SlideShare a Scribd company logo
DATCOMM
Local Area Network
Technologies
Engr. Melvin K. Cabatuan, MsE
De La Salle University
February 2013
Objectives
- To briefly discuss the technology of dominant
wired LANs- Ethernet, and other LAN media.
Objectives
- To briefly discuss the technology of dominant
wired LANs- Ethernet, and other LAN media.
- Describe Media Access Control (MAC) and
Carrier Sense Multiple Access/Collision
Detection (CSMA/CD)
Objectives
- To briefly discuss the technology of dominant
wired LANs- Ethernet, and other LAN media.
- Describe Media Access Control (MAC) and
Carrier Sense Multiple Access/Collision
Detection (CSMA/CD)
- Explain Address Resolution Protocol (ARP)
and Bridges.
Objectives
- To briefly discuss the technology of dominant
wired LANs- Ethernet, and other LAN media.
- Describe Media Access Control (MAC) and
Carrier Sense Multiple Access/Collision
Detection (CSMA/CD)
- Explain Address Resolution Protocol (ARP)
and Bridges.
- Discuss Switched Ethernet and
Virtual LAN (VLAN).
Local Area Network
LAN
- A computer network that is designed for a
limited geographic area such as a building or a
campus.
Local Area Network
LAN
- A computer network that is designed for a
limited geographic area such as a building or a
campus.
- LAN technologies: Ethernet, token ring, token
bus, FDDI, and ATM LAN.
IEEE Project 802
IEEE standard for LANs
- specify functions of the physical and data link
layer of major LAN protocols.
IEEE Project 802
IEEE standard for LANs
- specify functions of the physical and data link
layer of major LAN protocols.
- subdivided the data link layer into two
sublayers: logical link control (LLC) and media
access control (MAC).
Ethernet
- was created in 1976 at Xerox’s Palo Alto
Research Center (PARC).
Ethernet
- was created in 1976 at Xerox’s Palo Alto
Research Center (PARC).
- de facto standard technology that is used for
connecting LANs.
Ethernet
- was created in 1976 at Xerox’s Palo Alto
Research Center (PARC).
- de facto standard technology that is used for
connecting LANs.
- first implemented by a group called DIX
(Digital, Intel, and Xerox).
Ethernet (802.3) Frame
- Preamble
contains 7 bytes (56 bits) of alternating 0s and
1s that alerts the receiving system to the
coming frame and enables it to synchronize its
input timing.
Ethernet (802.3) Frame
- Start frame delimiter (SFD)
(1 byte: 10101011) signals the beginning of the
frame; the last 2 bits are 11 and alert the
receiver that the next field is the destination
address.
Ethernet (802.3) Frame
- Destination address (DA)
is 6 bytes and contains the physical address of
the destination station/s to receive the packet.
Ethernet (802.3) Frame
- Destination address (DA)
is 6 bytes and contains the physical address of
the destination station/s to receive the packet.
- Source address (SA)
is 6 bytes and contains the physical address of
the sender of the packet.
Ethernet (802.3) Frame
- Length or Type
◦ 802.3: length field to define the number of
bytes in the data field or
◦ Ethernet: type field to define the upper-layer
protocol using the MAC frame.
Ethernet (802.3) Frame
- Data
◦ carries data encapsulated from the
upper-layer protocols;
◦ a minimum of 46 and a maximum of 1500
bytes.
Ethernet (802.3) Frame
- Data
◦ carries data encapsulated from the
upper-layer protocols;
◦ a minimum of 46 and a maximum of 1500
bytes.
Understand
What if the upper-layer packet is less than the
minimum 46 bytes?
Understand
What if the upper-layer packet is less than the
minimum 46 bytes?
- Padding is added to make up the difference.
Ethernet (802.3) Frame
- Cyclic Redundancy Check (CRC)
verifies that the data that left the source
computer did not change at all during the
transmission.
Understand
The 802.3 standard defines the maximum length of
a frame (without preamble and SFD field) as 1518
bytes. Give the historical reasons for this
restriction.
Understand
The 802.3 standard defines the maximum length of
a frame (without preamble and SFD field) as 1518
bytes. Give the historical reasons for this
restriction.
- Memory was very expensive when Ethernet
was designed: a maximum length restriction
helped to reduce the size of the buffer.
Understand
The 802.3 standard defines the maximum length of
a frame (without preamble and SFD field) as 1518
bytes. Give the historical reasons for this
restriction.
- Memory was very expensive when Ethernet
was designed: a maximum length restriction
helped to reduce the size of the buffer.
- It prevents one station from monopolizing the
shared medium, blocking other stations that
have
data to send.
MAC Address
also referred to as the data link address or physical
address
- a 6 bytes (48 bits) physical address applied to
the network interface card (NIC) by the
manufacturer during production.
MAC Address
- normally written in hexadecimal notation, with
a colon between the bytes.
MAC Address
- normally written in hexadecimal notation, with
a colon between the bytes.
- Ex. Ethernet MAC address
4A: 30 : 10 : 21 : 10 : 1A
Source and Destination Addressing
Modes
- Source address is always a unicast address - the
frame comes from only one station.
Source and Destination Addressing
Modes
- Source address is always a unicast address - the
frame comes from only one station.
- Destination address can be unicast, multicast,
or broadcast.
Exercise
Define the type of the following destination
addresses:
Exercise
Define the type of the following destination
addresses:
- 4A : 30 : 10 : 21 : 10 : 1A
Exercise
Define the type of the following destination
addresses:
- 4A : 30 : 10 : 21 : 10 : 1A
- 47 : 20 : 1B : 2E : 08 : EE
Exercise
Define the type of the following destination
addresses:
- 4A : 30 : 10 : 21 : 10 : 1A
- 47 : 20 : 1B : 2E : 08 : EE
- FF : FF : FF : FF : FF : FF
Exercise
Define the type of the following destination
addresses:
- 4A : 30 : 10 : 21 : 10 : 1A
- 47 : 20 : 1B : 2E : 08 : EE
- FF : FF : FF : FF : FF : FF
Solution: Refer to the second hexadecimal digit
from the left:
even == unicast;
odd == multicast;
all F’s == Broadcast
Transmission of Addresses
- transmission is left-to-right, byte by byte;
however, for each byte, the least significant bit
is sent first and the most significant bit is sent
last.
Transmission of Addresses
- transmission is left-to-right, byte by byte;
however, for each byte, the least significant bit
is sent first and the most significant bit is sent
last.
- Ex. Show how the address
47 : 20 : 1B : 2E : 08 : EE is sent out on line.
Transmission of Addresses
- transmission is left-to-right, byte by byte;
however, for each byte, the least significant bit
is sent first and the most significant bit is sent
last.
- Ex. Show how the address
47 : 20 : 1B : 2E : 08 : EE is sent out on line.
CSMA/CD
Carrier Sense Multiple Access with Collision
Detection
- access method for traditional Ethernet
(10-Mbps) that senses the medium before
trying to use it.
CSMA/CD
Carrier Sense Multiple Access with Collision
Detection
- access method for traditional Ethernet
(10-Mbps) that senses the medium before
trying to use it.
