SlideShare a Scribd company logo
1
Introduction to
Backward Learning Algorithm
for creating Bridges
by Roshan Karunarathna
2
Contents
• Before we learn Algorithm
• Data Link Layer
• Interconnection Devices
• LAN
• Limits of LAN
• Interconnecting LANs
• Bridge
• What is bridge
• Backward learning Algorithm
3
Data Link Layer
• In the seven-layer OSI model of computer
networking, the data link layer is layer 2.
In TCP/IP reference model, it corresponds
to, or is part of the link layer.
• The data link layer is the protocol layer
that transfers data between adjacent
network nodes in a wide area network or
between nodes on the same local area
network segment.
4
Interconnection Devices
Interconnection devices are used to inter connect networks
at the different layers of the network architecture. The
devices can operate at:
– the physical layer such as optical repeaters, hubs, digital
cross connects, etc.
– the data link layer such as LAN switches/bridges, frame relay
switches, etc.,
– the network layer such as a router or a gateway
– the transport layer for TCP segment switching
– the application layer for overlay networks such as content
delivery networks
5
Interconnection Devices
Ethernet Ethernet
Ethernet
Repeater
Autonomous
System Autonomous
SystemBridge
Gateway
Router
6
Limits of a LAN
• One shared LAN can limit us in terms of:
– Distance
– Number of nodes
– Performance
• How do we scale to a larger, faster
network?
– We must be able to interconnect LANs
7
LAN Interconnection
• Extend range of LAN.
• Support more users.
• Security and robustness.
• Heterogeneity.
Hub
Switch
8
Interconnecting Different LANs
• Conversion between different frame
formats.
– E.g., different frame lengths.
• Speed mismatch.
– Buffering.
• Security.
– Different security services provided by
different DLLs/MACs.
9
LAN Interconnection: Example
• Multiple LANs connected by a backbone.
10
Bridges
• Connect LANs.
• Operate at the DLL.
– Route based on DLL addresses.
• Distinction between bridges, switches, and
routers gets fuzzier as technology
advances.
11
Repeaters and Bridges
• Repeaters:
– Extend scope of LANs.
– Serve as amplifiers.
– No storage/routing capabilities.
• Bridges:
– Also extend scope of LANs.
– Routing/storage capabilities.
12
Bridges and Extended LANs
• “Transparently” interconnect LANs
– Receive frames from each LAN and forward to the
other
– Each LAN is its own domain; a bridge is not a
repeater
– Could have many ports or join to a remote LAN
bridge
13
14
More on Bridges
• Have multiple interfaces, 1 per LAN.
• Use destination address to forward unicast
frames; if destination is on the same LAN,
drops frame; otherwise forwards it.
• Forward all broadcast frames.
• Have storage and routing capability.
15
More on Bridges
• No additional encapsulation.
• But they may have to do header conversion if
interconnecting different LANs (e.g., 802.3 to
802.4 frame).
• May interconnect more than 2 LANs.
• LANs may be interconnected by more than 1
bridge.
16
Bridges from 802.x to 802.y
• Operation of a LAN bridge from 802.11 to 802.3.
17
Routing
• Routing is the process of forwarding of a packet
in a network so that it reaches its intended
destination. The main goals of routing are:
• Correctness
• Simplicity
• Robustness
• Stability
• Fairness
• Optimality
18
Routing with Bridges
• Bridge decides to relay frame based on
destination MAC address.
• If only 2 LANs, decision is simple.
• If more complex topologies, routing is needed,
i.e., frame may traverse more than 1 bridge.
19
Routing with Bridges
B
1 4
5 8
Frames for
5->8.
Frames for
1->4
LAN A
LAN B
20
Routing with Bridges (Cont’d)
• Listens to all frames on LAN A and accepts those
addressed to stations on LAN B.
• Retransmits frames onto B.
• Does the same for B-to-A traffic.
21
Transparent Bridges
• Plug them in and they work!
• How do they work?
– Promiscuous mode operation.
– Upon receiving frame, decide whether to
forward it or not.
– Routing table mapping destination addresses
to outgoing interface.
22
• The concept of backwards learning is very simple:
• Learn about an (source) address from the direction from
which it came, then place that address in a table and use it
for (destination) forwarding.
• Bridges operate in promiscuous mode, they listen to all
traffic that is broadcast on every link connected to its
active ports.
• By examining the source MAC address of every packet
traversing the link associated with a particular port on the
bridge, the bridge learns what addresses are reachable via
that particular port.
• These addresses are stored in a forwarding database or
table
Backward Learning Algorithm
23
Every LAN switch/Bridge maintains a forwarding database or
table. This table contains the following fields:
• MAC address
• Outgoing Port number
• Timer – indicating age of entry
The table can be interpreted as follows:
A machine with MAC address lies in direction of
outgoing port number. The entry is timer time units old.
Backward Learning Algorithm
24
Backward Learning Algorithm
• To increase overall performance:
– Shouldn’t forward AB or CD, should forward
AC and DB
• How does the bridge know?
– Learn who is where by observing source
addresses
– Forward using destination address; age for
robustness
25
Backward Learning Algorithm
• used by transparent bridges.
• When a bridge starts, its routing table is
empty.
– So, it floods: every incoming frame is forwarded in
all outgoing interfaces, except the one the frame
was received.
– In promiscuous mode, bridge sees all frames.
– They look at the frame’s source and “remember”
which LAN it came from.
– Entries are time stamped and expire after a
certain interval.
• Allows for topology changes.
26
Backward Learning (Cont’d)
• If source LAN = destination LAN, discard
frame.
• If source LAN <>destination LAN, forward
frame.
– If destination LAN unknown, flood frame.
27
Backward Learning (Cont’d)
28
• As the bridges are connected in a loop free tree
topology,
• the flooding will terminate at the leaves of the tree.
• we illustrate the operation of the backwards learning
algorithm by stepping through an example of a frame
transmission
• through a single LAN switch with an initially empty
forwarding table.
29
A LAN1
B LAN1
C LAN2
…
30
31
32
33
34
35
Bridge 1 Bridge 2
MAC Address Port MAC Address Port
A 1 A 1
C 2 C 1
E 2 E 2
36
In this method the routing tables at each node gets modified by
information from the incoming packets.
One way to implement backward learning is to include the identity of
the source node in each packet, together with a hop counter that is
incremented on each hop. When a node receives a packet in a
particular line, it notes down the number of hops it has taken to reach
it from the source node. If the previous value of hop count stored in
the node is better than the current one then nothing is done but if the
current value is better then the value is updated for future use.
The problem with this is that when the best route goes down then it
cannot recall the second best route to a particular node. Hence all the
nodes have to forget the stored informations periodically and start all
over again.
Further more….
37
Thank You!
Q & A now……

More Related Content

What's hot

Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
Ali A Jalil
 
Chapter 1-Microprocessors, Microcomputers, and Assembly Language
Chapter 1-Microprocessors, Microcomputers, and Assembly LanguageChapter 1-Microprocessors, Microcomputers, and Assembly Language
Chapter 1-Microprocessors, Microcomputers, and Assembly Language
cmkandemir
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
Token ring
Token ringToken ring
Token ring
selvakumar_b1985
 
Data link layer
Data link layerData link layer
Data link layer
st2112
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
Nitesh Singh
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Flow control in Computer Network
Flow control in Computer NetworkFlow control in Computer Network
Flow control in Computer Network
Ahtesham Ullah khan
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
NetProtocol Xpert
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
KarthicaMarasamy
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Power control in 3 g
Power control in 3 gPower control in 3 g
Power control in 3 g
Manish Srivastava
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
JAIGANESH SEKAR
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
Harshita Yadav
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Kaushik Panta
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
Maksudujjaman
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread Spectrum
Rohit Choudhury
 

What's hot (20)

Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Chapter 1-Microprocessors, Microcomputers, and Assembly Language
Chapter 1-Microprocessors, Microcomputers, and Assembly LanguageChapter 1-Microprocessors, Microcomputers, and Assembly Language
Chapter 1-Microprocessors, Microcomputers, and Assembly Language
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Token ring
Token ringToken ring
Token ring
 
Data link layer
Data link layerData link layer
Data link layer
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Flow control in Computer Network
Flow control in Computer NetworkFlow control in Computer Network
Flow control in Computer Network
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Power control in 3 g
Power control in 3 gPower control in 3 g
Power control in 3 g
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread Spectrum
 

Similar to Introduction to backwards learning algorithm

chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
MelkamtseganewTigabi1
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
Zuhaib Zaroon
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
ngusyirga
 
Acn Experiment No 2
Acn Experiment No 2Acn Experiment No 2
Acn Experiment No 2
Garima Singh
 
Network devices
Network devicesNetwork devices
Network devices
Gopal Krishna
 
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshhNetworks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshh
VijayKaran7
 
CS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptCS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).ppt
MekiPetitSeg
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
SmitNiks
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
ssuser2cc0d4
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
NiharikaDubey17
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
Network hardware essentials Lec#3
Network hardware essentials Lec#3Network hardware essentials Lec#3
Network hardware essentials Lec#3
Punjab and Superior College, Pakpattan
 
Networking devices
Networking devicesNetworking devices
Networking devices
rehnuma rusha
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
welcometofacebook
 
routerrouterrouterrouterrouterrouterrouter
routerrouterrouterrouterrouterrouterrouterrouterrouterrouterrouterrouterrouterrouter
routerrouterrouterrouterrouterrouterrouter
Ganesan368890
 
Lan overview
Lan overviewLan overview
Lan overview
Shyam Gupta
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
Syaiful Ahdan
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
Pondinesh2
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
21viveksingh
 
connecting LANs.pptx
connecting LANs.pptxconnecting LANs.pptx
connecting LANs.pptx
Jayaprasanna4
 

Similar to Introduction to backwards learning algorithm (20)

chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
 
Acn Experiment No 2
Acn Experiment No 2Acn Experiment No 2
Acn Experiment No 2
 
Network devices
Network devicesNetwork devices
Network devices
 
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshhNetworks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshh
 
CS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptCS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).ppt
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network hardware essentials Lec#3
Network hardware essentials Lec#3Network hardware essentials Lec#3
Network hardware essentials Lec#3
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
routerrouterrouterrouterrouterrouterrouter
routerrouterrouterrouterrouterrouterrouterrouterrouterrouterrouterrouterrouterrouter
routerrouterrouterrouterrouterrouterrouter
 
Lan overview
Lan overviewLan overview
Lan overview
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
connecting LANs.pptx
connecting LANs.pptxconnecting LANs.pptx
connecting LANs.pptx
 

More from Roshan Karunarathna

UI/UX presentation by Roshan Karunarathna
UI/UX presentation by Roshan KarunarathnaUI/UX presentation by Roshan Karunarathna
UI/UX presentation by Roshan Karunarathna
Roshan Karunarathna
 
LIVE CHAT ETIQUETTE
LIVE CHAT ETIQUETTELIVE CHAT ETIQUETTE
LIVE CHAT ETIQUETTE
Roshan Karunarathna
 
Iplanet
IplanetIplanet
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel Computing
Roshan Karunarathna
 
onlinemarketing
onlinemarketingonlinemarketing
onlinemarketing
Roshan Karunarathna
 
Pay Pal Introduction.........!
Pay Pal Introduction.........!Pay Pal Introduction.........!
Pay Pal Introduction.........!
Roshan Karunarathna
 
Chou fasman algorithm for protein structure prediction
Chou fasman algorithm for protein structure predictionChou fasman algorithm for protein structure prediction
Chou fasman algorithm for protein structure prediction
Roshan Karunarathna
 
Iterative and Incremental Development (RAD)
Iterative  and Incremental Development (RAD)Iterative  and Incremental Development (RAD)
Iterative and Incremental Development (RAD)
Roshan Karunarathna
 

More from Roshan Karunarathna (8)

UI/UX presentation by Roshan Karunarathna
UI/UX presentation by Roshan KarunarathnaUI/UX presentation by Roshan Karunarathna
UI/UX presentation by Roshan Karunarathna
 
LIVE CHAT ETIQUETTE
LIVE CHAT ETIQUETTELIVE CHAT ETIQUETTE
LIVE CHAT ETIQUETTE
 
Iplanet
IplanetIplanet
Iplanet
 
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel Computing
 
onlinemarketing
onlinemarketingonlinemarketing
onlinemarketing
 
Pay Pal Introduction.........!
Pay Pal Introduction.........!Pay Pal Introduction.........!
Pay Pal Introduction.........!
 
Chou fasman algorithm for protein structure prediction
Chou fasman algorithm for protein structure predictionChou fasman algorithm for protein structure prediction
Chou fasman algorithm for protein structure prediction
 
Iterative and Incremental Development (RAD)
Iterative  and Incremental Development (RAD)Iterative  and Incremental Development (RAD)
Iterative and Incremental Development (RAD)
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

