SlideShare a Scribd company logo
1 of 121
RMK College of Engineering and Technology
CS 6551
Computer Networks
Department
of
Electronics and Communication Engineering
Unit 2
Media Access
and
Internetworking
Prepared by
Jai Ganesh S
Asst.Professor - ECE
Syllabus
• Media access control
• Ethernet (IEEE 802.3)
• Wireless LAN’s
• Bluetooth (IEEE 802.15)
• Wi – Fi (IEEE 802.11)
• Switching and Bridging
• Basic internetworking
• IP
• CIDR
• ARP
• DHCP
• ICMP
Introduction
• The data link layer is further classified in to 2 sub layers
• Logical Link Control sub layer (LLC)
• Media Access Control Sub layer (MAC)
• The computer society of IEEE started a project called 802 to set the standards to
enable intercommunication among various devices.
OSI Model and IEEE Standard
Ethernet – IEEE 802.3
Ethernet Cable and Port
Ethernet – Over view
• The topics that are to be discussed in the upcoming sessions are as follows:
• Evolution
• Physical properties
• Frame format
• Addressing
• Transmitter algorithm
Ethernet – Evolution – Why?
Ethernet - Evolution
• Ethernet is an dominant Local Area Networking Technology developed in the year 1976 at
Xerox’s Palo Alto Research Centre (PARC)
Evolutions of Ethernet
• It has gone through 4 generations
• Standard Ethernet – 10Mbps
• Fast Ethernet – 100mbps
• Gigabit Ethernet – 1Gbps
• Ten Giga bit Ethernet – 10Gbps
1. Physical Properties
• Ethernet segments were originally built
using co axial cables that runs up to 500
meters.
• Modern ethers cables are replaced by
twisted pair cables (CAT 5 )
• The structure of the physical Ethernet is
shown in the figure
2. Frame Format
• Ethernet Frame contains 7 fields.
PREAMBLE:
• 7 BYTES containing alternate 0’s and 1’s
• This alerts the receiving system about the incoming frame and helps in synchronization
• This is added at physical layer. Not a part of frame.
SFD (Start Frame Delimiter):
• This segment is 1 byte long.
• This indicates the start of the frame.
• The last 2 bits (11) alerts the receiver that the next field is destination address.
Destination Address (DA):
• It is of 6 bytes.
• Contains the physical address of the destination host or stations.
Source Address (SA):
• It is of 6 bytes.
• Contains the physical address of the Source host or stations.
Length or Type:
• Used for 2 purpose
• Ethernet (Type) – To define the upper layer protocol.
• IEEE (Length) – To specify the number of bytes in the data field.
Data & Padding:
• It can be a minimum size from 46 bytes to maximum of 1500 bytes.
• It carries data encapsulated from the upper layer
Cyclic Redundancy Check :
• This field contains Error Detection Information.
3. Addressing
• Each station on the network
has its own Network Interface
Card (NIC).
• This NIC Provides the 6 Byte
Physical Address.
Representation of Addresses
47:20:1B:2E:08:EE
Classification of Addresses
• The addresses are broadly classified in to 3 categories.
Unicast – It defines only one recipient. One to one communication
Multicast – It defines a group of recipients. One to Many Communication.
Broadcast – It is a special case of Multicast addressing. One to ALL
Communication.
Classification of Addressing
Identification of Addressing Modes
• The addresses are identified based on the Last Bit of the First Byte
• If ‘0’ – Unicast Address
• If ‘1’ – Multicast Address
• If All Bytes are ‘1’ – Broadcast Address
Examples
• 4A:30:10:21:10:1A
This is a unicast address because A in binary is 1010
• 47:20:1B:2E:08:EE
This is a multicast address because 7 in binary is 0111
• FF:FF:FF:FF:FF:FF
This is a broadcast address because all digits are F’s
4. Transmitter Algorithm
• Ethernet Uses CSMA – CD as the access method.
• CSMA works on the principle of “Listen Before Talk”
i.e., It Senses the Channel Before sending the
Data. This Approach reduces the possibility of
collision of packets
CSMA - CD
• CSMA – Carrier Sense Multiple Access
Defines the procedure for sensing the channel before transmission of data
• CD – Collision Detection
Defines the procedure for tracking the collision.
• Lets discuss these terms individually
Behaviour of CSMA
• The behaviour of CSMA – CD can be seen in 3 types.
One – Persistent Method
Non – Persistent Method
P – Persistent Method
One Persistent Method
Non Persistent Method
P Persistent Method
Functioning of Collision Detection
End
of
Ethernet
Wireless LAN’s
Problems to be addressed in Wireless Scenario
1. Bit Errors due to unpredictable environments
2. Reliability of message as we cannot send it for intended user
3. Power Requirements for transmitting and receiving
4. There are lots of chances for Eavesdropping
Spreading Techniques
• Since all the nodes in the WLAN share the same medium, it is mandatory to use the
spectrum effectively and reliably.
• Spread Spectrum is the Technique which is used to achieve the above mentioned
requirements.
• Classifications:
Frequency Hopping Spread Spectrum (FHSS)
Slow Frequency Hopping
Fast Frequency Hopping
Direct Sequence Spread Spectrum (DSSS)
Concept of Spread Spectrum
1. Direct Sequence Spread Spectrum
• The idea behind this approach is the generated message signal is
multiplied with an pseudorandom sequence to get the spread signal
2. Frequency Hopping Spread Spectrum
• Frequency Hopping Spread Spectrum (FHSS) is a method of transmitting
radio signals by rapidly switching a carrier among many frequency channels,
using a pseudorandom sequence known to both transmitter and receiver.
Frequency Hopping Concept
Types
• Fast Frequency Hopping:
• Fast FH changes the carrier frequency several times during transmission of one symbol.
• Slow Frequency Hopping:
• Slow FH transmits one or several symbols on each frequency
• Each timeslot is transmitted on a given carrier frequency; the next slot then changes to a
different frequency
FH for Multiple Access
Wireless Technologies
• There are several wireless technologies available
But Our Syllabus Covers Only 2 Technologies
IEEE 802.11 IEEE 802.15
Wi – Fi [IEEE 802.11]
• IEEE 802.11 standards are designed for limited geographical area (Homes, Offices, Colleges
etc.,)
• We are about to discuss
• Physical Properties – (Evolution)
• Problems in Wireless LAN’s
• Hidden Node Problem
• Exposed Node Problem
• Access Method – CSMA CA
• Architecture
• Frame Format
• Addressing Mechanisms
1. Physical Properties
• As discussed in the Ethernet the Wireless standards have also been evolved over Decades.
• The various versions of IEEE802.11 based on their data rate are as follows
• 802.11 a – upto 54 Mbps – 5 GHz
• 802.11 b – up to 11 Mbps – 2.4 GHz
• 802.11 g – up to 54 Mbps – 2.4 GHz
• 802.11 n – up to 600 Mbps – 5 GHz (Note)
2. Problems in WLAN
• There are 2 main Problems in
WLAN. They are,
• Hidden Node Problem
• Exposed Node Problem
a. Hidden Node Problem
• Any node present in their respective region can hear all of its respective
transmission
• From figure station C is outside the coverage of station A
• Station A is outside the coverage of station C
• Station B is covered by both A and C. Hence it can hear all communications
from A and C as well.
• A sends data to B. after some time C sends data to B. this leads in collision. (C
does not know that A is transmitting the data to B)
• In this case A and C are hidden Nodes to each other.
• This problem is overcome by using handshaking signals before transmission
b. Exposed Node Problem
• Consider the given scenario
• A is transmitting data to B
• C has some data to send to D
• Both the transmissions can happen simultaneously.
• But when C senses the channel it assumes that the channel is
busy and refrains its transmission to D
• This results in wastage of channel efficiency
• This problem cannot be solved by RTS – CTS Method.
3. Access Method
• In CSMA – CD the station senses the channel only for that instant and decides the idleness of the
channel.
• In this protocol the station, before sending the data senses that , is there any other transmissions from
other stations for a particular PERIOD.
• These periods are measured by a special timers called as Network Allocation Vector (NAV)
• The operation remains as same as the CSMA – CD except the waiting time. There are 2 timers involved in
this process.
 DISF – Distributed Coordinated Function Inter Frame Space.
 SIFS – Short Inter Frame Space.
Important Timers in CSMA - CA
• If station finds that the medium is continuously idle for Distributed Coordinated
Function Inter Frame Space (DIFS) duration, it is then permitted to transmit a frame.
If the channel is found busy during the DIFS interval, the station should defer its
transmission.
• Short Inter Frame Space (SIFS), is the amount of time in micro seconds required for a
wireless interface to process a received frame and to respond with a response frame
Flow diagram of CSMA - CA
• Before sending a frame the source station senses the channel for a
period of DIFS.
• If the channel is found idle for the entire period of DIFS then the
sender sends the control frame RTS “Request To Send”
• The receiver takes some time for processing the received frame
and to respond this time is referred to as SIFS. Then the receiver
responds with the control frame CTS “Clear To Send”
• Other stations are not allowed to sense the channel during this
period
Flow Chart of
CSMA - CA
Wireless Services
• IEEE 802.11 standard defines 2 types of services they are
• Basic Service Set – BSS
• Extended Service Set – ESS
Basic Service Set (BSS)
• BSS is made up of stationary or mobile stations and an
optional central base station known as Access Point (AP)
• BSS without AP is called as Ad hoc Networks
• BSS with AP is called as Infrastructure Network
Extended Service Set
• ESS is made up of more BSS and are
connected to a “Distributed Systems”
• The Distributed systems connects the AP’s
in the BSS
• There are 2 types of stations
Mobile Stations
Stationary Stations
4. Architecture of 802.11
MAC Sublayer
• The MAC sublayer contains 2 protocols
• Distributed Coordination Function – DCF
• Point Coordination Function – PCF
• These 2 protocols are related with the access methods of the standard
i. Distributed Coordination Function
• It uses CSMA – CA as the access method
• CSMA – CD cannot be used for wireless scenario for 3 major reasons
• For collision detection the station must send the data packet and receive the collision signal at the
same time. This increases the bandwidth requirement.
• Collision may not be detected due to hidden node problem.
• Due to large distance between the stations fading occurs. This prevents the station at one end
from hearing a collision at other end.
ii. Point Coordination Function
• These are the access methods that are well suited for the infrastructure network. (Not
for Ad hoc Networks)
• They are specially designed for the time sensitive applications.
• The AP performs polling method to allow data transmission by the stations.
• This uses 2 timers as like CSMA – CA
• PIFS – Same as DIFS
• SIFS – Same as SIFS
5. Frame Format
• The MAC layer frame contains 9 fields.
Type of Frames
• There are 3 types of Frames
• Management Frame:
• These frames are used for initial communications between the stations and access points
• Control Frame:
• These frames are used for accessing the channel and acknowledging the frames.
• It can be an RTS frame, CTS Frame or ACK Frame
• Data Frames:
• These frames are used for carrying the data and control information
Frame Control (FC) :
• Defines the type of the frame and some other control information.
• It has 11 sub fields.
Protocol Version :
• It defines the version of the protocol.
Type :
• It defines the type of information.
• 00 – management frame
• 01 – control frame
• 10 – data frame
Sub Type :
• It defines the sub type of each frame.
• 1011 – RTS Frame
• 1100 – CTS Frame
• 1101 - Acknowledgement
More Flag :
• When this bit is “1” it indicated more fragments are to be received
Retry :
• When this bit is “1” it indicates the retransmitted frame
Pwr Mgt (Power Management) :
• When this bit is “1” it indicates station is in power management Mode
More Data:
• When this bit is “1” it indicates station has more data to send
WEP (Wired Equivalent Privacy):
• When this bit is “1” it indicates encryption is implemented
RSVD (Reserved):
• This is reserved for future use
D (Duration):
• This field defines the duration of the transmission used to set the NAV timers
• This is used as the ID for control frames
Addresses:
• There are 4 address fields
• The values in the address fields depends on the values of “to DS” and “From DS” sub fields
SC (Sequence Control):
• This field defines the sequence number of the frames for flow control.
Frame Body :
• This field can be between 0 bytes to 2312 bytes.
• This field contains the actual information based on the values of the sub fields
FCS (Frame control Sequence):
• This field carries the 32 bit CRC for error detection and Correction.
6. Addressing Mechanisms
• The values of the 4 Address fields will be decided based on the values of
“To DS” and “From DS”
Address 1:
• This field is always the address of next device
Address 2:
• This field is always the address of previous device
Address 3:
• This field is always the address of final destination if it is not defined by address 1
Address 4:
• This field is always the address of Original Source if it is not defined by address 2
ADDRESS REPRESENTS
1 Address of Next Device
2 Address of Previous device
3 Address of Final Destination
4 Address of Original Source
Understanding Addressing
1 2 3
Case 1
• In this case the frame is not going to DS (To DS =0)
also not coming from DS (From DS =0)
• The frame is moving from one station to another
station of same BSS without passing through DS
Case 2
• In this case the frame is not coming from DS (From
DS =0) and the frame is going to DS (To DS =1)
• The frame comes from a station and going to the AP
Case 3
• In this case the frame is coming from DS (From DS
=0) and the frame is going to DS (To DS =1)
• The frame comes from AP of one BSS and going to
the AP of another BSS
Case 4
• In this case the frame is coming from a DS (From
DS =1) and the frame is not going to DS (To DS =0)
• The frame comes from AP and going to the station
End
of
Wi - Fi
Bluetooth – IEEE 802.15
Bluetooth
• A Bluetooth LAN is an Ad hoc Network.
• The various applications of Bluetooth are short range communications and
implementing various sensor networks
• Topics Discussed:
• Architecture
• Bluetooth Layers
• Frame Format
1. Architecture
• Bluetooth defines 2 types of architecture
• Piconets:
• It can have maximum of 8 stations out of which 1 station acts as
primary station and others acts as secondary stations.
• All the secondary stations are synchronised with the primary
station
• Scatternets:
• When 2 or more piconets combined together then they are
referred to as scatternet.
2. Bluetooth Layers
Radio Layer
• This layer is roughly equivalent to the physical layer.
• This also defines 3 other parameters
• Operating Band
• It is operated in 2.4 GHz ISM Band
• FHSS
• It uses FHSS method. It hops 1600 times per second
• Modulation
• It uses GFSK (Gaussian FSK) – Version of FSK as a modulation Technique
Base Band Layer
• This layer is roughly equivalent to MAC Sub Layer.
• This layer defines the following parameters
• Access Method
• It uses TDD – TDMA as the access mechanism
• Physical Link
• There are 2 types of link that can be created between the primary and secondary stations
• Synchronous Connection Oriented Link (SCL)
• This link is used when avoiding latency is more important than any reliable delivery.
• No retransmission of frames occurs during failure
• They are mainly used in audio communications
• Asynchronous Connectionless Link (ACL)
• This link is used when reliable delivery is more important than any latency.
• Frames are retransmitted on the event of failure.
L2CAP Layer
• Logical Link Control and Adaptation Layer
• They are roughly equivalent to the LLC sub layer.
• There are 4 specific duties
• Multiplexing
• It accepts the data from the upper layer and delivers them to the lower layers
• Segmentation an Reassembly
• This layer divides the larger packets into segments and adds extra information to define the location of the segment in original
packets
• At the destination this layer reassembles them back.
• Quality of Service (QoS)
• QoS can be defined under any circumstances
• Group Management
• Bluetooth allows data transmission between the group of users
• As similar to multicast
3. Frame Format
• Bluetooth frame can be classified in to 3 types.
• 1 slot frame:
• This frame frequency hops for each slot.
• Duration of this frame is 366 Bits (Note)
• 3 slot frame:
• This frame frequency hops for every 3 slots.
• Duration of this frame is 1616 Bits (Note)
• 5 slot frame:
• This frame frequency hops for every 5 slots
• Duration of this frame is 2866 Bits (Note)
General Frame Format
Access Code:
• This field contains a synchronisation bits to identify the primary from various piconets
• The secondary stations uses this bits to synchronise their speed with their primary station
Address:
• This field runs from 000 – 111 to define up to 7 secondary address.
• 000 – represents broadcast address.
Type:
• This field represents the type of data coming form the upper layer
F :
• This field is used for flow control
• When this field is set to “1” it indicates that the buffer is Full
A :
• This field is used for Acknowledgement
S :
• This field is used for Sequence Number
HEC (Header Error Correction) :
• This field is used for error detection (Check Sum)
Data :
• This field carries the actual data.
• The length of this field varies according to the type of the frame (As Mentioned in the
Figure)
L2CAP Frame Format
• Length :
• Indicates the size of the data field
• Channel ID:
• This defines the unique identifier for the virtual channel created
• Data and Control:
• Actual data to be sent.
• It can take a maximum value of 65,535 Bytes
End
of
Bluetooth
Switching & Bridging
Introduction
• This section especially deals particularly with “building networks at global level”
• Making all the system to come under 1 network is not practically possible
• Only possible solution is INTERNETWORKING
• One way of interconnecting the networks is by using “Switches” and “Bridges”
Switching
• Switch is a mechanism that allows us to interconnect
links to form a larger networks.
• Switch is a multi – input , multi – output device.
• It receives packets from one input port and forwards
them to one or more output ports.
• Switch provides a star topology
Primary Function of a Switch
• The primary function of a Switch is to receive incoming packets on one of
its links and to transmit them on some other link. This function is
referred to as “forwarding”
Forwarding Approaches
• How does a switch decide which output link to place each packets on ?
• There are 3 basic approaches from which switch knows where to forward.
• Datagram (or) connection less approach
• Virtual circuit (or) connection oriented approach
• Source Routing
Common Requirement for all 3 approach
• Forwarding can be done only if the switch knows 2 important parameters
• IP address of all the host connected to it
• This going to be a unique value so no problem.
• The port number on which a particular host is connected
• Can be done in 2 ways
• Numbering each ports (ie. Forward to Seat No : 10)
• Identifying each port by the name of the node connected to it (ie. Forward to Seat on which Ram sat
yesterday)
1. Datagram Approach @ Connection Less Approach
• All the packets are included with enough information about the destination. So
that any switch will know how to take it to the destination
• Each and every switch on the network maintains a table which indicates the
details of connected hosts on all ports. This table is referred to as “Forwarding
Table” or “Switching Table”
Drawbacks of Datagram Approach
• Difficult to from a forwarding table for large network
• Not suitable for dynamically changing topologies
• Creates a problem when there are multiple paths available to reach the
destination.
Characteristics of datagram networks
• They are referred to as “connection less” because they do not check for the
dedicated link to destination before transmission
• A host have no idea about the capability of the network to deliver the packets
• All packets take the same path unless the entries on the forwarding table is
altered. This may overload the path
2. Virtual Circuit Switching
@
Connection Oriented Approach
• This is an another approach which uses a concept of “Virtual Circuit”.
• This approach is referred to as connection oriented approach as it
establishes the virtual circuit between the source and destination
Process of Virtual Circuit Approach
• The entire process can be classified in to 2 phase
Connection setup phase Data transfer phase
Connection Setup Phase
• In this phase a virtual connection is established in all the switches present between the “Source” and
“Destination”
• This processes is referred to as “defining Connection State”
• Defining connection state has 4 main components
• Incoming interface – on which the packets of this VC arrives the switch
• Incoming Virtual Circuit Identifier – uniquely identifies the incoming VC ID
• Outgoing Interface – on which the packets of this VC leaves the switch
• Outgoing Virtual Circuit Identifier - uniquely identifies the outgoing VC ID
2 approaches for establishing the connection state
Manual Configuration
Automatic Configuration
 In this case connection state is established
by Network Administrator
 Virtual circuit is called “Permanent Virtual
Circuit (PVC)”
 Admin can delete the virtual circuit at any
time
 The process is initiated by the Sending
Node
 Sending node sends a message to the
network requesting to establish a connection
state
 This is referred to as “Signalling”
 The virtual circuit is called “Switched
Virtual Circuit (SVC)”
 Host can delete the VC at any time without
the intervention of admin
Establishing Connection State by Network Admin
1. Identify and Create Virtual Circuit from source to destination2. Assigning id for each virtual circuit which is not already used
5
11
7
4
3. Creation of VC table at each switch present between source and destination
3.1 VC table for switch 1
INCOMING
INTERFACE
INCOMING VCI
OUTGOING
INTERFACE
OUTGOING VCI
2 5 1 11
INCOMING
INTERFACE
INCOMING VCI
OUTGOING
INTERFACE
OUTGOING VCI
3 11 2 73.1 VC table for switch 2
3.1 VC table for switch 3
INCOMING
INTERFACE
INCOMING VCI
OUTGOING
INTERFACE
OUTGOING VCI
0 7 1 4INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
2 5 1 11
INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
3 11 2 7
INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
0 7 1 4
Establishing Connection State by Sending Node
INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
2 5 1 11
INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
3 11 2 7
INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
0 7 1 4
5
11
7
4
S1 S2 S3
1. Host A sends a setup message into the network with the
destination address of Host B
2. When switch 1 receives the setup message it picks a
VCI1 value and forwards the packet at all ports
3. Switch 1 updates the incoming port number and VCI
chosen
4. Now , Switch 2 receives the setup message. It performs
the same operation as Switch 1 and updates the VC Table
5. Now ,switch 3 receives the setup message and performs
the same operation.
6. Then the setup message is forwarded to Host B. The host
choses the VCI value.
7. At this stage none of the switch knows about the outgoing
interface. This will be updated from the ACK sent by Host B
8. Now, Switch 3 updates its outgoing information on VC
Table and forwards the ACK to Switch 2
9. Switch 2 updates the VC Table and Forwards the ACK to
Switch 1
10. Switch 1 updates the VC Table and forwards the ACK to
Host A
11. By Receiving this ACK Host A knows the Complete
Virtual Path to reach Host B
2. Data Transfer Phase
• Data transfer phase starts after the completion of connection setup phase.
• Host A puts a value of 5 for outgoing VCI in the header of the packet.
• Switch 1 receives any such packets on interface 2 it refers to the VC table and puts the VCI value of 11 and
forwards.
• Similarly the packet reaches Host B.
• Once the data transfer is done Host A can tear down the connection with Host B by sending “Tear Down Signal” to
Host B
• This signal removes all the entries in the switches.
End
of
Switching
2. Bridges
Bridging
Introduction
• Bridges are the devices that are used to interconnect two
Ethernet networks as the length of the cable is limited.
• The usage of bride is shown in the figure.
Transparent Bridge
• This is a type of bridge, the hosts does not have any idea about the existence of
the bridge.
• Bridge forwarding table is updated by “Learning Process” when the stations
forward frames among them.
• Forwarding Table can be configured by network admin also. But not suitable
for changing environment
Learning Process
1. Initially there will not be any entries in
the forwarding table
2. Table will be updated when the transfer
of Frames occurs
3. When A sends a frame to D : Bridge do
not have any entries for D or A
4. Since the Bridge do not know where D
is. It FLOODS the Frame.
5. By now the Bridge Learns that Host A
is on the LAN Connected at port 16. When E sends a Frame to A
7.Bridge refers to the table and the
location of A is known. So no Flooding.
Packet is sent on Port 1
8. This time the Bridge learns that Host E
is located on the LAN connected at Port 3
and updates the table
9. When B sends frame to C10. Bridge Doesn’t know about the
locations of B or C. Thus it FLOODS the
Packet. Also learns the location of B
11. This process continues until bridge
learns about all the hosts on the network
Looping Problem
• Bridges works fine as long as there is no redundant bridges in the system
(More than 1 bridge)
• This redundancy in bridges creates “Looping Problem”
• This problem is illustrated in the following figure.
When A Sends a Frame to D. This frame enters
both the Bridges at port 1. B1 and B2 Updates its
table and floods the frame on LAN 2.
Now LAN 2 contains 2 copies of frames. Now
frame sent by the B2 will be received by B1 and
Vice Versa. This time the frame enters at Port 2
of B1 and B2. Thus the Table is updated again
At this stage LAN 1 contains 2 copies of
frame and these frames again enters the
bridges at port 1. Table is updated again.
This Process continues on and on…..
Review of Looping Problem
Solution for Looping Problem
• This looping problem can be overcome by “Spanning Tree Algorithm”
• This algorithm creates a topology in which each LAN can be reached
from any other LAN through one path only.
• This ultimately removes the LOOP.
Spanning Tree Algorithm
Let us consider the given example
network where 4 LAN’s are connected
using 5 Bridges
For understanding and calculating
purpose lets draw an graphical
representation of the given network
Step 1: in order to start the spanning tree
process we need to assign a COST (or)
Metric to each link.
Cost can be assigned based on several
aspects like Minimum hops, Minimum
Delay, or Maximum Bandwidth. This can
be chosen by the choice of Admin.
Here we are considering No. of Hops as a metric.
Assign the cost as mentioned below.
Bridge LAN = 1
LAN  Bridge = 0
Step 2: Compute the Number of Hops from a Root
Node to all other nodes.
The node with least ID will act as root node. We
assume that B1 is the Root Node
If there are multiple path to a node, choose the path
with lowest cost and neglect the remaining paths
Before and After Alg.
End
of
Bridging
Basic
Internetworking
Introduction
• By using switches and bridges it is possible to build a large network but it is only up
to certain limit.
• In order to further increase the scalability of network , we connect multiple networks
by a device called as “Router”
• Hence the network layer comes in to picture which takes the responsibility of packet
delivery from source to destination among multiple networks
Basic Concepts
• IP – Internet Protocol
• CIDR – Classless Inter Domain Routing
• ARP – Address Resolution Protocol
• DHCP – Dynamic Host Control Protocol
• ICMP – Internet Control Message Protocol
Brief Notes first… then Deeper
IP
CIDR
ARP
DHCP
ICMP