- Ethernet stations can be connected together
using a physical bus or star topology but its
logical topology is always a bus.
CSMA Collision
CSMA/CD
Carrier Sense Multiple Access with Collision
Detection Algorithm
CSMA/CD
Minimum Frame Size
- a restriction on the frame size is required.
CSMA/CD
Minimum Frame Size
- a restriction on the frame size is required.
- before sending the last bit of the frame, the
sending station must detect a collision and
abort.
CSMA/CD
Minimum Frame Size
- a restriction on the frame size is required.
- before sending the last bit of the frame, the
sending station must detect a collision and
abort.
- thus, transmission time Tfr must be at least
two times the maximum propagation time Tp.
Exercise
In the standard Ethernet, if the maximum
propagation time is 25.6µs, what is the minimum
size of the frame?
Exercise
In the standard Ethernet, if the maximum
propagation time is 25.6µs, what is the minimum
size of the frame?
Tfr = 2 × Tp = 51.2µs
Exercise
In the standard Ethernet, if the maximum
propagation time is 25.6µs, what is the minimum
size of the frame?
Tfr = 2 × Tp = 51.2µs
10 Mbps ×51.2µs = 512 bits or 64 bytes
Exercise
In the standard Ethernet, if the maximum
propagation time is 25.6µs, what is the minimum
size of the frame?
Tfr = 2 × Tp = 51.2µs
10 Mbps ×51.2µs = 512 bits or 64 bytes
- This is the minimum size of the frame for
Standard Ethernet.
CSMA/CD
Flow Diagram
Standard Ethernet
Implementation
Reading Assignment
- Report about the IEEE 802.3
Standard, in your own words.
- Submit through
www.turnitin.com.
Cable Specifications
Coaxial Cable
Shielded Twisted Pair (STP)
Unshielded Twisted Pair (UTP)
Readings
It is the standards body that creates the Physical
layer specifications for Ethernet.
Readings
It is the standards body that creates the Physical
layer specifications for Ethernet.
- EIA/TIA (Electronic Industries Association
and the newer Telecommunications Industry
Association)
Readings
It is the standards body that creates the Physical
layer specifications for Ethernet.
- EIA/TIA (Electronic Industries Association
and the newer Telecommunications Industry
Association)
- EIA/TIA specifies that Ethernet use a
registered jack (RJ) connector with a 4 5
wiring sequence on unshielded twisted-pair
(UTP) cabling (RJ-45).
UTP Connections (RJ-45)
- RJ-45 connector is clear so you can see the
eight colored wires that connect to the
connector’s pins. These wires are twisted into
four pairs.
UTP Connections (RJ-45)
- RJ-45 connector is clear so you can see the
eight colored wires that connect to the
connector’s pins. These wires are twisted into
four pairs.
- Four wires (two pairs) carry the voltage and
are considered tip. The other four wires are
grounded and are called ring.
UTP Connections (RJ-45)
8-pin modular connector
Ethernet Cabling
Straight-through cable: used to connect
- Host to switch or hub.
Ethernet Cabling
Straight-through cable: used to connect
- Host to switch or hub.
- Router to switch or hub
Ethernet Cabling
Straight-through cable: wires on both cable ends
are in the same order.
Ethernet Cabling
Crossover Cable: used to connect
- Switch to switch
Ethernet Cabling
Crossover Cable: used to connect
- Switch to switch
- Hub to hub
Ethernet Cabling
Crossover Cable: used to connect
- Switch to switch
- Hub to hub
- Host to host
Ethernet Cabling
Crossover Cable: used to connect
- Switch to switch
- Hub to hub
- Host to host
- Hub to switch
Ethernet Cabling
Crossover Cable: used to connect
- Switch to switch
- Hub to hub
- Host to host
- Hub to switch
- Router direct to host
Ethernet Cabling
Crossover Cable: wires on each end of the cable
are crossed - Transmit to Receive and Receive to
Transmit on each side, for both tip and ring.
Ethernet Cabling
Summary
Fast Ethernet (802.3u)
- designed to compete with LAN protocols such
as FDDI or Fiber Channel.
Fast Ethernet (802.3u)
- designed to compete with LAN protocols such
as FDDI or Fiber Channel.
- upgrade the data rate to 100 Mbps.
Fast Ethernet (802.3u)
- designed to compete with LAN protocols such
as FDDI or Fiber Channel.
- upgrade the data rate to 100 Mbps.
- backward-compatible with Standard Ethernet.
Fast Ethernet (802.3u)
- designed to compete with LAN protocols such
as FDDI or Fiber Channel.
- upgrade the data rate to 100 Mbps.
- backward-compatible with Standard Ethernet.
- same frame format and 48-bit address.
Fast Ethernet (802.3u)
- designed to compete with LAN protocols such
as FDDI or Fiber Channel.
- upgrade the data rate to 100 Mbps.
- backward-compatible with Standard Ethernet.
- same frame format and 48-bit address.
- same minimum and maximum frame lengths.
Fast Ethernet (802.3u)
Implementation
Fast Ethernet (802.3u)
- MAC sublayer was kept untouched
Fast Ethernet (802.3u)
- MAC sublayer was kept untouched
- star topology: half duplex and full duplex
Fast Ethernet (802.3u)
- MAC sublayer was kept untouched
- star topology: half duplex and full duplex
- access method is the same (CSMA/CD) for the
half-duplex
Fast Ethernet (802.3u)
- MAC sublayer was kept untouched
- star topology: half duplex and full duplex
- access method is the same (CSMA/CD) for the
half-duplex
- autonegotiation allows two devices to negotiate
the mode or data rate of operation.
Address Resolution Protocol (ARP)
- accepts a logical address from the IP protocol,
then, identify and place the source and
destination MAC address in the frame
Address Resolution Protocol (ARP)
- accepts a logical address from the IP protocol,
then, identify and place the source and
destination MAC address in the frame
- operates at the Internet layer, but the the
MAC address is attached at the Network
Access layer.
Address Resolution Protocol (ARP)
- accepts a logical address from the IP protocol,
then, identify and place the source and
destination MAC address in the frame
- operates at the Internet layer, but the the
MAC address is attached at the Network
Access layer.
- maps a logical address to its corresponding
physical address
Address Resolution Protocol (ARP)
Position of ARP in TCP/IP protocol suite
Address Resolution Protocol (ARP)
Position of ARP in TCP/IP protocol suite
- Why do we need ARP?
ARP Operation
ARP request is broadcast
c If this is your IP address, send me your
MAC address. d
ARP Operation
ARP reply is unicast
c This is my MAC address. d
ARP Packet Format
ARP Packet Format
- Hardware type
16-bit field defining the type of the network on
which ARP is running. Each LAN has been
assigned.
Ex. Ethernet: type 1
ARP Packet Format
- Hardware type
16-bit field defining the type of the network on
which ARP is running. Each LAN has been
assigned.
Ex. Ethernet: type 1
- Protocol type
16-bit field defining the protocol.
Ex. IPv4 protocol: 080016
ARP Packet Format
- Hardware type
16-bit field defining the type of the network on
which ARP is running. Each LAN has been
assigned.
Ex. Ethernet: type 1
- Protocol type
16-bit field defining the protocol.
Ex. IPv4 protocol: 080016
- Hardware length
8-bit field defining the length of the physical
address in bytes.
Ex. Ethernet: 6 bytes
ARP Packet Format
- Protocol Length
8-bit field defining the length of the logical
address in bytes.
Ex. IPv4 protocol: 4
ARP Packet Format
- Protocol Length
8-bit field defining the length of the logical
address in bytes.
Ex. IPv4 protocol: 4
- Operation
16-bit field defining the type of packet
Ex. ARP request (1), ARP reply (2).
ARP Packet Format
- Protocol Length
8-bit field defining the length of the logical
address in bytes.
Ex. IPv4 protocol: 4
- Operation
16-bit field defining the type of packet
Ex. ARP request (1), ARP reply (2).
- Sender hardware address
variable-length field defining the physical
address of the sender.
Ex. Ethernet: 6 bytes
ARP Packet Format
- Sender protocol address
variable-length field defining the logical address
of the sender.
Ex. IPv4 protocol: 4 bytes
ARP Packet Format
- Sender protocol address
variable-length field defining the logical address
of the sender.
Ex. IPv4 protocol: 4 bytes
- Target hardware address
variable-length field defining the physical
address of the target.
Ex. Ethernet: 6 bytes
ARP Packet Format
- Sender protocol address
variable-length field defining the logical address
of the sender.
Ex. IPv4 protocol: 4 bytes
- Target hardware address
variable-length field defining the physical
address of the target.
Ex. Ethernet: 6 bytes
- Target protocol address
variable-length field defining the logical address
of the target.
Ex. IPv4 protocol: 4bytes
Encapsulation of ARP packet
An ARP packet is encapsulated directly into a
data link frame.
ARP Usage Scenarios
ARP Usage Scenarios
Exercise
A host with IP address 130.23.43.20 and physical
address B2 : 34 : 55 : 10 : 22 : 10 has a packet to
send to another host with IP address 130.23.43.25
and physical address A4 : 6E : F4 : 59 : 83 : AB
(which is unknown to the first host). The two
hosts are on the same Ethernet network. Show the
ARP request and reply packets encapsulated in
Ethernet frames.
ARP Exercise Request
ARP Exercise Reply
Proxy ARP Router
- acts on behalf of a set of hosts.
Proxy ARP Router
- acts on behalf of a set of hosts.
- whenever a router running a proxy ARP
receives an ARP request looking for the IP
address of one of its hosts, the router sends an
ARP reply announcing its own hardware
(physical) address.
Proxy ARP Router
After the router receives the actual IP packet, it
sends the packet to the appropriate host or router.
Connecting Devices
- To connect LANs and WANs together we use
connecting devices.
Connecting Devices
- To connect LANs and WANs together we use
connecting devices.
- Ex. Repeaters (or hubs), Bridges (or two-layer
switches), and Routers (or three-layer
switches).
Repeater
A repeater forwards every bit; it has no filtering
capability.
Bridge
Two-layer switch
- operates in both the physical and the data link
layers.
Bridge
Two-layer switch
- operates in both the physical and the data link
layers.
- PHY: regenerates the signal it receives.
Bridge
Two-layer switch
- operates in both the physical and the data link
layers.
- PHY: regenerates the signal it receives.
- DLL: check the MAC addresses (source and
destination) contained in the frame.
Bridge
Two-layer switch
- operates in both the physical and the data link
layers.
- PHY: regenerates the signal it receives.
- DLL: check the MAC addresses (source and
destination) contained in the frame.
- has a table used in filtering decisions.
Bridge
Example
The bridge consults its table to find the departing
port.
Transparent Bridge
- a bridge in which the stations are completely
unaware of the bridge’s existence.
Transparent Bridge
- a bridge in which the stations are completely
unaware of the bridge’s existence.
- reconfiguration of the stations is unnecessary
when added or deleted.
Transparent Bridge
- a bridge in which the stations are completely
unaware of the bridge’s existence.
- reconfiguration of the stations is unnecessary
when added or deleted.
- forwarding function with dynamic forwarding
table
Bridge Learning
Switched LAN
Traditional
Switched LAN
Contemporary
Bridging vs. LAN Switching
- Bridges are software based, while switches are
hardware based (ASIC for filtering)
Bridging vs. LAN Switching
- Bridges are software based, while switches are
hardware based (ASIC for filtering)
- A switch can be viewed as a multiport bridge.
Bridging vs. LAN Switching
- Bridges are software based, while switches are
hardware based (ASIC for filtering)
- A switch can be viewed as a multiport bridge.
- Switches have a higher number of ports than
most bridges.
Bridging vs. LAN Switching
- Bridges are software based, while switches are
hardware based (ASIC for filtering)
- A switch can be viewed as a multiport bridge.
- Switches have a higher number of ports than
most bridges.
- Both bridges and switches forward layer 2
broadcasts.
Layer 2 Switch Functions
- Address learning
remember the source hardware address of each
frame received, and save in forward/filter table.
Layer 2 Switch Functions
- Address learning
remember the source hardware address of each
frame received, and save in forward/filter table.
- Forward/filter decisions
When a frame is received, the switch looks at
the destination hardware address and finds the
exit interface.
Layer 2 Switch Functions
- Address learning
remember the source hardware address of each
frame received, and save in forward/filter table.
- Forward/filter decisions
When a frame is received, the switch looks at
the destination hardware address and finds the
exit interface.
- Loop avoidance
stop network loops while still permitting
redundancy.
Address Learning
Forward/Filter Decisions
Host A sends a data frame to Host D. What will the switch do
when it receives the frame from Host A?
Network Redundancy
Importance and Problem
Loop Avoidance
Spanning Tree Protocol (STP)
 All root ports forward,
All nonroot ports block .
Virtual Private Network
VPN
- It enables a host computer to send and receive
data across shared or public networks as if it
were a private network with all the
functionality
Network Security Issue
- Ensure confidentiality through use of
◦ User authentication
◦ Data encryption
Virtual Private Networks
- network connection that uses the Internet to
give users or branch offices secure access to a
company’s network resources.
Virtual Private Networks
- network connection that uses the Internet to
give users or branch offices secure access to a
company’s network resources.
- use encryption technology to ensure that
communication is private and secure
Virtual Private Networks
- network connection that uses the Internet to
give users or branch offices secure access to a
company’s network resources.
- use encryption technology to ensure that
communication is private and secure
- Privacy is achieved by creating a tunnel
between the VPN client and VPN server.
Virtual Private Network
A tunnel is created by encapsulation, in which the inner packet
containing the data is encrypted and the outer headers contain
the unencapsulated addresses.
VPN Types/ Benefits
- Remote access VPNs
Enable mobile users to connect with corporate
networks securely wherever an Internet
connection is available.
VPN Types/ Benefits
- Remote access VPNs
Enable mobile users to connect with corporate
networks securely wherever an Internet
connection is available.
- Site-to-site VPNs or intranet
Allow multiple sites to maintain permanent
secure connections via the Internet instead of
using expensive WAN links.
VPN Types/ Benefits
- Reduce costs by using the ISP’s support
services instead of paying for more expensive
WAN support.
VPN Types/ Benefits
- Reduce costs by using the ISP’s support
services instead of paying for more expensive
WAN support.
- Eliminate the need to support dial-up remote
access, which is a higher-cost solution requiring
more personnel.
IP Security
IPSec
- a collection of protocols designed by the
Internet Engineering Task Force (IETF) to
provide security for a packet at the network
level..
IP Security
IPSec
- a collection of protocols designed by the
Internet Engineering Task Force (IETF) to
provide security for a packet at the network
level..
- helps create authenticated and confidential
packets for the IP layer.
IP Security
IPSec
- a collection of protocols designed by the
Internet Engineering Task Force (IETF) to
provide security for a packet at the network
level..
- helps create authenticated and confidential
packets for the IP layer.
- operates in one of two different modes:
transport or tunnel mode.
IPSec Transport Mode
IPSec in transport mode does not protect the IP
header;
it only protects the information coming from the
transport layer.
It is used when we need host-to-host (end-to-end)
protection of data.
IPSec Tunnel Mode
IPSec in tunnel mode protects the original IP
header.
It is used between two routers, between a host and
a router, or between a router and a host.
Tunnel vs. Transport Mode
◦ In transport mode, the IPSec layer comes
between the transport layer and the network layer.
◦ In tunnel mode, the flow is from the network
layer to the IPSec layer and then back to the
network layer again.
Other Terms
- 1000BASE-CX, 1000BASE-LX, 1000BASE-SX,
1000BASE-T
The IEEE 802.3 standards for Ethernet implementation
with 1-Gbps data rate.
- 100BASE-FX, 100BASE-T4, 100BASE-TX, 100BASE-X
The IEEE 802.3 standards for Fast Ethernet
implementation with 100-Mbps data rate.
- 10BASE2, 10BASE5, 10BASE-F, 10BASE-E, 10BASE-L
The IEEE 802.3 standard for Thin Ethernet with 10-Mbps
data rate.
Other Terms
- Address Resolution Protocol (ARP)
In TCP/IP, a protocol for obtaining the physical address of
a node when the Internet address is known.
- Address space
The total number of addresses used by a protocol.
- Bandwidth
The difference between the highest and lowest frequencies
available for network signals. The term is also used to
describe the rated throughput capacity of a given network
medium or protocol.
Other Terms
- Bridge
A network device operating at the first two layers of the
OSI model with filtering and forwarding capabilities.
- Broadcast address
An address that allows transmission of a message to all
nodes of a network.
- Congestion
Excessive network or internetwork traffic causing a general
degradation of service. This can be seen in slower response
times, longer file transfers and network users becoming less
productive due to network delays.
Other Terms
- Carrier Sense Multiple Access with Collision Avoidance
(CSMA/CA)
An access method in wireless LANs that avoids collision by
forcing the stations to send reservation messages when they
find the channel is idle.
- Carrier Sense Multiple Access with Collision Detection
(CSMA/CD)
An access method in which stations transmit whenever the
transmission medium is available and retransmit when
collision occurs.
- Collision
The event that occurs when two transmitters send at the
same time on a channel designed for only one transmission
at a time; data will be destroyed.
Other Terms
- Consultative Committee for International Telegraphy and
Telephony (CCITT)
An international standards group now known as the ITU-T.
- Defense Advanced Research Projects Agency (DARPA)
A government organization, which, under the name of
ARPA, funded ARPANET and the Internet.
- Ethernet
A local area network using the CSMA/CD access method.
Other Terms
- Extranet
A private network that uses the TCP/IP protocol suite that
allows authorized access from outside users.
- Flooding
Saturation of a network with a message. intranet A private
network that uses the TCP/IP protocol suite.
- Intranet
A private network that uses the TCP/IP protocol suite.
Other Terms
- Institute of Electrical and Electronics Engineers (IEEE)
A group consisting of professional engineers that has
specialized societies whose committees prepare standards in
members’ areas of specialty.
- Logical tunnel
The encapsulation of a multicast packet inside a unicast
packet to enable multicast routing by non-multicast routers.
- Physical address
The address of a device used at the data link layer (MAC
address).
Other Terms
- Request for Comment (RFC)
A formal Internet document concerning an Internet issue.
- Reverse Address Resolution Protocol (RARP)
A TCP/IP protocol that allows a host to find its Internet
address, given its physical address.
- Switch
A device connecting multiple communication lines together.
- Switched Ethernet
An Ethernet in which a switch, replacing the hub, can
direct a transmission to its destination.
References
TEXTBOOK:
- Data Communications and Networking,
Behrouz Forouzan, 4th Edition, McGraw-Hill,
2007
References
SECONDARY SOURCE:
- TCP/IP Protocol Suite, Behrouz Forouzan, 4th
edition, 2010
References
SECONDARY SOURCE:
- Data and Computer Communications, William
Stallings, 2007
References
SECONDARY SOURCE:
- CISCO Networking Essentials, Troy McMillan,
2012
References
SECONDARY SOURCE:
- Network Fundamentals, Cisco Networking
Academy, 2007
Thank you for your attention!

More Related Content

PDF
Data communication part1
PPT
Computer Network Fundamentals
PPTX
Transport layer
PPT
the transport layer
PPTX
Transport layer
PPT
Tcp Udp Icmp And The Transport Layer
PPT
Transport Layer
PPTX
Network Layer
Data communication part1
Computer Network Fundamentals
Transport layer
the transport layer
Transport layer
Tcp Udp Icmp And The Transport Layer
Transport Layer
Network Layer

What's hot (20)

PPTX
Unit 3 - Data Link Layer - Part A
PPT
Network layer tanenbaum
PPTX
CN_Lec 5_OSI
PPTX
Transport layer protocol
PPT
transport layer
PPT
Transportlayer tanenbaum
PPTX
Transport Layer Services : Multiplexing And Demultiplexing
PPT
PDF
Cs8591 Computer Networks
PPT
Media Access and Internetworking
PDF
TCP Theory
PPT
Ch4 net layer network
PDF
Cs8591 Computer Networks
PPT
Transport protocols
PPT
IPV4 Frame Format
PPTX
Introduction of tcp, ip & udp
PPT
TCP Over Wireless
PPTX
TCP- Transmission Control Protocol
PPTX
Ch 19 Network-layer protocols Section 1
Unit 3 - Data Link Layer - Part A
Network layer tanenbaum
CN_Lec 5_OSI
Transport layer protocol
transport layer
Transportlayer tanenbaum
Transport Layer Services : Multiplexing And Demultiplexing
Cs8591 Computer Networks
Media Access and Internetworking
TCP Theory
Ch4 net layer network
Cs8591 Computer Networks
Transport protocols
IPV4 Frame Format
Introduction of tcp, ip & udp
TCP Over Wireless
TCP- Transmission Control Protocol
Ch 19 Network-layer protocols Section 1
Ad

Viewers also liked (20)

PDF
LBYEC72_Overview
PDF
Valgrind
PDF
Mercurial setup
PDF
My Android portfolio part1
PDF
My Android portfolio part2
PDF
Dismath part2 2013
PDF
Nummeth0 ay1415
PDF
C tour Unix
PPT
Computer Networks And Topology
PDF
DISMATH_Intro_Admin
PDF
PDF
Vector calculus
PDF
Transport layer services
PPT
PDF
Unit 4 data link layer
PDF
Ipn conference2016
PDF
DISMATH_Part1
PDF
DISMATH_Part2
PPTX
Data link layer
PPT
The Data Link Layer
LBYEC72_Overview
Valgrind
Mercurial setup
My Android portfolio part1
My Android portfolio part2
Dismath part2 2013
Nummeth0 ay1415
C tour Unix
Computer Networks And Topology
DISMATH_Intro_Admin
Vector calculus
Transport layer services
Unit 4 data link layer
Ipn conference2016
DISMATH_Part1
DISMATH_Part2
Data link layer
The Data Link Layer
Ad

Similar to Data communication part2 (20)

PPTX
LAN TECHNOLOGLES
PPT
3-MACSublayer.ppt
PPT
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
PPTX
CN-Unit_2-DLL-Etherne nnnnnnnnnnnt .pptx
PDF
Ethernet_Networks
PPT
6 Ethernet
PPT
IEEE Standards
DOC
PPT
F06_Lecture7_etherne..
PPT
Lecture5
PPTX
Ethernet and token ring
PPSX
PPT
Week 5 lan topology
PPT
Ethernet and switches
PDF
CN-unit-iii.pdf computer network presentaion
PPTX
Ethernet 802.3.pptx
PPT
LAN TECHNOLOGLES
3-MACSublayer.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
CN-Unit_2-DLL-Etherne nnnnnnnnnnnt .pptx
Ethernet_Networks
6 Ethernet
IEEE Standards
F06_Lecture7_etherne..
Lecture5
Ethernet and token ring
Week 5 lan topology
Ethernet and switches
CN-unit-iii.pdf computer network presentaion
Ethernet 802.3.pptx

Recently uploaded (20)

PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Well-logging-methods_new................
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPT
Project quality management in manufacturing
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Operating System & Kernel Study Guide-1 - converted.pdf
CH1 Production IntroductoryConcepts.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Well-logging-methods_new................
CYBER-CRIMES AND SECURITY A guide to understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Lecture Notes Electrical Wiring System Components
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
additive manufacturing of ss316l using mig welding
Project quality management in manufacturing
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Mechanical Engineering MATERIALS Selection
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
OOP with Java - Java Introduction (Basics)
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Embodied AI: Ushering in the Next Era of Intelligent Systems
UNIT-1 - COAL BASED THERMAL POWER PLANTS

Data communication part2

  • 1. DATCOMM Local Area Network Technologies Engr. Melvin K. Cabatuan, MsE De La Salle University February 2013
  • 2. Objectives - To briefly discuss the technology of dominant wired LANs- Ethernet, and other LAN media.
  • 3. Objectives - To briefly discuss the technology of dominant wired LANs- Ethernet, and other LAN media. - Describe Media Access Control (MAC) and Carrier Sense Multiple Access/Collision Detection (CSMA/CD)
  • 4. Objectives - To briefly discuss the technology of dominant wired LANs- Ethernet, and other LAN media. - Describe Media Access Control (MAC) and Carrier Sense Multiple Access/Collision Detection (CSMA/CD) - Explain Address Resolution Protocol (ARP) and Bridges.
  • 5. Objectives - To briefly discuss the technology of dominant wired LANs- Ethernet, and other LAN media. - Describe Media Access Control (MAC) and Carrier Sense Multiple Access/Collision Detection (CSMA/CD) - Explain Address Resolution Protocol (ARP) and Bridges. - Discuss Switched Ethernet and Virtual LAN (VLAN).
  • 6. Local Area Network LAN - A computer network that is designed for a limited geographic area such as a building or a campus.
  • 7. Local Area Network LAN - A computer network that is designed for a limited geographic area such as a building or a campus. - LAN technologies: Ethernet, token ring, token bus, FDDI, and ATM LAN.
  • 8. IEEE Project 802 IEEE standard for LANs - specify functions of the physical and data link layer of major LAN protocols.
  • 9. IEEE Project 802 IEEE standard for LANs - specify functions of the physical and data link layer of major LAN protocols. - subdivided the data link layer into two sublayers: logical link control (LLC) and media access control (MAC).
  • 10. Ethernet - was created in 1976 at Xerox’s Palo Alto Research Center (PARC).
  • 11. Ethernet - was created in 1976 at Xerox’s Palo Alto Research Center (PARC). - de facto standard technology that is used for connecting LANs.
  • 12. Ethernet - was created in 1976 at Xerox’s Palo Alto Research Center (PARC). - de facto standard technology that is used for connecting LANs. - first implemented by a group called DIX (Digital, Intel, and Xerox).
  • 13. Ethernet (802.3) Frame - Preamble contains 7 bytes (56 bits) of alternating 0s and 1s that alerts the receiving system to the coming frame and enables it to synchronize its input timing.
  • 14. Ethernet (802.3) Frame - Start frame delimiter (SFD) (1 byte: 10101011) signals the beginning of the frame; the last 2 bits are 11 and alert the receiver that the next field is the destination address.
  • 15. Ethernet (802.3) Frame - Destination address (DA) is 6 bytes and contains the physical address of the destination station/s to receive the packet.
  • 16. Ethernet (802.3) Frame - Destination address (DA) is 6 bytes and contains the physical address of the destination station/s to receive the packet. - Source address (SA) is 6 bytes and contains the physical address of the sender of the packet.
  • 17. Ethernet (802.3) Frame - Length or Type ◦ 802.3: length field to define the number of bytes in the data field or ◦ Ethernet: type field to define the upper-layer protocol using the MAC frame.
  • 18. Ethernet (802.3) Frame - Data ◦ carries data encapsulated from the upper-layer protocols; ◦ a minimum of 46 and a maximum of 1500 bytes.
  • 19. Ethernet (802.3) Frame - Data ◦ carries data encapsulated from the upper-layer protocols; ◦ a minimum of 46 and a maximum of 1500 bytes.
  • 20. Understand What if the upper-layer packet is less than the minimum 46 bytes?
  • 21. Understand What if the upper-layer packet is less than the minimum 46 bytes? - Padding is added to make up the difference.
  • 22. Ethernet (802.3) Frame - Cyclic Redundancy Check (CRC) verifies that the data that left the source computer did not change at all during the transmission.
  • 23. Understand The 802.3 standard defines the maximum length of a frame (without preamble and SFD field) as 1518 bytes. Give the historical reasons for this restriction.
  • 24. Understand The 802.3 standard defines the maximum length of a frame (without preamble and SFD field) as 1518 bytes. Give the historical reasons for this restriction. - Memory was very expensive when Ethernet was designed: a maximum length restriction helped to reduce the size of the buffer.
  • 25. Understand The 802.3 standard defines the maximum length of a frame (without preamble and SFD field) as 1518 bytes. Give the historical reasons for this restriction. - Memory was very expensive when Ethernet was designed: a maximum length restriction helped to reduce the size of the buffer. - It prevents one station from monopolizing the shared medium, blocking other stations that have data to send.