Introduction to backwards learning algorithm

  • 1. 1 Introduction to Backward Learning Algorithm for creating Bridges by Roshan Karunarathna
  • 2. 2 Contents • Before we learn Algorithm • Data Link Layer • Interconnection Devices • LAN • Limits of LAN • Interconnecting LANs • Bridge • What is bridge • Backward learning Algorithm
  • 3. 3 Data Link Layer • In the seven-layer OSI model of computer networking, the data link layer is layer 2. In TCP/IP reference model, it corresponds to, or is part of the link layer. • The data link layer is the protocol layer that transfers data between adjacent network nodes in a wide area network or between nodes on the same local area network segment.
  • 4. 4 Interconnection Devices Interconnection devices are used to inter connect networks at the different layers of the network architecture. The devices can operate at: – the physical layer such as optical repeaters, hubs, digital cross connects, etc. – the data link layer such as LAN switches/bridges, frame relay switches, etc., – the network layer such as a router or a gateway – the transport layer for TCP segment switching – the application layer for overlay networks such as content delivery networks
  • 6. 6 Limits of a LAN • One shared LAN can limit us in terms of: – Distance – Number of nodes – Performance • How do we scale to a larger, faster network? – We must be able to interconnect LANs
  • 7. 7 LAN Interconnection • Extend range of LAN. • Support more users. • Security and robustness. • Heterogeneity. Hub Switch
  • 8. 8 Interconnecting Different LANs • Conversion between different frame formats. – E.g., different frame lengths. • Speed mismatch. – Buffering. • Security. – Different security services provided by different DLLs/MACs.
  • 9. 9 LAN Interconnection: Example • Multiple LANs connected by a backbone.
  • 10. 10 Bridges • Connect LANs. • Operate at the DLL. – Route based on DLL addresses. • Distinction between bridges, switches, and routers gets fuzzier as technology advances.
  • 11. 11 Repeaters and Bridges • Repeaters: – Extend scope of LANs. – Serve as amplifiers. – No storage/routing capabilities. • Bridges: – Also extend scope of LANs. – Routing/storage capabilities.
  • 12. 12 Bridges and Extended LANs • “Transparently” interconnect LANs – Receive frames from each LAN and forward to the other – Each LAN is its own domain; a bridge is not a repeater – Could have many ports or join to a remote LAN bridge
  • 13. 13
  • 14. 14 More on Bridges • Have multiple interfaces, 1 per LAN. • Use destination address to forward unicast frames; if destination is on the same LAN, drops frame; otherwise forwards it. • Forward all broadcast frames. • Have storage and routing capability.
  • 15. 15 More on Bridges • No additional encapsulation. • But they may have to do header conversion if interconnecting different LANs (e.g., 802.3 to 802.4 frame). • May interconnect more than 2 LANs. • LANs may be interconnected by more than 1 bridge.
  • 16. 16 Bridges from 802.x to 802.y • Operation of a LAN bridge from 802.11 to 802.3.
  • 17. 17 Routing • Routing is the process of forwarding of a packet in a network so that it reaches its intended destination. The main goals of routing are: • Correctness • Simplicity • Robustness • Stability • Fairness • Optimality
  • 18. 18 Routing with Bridges • Bridge decides to relay frame based on destination MAC address. • If only 2 LANs, decision is simple. • If more complex topologies, routing is needed, i.e., frame may traverse more than 1 bridge.
  • 19. 19 Routing with Bridges B 1 4 5 8 Frames for 5->8. Frames for 1->4 LAN A LAN B
  • 20. 20 Routing with Bridges (Cont’d) • Listens to all frames on LAN A and accepts those addressed to stations on LAN B. • Retransmits frames onto B. • Does the same for B-to-A traffic.
  • 21. 21 Transparent Bridges • Plug them in and they work! • How do they work? – Promiscuous mode operation. – Upon receiving frame, decide whether to forward it or not. – Routing table mapping destination addresses to outgoing interface.
  • 22. 22 • The concept of backwards learning is very simple: • Learn about an (source) address from the direction from which it came, then place that address in a table and use it for (destination) forwarding. • Bridges operate in promiscuous mode, they listen to all traffic that is broadcast on every link connected to its active ports. • By examining the source MAC address of every packet traversing the link associated with a particular port on the bridge, the bridge learns what addresses are reachable via that particular port. • These addresses are stored in a forwarding database or table Backward Learning Algorithm
  • 23. 23 Every LAN switch/Bridge maintains a forwarding database or table. This table contains the following fields: • MAC address • Outgoing Port number • Timer – indicating age of entry The table can be interpreted as follows: A machine with MAC address lies in direction of outgoing port number. The entry is timer time units old. Backward Learning Algorithm
  • 24. 24 Backward Learning Algorithm • To increase overall performance: – Shouldn’t forward AB or CD, should forward AC and DB • How does the bridge know? – Learn who is where by observing source addresses – Forward using destination address; age for robustness
  • 25. 25 Backward Learning Algorithm • used by transparent bridges. • When a bridge starts, its routing table is empty. – So, it floods: every incoming frame is forwarded in all outgoing interfaces, except the one the frame was received. – In promiscuous mode, bridge sees all frames. – They look at the frame’s source and “remember” which LAN it came from. – Entries are time stamped and expire after a certain interval. • Allows for topology changes.
  • 26. 26 Backward Learning (Cont’d) • If source LAN = destination LAN, discard frame. • If source LAN <>destination LAN, forward frame. – If destination LAN unknown, flood frame.
  • 28. 28 • As the bridges are connected in a loop free tree topology, • the flooding will terminate at the leaves of the tree. • we illustrate the operation of the backwards learning algorithm by stepping through an example of a frame transmission • through a single LAN switch with an initially empty forwarding table.
  • 29. 29 A LAN1 B LAN1 C LAN2 …
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. 35 Bridge 1 Bridge 2 MAC Address Port MAC Address Port A 1 A 1 C 2 C 1 E 2 E 2
  • 36. 36 In this method the routing tables at each node gets modified by information from the incoming packets. One way to implement backward learning is to include the identity of the source node in each packet, together with a hop counter that is incremented on each hop. When a node receives a packet in a particular line, it notes down the number of hops it has taken to reach it from the source node. If the previous value of hop count stored in the node is better than the current one then nothing is done but if the current value is better then the value is updated for future use. The problem with this is that when the best route goes down then it cannot recall the second best route to a particular node. Hence all the nodes have to forget the stored informations periodically and start all over again. Further more….
  • 37. 37 Thank You! Q & A now……

