This document discusses various networking devices and their functions:
Layer 1 devices like repeaters and hubs extend signal distances or recreate signals on multiple ports. Layer 2 switches and bridges operate at the data link layer, using MAC addresses to determine packet forwarding. Layer 3 devices like routers use network layer addresses and can connect different network types. MPLS assigns "labels" to packets for efficient forwarding through label switching routers.
Here are the answers to the exercise questions:
1. In a point-to-point network with N computers, each computer needs to be connected to every other computer with a dedicated link. The total number of links required is the number of ways of choosing an ordered pair of computers out of N computers, which is N(N-1). Since each link connects two computers, the total number of links is N(N-1)/2 = (N2-N)/2.
2. For bus topology, if a station breaks, all communication on the segment is disrupted. For star topology, only the broken station is affected, other stations can still communicate. For ring topology, the ring is broken and no station after
The document introduces Cisco IOS software which controls routing and switching functions on Cisco routers and switches. It describes the purpose of IOS which provides basic routing, switching, security and scalability. It also outlines the command line interface environment and modes, and how to establish connections and configure router interfaces such as Ethernet, serial and ISDN interfaces.
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Vishal Sharma, Ph.D.
This document discusses internet routing protocols and provides an overview of distance vector and link state routing. It begins by outlining the talk and explaining the importance of routing in the internet. It then describes the routing process at a router and how routers build routing tables by exchanging information with routing protocols. The document proceeds to illustrate the operation of distance vector routing, including how routers calculate and update their routing tables. It notes some drawbacks of distance vector routing, such as slow convergence after topology changes and problems with unequal link costs. Finally, it provides examples of how these drawbacks, like counting to infinity and bouncing effects, can occur.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
A router is a networking device that forwards data packets between computer networks. It chooses the best path within the network to send data from one PC to another. Routers use internal components like a CPU, RAM, and flash memory to run an operating system like Cisco IOS, which allows it to perform routing functions. Routers have external ports that connect to both local area networks and wide area networks. Routers can also act as firewalls by hiding private IP addresses and only exposing a public IP address to the internet, protecting devices on the private network.
- This chapter discusses switching and VLANs, including Fast Ethernet, full- and half-duplex Ethernet operations, LAN switching methods like cut-through and store-and-forward, and the Spanning Tree Protocol. It also defines virtual LANs (VLANs) and how they segment networks logically without changing the physical configuration. VLAN trunking protocols are used to communicate VLAN information between switches.
This document discusses various attacks that can be performed on network infrastructure. It describes how hubs and switches can be exploited using sniffing tools or ARP poisoning to perform man-in-the-middle attacks. The document provides recommendations for mitigating these risks, such as using switches instead of hubs, encrypting traffic, monitoring for unauthorized ARP broadcasts, and hardening devices against ARP spoofing attacks.
Here are the answers to the exercise questions:
1. In a point-to-point network with N computers, each computer needs to be connected to every other computer with a dedicated link. The total number of links required is the number of ways of choosing an ordered pair of computers out of N computers, which is N(N-1). Since each link connects two computers, the total number of links is N(N-1)/2 = (N2-N)/2.
2. For bus topology, if a station breaks, all communication on the segment is disrupted. For star topology, only the broken station is affected, other stations can still communicate. For ring topology, the ring is broken and no station after
The document introduces Cisco IOS software which controls routing and switching functions on Cisco routers and switches. It describes the purpose of IOS which provides basic routing, switching, security and scalability. It also outlines the command line interface environment and modes, and how to establish connections and configure router interfaces such as Ethernet, serial and ISDN interfaces.
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Vishal Sharma, Ph.D.
This document discusses internet routing protocols and provides an overview of distance vector and link state routing. It begins by outlining the talk and explaining the importance of routing in the internet. It then describes the routing process at a router and how routers build routing tables by exchanging information with routing protocols. The document proceeds to illustrate the operation of distance vector routing, including how routers calculate and update their routing tables. It notes some drawbacks of distance vector routing, such as slow convergence after topology changes and problems with unequal link costs. Finally, it provides examples of how these drawbacks, like counting to infinity and bouncing effects, can occur.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
A router is a networking device that forwards data packets between computer networks. It chooses the best path within the network to send data from one PC to another. Routers use internal components like a CPU, RAM, and flash memory to run an operating system like Cisco IOS, which allows it to perform routing functions. Routers have external ports that connect to both local area networks and wide area networks. Routers can also act as firewalls by hiding private IP addresses and only exposing a public IP address to the internet, protecting devices on the private network.
- This chapter discusses switching and VLANs, including Fast Ethernet, full- and half-duplex Ethernet operations, LAN switching methods like cut-through and store-and-forward, and the Spanning Tree Protocol. It also defines virtual LANs (VLANs) and how they segment networks logically without changing the physical configuration. VLAN trunking protocols are used to communicate VLAN information between switches.
This document discusses various attacks that can be performed on network infrastructure. It describes how hubs and switches can be exploited using sniffing tools or ARP poisoning to perform man-in-the-middle attacks. The document provides recommendations for mitigating these risks, such as using switches instead of hubs, encrypting traffic, monitoring for unauthorized ARP broadcasts, and hardening devices against ARP spoofing attacks.
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Tutun Juhana
- The document discusses different types of computer networks at the data link layer, including broadcast networks where all stations share a channel and point-to-point networks where pairs of hosts are directly connected. It focuses on wired local area networks (LANs).
- Common LAN technologies discussed include Ethernet, Token Ring, FDDI, and ATM LAN. Ethernet standards including Fast Ethernet and Gigabit Ethernet are explained in detail, covering their goals, frame formats, addressing, and implementations of half-duplex and full-duplex modes.