  • 26. MAC Address also referred to as the data link address or physical address - a 6 bytes (48 bits) physical address applied to the network interface card (NIC) by the manufacturer during production.
  • 27. MAC Address - normally written in hexadecimal notation, with a colon between the bytes.
  • 28. MAC Address - normally written in hexadecimal notation, with a colon between the bytes. - Ex. Ethernet MAC address 4A: 30 : 10 : 21 : 10 : 1A
  • 29. Source and Destination Addressing Modes - Source address is always a unicast address - the frame comes from only one station.
  • 30. Source and Destination Addressing Modes - Source address is always a unicast address - the frame comes from only one station. - Destination address can be unicast, multicast, or broadcast.
  • 31. Exercise Define the type of the following destination addresses:
  • 32. Exercise Define the type of the following destination addresses: - 4A : 30 : 10 : 21 : 10 : 1A
  • 33. Exercise Define the type of the following destination addresses: - 4A : 30 : 10 : 21 : 10 : 1A - 47 : 20 : 1B : 2E : 08 : EE
  • 34. Exercise Define the type of the following destination addresses: - 4A : 30 : 10 : 21 : 10 : 1A - 47 : 20 : 1B : 2E : 08 : EE - FF : FF : FF : FF : FF : FF
  • 35. Exercise Define the type of the following destination addresses: - 4A : 30 : 10 : 21 : 10 : 1A - 47 : 20 : 1B : 2E : 08 : EE - FF : FF : FF : FF : FF : FF Solution: Refer to the second hexadecimal digit from the left: even == unicast; odd == multicast; all F’s == Broadcast
  • 36. Transmission of Addresses - transmission is left-to-right, byte by byte; however, for each byte, the least significant bit is sent first and the most significant bit is sent last.
  • 37. Transmission of Addresses - transmission is left-to-right, byte by byte; however, for each byte, the least significant bit is sent first and the most significant bit is sent last. - Ex. Show how the address 47 : 20 : 1B : 2E : 08 : EE is sent out on line.
  • 38. Transmission of Addresses - transmission is left-to-right, byte by byte; however, for each byte, the least significant bit is sent first and the most significant bit is sent last. - Ex. Show how the address 47 : 20 : 1B : 2E : 08 : EE is sent out on line.
  • 39. CSMA/CD Carrier Sense Multiple Access with Collision Detection - access method for traditional Ethernet (10-Mbps) that senses the medium before trying to use it.
  • 40. CSMA/CD Carrier Sense Multiple Access with Collision Detection - access method for traditional Ethernet (10-Mbps) that senses the medium before trying to use it. - Ethernet stations can be connected together using a physical bus or star topology but its logical topology is always a bus.
  • 42. CSMA/CD Carrier Sense Multiple Access with Collision Detection Algorithm
  • 43. CSMA/CD Minimum Frame Size - a restriction on the frame size is required.
  • 44. CSMA/CD Minimum Frame Size - a restriction on the frame size is required. - before sending the last bit of the frame, the sending station must detect a collision and abort.
  • 45. CSMA/CD Minimum Frame Size - a restriction on the frame size is required. - before sending the last bit of the frame, the sending station must detect a collision and abort. - thus, transmission time Tfr must be at least two times the maximum propagation time Tp.
  • 46. Exercise In the standard Ethernet, if the maximum propagation time is 25.6µs, what is the minimum size of the frame?
  • 47. Exercise In the standard Ethernet, if the maximum propagation time is 25.6µs, what is the minimum size of the frame? Tfr = 2 × Tp = 51.2µs
  • 48. Exercise In the standard Ethernet, if the maximum propagation time is 25.6µs, what is the minimum size of the frame? Tfr = 2 × Tp = 51.2µs 10 Mbps ×51.2µs = 512 bits or 64 bytes
  • 49. Exercise In the standard Ethernet, if the maximum propagation time is 25.6µs, what is the minimum size of the frame? Tfr = 2 × Tp = 51.2µs 10 Mbps ×51.2µs = 512 bits or 64 bytes - This is the minimum size of the frame for Standard Ethernet.
  • 52. Reading Assignment - Report about the IEEE 802.3 Standard, in your own words. - Submit through www.turnitin.com.
  • 57. Readings It is the standards body that creates the Physical layer specifications for Ethernet.
  • 58. Readings It is the standards body that creates the Physical layer specifications for Ethernet. - EIA/TIA (Electronic Industries Association and the newer Telecommunications Industry Association)
  • 59. Readings It is the standards body that creates the Physical layer specifications for Ethernet. - EIA/TIA (Electronic Industries Association and the newer Telecommunications Industry Association) - EIA/TIA specifies that Ethernet use a registered jack (RJ) connector with a 4 5 wiring sequence on unshielded twisted-pair (UTP) cabling (RJ-45).
  • 60. UTP Connections (RJ-45) - RJ-45 connector is clear so you can see the eight colored wires that connect to the connector’s pins. These wires are twisted into four pairs.
  • 61. UTP Connections (RJ-45) - RJ-45 connector is clear so you can see the eight colored wires that connect to the connector’s pins. These wires are twisted into four pairs. - Four wires (two pairs) carry the voltage and are considered tip. The other four wires are grounded and are called ring.
  • 62. UTP Connections (RJ-45) 8-pin modular connector
  • 63. Ethernet Cabling Straight-through cable: used to connect - Host to switch or hub.
  • 64. Ethernet Cabling Straight-through cable: used to connect - Host to switch or hub. - Router to switch or hub
  • 65. Ethernet Cabling Straight-through cable: wires on both cable ends are in the same order.
  • 66. Ethernet Cabling Crossover Cable: used to connect - Switch to switch
  • 67. Ethernet Cabling Crossover Cable: used to connect - Switch to switch - Hub to hub
  • 68. Ethernet Cabling Crossover Cable: used to connect - Switch to switch - Hub to hub - Host to host
  • 69. Ethernet Cabling Crossover Cable: used to connect - Switch to switch - Hub to hub - Host to host - Hub to switch
  • 70. Ethernet Cabling Crossover Cable: used to connect - Switch to switch - Hub to hub - Host to host - Hub to switch - Router direct to host
  • 71. Ethernet Cabling Crossover Cable: wires on each end of the cable are crossed - Transmit to Receive and Receive to Transmit on each side, for both tip and ring.
  • 73. Fast Ethernet (802.3u) - designed to compete with LAN protocols such as FDDI or Fiber Channel.
  • 74. Fast Ethernet (802.3u) - designed to compete with LAN protocols such as FDDI or Fiber Channel. - upgrade the data rate to 100 Mbps.
  • 75. Fast Ethernet (802.3u) - designed to compete with LAN protocols such as FDDI or Fiber Channel. - upgrade the data rate to 100 Mbps. - backward-compatible with Standard Ethernet.
  • 76. Fast Ethernet (802.3u) - designed to compete with LAN protocols such as FDDI or Fiber Channel. - upgrade the data rate to 100 Mbps. - backward-compatible with Standard Ethernet. - same frame format and 48-bit address.
