campus network (pg. 224) Show a collection of two or more interconnected LANs, either within a building or housed externally in multiple buildings. bridge (pg. 225) A layer 2 device in the OSI model, meaning that it uses the MAC address information to make decisions regarding forwarding data packets. Only the data that needs to be sent across the bridge to the adjacent network segment is forwarded. Bridge Example: An example of using a bridge to segment two Ethernet LANs is shown in Figure 5-1. The picture shows that LAN A connects to port 1 of the bridge and LAN B connects to port 2 on the bridge, creating two segments, as shown. There are four computers in LAN A and three computers in LAN B. Bridges monitor all data traffic in each of the LAN segments connected to its ports. bridging table (pg. 225) List of MAC addresses and port locations for hosts association (pg. 226) Indicates that the destination MAC address for a host is connected to one of the ports on the bridge. If an association is found, the data is forwarded to that port. For example, assume that computer I sends a message to broadcast pg. 226 means the message is being sent to all computers on the network; therefore, all broadcasts in a LAN will be forwarded to all hosts connected within the bridged LANs. For example, the broadcast associated with an ARP will appear on all hosts. ARP pg. 226 ARP stands for Address Resolution Protocol, which is a protocol used to map an IP address to its MAC address. In the address resolution protocol, a broadcast is sent to all hosts in a LAN connected to the bridge. ARP Example: This is graphically shown in Figure 5-2. The bridge forwards all broadcasts; therefore, an ARP request broadcasting the message "Who has this IP address?" is sent to all hosts on the LAN. The data packets associated with ARP requests are small, but it requires computer time to process each request.
broadcast storm (pg. 226) Excessive amounts of broadcasts being forwarded by the bridge network slowdown (pg.226) Excessive amounts of broadcasts being forwarded by the bridge can lead to a broadcast storm, resulting in degraded network performance, ARP cache (pg. 227) all
networking devices (for example, computers) contain ARP cache notes: (pg. 228) The ARP cache holds the MAC address of a host, and this The following message is generated if all the ARP entries have expired: ARP cache Example: Following list outlines typical steps of a communication process between computer 1 and computer 2. 1. Computer 1 checks its ARP cache to determine if it
already has the MAC address of computer 2. If it does, it will skip to the final step; otherwise, it proceeds to the next step. ARP table (pg. 227) Another name for the ARP cache transparent bridge (pg. 228) The name for the type of bridge used to interconnect two LAN s running the same type of protocol (for example, Ethernet) translation bridge (pg. 228) Bridges are also used to interconnect two LANs that are operating two different networking protocols. For example, LAN A could be an Ethernet LAN and LAN B could be a token ring. Translation
Bridge Example: An example is provided in Figure 5-3. The bridge allows data from one LAN to be transferred to another. Also the MAC addressing information is standardized so the same address information is used regardless of the protocol. A common application today using a bridge is interconnecting LANs using wireless technology. The use of wireless bridges in LAN s is a popular choice for interconnecting the LANs when the cost of physically connecting them is prohibitive. Networking Bridge Table 5-3 Summary Of the Advantages and disadvantages Of a Bridge for Interconnecting LANs: Disadvantages: layer 2 switch (pg. 231) an improved network technology that addresses the issue Layer 2 Switch notes: (pg. 231) 1. The switch operates at layer 2 of the OSI model and therefore uses the MAC or Ethernet address for making decisions for forwarding data packets. multiport bridge: (pg. 231) Another name for a layer 2 switch (because it has multiple ports similar to the hub and can switch in a data connection from any port to any other port, similar to the bridge). Switch interconnecting a network The LAN shown in Figure 5-5 contains 14 computers and 2 printers connected to 16 ports on the switch, configured in a star topology. lf the computer connected to port 1 is printing a file on
the laser printer (port 12), the switch will set up a direct connection between ports 1 and 12. The computer at port 14 could also be communicating multicast (pg. 232) A multicast message is sent to a specific group of hosts on the network. Hub-Switch Comparison (fig 5-6) (pg. 232) 1.The objective of this experiment was to show that data traffic is isolated
with a switch but not with a hub.