More Related Content

What's hot

Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSjunnubabu
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksNt Arvind
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Subnetting supernetting
Subnetting supernettingSubnetting supernetting
Subnetting supernettingwacasr12
 
Switch configuration
Switch configurationSwitch configuration
Switch configurationMuuluu
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingDr Rajiv Srivastava
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iiiJAIGANESH SEKAR
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARDKak Yong
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client serverSatya P. Joshi
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 

What's hot (20)

Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Ethernet technology
Ethernet technologyEthernet technology
Ethernet technology
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Subnetting supernetting
Subnetting supernettingSubnetting supernetting
Subnetting supernetting
 
Ip address
Ip address Ip address
Ip address
 
Switch configuration
Switch configurationSwitch configuration
Switch configuration
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 

Similar to Computer networks unit ii

Similar to Computer networks unit ii (20)

WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
 
UNIT-3 (2).pptx
UNIT-3 (2).pptxUNIT-3 (2).pptx
UNIT-3 (2).pptx
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
Media Access Layer
Media Access LayerMedia Access Layer
Media Access Layer
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
Ethernet copy
Ethernet   copyEthernet   copy
Ethernet copy
 
Manet
ManetManet
Manet
 
Manet
ManetManet
Manet
 
QSpiders - Dod Model
QSpiders - Dod ModelQSpiders - Dod Model
QSpiders - Dod Model
 
CS553_ST7_Ch06-DigitalDataComm.ppt
CS553_ST7_Ch06-DigitalDataComm.pptCS553_ST7_Ch06-DigitalDataComm.ppt
CS553_ST7_Ch06-DigitalDataComm.ppt
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Week16 lec2
Week16 lec2Week16 lec2
Week16 lec2
 
Frame relay
Frame relayFrame relay
Frame relay
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methodsJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1JAIGANESH SEKAR
 