  • 77. Fast Ethernet (802.3u) - designed to compete with LAN protocols such as FDDI or Fiber Channel. - upgrade the data rate to 100 Mbps. - backward-compatible with Standard Ethernet. - same frame format and 48-bit address. - same minimum and maximum frame lengths.
  • 79. Fast Ethernet (802.3u) - MAC sublayer was kept untouched
  • 80. Fast Ethernet (802.3u) - MAC sublayer was kept untouched - star topology: half duplex and full duplex
  • 81. Fast Ethernet (802.3u) - MAC sublayer was kept untouched - star topology: half duplex and full duplex - access method is the same (CSMA/CD) for the half-duplex
  • 82. Fast Ethernet (802.3u) - MAC sublayer was kept untouched - star topology: half duplex and full duplex - access method is the same (CSMA/CD) for the half-duplex - autonegotiation allows two devices to negotiate the mode or data rate of operation.
  • 83. Address Resolution Protocol (ARP) - accepts a logical address from the IP protocol, then, identify and place the source and destination MAC address in the frame
  • 84. Address Resolution Protocol (ARP) - accepts a logical address from the IP protocol, then, identify and place the source and destination MAC address in the frame - operates at the Internet layer, but the the MAC address is attached at the Network Access layer.
  • 85. Address Resolution Protocol (ARP) - accepts a logical address from the IP protocol, then, identify and place the source and destination MAC address in the frame - operates at the Internet layer, but the the MAC address is attached at the Network Access layer. - maps a logical address to its corresponding physical address
  • 86. Address Resolution Protocol (ARP) Position of ARP in TCP/IP protocol suite
  • 87. Address Resolution Protocol (ARP) Position of ARP in TCP/IP protocol suite - Why do we need ARP?
  • 88. ARP Operation ARP request is broadcast c If this is your IP address, send me your MAC address. d
  • 89. ARP Operation ARP reply is unicast c This is my MAC address. d
  • 91. ARP Packet Format - Hardware type 16-bit field defining the type of the network on which ARP is running. Each LAN has been assigned. Ex. Ethernet: type 1
  • 92. ARP Packet Format - Hardware type 16-bit field defining the type of the network on which ARP is running. Each LAN has been assigned. Ex. Ethernet: type 1 - Protocol type 16-bit field defining the protocol. Ex. IPv4 protocol: 080016
  • 93. ARP Packet Format - Hardware type 16-bit field defining the type of the network on which ARP is running. Each LAN has been assigned. Ex. Ethernet: type 1 - Protocol type 16-bit field defining the protocol. Ex. IPv4 protocol: 080016 - Hardware length 8-bit field defining the length of the physical address in bytes. Ex. Ethernet: 6 bytes
  • 94. ARP Packet Format - Protocol Length 8-bit field defining the length of the logical address in bytes. Ex. IPv4 protocol: 4
  • 95. ARP Packet Format - Protocol Length 8-bit field defining the length of the logical address in bytes. Ex. IPv4 protocol: 4 - Operation 16-bit field defining the type of packet Ex. ARP request (1), ARP reply (2).
  • 96. ARP Packet Format - Protocol Length 8-bit field defining the length of the logical address in bytes. Ex. IPv4 protocol: 4 - Operation 16-bit field defining the type of packet Ex. ARP request (1), ARP reply (2). - Sender hardware address variable-length field defining the physical address of the sender. Ex. Ethernet: 6 bytes
  • 97. ARP Packet Format - Sender protocol address variable-length field defining the logical address of the sender. Ex. IPv4 protocol: 4 bytes
  • 98. ARP Packet Format - Sender protocol address variable-length field defining the logical address of the sender. Ex. IPv4 protocol: 4 bytes - Target hardware address variable-length field defining the physical address of the target. Ex. Ethernet: 6 bytes
  • 99. ARP Packet Format - Sender protocol address variable-length field defining the logical address of the sender. Ex. IPv4 protocol: 4 bytes - Target hardware address variable-length field defining the physical address of the target. Ex. Ethernet: 6 bytes - Target protocol address variable-length field defining the logical address of the target. Ex. IPv4 protocol: 4bytes
  • 100. Encapsulation of ARP packet An ARP packet is encapsulated directly into a data link frame.
  • 103. Exercise A host with IP address 130.23.43.20 and physical address B2 : 34 : 55 : 10 : 22 : 10 has a packet to send to another host with IP address 130.23.43.25 and physical address A4 : 6E : F4 : 59 : 83 : AB (which is unknown to the first host). The two hosts are on the same Ethernet network. Show the ARP request and reply packets encapsulated in Ethernet frames.
  • 106. Proxy ARP Router - acts on behalf of a set of hosts.
  • 107. Proxy ARP Router - acts on behalf of a set of hosts. - whenever a router running a proxy ARP receives an ARP request looking for the IP address of one of its hosts, the router sends an ARP reply announcing its own hardware (physical) address.
  • 108. Proxy ARP Router After the router receives the actual IP packet, it sends the packet to the appropriate host or router.
  • 109. Connecting Devices - To connect LANs and WANs together we use connecting devices.
  • 110. Connecting Devices - To connect LANs and WANs together we use connecting devices. - Ex. Repeaters (or hubs), Bridges (or two-layer switches), and Routers (or three-layer switches).
  • 111. Repeater A repeater forwards every bit; it has no filtering capability.
  • 112. Bridge Two-layer switch - operates in both the physical and the data link layers.
  • 113. Bridge Two-layer switch - operates in both the physical and the data link layers. - PHY: regenerates the signal it receives.
  • 114. Bridge Two-layer switch - operates in both the physical and the data link layers. - PHY: regenerates the signal it receives. - DLL: check the MAC addresses (source and destination) contained in the frame.
  • 115. Bridge Two-layer switch - operates in both the physical and the data link layers. - PHY: regenerates the signal it receives. - DLL: check the MAC addresses (source and destination) contained in the frame. - has a table used in filtering decisions.
  • 116. Bridge Example The bridge consults its table to find the departing port.
  • 117. Transparent Bridge - a bridge in which the stations are completely unaware of the bridge’s existence.
  • 118. Transparent Bridge - a bridge in which the stations are completely unaware of the bridge’s existence. - reconfiguration of the stations is unnecessary when added or deleted.
  • 119. Transparent Bridge - a bridge in which the stations are completely unaware of the bridge’s existence. - reconfiguration of the stations is unnecessary when added or deleted. - forwarding function with dynamic forwarding table
  • 123. Bridging vs. LAN Switching - Bridges are software based, while switches are hardware based (ASIC for filtering)
  • 124. Bridging vs. LAN Switching - Bridges are software based, while switches are hardware based (ASIC for filtering) - A switch can be viewed as a multiport bridge.
  • 125. Bridging vs. LAN Switching - Bridges are software based, while switches are hardware based (ASIC for filtering) - A switch can be viewed as a multiport bridge. - Switches have a higher number of ports than most bridges.
  • 126. Bridging vs. LAN Switching - Bridges are software based, while switches are hardware based (ASIC for filtering) - A switch can be viewed as a multiport bridge. - Switches have a higher number of ports than most bridges. - Both bridges and switches forward layer 2 broadcasts.
