router connects independent LANs or WANs to create an internetwork (internet). Note:
  • 53. Figure 3.33 Routing example
  • 54. A router changes the physical addresses in a packet. Note: