lec 2. computer networks
TRANSCRIPT
-
7/29/2019 Lec 2. Computer Networks
1/42
Lecture 2: Network Devices
Muhammad Saqib Bhatti
-
7/29/2019 Lec 2. Computer Networks
2/42
15.1 Connecting Devices
Five connecting devices Repeaters
Hubs
Bridges
Switches Routers
Gateway
-
7/29/2019 Lec 2. Computer Networks
3/42
Figure 15.1 Five categories of connecting devices
-
7/29/2019 Lec 2. Computer Networks
4/42
Repeaters
A physical layer device the acts on bits not on frames orpackets
Can have two or more interfaces When a bit (0,1) arrives, the repeater receives it and
regenerates it, the transmits it onto all other interfaces Used in LAN to connectcable segments and extend the
maximum cable length extending the geographicalLAN range
Ethernet 10base5Max. segment length 500m4repeaters (5 segments) are used to extend the cable to2500m)
Ethernet 10Base2- Max. segment length 185m - 4repeaters (5 segments) are used to extend the cable to925m
Repeaters do not implement any access method If any two nodes on any two connected segments
transmit at the same time collision will happen
-
7/29/2019 Lec 2. Computer Networks
5/42
Figure 15.3 Function of a repeater
-
7/29/2019 Lec 2. Computer Networks
6/42
Figure 15.2 A repeater connecting two segments of a LAN
-
7/29/2019 Lec 2. Computer Networks
7/42
Hubs Acts on the physical layer Operate on bits rather than frames
Also called multiport repeater
Used to connect stations adapters in a physical star topology butlogically bus
Connection to the hub consists oftwo pairs of twisted pair wire onefortransmission and the other forreceiving.
Hub receives a bit from an adapter and sends it to all the other adapterswithout implementing any access method.
does not do filtering (forward a frame into a specific destination ordrop it) just it copy the received frame onto all other links
The entire hub forms a single collision domain, and a singleBroadcast domain Collision domain: is that part of the network (set ofNICs) when two or
more nodes transmit at the same time collision will happen.
Broadcast domain: is that part of the network (set of NIC) where eachNIC can 'see' other NICs' traffic broadcast messages.
Multiple Hubs can be used to extend the network length
For 10BaseT and 100BaseT the maximum length of the connectionbetween an adapter and the hub is 100 meters the maximum lengthbetween any two nodes is 200 m = maximum network length
-
7/29/2019 Lec 2. Computer Networks
8/42
Figure 16.4 Hubs
-
7/29/2019 Lec 2. Computer Networks
9/42
Interconnecting with hubs
Backbone hub interconnects LAN segments
Advantage:
Extends max distance between nodes
Disadvantages
Individual segment collision domains become one large collision
domain (reduce the performance)
Cant interconnect different Ethernet technologies(like 10BaseT &100BaseT) because no buffering at the hub
Here we have a
single collision
domain and a
singlebroadcastdomain
-
7/29/2019 Lec 2. Computer Networks
10/42
Hubs Vs. Repeaters
Hub are different than repeaters in the following:
The provide network management features by gathering
information about the network and report them to a monitoring host
connected to the hub so some statistics about the network(bandwidth usages, collision rates, average frame sizes) can be
generated.
If an adapter is not working the hub can disconnect it internally and
the network will not be affected.
-
7/29/2019 Lec 2. Computer Networks
11/42
Bridges/switches Acts on the data linklayer (MAC address level)
Used to divide (segment) the LAN into smaller LANs segments, or to connect LANs that useidentical physical and data link layers protocol (see figure in next slide)
Each LAN segment is a separate collision domain
Bridge does not send the received frame to all other interfaces like hubs and repeaters, but it performsfiltering which means: Whether a frame should be forwarded to another interface that leads to the destination ordropped
This is done by a bridge table (forwarding table) that contains entries for the nodes on the LAN
The bridge table is initially empty and filled automatically by learning from framesmovements in the network
An entry in the bridge table consists of : Node LAN (MAC)Address, Bridge Interface towhich the node is connected to, the record creation time
A bridge runs CSMA/CD before sending a frame onto the link not like the hub or repeater
Bridge frame handling is done in software
-
7/29/2019 Lec 2. Computer Networks
12/42
Bridges
Connecting two or more LAN segments together
-
7/29/2019 Lec 2. Computer Networks
13/42
Bridges (Switches) Vs. Hubs
A Hub sending a packet form F to C.A Switch sending a packet from F to C
-
7/29/2019 Lec 2. Computer Networks
14/42
Figure 15.5 A bridge connecting two LANs
-
7/29/2019 Lec 2. Computer Networks
15/42
Switch learning process When the switch receives a frame, it compares the source address of
the frame with each entry in the forwarding table
IfNo match is found, the bridge will add to the table the frame source
address and the Interface on which the frame was received.
If a match is found, the bridge updates the Interface number on whichthe frame was received ifit is different from the one in the table also it
updates the record time
Then, the switch compares the destination address of the frame with
each entry in the forwarding table (MAC table)
If a match is found then
The bridge compares the interface number on which the frame was received and
the interface number in the table, if they are different the bridge forwards the
frame through the interface number stored in the table. Otherwise, if they are the
same the switches discards (drops) the frame.
If no match is found, the switch floods the frame on all interfaces except
the one on which the frame was received.