  • 127. Layer 2 Switch Functions - Address learning remember the source hardware address of each frame received, and save in forward/filter table.
  • 128. Layer 2 Switch Functions - Address learning remember the source hardware address of each frame received, and save in forward/filter table. - Forward/filter decisions When a frame is received, the switch looks at the destination hardware address and finds the exit interface.
  • 129. Layer 2 Switch Functions - Address learning remember the source hardware address of each frame received, and save in forward/filter table. - Forward/filter decisions When a frame is received, the switch looks at the destination hardware address and finds the exit interface. - Loop avoidance stop network loops while still permitting redundancy.
  • 131. Forward/Filter Decisions Host A sends a data frame to Host D. What will the switch do when it receives the frame from Host A?
  • 133. Loop Avoidance Spanning Tree Protocol (STP) All root ports forward, All nonroot ports block .
  • 134. Virtual Private Network VPN - It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality
  • 135. Network Security Issue - Ensure confidentiality through use of ◦ User authentication ◦ Data encryption
  • 136. Virtual Private Networks - network connection that uses the Internet to give users or branch offices secure access to a company’s network resources.
  • 137. Virtual Private Networks - network connection that uses the Internet to give users or branch offices secure access to a company’s network resources. - use encryption technology to ensure that communication is private and secure
  • 138. Virtual Private Networks - network connection that uses the Internet to give users or branch offices secure access to a company’s network resources. - use encryption technology to ensure that communication is private and secure - Privacy is achieved by creating a tunnel between the VPN client and VPN server.
  • 139. Virtual Private Network A tunnel is created by encapsulation, in which the inner packet containing the data is encrypted and the outer headers contain the unencapsulated addresses.
  • 140. VPN Types/ Benefits - Remote access VPNs Enable mobile users to connect with corporate networks securely wherever an Internet connection is available.
  • 141. VPN Types/ Benefits - Remote access VPNs Enable mobile users to connect with corporate networks securely wherever an Internet connection is available. - Site-to-site VPNs or intranet Allow multiple sites to maintain permanent secure connections via the Internet instead of using expensive WAN links.
  • 142. VPN Types/ Benefits - Reduce costs by using the ISP’s support services instead of paying for more expensive WAN support.
  • 143. VPN Types/ Benefits - Reduce costs by using the ISP’s support services instead of paying for more expensive WAN support. - Eliminate the need to support dial-up remote access, which is a higher-cost solution requiring more personnel.
  • 144. IP Security IPSec - a collection of protocols designed by the Internet Engineering Task Force (IETF) to provide security for a packet at the network level..
  • 145. IP Security IPSec - a collection of protocols designed by the Internet Engineering Task Force (IETF) to provide security for a packet at the network level.. - helps create authenticated and confidential packets for the IP layer.
  • 146. IP Security IPSec - a collection of protocols designed by the Internet Engineering Task Force (IETF) to provide security for a packet at the network level.. - helps create authenticated and confidential packets for the IP layer. - operates in one of two different modes: transport or tunnel mode.
  • 147. IPSec Transport Mode IPSec in transport mode does not protect the IP header; it only protects the information coming from the transport layer. It is used when we need host-to-host (end-to-end) protection of data.
  • 148. IPSec Tunnel Mode IPSec in tunnel mode protects the original IP header. It is used between two routers, between a host and a router, or between a router and a host.
  • 149. Tunnel vs. Transport Mode ◦ In transport mode, the IPSec layer comes between the transport layer and the network layer. ◦ In tunnel mode, the flow is from the network layer to the IPSec layer and then back to the network layer again.
  • 150. Other Terms - 1000BASE-CX, 1000BASE-LX, 1000BASE-SX, 1000BASE-T The IEEE 802.3 standards for Ethernet implementation with 1-Gbps data rate. - 100BASE-FX, 100BASE-T4, 100BASE-TX, 100BASE-X The IEEE 802.3 standards for Fast Ethernet implementation with 100-Mbps data rate. - 10BASE2, 10BASE5, 10BASE-F, 10BASE-E, 10BASE-L The IEEE 802.3 standard for Thin Ethernet with 10-Mbps data rate.
  • 151. Other Terms - Address Resolution Protocol (ARP) In TCP/IP, a protocol for obtaining the physical address of a node when the Internet address is known. - Address space The total number of addresses used by a protocol. - Bandwidth The difference between the highest and lowest frequencies available for network signals. The term is also used to describe the rated throughput capacity of a given network medium or protocol.
  • 152. Other Terms - Bridge A network device operating at the first two layers of the OSI model with filtering and forwarding capabilities. - Broadcast address An address that allows transmission of a message to all nodes of a network. - Congestion Excessive network or internetwork traffic causing a general degradation of service. This can be seen in slower response times, longer file transfers and network users becoming less productive due to network delays.
  • 153. Other Terms - Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) An access method in wireless LANs that avoids collision by forcing the stations to send reservation messages when they find the channel is idle. - Carrier Sense Multiple Access with Collision Detection (CSMA/CD) An access method in which stations transmit whenever the transmission medium is available and retransmit when collision occurs. - Collision The event that occurs when two transmitters send at the same time on a channel designed for only one transmission at a time; data will be destroyed.
  • 154. Other Terms - Consultative Committee for International Telegraphy and Telephony (CCITT) An international standards group now known as the ITU-T. - Defense Advanced Research Projects Agency (DARPA) A government organization, which, under the name of ARPA, funded ARPANET and the Internet. - Ethernet A local area network using the CSMA/CD access method.
  • 155. Other Terms - Extranet A private network that uses the TCP/IP protocol suite that allows authorized access from outside users. - Flooding Saturation of a network with a message. intranet A private network that uses the TCP/IP protocol suite. - Intranet A private network that uses the TCP/IP protocol suite.
  • 156. Other Terms - Institute of Electrical and Electronics Engineers (IEEE) A group consisting of professional engineers that has specialized societies whose committees prepare standards in members’ areas of specialty. - Logical tunnel The encapsulation of a multicast packet inside a unicast packet to enable multicast routing by non-multicast routers. - Physical address The address of a device used at the data link layer (MAC address).
  • 157. Other Terms - Request for Comment (RFC) A formal Internet document concerning an Internet issue. - Reverse Address Resolution Protocol (RARP) A TCP/IP protocol that allows a host to find its Internet address, given its physical address. - Switch A device connecting multiple communication lines together. - Switched Ethernet An Ethernet in which a switch, replacing the hub, can direct a transmission to its destination.
  • 158. References TEXTBOOK: - Data Communications and Networking, Behrouz Forouzan, 4th Edition, McGraw-Hill, 2007
  • 159. References SECONDARY SOURCE: - TCP/IP Protocol Suite, Behrouz Forouzan, 4th edition, 2010
  • 160. References SECONDARY SOURCE: - Data and Computer Communications, William Stallings, 2007
  • 161. References SECONDARY SOURCE: - CISCO Networking Essentials, Troy McMillan, 2012
  • 162. References SECONDARY SOURCE: - Network Fundamentals, Cisco Networking Academy, 2007
  • 163. Thank you for your attention!