- Ten-Gigabit Ethernet is also summarized, with the goals of upgrading the data rate to 10Gbps while maintaining compatibility with previous Ethernet standards.
Routing Technique Table Type by Umar danjuma maiwada.pptumardanjumamaiwada
This presentation discusses routing techniques and routing tables. It begins with an introduction to key concepts like routing, routers, and routing tables. It then explains routing as the process of moving data between a source and destination, usually performed by routers. There are two main categories of routing tables: static and dynamic. Static tables are manually configured while dynamic tables adapt to network changes. The presentation also covers unicast and multicast routing techniques. Unicast routing forwards data to a single destination, while multicast routing sends data to multiple destinations simultaneously. Common routing protocols and applications are also outlined.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes key OSPF concepts like link state routing, areas, neighbor relationships, designated routers, link state advertisements, and shortest path first algorithms. It also provides configuration examples and compares OSPF to other routing protocols.
The document discusses managing Cisco IOS images and configuring WAN connections. It covers topics such as copying flash images using TFTP, resolving hostnames, password recovery, and configuring encapsulation protocols like HDLC and PPP. Specific configuration examples are provided for setting the CHAP authentication protocol on serial interfaces between two routers.
STP prevents loops by electing a single root bridge and blocking redundant links. It uses BPDUs containing bridge IDs and path costs to elect the root bridge with the lowest bridge ID. The switch with bridge ID 32768.0001.964E.7EBB is elected as the root bridge based on having the lowest bridge ID of the switches shown.
Ethernet networks can operate in either half-duplex or full-duplex mode. Half-duplex uses CSMA/CD to resolve collisions but only allows data transmission in one direction at a time, while full-duplex allows simultaneous two-way transmission by using point-to-point connections between devices to eliminate collisions. Spanning Tree Protocol (STP) is used to prevent loops in redundant switched networks by providing a single active path and blocking backup paths, while Rapid Spanning Tree Protocol (RSTP) provides much faster convergence times than STP. Virtual LANs (VLANs) allow logical segmentation of networks to isolate broadcast domains while maintaining physical connectivity, with VLAN IDs associating ports on switches to specific
This document provides an overview of advances in Ethernet technology. It discusses the evolution of Ethernet beyond its original use as a LAN technology. It describes different standards body views of Ethernet and key Ethernet concepts like frames, addressing, clients, and link layer control protocols. The document also outlines modern Ethernet features like VLANs, Ethernet services, QoS, link aggregation, and OAM functions.
This document discusses different types of network transmission and interconnection devices. It describes unicast transmission as one-to-one, multicast as one-to-many, and broadcast as one-to-all. Hubs operate at the physical layer and can cause collisions, while switches add intelligence to prevent collisions and learn MAC addresses to avoid broadcasting. Routers operate at the network layer and maintain routing tables to forward packets between networks. Bridges operate at the data link layer and use self-configuring algorithms like spanning tree to transparently interconnect LANs without requiring reconfiguration of network addresses.
Design and Implementation of Dynamic Routing in Wireless NetworksSatish Reddy
This document summarizes a student's research on designing and implementing dynamic routing in wireless networks. It discusses several dynamic routing algorithms including SPRA, ECMP, AODV, and proposes a new algorithm called DDRA. DDRA aims to improve security and throughput by routing consecutive packets along different paths instead of the same path. Evaluation shows DDRA has less path similarity, higher throughput, and is less vulnerable to attacks like eavesdropping compared to other algorithms. The document also covers related topics like routing methods, protocols, and a security-enhanced routing table design.
Routers, switches, hubs, and bridges are networking devices that operate at different layers of the OSI model. Routers operate at layer 3 and use logical IP addresses to route packets between networks. Switches operate at layer 2 and use MAC addresses to segment collision domains and allow for full duplex communication within a broadcast domain. Hubs operate at layer 1 and are used to connect network segments but do not segment collision domains. Bridges are software-based devices that operate at layer 2 and segment broadcast domains but have fewer ports and are slower than switches.
Routing protocols allow routers to communicate and exchange information that helps determine the best path between networks. The main types are static routing, where routes are manually configured, and dynamic routing, where routes are automatically updated as network conditions change. Common dynamic routing protocols include RIP, IGRP, EIGRP, and OSPF, which use different algorithms and metrics like hop count or bandwidth to calculate the best routes.
This document provides an overview of different routing protocols. It discusses IP routing, static routing, and dynamic routing. It also covers proactive routing protocols like DSDV which maintain routing tables and periodically update them. Reactive protocols like DSR and AODV establish routes on demand. Hybrid protocols combine proactive and reactive approaches. The document describes the key processes, advantages, and disadvantages of DSDV, DSR, AODV, and zone routing protocol.
The document summarizes the architecture of Juniper Networks routers. It discusses the separation of the control plane and forwarding plane. The control plane builds the routing tables while the forwarding plane is responsible for packet forwarding using specialized ASICs. It also describes the TX Matrix platform with up to 4 T640 routing nodes, each with 16 packet forwarding engines. The nodes are interconnected using a CLOS fabric switch.
There are two main types of routing protocols: distance vector protocols like RIP and IGRP that determine the best path based on hop count and send the full routing table, and link state protocols like OSPF and IS-IS that advertise link information to build a shared topology database and converge faster. EIGRP is a hybrid protocol that behaves like a distance vector protocol. Interior routing protocols like these are used within an autonomous system, while exterior protocols like BGP route between autonomous systems.
A beginners guide into routing, its elements and basic working principles. An introduction to most widely used Unicast routing protocols and their working principles.
Cisco IOS is the operating system that controls routing and switching functions on Cisco networking devices. It allows routers and switches to function by running configuration files that control traffic flow. Understanding Cisco IOS is essential for network administrators to properly configure and manage Cisco devices on their networks.
The document discusses different routing methods used in computer networks, including:
- Network-specific routing which treats all hosts on the same network as a single entity in the routing table.
- Host-specific routing which explicitly defines routes to individual host addresses in the routing table.
- Default routing which uses a single default route for all unknown destinations.
It also covers routing protocols like RIP and OSPF, explaining how they establish and maintain routing tables dynamically as the network changes. Distance vector protocols like RIP propagate full routing tables between routers, while link-state protocols like OSPF flood link state information to build independent views of the network topology.
Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree
Protocol (RSTP)
1. The main difference between Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) and Spanning
Tree Protocol (STP IEEE 802.1D) is that Rapid Spanning Tree Protocol (RSTP IEEE 802.1W)
assumes the three Spanning Tree Protocol (STP) ports states Listening, Blocking, and Disabled are
same (these states do not forward Ethernet frames and they do not learn MAC addresses).
Hence Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) places them all into a new called
Discarding state. Learning and forwarding ports remain more or less the same.
This document provides an overview of PDH (Plesiochronous Digital Hierarchy) networks and SONET/SDH (Synchronous Optical Networking/Synchronous Digital Hierarchy) technologies. It discusses the evolution of PDH networks and their implementation, as well as the evolution of SONET/SDH. The basic units of transmission for SONET/SDH are described, including framing, interleaving, and their data rates. Differences between PDH and SONET/SDH are also outlined.
The document discusses contention networks, carrier sense multiple access (CSMA), components of routers, modular network interfaces in routers, differences between hubs, layer 2 switches and layer 3 switches, packet tunneling, shortest path routing, packet fragmentation, functions of routing processors, evolution of router construction, minimum spanning trees, routing protocols for mobile hosts, TCP/IP tunneling over ATM, distance vector routing, link state routing, hierarchical routing, ATM networks, creating ATM virtual circuits, segmentation and reassembly in ATM, internetworking using concatenated virtual circuits and connectionless internetworking, network properties, and an example of the TCP/IP protocol in action.
This document discusses various components of backbone networks including bridges, routers, and gateways. It describes common backbone architectures like serial, distributed, and collapsed backbones. Key technologies discussed include Ethernet, FDDI, and ATM. The document provides details on improving backbone performance through techniques like upgrading network components, increasing circuit capacity, and reducing network demand. It recommends designing backbones that can be easily upgraded and moving to Ethernet as the standard technology for both LANs and backbones.
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Tutun Juhana
- The document discusses different types of computer networks at the data link layer, including broadcast networks where all stations share a channel and point-to-point networks where pairs of hosts are directly connected. It focuses on wired local area networks (LANs).
- Common LAN technologies discussed include Ethernet, Token Ring, FDDI, and ATM LAN. Ethernet standards including Fast Ethernet and Gigabit Ethernet are explained in detail, covering their goals, frame formats, addressing, and implementations of half-duplex and full-duplex modes.
- Ten-Gigabit Ethernet is also summarized, with the goals of upgrading the data rate to 10Gbps while maintaining compatibility with previous Ethernet standards.
Routing Technique Table Type by Umar danjuma maiwada.pptumardanjumamaiwada
This presentation discusses routing techniques and routing tables. It begins with an introduction to key concepts like routing, routers, and routing tables. It then explains routing as the process of moving data between a source and destination, usually performed by routers. There are two main categories of routing tables: static and dynamic. Static tables are manually configured while dynamic tables adapt to network changes. The presentation also covers unicast and multicast routing techniques. Unicast routing forwards data to a single destination, while multicast routing sends data to multiple destinations simultaneously. Common routing protocols and applications are also outlined.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes key OSPF concepts like link state routing, areas, neighbor relationships, designated routers, link state advertisements, and shortest path first algorithms. It also provides configuration examples and compares OSPF to other routing protocols.
The document discusses managing Cisco IOS images and configuring WAN connections. It covers topics such as copying flash images using TFTP, resolving hostnames, password recovery, and configuring encapsulation protocols like HDLC and PPP. Specific configuration examples are provided for setting the CHAP authentication protocol on serial interfaces between two routers.
STP prevents loops by electing a single root bridge and blocking redundant links. It uses BPDUs containing bridge IDs and path costs to elect the root bridge with the lowest bridge ID. The switch with bridge ID 32768.0001.964E.7EBB is elected as the root bridge based on having the lowest bridge ID of the switches shown.
Ethernet networks can operate in either half-duplex or full-duplex mode. Half-duplex uses CSMA/CD to resolve collisions but only allows data transmission in one direction at a time, while full-duplex allows simultaneous two-way transmission by using point-to-point connections between devices to eliminate collisions. Spanning Tree Protocol (STP) is used to prevent loops in redundant switched networks by providing a single active path and blocking backup paths, while Rapid Spanning Tree Protocol (RSTP) provides much faster convergence times than STP. Virtual LANs (VLANs) allow logical segmentation of networks to isolate broadcast domains while maintaining physical connectivity, with VLAN IDs associating ports on switches to specific
This document provides an overview of advances in Ethernet technology. It discusses the evolution of Ethernet beyond its original use as a LAN technology. It describes different standards body views of Ethernet and key Ethernet concepts like frames, addressing, clients, and link layer control protocols. The document also outlines modern Ethernet features like VLANs, Ethernet services, QoS, link aggregation, and OAM functions.
This document discusses different types of network transmission and interconnection devices. It describes unicast transmission as one-to-one, multicast as one-to-many, and broadcast as one-to-all. Hubs operate at the physical layer and can cause collisions, while switches add intelligence to prevent collisions and learn MAC addresses to avoid broadcasting. Routers operate at the network layer and maintain routing tables to forward packets between networks. Bridges operate at the data link layer and use self-configuring algorithms like spanning tree to transparently interconnect LANs without requiring reconfiguration of network addresses.
Design and Implementation of Dynamic Routing in Wireless NetworksSatish Reddy
This document summarizes a student's research on designing and implementing dynamic routing in wireless networks. It discusses several dynamic routing algorithms including SPRA, ECMP, AODV, and proposes a new algorithm called DDRA. DDRA aims to improve security and throughput by routing consecutive packets along different paths instead of the same path. Evaluation shows DDRA has less path similarity, higher throughput, and is less vulnerable to attacks like eavesdropping compared to other algorithms. The document also covers related topics like routing methods, protocols, and a security-enhanced routing table design.
Routers, switches, hubs, and bridges are networking devices that operate at different layers of the OSI model. Routers operate at layer 3 and use logical IP addresses to route packets between networks. Switches operate at layer 2 and use MAC addresses to segment collision domains and allow for full duplex communication within a broadcast domain. Hubs operate at layer 1 and are used to connect network segments but do not segment collision domains. Bridges are software-based devices that operate at layer 2 and segment broadcast domains but have fewer ports and are slower than switches.
Routing protocols allow routers to communicate and exchange information that helps determine the best path between networks. The main types are static routing, where routes are manually configured, and dynamic routing, where routes are automatically updated as network conditions change. Common dynamic routing protocols include RIP, IGRP, EIGRP, and OSPF, which use different algorithms and metrics like hop count or bandwidth to calculate the best routes.
This document provides an overview of different routing protocols. It discusses IP routing, static routing, and dynamic routing. It also covers proactive routing protocols like DSDV which maintain routing tables and periodically update them. Reactive protocols like DSR and AODV establish routes on demand. Hybrid protocols combine proactive and reactive approaches. The document describes the key processes, advantages, and disadvantages of DSDV, DSR, AODV, and zone routing protocol.
The document summarizes the architecture of Juniper Networks routers. It discusses the separation of the control plane and forwarding plane. The control plane builds the routing tables while the forwarding plane is responsible for packet forwarding using specialized ASICs. It also describes the TX Matrix platform with up to 4 T640 routing nodes, each with 16 packet forwarding engines. The nodes are interconnected using a CLOS fabric switch.
There are two main types of routing protocols: distance vector protocols like RIP and IGRP that determine the best path based on hop count and send the full routing table, and link state protocols like OSPF and IS-IS that advertise link information to build a shared topology database and converge faster. EIGRP is a hybrid protocol that behaves like a distance vector protocol. Interior routing protocols like these are used within an autonomous system, while exterior protocols like BGP route between autonomous systems.
A beginners guide into routing, its elements and basic working principles. An introduction to most widely used Unicast routing protocols and their working principles.
Cisco IOS is the operating system that controls routing and switching functions on Cisco networking devices. It allows routers and switches to function by running configuration files that control traffic flow. Understanding Cisco IOS is essential for network administrators to properly configure and manage Cisco devices on their networks.
The document discusses different routing methods used in computer networks, including:
- Network-specific routing which treats all hosts on the same network as a single entity in the routing table.
- Host-specific routing which explicitly defines routes to individual host addresses in the routing table.
- Default routing which uses a single default route for all unknown destinations.
It also covers routing protocols like RIP and OSPF, explaining how they establish and maintain routing tables dynamically as the network changes. Distance vector protocols like RIP propagate full routing tables between routers, while link-state protocols like OSPF flood link state information to build independent views of the network topology.
Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree
Protocol (RSTP)
1. The main difference between Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) and Spanning
Tree Protocol (STP IEEE 802.1D) is that Rapid Spanning Tree Protocol (RSTP IEEE 802.1W)
assumes the three Spanning Tree Protocol (STP) ports states Listening, Blocking, and Disabled are
same (these states do not forward Ethernet frames and they do not learn MAC addresses).
Hence Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) places them all into a new called
Discarding state. Learning and forwarding ports remain more or less the same.
This document provides an overview of PDH (Plesiochronous Digital Hierarchy) networks and SONET/SDH (Synchronous Optical Networking/Synchronous Digital Hierarchy) technologies. It discusses the evolution of PDH networks and their implementation, as well as the evolution of SONET/SDH. The basic units of transmission for SONET/SDH are described, including framing, interleaving, and their data rates. Differences between PDH and SONET/SDH are also outlined.
The document discusses contention networks, carrier sense multiple access (CSMA), components of routers, modular network interfaces in routers, differences between hubs, layer 2 switches and layer 3 switches, packet tunneling, shortest path routing, packet fragmentation, functions of routing processors, evolution of router construction, minimum spanning trees, routing protocols for mobile hosts, TCP/IP tunneling over ATM, distance vector routing, link state routing, hierarchical routing, ATM networks, creating ATM virtual circuits, segmentation and reassembly in ATM, internetworking using concatenated virtual circuits and connectionless internetworking, network properties, and an example of the TCP/IP protocol in action.
This document discusses various components of backbone networks including bridges, routers, and gateways. It describes common backbone architectures like serial, distributed, and collapsed backbones. Key technologies discussed include Ethernet, FDDI, and ATM. The document provides details on improving backbone performance through techniques like upgrading network components, increasing circuit capacity, and reducing network demand. It recommends designing backbones that can be easily upgraded and moving to Ethernet as the standard technology for both LANs and backbones.
A hub is a networking device that connects multiple devices on a local area network (LAN). It receives data packets through one port and broadcasts them to all other ports so all connected devices can see the packets. Hubs operate in half duplex mode and have no bandwidth management or collision detection. Switches are more advanced devices that can connect more devices than hubs. Switches have buffers and port-to-MAC address tables that allow them to send frames to specific ports faster than hubs. Routers connect multiple networks like LANs and WANs. Routers use IP addresses to route packets between networks and can run routing protocols to dynamically learn routes.
Network devices like hubs, switches, and routers connect computers in a network and help manage traffic flow. Hubs broadcast all received data to all ports but have limited bandwidth. Switches can connect more devices than hubs and have features like VLANs. Routers connect different networks and use IP addresses to direct traffic. Other devices like firewalls, VPNs, and IDS/IPS provide network security functions.
This document discusses various networking hardware devices and their functions. It describes network adapters, hubs, switches, routers, bridges, and gateways. It explains that network adapters connect devices to the network, hubs repeat signals, switches subdivide networks and support virtual LANs, routers integrate LANs and WANs using different protocols, bridges connect similar LANs, and gateways connect dissimilar networks. It also provides details on various types, features, and protocols associated with these networking hardware devices.
This document discusses different types of network transmission and interconnection devices. It describes unicast transmission as one-to-one communication, multicast as one-to-many communication, and broadcast as one-to-all communication. The document then discusses various network devices like hubs, switches, bridges, routers and gateways, explaining their functions and key differences. For example, it notes that switches perform buffering to prevent collisions, while hubs do not, and that bridges connect local area networks transparently while routers require IP address configuration.
In the field of Computer Science and Information Technology, Computer Networks plays significant role. This Presentation provides newly Students to aware the Network, Network devices and what are the possibilities to connect or communicate large geographical areas.
The document discusses topics related to the network layer, including:
1) The network layer is responsible for routing packets between hosts and networks, addressing devices and networks, and internetworking between subnets with different addressing schemes or protocols.
2) Key functions of the network layer include routing, addressing, queueing and forwarding packets according to quality of service, and providing connection-oriented and connectionless mechanisms.
3) The document discusses various networking devices that operate at the network layer like routers, switches, bridges, repeaters, and gateways, and their functions in routing packets between networks and subnets.
This document provides an overview of network devices and protocols including repeaters, bridges, routers, gateways, TCP/IP, and applications like DNS, SMTP, HTTP. It describes the functions of repeaters, hubs, bridges, switches, routers, and gateways. Repeaters extend network length while hubs connect multiple devices. Bridges and switches filter traffic between segments/ports. Routers route packets between networks and gateways translate between different protocols. It also summarizes the layers of the TCP/IP protocol suite including network interface, internet, transport, and application layers, and describes protocols like IPv4, IPv6, TCP, UDP, and applications like DNS, SMTP, HTTP.
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
Anycast is a networking technique where the same IP address is assigned to multiple nodes or devices, and packets are delivered to the nearest node. This improves latency and provides redundancy compared to unicasting, where there is a single destination node. With anycasting, routers select the best destination node based on the fewest hops or other application-level metrics. Anycasting was initially used for DNS to improve response times, as DNS uses UDP and does not require an established connection. It has since been applied to other protocols like HTTP that use TCP, where switching nodes can cause connection issues.
A hub, switch, and router each serve different functions in a network. A hub simply connects devices together but broadcasts all data to all ports. A switch connects devices and sends data only to the port of the intended recipient to avoid congestion. A router connects multiple networks together, both wired and wireless, and chooses the best path to send data packets between the networks.
Routers and switches are networking devices that allow computers and other devices to connect to each other and form networks. While routers connect separate logical networks and operate at the network layer, switches operate at the data link layer and connect devices within a single local area network by forwarding data frames. The functions of routers and switches differ, with routers directing traffic between networks and switches allowing many devices to share a connection and increasing network bandwidth.
Routers and switches are networking devices that connect computers and networks, but they operate at different layers and have different functions. Routers operate at the network layer (layer 3) and use IP addresses to direct traffic between networks, while switches operate at the data link layer (layer 2) and use MAC addresses to direct traffic within a local area network. Some key differences are that routers can perform tasks like network address translation, have fewer ports, and take longer for routing decisions than switches.
Types of Networks
There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
Personal area network, or PAN
Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN
A router forwards packets between networks based on network layer information in its routing tables. It operates at layer 3 and can connect different networks, whether local or global. Routers have two primary functions: determining the best path and sharing routing details with other routers. Routers boot up by verifying components and can be configured through commands or graphical interfaces to perform functions like routing, switching, and network address translation.
This document provides information about Ethernet, switches, and their components. It discusses the Ethernet frame structure including the preamble, start of frame delimiter, destination and source addresses, length, data, and CRC fields. It also describes Ethernet cabling including twisted pair, coaxial, and fiber optic cables. The CSMA/CD protocol for Ethernet is explained. Finally, the document discusses different devices for interconnecting nodes on a network including hubs, switches, and routers as well as advantages and disadvantages of switches.
A computer network connects devices like computers, printers and routers that can communicate with each other. There are two main types of networks: local area networks (LANs) within a building and wide area networks (WANs) that interconnect LANs across large geographic areas. LANs use technologies like Ethernet and transmit data through cabling like twisted pair or fiber optic cables. Common devices that help manage data flow on networks include switches, routers and wireless access points.
➒➌➎➏➑➐➋➑➐➐ Satta Matka Dpboss Matka Guessing Indian Matka
KALYAN MATKA | MATKA RESULT | KALYAN MATKA TIPS | SATTA MATKA | MATKA.COM | MATKA PANA JODI TODAY | BATTA SATKA | MATKA PATTI JODI NUMBER | MATKA RESULTS | MATKA CHART | MATKA JODI | SATTA COM | FULL RATE GAME | MATKA GAME | MATKA WAPKA | ALL MATKA RESULT LIVE ONLINE | MATKA RESULT | KALYAN MATKA RESULT | DPBOSS MATKA 143 | MAIN MATKA
➒➌➎➏➑➐➋➑➐➐ Satta Matka Dpboss Matka Guessing Indian Matka
KALYAN MATKA | MATKA RESULT | KALYAN MATKA TIPS | SATTA MATKA | MATKA.COM | MATKA PANA JODI TODAY | BATTA SATKA | MATKA PATTI JODI NUMBER | MATKA RESULTS | MATKA CHART | MATKA JODI | SATTA COM | FULL RATE GAME | MATKA GAME | MATKA WAPKA | ALL MATKA RESULT LIVE ONLINE | MATKA RESULT | KALYAN MATKA RESULT | DPBOSS MATKA 143 | MAIN MATKA
➒➌➎➏➑➐➋➑➐➐ Satta Matka Dpboss Matka Guessing Indian Matka KALYAN MATKA | MATKA RESULT | KALYAN MATKA TIPS | SATTA MATKA | MATKA.COM | MATKA PANA JODI TODAY | BATTA SATKA | MATKA PATTI JODI NUMBER | MATKA RESULTS | MATKA CHART | MATKA JODI | SATTA COM | FULL RATE GAME | MATKA GAME | MATKA WAPKA | ALL MATKA RESULT LIVE ONLINE | MATKA RESULT | KALYAN MATKA RESULT | DPBOSS MATKA 143 | MAIN MATKA
➒➌➍➑➊➑➏➍➋➒ Satta Matka Satta result marka result
Satta Matka Satta result marka result Dpboss sattamatka341 satta143 Satta Matka Sattamatka New Mumbai Ratan Satta Matka Fast Matka Milan Market Kalyan Matka Results Satta Game Matka Game Satta Matka Kalyan Satta Matka Mumbai Main Online Matka Results Satta Matka Tips Milan Chart Satta Matka Boss
New Star Day Satta King Live Satta Matka Results Satta Matka Company Indian Matka Satta Matka Kalyan Night Matka
➒➌➍➑➊➑➏➍➋➒ Satta Matka Satta result marka result
2. Layer 1 (Physical) DevicesLayer 1 (Physical) Devices
Repeater:Repeater:
Extends distances by repeating a signalExtends distances by repeating a signal
Any slight variations in the carrier wave for individualAny slight variations in the carrier wave for individual
bits is corrected when the carrier wave is reproducedbits is corrected when the carrier wave is reproduced
Hub:Hub:
As above, but re-creates the carrier wave on multipleAs above, but re-creates the carrier wave on multiple
portsports
Hubs do not decide whether or not to copy data, theyHubs do not decide whether or not to copy data, they
do it (necessary or unnecessary)do it (necessary or unnecessary)
All ports are part of the same collision domainAll ports are part of the same collision domain
With a hub as the centre of the star, any 2 hosts can haveWith a hub as the centre of the star, any 2 hosts can have
frame collisionsframe collisions
3. Layer 2 (Data Link) DevicesLayer 2 (Data Link) Devices
Layer 2 switch:Layer 2 switch:
Serves the same purpose as a hubServes the same purpose as a hub
Can dynamically determine if a frame should be placed on a portCan dynamically determine if a frame should be placed on a port
(and which one)(and which one)
The data link layer (e.g. MAC) address is used to make thisThe data link layer (e.g. MAC) address is used to make this
determinationdetermination
A table of MAC addresses and corresponding ports is built usingA table of MAC addresses and corresponding ports is built using
incoming framesincoming frames
Each LAN segment (port) becomes its own collision domainEach LAN segment (port) becomes its own collision domain
Only 2 hosts on the same LAN segment can have frame collisionsOnly 2 hosts on the same LAN segment can have frame collisions
Layer 2 bridgeLayer 2 bridge
As above, but the connected networks do not necessarily haveAs above, but the connected networks do not necessarily have
to be of the same typeto be of the same type
4. Layer 2/3 DevicesLayer 2/3 Devices
Broadband (Cable/DSL) or Wireless RouterBroadband (Cable/DSL) or Wireless Router
Primarily operates as a layer 2 switch / access pointPrimarily operates as a layer 2 switch / access point
However, theseHowever, these routersrouters often have additional features (some ofoften have additional features (some of
which are in layer 3):which are in layer 3):
Dynamic host configuration (DHCP) – IP address assignment forDynamic host configuration (DHCP) – IP address assignment for
network hosts, for examplenetwork hosts, for example
DNS capability (local or distributed) – Provides naming of hostsDNS capability (local or distributed) – Provides naming of hosts
inside the networkinside the network
IP masquerading – TheIP masquerading – The routerrouter can use one IP given by a broadbandcan use one IP given by a broadband
provider, but allow all of its hosts to use different IPs inside theprovider, but allow all of its hosts to use different IPs inside the
networknetwork
Layer 3 SwitchLayer 3 Switch
Uses layer 3 routing to determine a path for packetsUses layer 3 routing to determine a path for packets
Once a path is found, subsequent packets are switchedOnce a path is found, subsequent packets are switched
This switching typically occurs on layer 2This switching typically occurs on layer 2
These devices will be discussed in more detail laterThese devices will be discussed in more detail later
5. Layer 3 (Network) DevicesLayer 3 (Network) Devices
Layer 3 BridgeLayer 3 Bridge
A bridge that uses network layer addresses (e.g. IP) in itsA bridge that uses network layer addresses (e.g. IP) in its
forwarding database, instead of data link layer addresses (e.g.forwarding database, instead of data link layer addresses (e.g.