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

Computer networks unit ii

  • 1. RMK College of Engineering and Technology CS 6551 Computer Networks Department of Electronics and Communication Engineering
  • 2. Unit 2 Media Access and Internetworking Prepared by Jai Ganesh S Asst.Professor - ECE
  • 3. Syllabus • Media access control • Ethernet (IEEE 802.3) • Wireless LAN’s • Bluetooth (IEEE 802.15) • Wi – Fi (IEEE 802.11) • Switching and Bridging • Basic internetworking • IP • CIDR • ARP • DHCP • ICMP
  • 4. Introduction • The data link layer is further classified in to 2 sub layers • Logical Link Control sub layer (LLC) • Media Access Control Sub layer (MAC) • The computer society of IEEE started a project called 802 to set the standards to enable intercommunication among various devices.
  • 5. OSI Model and IEEE Standard
  • 8. Ethernet – Over view • The topics that are to be discussed in the upcoming sessions are as follows: • Evolution • Physical properties • Frame format • Addressing • Transmitter algorithm
  • 10. Ethernet - Evolution • Ethernet is an dominant Local Area Networking Technology developed in the year 1976 at Xerox’s Palo Alto Research Centre (PARC)
  • 11. Evolutions of Ethernet • It has gone through 4 generations • Standard Ethernet – 10Mbps • Fast Ethernet – 100mbps • Gigabit Ethernet – 1Gbps • Ten Giga bit Ethernet – 10Gbps
  • 12. 1. Physical Properties • Ethernet segments were originally built using co axial cables that runs up to 500 meters. • Modern ethers cables are replaced by twisted pair cables (CAT 5 ) • The structure of the physical Ethernet is shown in the figure
  • 13. 2. Frame Format • Ethernet Frame contains 7 fields.
  • 14. PREAMBLE: • 7 BYTES containing alternate 0’s and 1’s • This alerts the receiving system about the incoming frame and helps in synchronization • This is added at physical layer. Not a part of frame. SFD (Start Frame Delimiter): • This segment is 1 byte long. • This indicates the start of the frame. • The last 2 bits (11) alerts the receiver that the next field is destination address. Destination Address (DA): • It is of 6 bytes. • Contains the physical address of the destination host or stations. Source Address (SA): • It is of 6 bytes. • Contains the physical address of the Source host or stations. Length or Type: • Used for 2 purpose • Ethernet (Type) – To define the upper layer protocol. • IEEE (Length) – To specify the number of bytes in the data field. Data & Padding: • It can be a minimum size from 46 bytes to maximum of 1500 bytes. • It carries data encapsulated from the upper layer Cyclic Redundancy Check : • This field contains Error Detection Information.
  • 15. 3. Addressing • Each station on the network has its own Network Interface Card (NIC). • This NIC Provides the 6 Byte Physical Address.
  • 17. Classification of Addresses • The addresses are broadly classified in to 3 categories. Unicast – It defines only one recipient. One to one communication Multicast – It defines a group of recipients. One to Many Communication. Broadcast – It is a special case of Multicast addressing. One to ALL Communication.
  • 19. Identification of Addressing Modes • The addresses are identified based on the Last Bit of the First Byte • If ‘0’ – Unicast Address • If ‘1’ – Multicast Address • If All Bytes are ‘1’ – Broadcast Address
  • 20. Examples • 4A:30:10:21:10:1A This is a unicast address because A in binary is 1010 • 47:20:1B:2E:08:EE This is a multicast address because 7 in binary is 0111 • FF:FF:FF:FF:FF:FF This is a broadcast address because all digits are F’s
  • 21. 4. Transmitter Algorithm • Ethernet Uses CSMA – CD as the access method. • CSMA works on the principle of “Listen Before Talk” i.e., It Senses the Channel Before sending the Data. This Approach reduces the possibility of collision of packets
  • 22. CSMA - CD • CSMA – Carrier Sense Multiple Access Defines the procedure for sensing the channel before transmission of data • CD – Collision Detection Defines the procedure for tracking the collision. • Lets discuss these terms individually
  • 23. Behaviour of CSMA • The behaviour of CSMA – CD can be seen in 3 types. One – Persistent Method Non – Persistent Method P – Persistent Method
  • 30. Problems to be addressed in Wireless Scenario
  • 31. 1. Bit Errors due to unpredictable environments
  • 32. 2. Reliability of message as we cannot send it for intended user
  • 33. 3. Power Requirements for transmitting and receiving
  • 34. 4. There are lots of chances for Eavesdropping
  • 35. Spreading Techniques • Since all the nodes in the WLAN share the same medium, it is mandatory to use the spectrum effectively and reliably. • Spread Spectrum is the Technique which is used to achieve the above mentioned requirements. • Classifications: Frequency Hopping Spread Spectrum (FHSS) Slow Frequency Hopping Fast Frequency Hopping Direct Sequence Spread Spectrum (DSSS)
  • 36. Concept of Spread Spectrum
  • 37. 1. Direct Sequence Spread Spectrum • The idea behind this approach is the generated message signal is multiplied with an pseudorandom sequence to get the spread signal
  • 38.
  • 39. 2. Frequency Hopping Spread Spectrum • Frequency Hopping Spread Spectrum (FHSS) is a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver.
  • 41. Types • Fast Frequency Hopping: • Fast FH changes the carrier frequency several times during transmission of one symbol. • Slow Frequency Hopping: • Slow FH transmits one or several symbols on each frequency • Each timeslot is transmitted on a given carrier frequency; the next slot then changes to a different frequency
  • 42. FH for Multiple Access
  • 43. Wireless Technologies • There are several wireless technologies available
  • 44. But Our Syllabus Covers Only 2 Technologies IEEE 802.11 IEEE 802.15
  • 45. Wi – Fi [IEEE 802.11] • IEEE 802.11 standards are designed for limited geographical area (Homes, Offices, Colleges etc.,) • We are about to discuss • Physical Properties – (Evolution) • Problems in Wireless LAN’s • Hidden Node Problem • Exposed Node Problem • Access Method – CSMA CA • Architecture • Frame Format • Addressing Mechanisms
  • 46. 1. Physical Properties • As discussed in the Ethernet the Wireless standards have also been evolved over Decades. • The various versions of IEEE802.11 based on their data rate are as follows • 802.11 a – upto 54 Mbps – 5 GHz • 802.11 b – up to 11 Mbps – 2.4 GHz • 802.11 g – up to 54 Mbps – 2.4 GHz • 802.11 n – up to 600 Mbps – 5 GHz (Note)
  • 47. 2. Problems in WLAN • There are 2 main Problems in WLAN. They are, • Hidden Node Problem • Exposed Node Problem
  • 48. a. Hidden Node Problem • Any node present in their respective region can hear all of its respective transmission • From figure station C is outside the coverage of station A • Station A is outside the coverage of station C • Station B is covered by both A and C. Hence it can hear all communications from A and C as well. • A sends data to B. after some time C sends data to B. this leads in collision. (C does not know that A is transmitting the data to B) • In this case A and C are hidden Nodes to each other. • This problem is overcome by using handshaking signals before transmission
  • 49. b. Exposed Node Problem • Consider the given scenario • A is transmitting data to B • C has some data to send to D • Both the transmissions can happen simultaneously. • But when C senses the channel it assumes that the channel is busy and refrains its transmission to D • This results in wastage of channel efficiency • This problem cannot be solved by RTS – CTS Method.
  • 50. 3. Access Method • In CSMA – CD the station senses the channel only for that instant and decides the idleness of the channel. • In this protocol the station, before sending the data senses that , is there any other transmissions from other stations for a particular PERIOD. • These periods are measured by a special timers called as Network Allocation Vector (NAV) • The operation remains as same as the CSMA – CD except the waiting time. There are 2 timers involved in this process.  DISF – Distributed Coordinated Function Inter Frame Space.  SIFS – Short Inter Frame Space.
  • 51. Important Timers in CSMA - CA • If station finds that the medium is continuously idle for Distributed Coordinated Function Inter Frame Space (DIFS) duration, it is then permitted to transmit a frame. If the channel is found busy during the DIFS interval, the station should defer its transmission. • Short Inter Frame Space (SIFS), is the amount of time in micro seconds required for a wireless interface to process a received frame and to respond with a response frame
  • 52. Flow diagram of CSMA - CA • Before sending a frame the source station senses the channel for a period of DIFS. • If the channel is found idle for the entire period of DIFS then the sender sends the control frame RTS “Request To Send” • The receiver takes some time for processing the received frame and to respond this time is referred to as SIFS. Then the receiver responds with the control frame CTS “Clear To Send” • Other stations are not allowed to sense the channel during this period
  • 54. Wireless Services • IEEE 802.11 standard defines 2 types of services they are • Basic Service Set – BSS • Extended Service Set – ESS
  • 55. Basic Service Set (BSS) • BSS is made up of stationary or mobile stations and an optional central base station known as Access Point (AP) • BSS without AP is called as Ad hoc Networks • BSS with AP is called as Infrastructure Network