ping (pg. 233) command is used to verify that a network connection exists between two computers. The command format for ping is: ping [ip address] {for this example ping 10.10.10_3} PING COMMAND REVIEW 1.a series of echo requests and echo replies are issued by the networking devices to test the time it takes for data to The Switch Experimental Results (pg. 234)(fig 5-6(b)) 1.The ping command was sent from computer 1 to computer 3, ping 10.10.10.3. managed switch (pg. 235) simply a network switch that allows the network administrator to monitor, configure, and manage certain network features such as which computers are allowed to access the LAN via the switch. Cisco Network Assistant (pg. 235) 1.A management software tool from Cisco that simplifies dynamic assignment (pg. 236) means that the MAC address was assigned to a port when a host was connected. static assignment (pg. 236) indicates that the MAC address has been manually assigned to an interface, and the port assignment does not Secure tab (pg. 236) shows what switch ports have been secured. secure addresses (pg. 236) means that a MAC address has been assigned to a port, and the port will automatically disable itself if a device with a different MAC address connects to the secured aging time (pg. 237) 1. the length of time a MAC address remains assigned to a port. Network Switch-benefits (Pg. 239) 1. The benefits of using a network switch are many in a modern computer network. ping (pg. 233) ... isolating the collision-domain (pg. 239) 1. Breaking the network into segments where a segment is time-stamp
(pg. 239) establishes the time when the mapping of the MAC address to a switch port is established. What happens if the destination MAC address is not stored in CAM? (pg. 239) In this case, the packet is transmitted out all switch ports except for the port where the packet was received. This is called flooding. flooding (pg. 239) The term used to describe what happens when a switch broadcast domain (pg. 239) 1. any network broadcast sent over the network will be seen by all networking devices in the same network. Broadcasts within a LAN will be passed by switches. store-and- forward (pg. 239) 1. In this mode, the entire frame of data is received before 2. There is switch latency in this mode because the destination and source MAC addresses must be extracted from the packet, and the entire packet must be received 3. An advantage of the store-and- forward mode is that the switch checks the data packet for errors before it is sent on to the destination. 4. A disadvantage is lengthy data packets will take a longer time before they exit the switch and are sent to the switch latency (pg. 239) the length of time a data packet takes from the time it enters a switch until it exits. content addressable memory (CAM) (pg. 239) 1. CAM is a table of MAC address and port mapping used by the switch to identify connected networking devices. 2. The extracted MAC addresses are then used by the switch to map a direct communication between two network devices connected to its ports. 3. The MAC address and port information remain in CAM as long as the device connected to the switch port remains active. cut-through (pg. 239-240) 1. In this mode, the data packet is forwarded to the destination as soon as the destination MAC address has been read. 2. This minimizes the switch latency; however, no error detection is provided by the switch. Cut-through forms (pg. 240) 1. Fast-Forward: This mode offers the minimum switch latency. The received data packet is sent to the destination as soon as the destination MAC address is extracted. 2. Fragment-Free: In this mode, fragment collisions are filtered out by the switch. Fragment-collisions are collisions that occur within the first 64 bytes of 3. Adaptive Cut-Through: This is a combination of the store-and-forward mode and
cut-through. Adaptive Cut-Through: (pg. 240) This is a combination of the store-and-forward mode and cut-through. error threshold (pg. 240) The point where the number of errors in the data packets multilayer switch (MLS) (pg. 240) 1. Operates at layer 2 but functions at the higher layer 3 switch (pg. 240) 1. Layer 3 switches still work at layer 2 but additionally wire speed routing (pg. 240) (layer 3 switch) where the data packets are processed as fast as they are arriving. layer 4 switch processes data packets at the transport layer of the OSI model. network address (pg. 241) 1. Another name for the layer 3 address 2. The router is a layer 3 device in the OSI model, which means the router uses the network address (layer 3 addressing) to make routing decisions regarding forwarding data packets. 3. In the OSI model, the layer 3 or network layer responsibilities include handling of the network address. The network address is also called a logical address, rather than being a physical address such as the MAC address. logical address (pg. 241) describes the IP address location of the network and the address location of the host in the network. physical address (pg. 241) is the hardware or MAC address embedded into the Routers 1. are used to interconnect LANs in a campus network. routing table (pg. 249) Keeps track of the routes to use for forwarding data to its Routing table Example (pg. 249)(fig. 5-21) 1. RouterA used its routing table to determine a network gateway (pg. 249) 1. is used to describe the address of the networking device that enables the hosts in a LAN to connect to networks and hosts outside the LAN. For example, for