-
7/29/2019 Lec 2. Computer Networks
16/42
Figure 15.6 A learning switch and the process of learning
Read Page 449
-
7/29/2019 Lec 2. Computer Networks
17/42
Collision domains in a nonbridged and bridged network
In heavy load, each station has an average effectivetheoretical bandwidth = 10/12
Each station has an average effective bandwidth equal=10/3
-
7/29/2019 Lec 2. Computer Networks
18/42
Example:Three LANs connected through abridgeNote: here we have three collisiondomains and a single broadcast domain
Switch
-
7/29/2019 Lec 2. Computer Networks
19/42
Figure 16.8 Prior to spanning tree application
When using switches, the network should not
contain any loop (there should be exactly onepath from any LAN to any other LAN
Loops can cause number of frames in the LAN toincrease indefinitely
Switch
-
7/29/2019 Lec 2. Computer Networks
20/42
Effect of Loop of switches
-
7/29/2019 Lec 2. Computer Networks
21/42
Switches N-Port bridge where N is equal to number of stations
Usually used to connect individual computers not LANs like bridge
Allows more than one device connected to the switch directly totransmit simultaneously
Can operates in Full-duplex mode (can send and receive frames at thesame time over the same interface)
Performs MAC address recognition and frame forwarding inhardware (bridge in software)
Two types :
Store-and-forward: switch receives the whole a frame on the inputline, buffers it briefly , performs error checking, then routes it to theappropriate output line (similar to bridge). Buffering will causesome delay.
Cut-through: based on the fact that the destination address appearsat the beginning of the MAC frame, so once the address isrecognized the frame is directly sent to the appropriate output line ifthe output buffer is empty (no need to buffer it). no bufferingdelay NO ERROR CHECKING
-
7/29/2019 Lec 2. Computer Networks
22/42
Full-Duplex operation
Isolatedcollisiondomains
-
7/29/2019 Lec 2. Computer Networks
23/42
Routers Operates at network layer = deals with packets not frames
Connect LANs and WANs with similar or different protocolstogether
Switches and bridges isolate collision domains but forwardbroadcast messages to all LANs connected to them. Routers isolatebothcollision domains and broadcastdomains
Acts like normal stations on a network, but have more than onenetwork address (an address to each connected network)
Deals with global address ( network layer address (IP)) not localaddress (MAC address)
Routers Communicate with each other and exchange routinginformation
Determine best route using routing algorithmby special softwareinstalled on them
Forward traffic if information on destination is availableotherwise discard it (not like a switch or bridge)
-
7/29/2019 Lec 2. Computer Networks
24/42
Figure 15.11 Routers connecting independent LANs and WANs
Routers
-
7/29/2019 Lec 2. Computer Networks
25/42
An Institutional Network Using Hubs,
Ethernet Switches, and a Router
-
7/29/2019 Lec 2. Computer Networks
26/42
switch switch switch
-
7/29/2019 Lec 2. Computer Networks
27/42
-
7/29/2019 Lec 2. Computer Networks
28/42
Learning Objectives List common cable types used in networking
Describe how UTP cables are made
Explain how UTP cables are used in Ethernet networks Demonstrate the ability to make a working patch cable
Name the two wiring standards used for wiredEthernet networks and their uses
Common network cable
-
7/29/2019 Lec 2. Computer Networks
29/42
Common network cable
types
Coaxial cable
Unshieldedtwisted pair
Fiber optic
-
7/29/2019 Lec 2. Computer Networks
30/42
UTP characteristics
Unshielded
Twisted (why?) pairs of insulated conductors
Covered by
insulating sheath
-
7/29/2019 Lec 2. Computer Networks
31/42
UTP categories
Category 1 Voice only (Telephone)
Category 2 Data to 4 Mbps (Localtalk)
Category 3 Data to 10Mbps (Ethernet)
Category 4 Data to 20Mbps (Token ring)
Category 5Category 5e
Data to 100Mbps (Fast Ethernet)Data to 1000Mbps (Gigabit Ethernet)
Category 6 Data to 2500Mbps (Gigabit Ethernet)
-
7/29/2019 Lec 2. Computer Networks
32/42
Cat5e cable 1000Mbps data capacity
For runs of up to 90 meters
Solid core cable ideal for structural installations (PVCor Plenum)
Stranded cable ideal for patch cables
Terminated with RJ-45 connectors
-
7/29/2019 Lec 2. Computer Networks
33/42
RJ45 connector
-
7/29/2019 Lec 2. Computer Networks
34/42
Making connections - Tools
Cat5e cable
RJ45 connectors
Cable stripper
Scissors
Crimping tool
-
7/29/2019 Lec 2. Computer Networks
35/42
Making connections - Steps
1. Strip cable end
2. Untwist wire ends
3. Arrange wires
4. Trim wires to size
5. Attach connector
6. Check
7. Crimp8. Test
-
7/29/2019 Lec 2. Computer Networks
36/42
Step 1 Strip cable end
Strip 1 1 of insulating sheath
Avoid cutting into conductor insulation
-
7/29/2019 Lec 2. Computer Networks
37/42
Step 2 Untwist wire ends
Sort wires by insulation colors
-
7/29/2019 Lec 2. Computer Networks
38/42
Step 3 Arrange wires
TIA/EIA 568A: GW-G OW-Bl BlW-O BrW-Br
TIA/EIA 568B: OW-O GW-Bl BlW-G BrW-Br
-
7/29/2019 Lec 2. Computer Networks
39/42
Step 4 Trim wires to size
Trim all wires evenly
Leave about of wires exposed
-
7/29/2019 Lec 2. Computer Networks
40/42
Step 5 Attach connector
Maintain wire order, left-to-right, with RJ45 tabfacing downward
-
7/29/2019 Lec 2. Computer Networks
41/42
Step 6 - Check
Do all wires extend to end?
Is sheath well inside connector?
-
7/29/2019 Lec 2. Computer Networks
42/42
Step 7 - Crimp
Squeeze firmly to crimp connecteronto cable end (8P)