  • 56. Extended Service Set • ESS is made up of more BSS and are connected to a “Distributed Systems” • The Distributed systems connects the AP’s in the BSS • There are 2 types of stations Mobile Stations Stationary Stations
  • 58. MAC Sublayer • The MAC sublayer contains 2 protocols • Distributed Coordination Function – DCF • Point Coordination Function – PCF • These 2 protocols are related with the access methods of the standard
  • 59. i. Distributed Coordination Function • It uses CSMA – CA as the access method • CSMA – CD cannot be used for wireless scenario for 3 major reasons • For collision detection the station must send the data packet and receive the collision signal at the same time. This increases the bandwidth requirement. • Collision may not be detected due to hidden node problem. • Due to large distance between the stations fading occurs. This prevents the station at one end from hearing a collision at other end.
  • 60. ii. Point Coordination Function • These are the access methods that are well suited for the infrastructure network. (Not for Ad hoc Networks) • They are specially designed for the time sensitive applications. • The AP performs polling method to allow data transmission by the stations. • This uses 2 timers as like CSMA – CA • PIFS – Same as DIFS • SIFS – Same as SIFS
  • 61. 5. Frame Format • The MAC layer frame contains 9 fields.
  • 62. Type of Frames • There are 3 types of Frames • Management Frame: • These frames are used for initial communications between the stations and access points • Control Frame: • These frames are used for accessing the channel and acknowledging the frames. • It can be an RTS frame, CTS Frame or ACK Frame • Data Frames: • These frames are used for carrying the data and control information
  • 63. Frame Control (FC) : • Defines the type of the frame and some other control information. • It has 11 sub fields. Protocol Version : • It defines the version of the protocol. Type : • It defines the type of information. • 00 – management frame • 01 – control frame • 10 – data frame Sub Type : • It defines the sub type of each frame. • 1011 – RTS Frame • 1100 – CTS Frame • 1101 - Acknowledgement More Flag : • When this bit is “1” it indicated more fragments are to be received Retry : • When this bit is “1” it indicates the retransmitted frame Pwr Mgt (Power Management) : • When this bit is “1” it indicates station is in power management Mode More Data: • When this bit is “1” it indicates station has more data to send WEP (Wired Equivalent Privacy): • When this bit is “1” it indicates encryption is implemented RSVD (Reserved): • This is reserved for future use D (Duration): • This field defines the duration of the transmission used to set the NAV timers • This is used as the ID for control frames Addresses: • There are 4 address fields • The values in the address fields depends on the values of “to DS” and “From DS” sub fields SC (Sequence Control): • This field defines the sequence number of the frames for flow control. Frame Body : • This field can be between 0 bytes to 2312 bytes. • This field contains the actual information based on the values of the sub fields FCS (Frame control Sequence): • This field carries the 32 bit CRC for error detection and Correction.
  • 64. 6. Addressing Mechanisms • The values of the 4 Address fields will be decided based on the values of “To DS” and “From DS” Address 1: • This field is always the address of next device Address 2: • This field is always the address of previous device Address 3: • This field is always the address of final destination if it is not defined by address 1 Address 4: • This field is always the address of Original Source if it is not defined by address 2 ADDRESS REPRESENTS 1 Address of Next Device 2 Address of Previous device 3 Address of Final Destination 4 Address of Original Source
  • 66. Case 1 • In this case the frame is not going to DS (To DS =0) also not coming from DS (From DS =0) • The frame is moving from one station to another station of same BSS without passing through DS
  • 67. Case 2 • In this case the frame is not coming from DS (From DS =0) and the frame is going to DS (To DS =1) • The frame comes from a station and going to the AP
  • 68. Case 3 • In this case the frame is coming from DS (From DS =0) and the frame is going to DS (To DS =1) • The frame comes from AP of one BSS and going to the AP of another BSS
  • 69. Case 4 • In this case the frame is coming from a DS (From DS =1) and the frame is not going to DS (To DS =0) • The frame comes from AP and going to the station
  • 72. Bluetooth • A Bluetooth LAN is an Ad hoc Network. • The various applications of Bluetooth are short range communications and implementing various sensor networks • Topics Discussed: • Architecture • Bluetooth Layers • Frame Format
  • 73. 1. Architecture • Bluetooth defines 2 types of architecture • Piconets: • It can have maximum of 8 stations out of which 1 station acts as primary station and others acts as secondary stations. • All the secondary stations are synchronised with the primary station • Scatternets: • When 2 or more piconets combined together then they are referred to as scatternet.
  • 75. Radio Layer • This layer is roughly equivalent to the physical layer. • This also defines 3 other parameters • Operating Band • It is operated in 2.4 GHz ISM Band • FHSS • It uses FHSS method. It hops 1600 times per second • Modulation • It uses GFSK (Gaussian FSK) – Version of FSK as a modulation Technique
  • 76. Base Band Layer • This layer is roughly equivalent to MAC Sub Layer. • This layer defines the following parameters • Access Method • It uses TDD – TDMA as the access mechanism • Physical Link • There are 2 types of link that can be created between the primary and secondary stations • Synchronous Connection Oriented Link (SCL) • This link is used when avoiding latency is more important than any reliable delivery. • No retransmission of frames occurs during failure • They are mainly used in audio communications • Asynchronous Connectionless Link (ACL) • This link is used when reliable delivery is more important than any latency. • Frames are retransmitted on the event of failure.
  • 77. L2CAP Layer • Logical Link Control and Adaptation Layer • They are roughly equivalent to the LLC sub layer. • There are 4 specific duties • Multiplexing • It accepts the data from the upper layer and delivers them to the lower layers • Segmentation an Reassembly • This layer divides the larger packets into segments and adds extra information to define the location of the segment in original packets • At the destination this layer reassembles them back. • Quality of Service (QoS) • QoS can be defined under any circumstances • Group Management • Bluetooth allows data transmission between the group of users • As similar to multicast
  • 78. 3. Frame Format • Bluetooth frame can be classified in to 3 types. • 1 slot frame: • This frame frequency hops for each slot. • Duration of this frame is 366 Bits (Note) • 3 slot frame: • This frame frequency hops for every 3 slots. • Duration of this frame is 1616 Bits (Note) • 5 slot frame: • This frame frequency hops for every 5 slots • Duration of this frame is 2866 Bits (Note)
  • 79. General Frame Format Access Code: • This field contains a synchronisation bits to identify the primary from various piconets • The secondary stations uses this bits to synchronise their speed with their primary station Address: • This field runs from 000 – 111 to define up to 7 secondary address. • 000 – represents broadcast address. Type: • This field represents the type of data coming form the upper layer F : • This field is used for flow control • When this field is set to “1” it indicates that the buffer is Full A : • This field is used for Acknowledgement S : • This field is used for Sequence Number HEC (Header Error Correction) : • This field is used for error detection (Check Sum) Data : • This field carries the actual data. • The length of this field varies according to the type of the frame (As Mentioned in the Figure)
  • 80. L2CAP Frame Format • Length : • Indicates the size of the data field • Channel ID: • This defines the unique identifier for the virtual channel created • Data and Control: • Actual data to be sent. • It can take a maximum value of 65,535 Bytes
  • 82.
  • 84. Introduction • This section especially deals particularly with “building networks at global level” • Making all the system to come under 1 network is not practically possible • Only possible solution is INTERNETWORKING • One way of interconnecting the networks is by using “Switches” and “Bridges”
  • 85. Switching • Switch is a mechanism that allows us to interconnect links to form a larger networks. • Switch is a multi – input , multi – output device. • It receives packets from one input port and forwards them to one or more output ports. • Switch provides a star topology
  • 86. Primary Function of a Switch • The primary function of a Switch is to receive incoming packets on one of its links and to transmit them on some other link. This function is referred to as “forwarding”
  • 87. Forwarding Approaches • How does a switch decide which output link to place each packets on ? • There are 3 basic approaches from which switch knows where to forward. • Datagram (or) connection less approach • Virtual circuit (or) connection oriented approach • Source Routing
