Wrapping The Encapsulation)

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Wrapping The Encapsulation) as PDF for free.

More details

  • Words: 596
  • Pages: 24
Wrapping The Package Devices & Data Encapsulation By: Allan Johnson

Evolution of LAN Devices NICs, Repeaters, & Hubs Bridges Switches Routers

NIC Specifics NICs provide hosts with access to media by using a MAC address. MAC stands for Media Access Control NICs operate at Layer 2 !!

NICs, Repeaters, & Hubs The First LAN NIC

NIC

To connect two computers, you must... NIC NIC card inusing each.  Install Attach acomputers a crossover cable You will make a crossover cable in Ch. 5

NICs, Repeaters, & Hubs NIC

Repeaters can be used to increase the distance

NIC

So what can we use if this Repeaters amplify What’s the maximum 100distance meters or approx. 300 greater than 100feet and is retime signals distance meters? for Cat 5 cable?

NICs, Repeaters, & Hubs NIC

NIC

Using repeaters was fine as long as a business only needed two computers networked. What if a business wanted a third computer NIC NIC attached? Or a fourth? What device would they need?

NICs, Repeaters, & Hubs A multi-port repeater! Also called a... NIC

NIC

Hub

NIC

NIC

A Dilemma!

As businesses expanded their networks, they began to cascade hubs.

NIC

NIC

NIC

NIC

What’s The Problem? 1) Hubs share bandwidth between all attached devices. 2) Hubs are stupid, Layer 1 devices. They cannot filter traffic. 3) Most LANs use a “broadcast topology,” so every device sees every packet sent down the media.

Let’s take a look at how broadcasting works

Broadcasts

In this picture, all hubs forward all traffic to all devices.

So, if Host 1 wants ping Host 2, all hosts see the ping. This is what we mean by a broadcast topology

Broadcasts 1 2

The red arrows show that all hosts receive the ping request. Only Host 2 will

What’s The Solution? We need a smarter hub! What’s a “smarter hub” called? A Bridge! Bridges filter network traffic based on MAC addresses. Let’s take a look at how this works.

Bridge

To lessen the amount of LAN traffic, businesses began to uses bridges to filter frames based on MAC addresses.

Bridge 1 2

Now, if Host 1 pings Host 2, only the hosts on that LAN segment see the ping. The bridges stop the ping.

Switch

A switch (also know as a multiport bridge), can effectively replace these four bridges.

Switch

Another benefit of a switch is that each LAN segment gets dedicated bandwidth. 10 Mbps 10 Mbps The Cloud

10 Mbps

10 Mbps

10 Mbps

Switc h 1 2

Since a switch is a stop multi-port But a switch cannot a ping bridge, we know it willLAN stop local destined for a different pings from traveling toto other segment from traveling all other network segments. LAN segments.

Switc h

For example, Host 1 pings Host 16. Since Host 16 isdevice on another LAN this segment, the What will solve switch will flood the ping request out all problem? ports.

1

16

Route r

Routers filter traffic based on IP addresses. The IP address tells the router which LAN segment the ping belongs to.

1

16

Devices Function At Layers

Know These!

Devices Function At Layers Also know that each device not only works at its layer, but all layers below it.

Devices Function At Layers For example, a router is a layer 3 device but also uses MAC addresses (layer 2) and repeats the signal (layer 1)

Devices Function At Layers One last bit of information from Chapter 3

At what layers ALL LAYERS!! do 7these two operate?

The Cloud

L G ood On uck The Test! !

Related Documents

Wrapping The Encapsulation)
November 2019 13
Wire Wrapping
November 2019 45
Protocol Encapsulation
April 2020 3
Encapsulation - Questions
October 2019 8
Encapsulation - Answers
October 2019 7