MAC)MAC)
This type of bridge more readily allows different types of networkThis type of bridge more readily allows different types of network
to be joined, since they need not share an address typeto be joined, since they need not share an address type
Cannot handle multiple paths effectively/efficiently: a host isCannot handle multiple paths effectively/efficiently: a host is
either on a given port or it is noteither on a given port or it is not
RouterRouter
Determines routes for each packet using network layerDetermines routes for each packet using network layer
addresses (e.g. IP)addresses (e.g. IP)
Can connect any type of network togetherCan connect any type of network together
Is capable of determining preferred paths where multiple pathsIs capable of determining preferred paths where multiple paths
existexist
7. What is a Router Made of?What is a Router Made of?
A router has many of the sameA router has many of the same
components as your computer:components as your computer:
CPUCPU
MemoryMemory
I/O Interfaces (mostly network interfaces)I/O Interfaces (mostly network interfaces)
Operating SystemOperating System
8. Routers Through HistoryRouters Through History
Gateways:Gateways:
A computer with installed software to forward packetsA computer with installed software to forward packets
These are obsolete, but were common in the early days ofThese are obsolete, but were common in the early days of
ARPANetARPANet
Routers:Routers:
A computer with specialized hardware and operating systemA computer with specialized hardware and operating system
designed for forwarding packetsdesigned for forwarding packets
Switching Routers:Switching Routers:
A computer with specialized hardware (switching fabric) thatA computer with specialized hardware (switching fabric) that
allows packets to be forwarded directly in hardwareallows packets to be forwarded directly in hardware
The specialized hardware is, in many respects, similar to that ofThe specialized hardware is, in many respects, similar to that of
a switch (e.g. ATM switch)a switch (e.g. ATM switch)
9. Router HardwareRouter Hardware
Input buffers (one for each network interface):Input buffers (one for each network interface):
Used to store incoming packets before they are processedUsed to store incoming packets before they are processed
Routing processor:Routing processor:
This is often software running on a CPU which:This is often software running on a CPU which:
Maintains and exchanges routing data with other routersMaintains and exchanges routing data with other routers
Controls the switching fabric to forward packetsControls the switching fabric to forward packets
With high-end routers, each network interface may have a localWith high-end routers, each network interface may have a local
routing processor (for forwarding) so that each can forward therouting processor (for forwarding) so that each can forward the
packets in its own input buffer independentlypackets in its own input buffer independently
Switching fabric:Switching fabric:
A network of connections between network interfaces (and theirA network of connections between network interfaces (and their
input and output buffers)input and output buffers)
Output buffers (one for each network interface):Output buffers (one for each network interface):
Used to store outgoing packets after they are processed, butUsed to store outgoing packets after they are processed, but
before the network is available for transmissionbefore the network is available for transmission
10. Routers: Network InterfacesRouters: Network Interfaces
Often, routers have modularized networkOften, routers have modularized network
interfacesinterfaces
One can add/remove/replace network interfaces asOne can add/remove/replace network interfaces as
needs changeneeds change
Some routers can accept network interface modulesSome routers can accept network interface modules
of different types (e.g. Ethernet, Token Ring)of different types (e.g. Ethernet, Token Ring)
Each network interface would have its own:Each network interface would have its own:
Input bufferInput buffer
Output bufferOutput buffer
Routing processor (in high-end routers)Routing processor (in high-end routers)
11. Routers: Input BuffersRouters: Input Buffers
The incoming packets of a network interface are placedThe incoming packets of a network interface are placed
in input buffersin input buffers
These are banks of very high speed memory for packet queuingThese are banks of very high speed memory for packet queuing
prior to processingprior to processing
The packet is stored here until the routing processor is availableThe packet is stored here until the routing processor is available
The network interface may have a routing processor,The network interface may have a routing processor,
which would:which would:
…… have a copy of the forwarding table (to prevent concurrenthave a copy of the forwarding table (to prevent concurrent
access)access)
…… lookup the destination address in this forwarding table, tolookup the destination address in this forwarding table, to
determine the correct output portdetermine the correct output port
…… configure the switching fabric to forward the packet to theconfigure the switching fabric to forward the packet to the
correct output buffercorrect output buffer
Low-end routers would share one routing processorLow-end routers would share one routing processor
12. Routers: Routing ProcessorsRouters: Routing Processors
Routing processors have two functions:Routing processors have two functions:
1.1. Maintain and exchange routing data withMaintain and exchange routing data with
other routers in the networkother routers in the network
Often this involves computing the forwardingOften this involves computing the forwarding
table from data received by other routerstable from data received by other routers
1.1. Use the forwarding table data toUse the forwarding table data to
configure the switching fabric to forwardconfigure the switching fabric to forward
the packet to the correct output portthe packet to the correct output port
13. Routers: Routing ProcessorsRouters: Routing Processors
A routing processor is software which executesA routing processor is software which executes
on a CPU:on a CPU:
Off-the-shelf CPUOff-the-shelf CPU
These are very inexpensiveThese are very inexpensive
However, the performance of these CPUs is low since theyHowever, the performance of these CPUs is low since they
are not optimized for the types of operations a routerare not optimized for the types of operations a router
typically needs to performtypically needs to perform
Application-Specific Integrated Circuit (ASIC)Application-Specific Integrated Circuit (ASIC)