Editor's Notes

  1. Routers route based on layer 3 addresses Three cases: Some times people may have there own LAN and they may wanted to be connected There may be geographically spreaded so need cable ex Ethernet only 200m When we need to breake a LAN into parts
  2. LAN switches are multi port (more than 4 port) bridges. LAN switches are touted by manufacturers as high throughput multi interface devices that can interconnect ports at a variety of speeds, e.g., 10M, 100M, 1G and 10Gpbs. They are also able to operate the links in full duplex mode if directly connected to a network device1. To increase their speed of operation, LAN switches, like hubs, use cut through switching. Once the destination address has been processed the packet is forwarded to the appropriate output port where transmission can be commenced if the link is idle.
  3. Correctness: The routing should be done properly and correctly so that the packets may reach their proper destination. Simplicity: The routing should be done in a simple manner so that the overhead is as low as possible. With increasing complexity of the routing algorithms the overhead also increases. Robustness: Once a major network becomes operative, it may be expected to run continuously for years without any failures. The algorithms designed for routing should be robust enough to handle hardware and software failures and should be able to cope with changes in the topology and traffic without requiring all jobs in all hosts to be aborted and the network rebooted every time some router goes down. Stability: The routing algorithms should be stable under all possible circumstances. Fairness: Every node connected to the network should get a fair chance of transmitting their packets. This is generally done on a first come first serve basis. Optimality: The routing algorithms should be optimal in terms of throughput and minimizing mean packet delays. Here there is a trade-off and one has to choose depending on his suitability.
  4. The MAC address refers to the destination address in the MAC frame. The outgoing port number refers to the port that needs to be used to transmit the frame for that particular MAC address. The timer is used to control the age of the entries. When a timer expires, the entry is deleted from the table. Every MAC address hit refreshes the timer of that MAC address entry.
  5. If a bridge sees a frame with a destination address that matches one of the entries in its forwarding table, it will copy the packet into its buffer and forward the packet to the necessary port. If the outgoing port is the same as the incoming port, it discards the frame. If the bridge sees a frame for which it has no entry in its forwarding table, it will make multiple copies of the frame and broadcast it on every outgoing port (excluding the port
  6. If we now take an example of two bridges and observe the process by which a the forwarding table is filled, we will understand the backwards learning algorithm and how it is used by the bridges in promiscuous mode. we show a sample network with two bridges. Host A initially sends a frame to host F. This is followed by a frame from host C to host A and then a third frame from host E to host C. Bridge 1 will receive the frame on port 1. With its forwarding table empty, Bridge 1 will flood the frame on outging port 2. Bridge 2 receives the frame on port 1, it too does not find an entry in its table and proceeds to flood the frame on outgoing port 2. Destination F finally receives the frame. During this flooding process, both Bridges 1 and 2 learnt that MAC address A is associated with port 1 on their respective bridges. The second frame from host C to host A will cause no flooding as both bridges have an entry for MAC address A. Bridge 2 will ignore the frame as its association for MAC address A is with port 1 on which it received the frame. But before discarding the frame it will make an entry in its forwarding table for MAC address C. Bridge 1 will receive the frame on port 2 and forward the frame to port 1 based upon the entry for MAC address A in its forwarding table. It too will make a new entry in the forwarding table for MAC address C. The third frame from host E to host C will not cause flooding either as both bridges have now an entry for MAC address C. Bridge 2 will forward the frame from port 2 to port 1 and at the same time enter MAC address E in the forwarding table. Bridge 1 will ignore the frame as the outgoing port is the same as the received port. It too will make a new entry in the forwarding table for MAC address E. Below we show the resulting forwarding tables (ignoring the timer field).
  7. Why can’t we build a large network using bridges? Little control over forwarding paths Size of bridge forwarding tables grows with number of hosts Broadcast traffic flows freely over whole extended LAN Spanning tree algorithm limits reconfiguration speed Poor solution for connecting LANs with different MAC protocols
  8. The bridges must reside in a loop free topology because they use flooding to find a destination. In Figure 7 below we show an example of a typical meshed bridged network. Meshed networks are popular for they can tolerate a certain number of link and device failures without creating a disconnected segment.