all hosts in LAN A, the gateway address will be 10.10.10.250. This address is configured on the host computer. Any IP packets with a destination outside the network segment (pg. 249) 1. defines the networking link between two LANs. There is a segment associated with each connection of an internetworking device (for example, router-hub, router-switch,
router-router). For example, the IP address for the network segment connecting LAN A to the router is lO.lO.20.0. All hosts connected to this segment must contain a 10.lO.20.x because a subnet mask of 255.255.255.0 is being used. auto-negotiation 1. Protocol used by interconnected electronic devices to
negotiate a link speed. ADVANTAGES DISADVANTAGES Auto-Negotiation Steps (pg. 251) 1. Each link partner shares or advertises its data link capabilities with the other link partner. half-duplex (pg. 252)(FIG. 5-23)
The communications device can transmit or receive but full-duplex (pg. 252)(fig 5-23) 1. means that the communications device can transmit and receive at the same time. fast link pulse (FLP) (pg. 251) 1. Carries the configuration information between each console input (pg. 242) 1. This input provides an RS-232 serial communications link into the router for initial router configuration. media converter (pg. 245) 1. Media converters are commonly used in computer networks to adapt layer 1 or physical layer technologies from one technology to another. For example: enterprise network (pg. 247) 1. Term used to describe the network used by a large USB Interface: (pg. 242) The USB ports are used for storage and security support Serial Interface (pg. 242) 1. CTRLR Tl land CTRLR Tl O. • AL-alarm FastEthernet port (FAO/O, / FAO/I, FAOI2, ... ) (pg. 242) 1. Naming of the FastEthernet ports on the router. FEOIO: Fast Ethernet (lOIlOOMbps) and FEOIl: Fast small interconnected LAN (Fig 5-21)(pg. 247-248) 1. This example shows four Ethernet LANs interconnected using three routers. Router A connects directly to the LAN A switch via FastEthernet port FAO/O. Router A also connects directly to Router B via the FastEthernet port FAo/l and • Router B connects directly to the LAN B switch via FastEthernet port FAO/O. Router B connects to the LAN C switch via FastEthernet port FAo/I. Router B connects directly to Router A via FastEthernet port FA012 and connects to Router C via FastEthernet port FAO/3. • Router C connects directly to the LAN D switch via the FastEthernet port FAO/O. Connection to Router B is provided via Ethernet port FAO/I. Router C connects to Router A via FastEthernet port FA012. Voice Interface Card (VIC2-4FXO): (pg. 243) This interface shows four phone line connections. This router can be programmed as a small Private Branch WAN Interface Card (WIC2AM): (pg. 243) This interface has two RJ-l1 jacks and two V90 analog internal modems. These modems can be used to handle both incoming and outgoing modem calls. VIC-4FXSIDID: (pg. 243) 1. This interface is a four-port FXS and DID voice/fax interface card. serial port (SO/O,SO/I, SOI2, ... ) (pg. 248) 1. Naming of the serial ports on the router. serial ports (pg. 243) Provides a serial data communication link into and out of the router, using V35 serial interface cables. DSU Port (pg. 244) 1. This Tl controller port connection is used to make the serial connection to Telco. *TD-Transmit Data Ethernet Port (pg. 244) This connection provides a lO/lOOMbps Ethernet data link. Analog Modem Ports (pg. 244) This router has a 16-port analog network module. router interface (pg. 242)(fig 5-14) 1. Often the router ports are called the router interface, the physical connection where the router connects to the network. auxiliary input (pg. 242) This input is used to connect a dial-in modem into the router. The auxiliary port provides an alternative way to remotely log in to the router if the network is down. This port also uses an RJ-45 connection. power on/off (pg. 243) Turns on/off electrical power to the router. AUI port (pg. 244) This is a lOMbps Ethernet port. AUI stands for "attachment unitinterface." What OSI layer is a bridge?The key difference between hubs, switches and bridges is that hubs operate at Layer 1 of the OSI model, while bridges and switches work with MAC addresses at Layer 2.
Where does bridge operation in OSI model?In the OSI model, bridging is performed in the data link layer (layer 2). If one or more segments of the bridged network are wireless, the device is known as a wireless bridge.
What is Layer 2 bridging?Layer-2 bridging works by putting one physical and one virtual Ethernet adapter into a mode where they can receive traffic that is not destined for their address. This traffic is selectively sent onto the other network according to the IEEE 802.1D standard, known as, "bridging" the frames.
What do bridges and switches use to make data forwarding decisions?Bridges are used to divide up networks and thus reduce the amount of traffic on each network. Unlike bridges and switches, which use the hardware-configured MAC address to determine the destination of the data, routers use the software-configured network address to make decisions.
|