These are expensive to design (time and money)These are expensive to design (time and money)
They are optimized for typical routing operationsThey are optimized for typical routing operations
High-end routers use these to achieve higher performanceHigh-end routers use these to achieve higher performance
levelslevels
14. Routers: Switching FabricRouters: Switching Fabric
Switching fabric’s job is to move packetsSwitching fabric’s job is to move packets
from the input buffer into the correct outputfrom the input buffer into the correct output
bufferbuffer
The routing processor determines the correctThe routing processor determines the correct
output port, using the forwarding tableoutput port, using the forwarding table
15. Routers: Switching FabricRouters: Switching Fabric
Switching fabric comes in 3 major types:Switching fabric comes in 3 major types:
In-memory switching fabric:In-memory switching fabric:
The packets are input into the routing processor’sThe packets are input into the routing processor’s
memory, and output into the correct output buffermemory, and output into the correct output buffer
Bus-based switching fabric:Bus-based switching fabric:
The packets move along a shared bus (similar to aThe packets move along a shared bus (similar to a
network bus) to the correct output buffernetwork bus) to the correct output buffer
Crossbar switching fabric:Crossbar switching fabric:
The packets move along a grid of redundant busesThe packets move along a grid of redundant buses
If any bus fails, alternate paths exist so thatIf any bus fails, alternate paths exist so that
forwarding can continueforwarding can continue
16. Routers: Output BuffersRouters: Output Buffers
The switching fabric gets the packet to theThe switching fabric gets the packet to the
right output portright output port
However, that port’s network may not beHowever, that port’s network may not be
immediately availableimmediately available
The packets are stored in the output bufferThe packets are stored in the output buffer
until the network is availableuntil the network is available
17. Router PerformanceRouter Performance
Several methods to improve router performanceSeveral methods to improve router performance
have been discussed:have been discussed:
Use application-specific integrated circuitsUse application-specific integrated circuits
Optimized for routing operationsOptimized for routing operations
Include much routing functionality otherwise executed asInclude much routing functionality otherwise executed as
software (in memory)software (in memory)
Many routing functions can execute in parallel, adding newMany routing functions can execute in parallel, adding new
functionality without decreasing throughputfunctionality without decreasing throughput
Use efficient switching fabricUse efficient switching fabric
Bus or crossbar-based switching fabrics reduce the need forBus or crossbar-based switching fabrics reduce the need for
in-memory processingin-memory processing
19. MPLSMPLS
MPLS is another way to improve routerMPLS is another way to improve router
performanceperformance
Label switching tries to leverage some of theLabel switching tries to leverage some of the
performance of virtual circuit switched networksperformance of virtual circuit switched networks
(e.g. ATM)(e.g. ATM)
Packets are assigned a label upon entering anPackets are assigned a label upon entering an
MPLS networkMPLS network
This label is used (instead of the IP address) forThis label is used (instead of the IP address) for
making forwarding decisionsmaking forwarding decisions
20. MPLS LabelsMPLS Labels
An MPLS label is an arbitrary valueAn MPLS label is an arbitrary value
This value is typically a numeric identifierThis value is typically a numeric identifier
However, labels could also be the frequency (i.e. colour) ofHowever, labels could also be the frequency (i.e. colour) of
light used in multi-mode optical fibrelight used in multi-mode optical fibre
The label can change from one label-switching routerThe label can change from one label-switching router
(LSR) to the next(LSR) to the next
The label must only be unique for the sending andThe label must only be unique for the sending and
receiving routerreceiving router
IP addresses, in contrast, are usually unique across theIP addresses, in contrast, are usually unique across the
networknetwork
A value could even be chosen to help the routingA value could even be chosen to help the routing
processor choose the correct output portprocessor choose the correct output port
22. MPLS: SimplifiedMPLS: Simplified
MPLS LSR
MPLS LSR MPLS LSR
MPLS LSR
MPLS LSR
MPLS LSR
Web Server
E-Mail Server
User
• Here, the label is shown as colour
• Notice the simplicity of the router’s job:
• Red: Up
• Blue: Right
23. MPLS: SimplifiedMPLS: Simplified
MPLS LSR
MPLS LSR MPLS LSR
MPLS LSR
MPLS LSR
MPLS LSR
Web Server
E-Mail Server
User
• Notice that two labels can be directed
down the same link
24. MPLS: Label ValuesMPLS: Label Values
MPLS LSR
MPLS LSR MPLS LSR
MPLS LSR
MPLS LSR
MPLS LSR
Web Server
E-Mail Server
User
• Notice that label values are not
globally unique
• Each pair of routers agrees on a label
7
15
31
7
31
47
25. MPLS PacketsMPLS Packets
MPLS adds a small pre-header to the start of any IPv4MPLS adds a small pre-header to the start of any IPv4
(or IPv6, IPX, etc.) packet(or IPv6, IPX, etc.) packet
In other words, between the data link and network headersIn other words, between the data link and network headers
Label
20 bits
Class of Service3 bits
Stack1 bit
Hop Limit8 bits
The label value
The QoS class of the packet attached (e.g. discardable?)
Is there a stack of labels?
The hop limit, copied from/to the IP header
26. MPLS and ATMMPLS and ATM
LSRs can be ATM-enabledLSRs can be ATM-enabled
An LSR can forward a packet (as cells) through anAn LSR can forward a packet (as cells) through an
ATM networkATM network
This can be for any number of hops through the ATMThis can be for any number of hops through the ATM
networknetwork
In this situation the source and destination ATMIn this situation the source and destination ATM
switches must be LSRsswitches must be LSRs
Other switches in between can be normal ATM switches,Other switches in between can be normal ATM switches,
howeverhowever
The source LSR will use AAL segmentation to send the cellsThe source LSR will use AAL segmentation to send the cells
on the ATM network using a VPI/VCI for the destination LSRon the ATM network using a VPI/VCI for the destination LSR
The destination LSR will extract the packet and continueThe destination LSR will extract the packet and continue
transmission using MPLStransmission using MPLS