  • 88. Common Requirement for all 3 approach • Forwarding can be done only if the switch knows 2 important parameters • IP address of all the host connected to it • This going to be a unique value so no problem. • The port number on which a particular host is connected • Can be done in 2 ways • Numbering each ports (ie. Forward to Seat No : 10) • Identifying each port by the name of the node connected to it (ie. Forward to Seat on which Ram sat yesterday)
  • 89. 1. Datagram Approach @ Connection Less Approach • All the packets are included with enough information about the destination. So that any switch will know how to take it to the destination • Each and every switch on the network maintains a table which indicates the details of connected hosts on all ports. This table is referred to as “Forwarding Table” or “Switching Table”
  • 90.
  • 91. Drawbacks of Datagram Approach • Difficult to from a forwarding table for large network • Not suitable for dynamically changing topologies • Creates a problem when there are multiple paths available to reach the destination.
  • 92. Characteristics of datagram networks • They are referred to as “connection less” because they do not check for the dedicated link to destination before transmission • A host have no idea about the capability of the network to deliver the packets • All packets take the same path unless the entries on the forwarding table is altered. This may overload the path
  • 93. 2. Virtual Circuit Switching @ Connection Oriented Approach • This is an another approach which uses a concept of “Virtual Circuit”. • This approach is referred to as connection oriented approach as it establishes the virtual circuit between the source and destination
  • 94. Process of Virtual Circuit Approach • The entire process can be classified in to 2 phase Connection setup phase Data transfer phase
  • 95. Connection Setup Phase • In this phase a virtual connection is established in all the switches present between the “Source” and “Destination” • This processes is referred to as “defining Connection State” • Defining connection state has 4 main components • Incoming interface – on which the packets of this VC arrives the switch • Incoming Virtual Circuit Identifier – uniquely identifies the incoming VC ID • Outgoing Interface – on which the packets of this VC leaves the switch • Outgoing Virtual Circuit Identifier - uniquely identifies the outgoing VC ID
  • 96. 2 approaches for establishing the connection state Manual Configuration Automatic Configuration  In this case connection state is established by Network Administrator  Virtual circuit is called “Permanent Virtual Circuit (PVC)”  Admin can delete the virtual circuit at any time  The process is initiated by the Sending Node  Sending node sends a message to the network requesting to establish a connection state  This is referred to as “Signalling”  The virtual circuit is called “Switched Virtual Circuit (SVC)”  Host can delete the VC at any time without the intervention of admin
  • 97. Establishing Connection State by Network Admin 1. Identify and Create Virtual Circuit from source to destination2. Assigning id for each virtual circuit which is not already used 5 11 7 4 3. Creation of VC table at each switch present between source and destination 3.1 VC table for switch 1 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 2 5 1 11 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 3 11 2 73.1 VC table for switch 2 3.1 VC table for switch 3 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 0 7 1 4INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 2 5 1 11 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 3 11 2 7 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 0 7 1 4
  • 98. Establishing Connection State by Sending Node INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 2 5 1 11 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 3 11 2 7 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 0 7 1 4 5 11 7 4 S1 S2 S3 1. Host A sends a setup message into the network with the destination address of Host B 2. When switch 1 receives the setup message it picks a VCI1 value and forwards the packet at all ports 3. Switch 1 updates the incoming port number and VCI chosen 4. Now , Switch 2 receives the setup message. It performs the same operation as Switch 1 and updates the VC Table 5. Now ,switch 3 receives the setup message and performs the same operation. 6. Then the setup message is forwarded to Host B. The host choses the VCI value. 7. At this stage none of the switch knows about the outgoing interface. This will be updated from the ACK sent by Host B 8. Now, Switch 3 updates its outgoing information on VC Table and forwards the ACK to Switch 2 9. Switch 2 updates the VC Table and Forwards the ACK to Switch 1 10. Switch 1 updates the VC Table and forwards the ACK to Host A 11. By Receiving this ACK Host A knows the Complete Virtual Path to reach Host B
  • 99. 2. Data Transfer Phase • Data transfer phase starts after the completion of connection setup phase. • Host A puts a value of 5 for outgoing VCI in the header of the packet. • Switch 1 receives any such packets on interface 2 it refers to the VC table and puts the VCI value of 11 and forwards. • Similarly the packet reaches Host B. • Once the data transfer is done Host A can tear down the connection with Host B by sending “Tear Down Signal” to Host B • This signal removes all the entries in the switches.
  • 100.
  • 104. Introduction • Bridges are the devices that are used to interconnect two Ethernet networks as the length of the cable is limited. • The usage of bride is shown in the figure.
  • 105. Transparent Bridge • This is a type of bridge, the hosts does not have any idea about the existence of the bridge. • Bridge forwarding table is updated by “Learning Process” when the stations forward frames among them. • Forwarding Table can be configured by network admin also. But not suitable for changing environment
  • 106. Learning Process 1. Initially there will not be any entries in the forwarding table 2. Table will be updated when the transfer of Frames occurs 3. When A sends a frame to D : Bridge do not have any entries for D or A 4. Since the Bridge do not know where D is. It FLOODS the Frame. 5. By now the Bridge Learns that Host A is on the LAN Connected at port 16. When E sends a Frame to A 7.Bridge refers to the table and the location of A is known. So no Flooding. Packet is sent on Port 1 8. This time the Bridge learns that Host E is located on the LAN connected at Port 3 and updates the table 9. When B sends frame to C10. Bridge Doesn’t know about the locations of B or C. Thus it FLOODS the Packet. Also learns the location of B 11. This process continues until bridge learns about all the hosts on the network
  • 107. Looping Problem • Bridges works fine as long as there is no redundant bridges in the system (More than 1 bridge) • This redundancy in bridges creates “Looping Problem” • This problem is illustrated in the following figure.
  • 108. When A Sends a Frame to D. This frame enters both the Bridges at port 1. B1 and B2 Updates its table and floods the frame on LAN 2. Now LAN 2 contains 2 copies of frames. Now frame sent by the B2 will be received by B1 and Vice Versa. This time the frame enters at Port 2 of B1 and B2. Thus the Table is updated again At this stage LAN 1 contains 2 copies of frame and these frames again enters the bridges at port 1. Table is updated again. This Process continues on and on…..
  • 109. Review of Looping Problem
  • 110. Solution for Looping Problem • This looping problem can be overcome by “Spanning Tree Algorithm” • This algorithm creates a topology in which each LAN can be reached from any other LAN through one path only. • This ultimately removes the LOOP.
  • 111. Spanning Tree Algorithm Let us consider the given example network where 4 LAN’s are connected using 5 Bridges For understanding and calculating purpose lets draw an graphical representation of the given network Step 1: in order to start the spanning tree process we need to assign a COST (or) Metric to each link. Cost can be assigned based on several aspects like Minimum hops, Minimum Delay, or Maximum Bandwidth. This can be chosen by the choice of Admin. Here we are considering No. of Hops as a metric. Assign the cost as mentioned below. Bridge LAN = 1 LAN  Bridge = 0 Step 2: Compute the Number of Hops from a Root Node to all other nodes. The node with least ID will act as root node. We assume that B1 is the Root Node If there are multiple path to a node, choose the path with lowest cost and neglect the remaining paths
  • 115. Introduction • By using switches and bridges it is possible to build a large network but it is only up to certain limit. • In order to further increase the scalability of network , we connect multiple networks by a device called as “Router” • Hence the network layer comes in to picture which takes the responsibility of packet delivery from source to destination among multiple networks
  • 116. Basic Concepts • IP – Internet Protocol • CIDR – Classless Inter Domain Routing • ARP – Address Resolution Protocol • DHCP – Dynamic Host Control Protocol • ICMP – Internet Control Message Protocol
  • 117. Brief Notes first… then Deeper IP
  • 118. CIDR
  • 119. ARP
  • 120. DHCP
  • 121. ICMP

Editor's Notes

  1. View in Slide Show mode for better understanding
  2. NOTE: NOT AN EMPTY SLIDE….Image is hided for better understanding. View in slide show mode..
  3. View in Slide Show
  4. View in Slide Show
  5. VIEW IN SLIDE SHOW FOR BETTER UNDERSTANDING…
  6. View in slide show mode for clear view