2 Repeaters, Bridges, Routers and Gateways LAN Interconnection

Total Page:16

File Type:pdf, Size:1020Kb

2 Repeaters, Bridges, Routers and Gateways LAN Interconnection LAN Interconnection 2 Repeaters, Bridges, Routers and Gateways g LAN interconnection refers to the ability to inter- network LANs, MANs, and WANs, through relays. b A layer n relay is a device that interconnects two systems not directly connected to each other (OSI Ref. Model) ` Layer n relay shares a common layer n with other systems, but does not participate in layer n+1 protocol g Terminology is non uniformly used in the litera- ture Prof. A. Bruce McDonald Spring’01 LAN Interconnection 3 Interconnecting LANs g There are four generic devices for LAN intercon- nection b Repeater : Physical layer relay b Bridge : Data link layer relay b Router : Network layer relay b Gateway : Any relay at higher layer than net- work layer g One final category combines bridges and routers functionalities b Brouters Prof. A. Bruce McDonald Spring’01 LAN Interconnection 4 Relays, Bridges, Routers and Gateways End System End System Relays Network Relays Bridge Repeater Physical Media Prof. A. Bruce McDonald Spring’01 LAN Interconnection 5 Shared-Bandwidth LANs Thick Ethernet Trunk Cable Maximum Trunk Link, 500 Meters Transceiver Terminating Resistor at each end Transceiver Cable Bridge Prof. A. Bruce McDonald Spring’01 LAN Interconnection 6 Dedicated-Bandwidth LANs Structured Wiring Work Location Wall Plate Wiring Closest LAN Hub Patch Panel Horizental Distribution V (UTP Cat 5) e r t i c B a u l i l d i n g UTP B a 100 m distance D c i k VD s b µ t o Fiber (62.5/125 m) r n 2 Km distance i e b u t i o n Prof. A. Bruce McDonald Spring’01 LAN Interconnection 7 Repeaters g Repeaters are used to interconnect homogene- ous networks, and to extend their range of opera- tions g Repeaters pass signals in both directions g Their main functions include b Amplifying signals b Regenerating signal b Signals are not changed except for ‘‘cleaning’’ g Repeaters have no effect on protocols Prof. A. Bruce McDonald Spring’01 LAN Interconnection 8 Standalone Repeaters g Repeaters forward packets to all ports b Shared Network g All segments interconnected by means of repeaters are in one Electrical Collision Domain Prof. A. Bruce McDonald Spring’01 LAN Interconnection 9 Electrical Collision Domain g All collisions occurring in a single collision domain must be detected by the nodes causing the collisions before they terminate their transmissions b This has to hold for all network nodes, includ- ing the ones at the farthest ends of the net- work g As a result, the network diameter is directly related to the minimum packet size, which is 512 bits Prof. A. Bruce McDonald Spring’01 LAN Interconnection 10 Electrical Collision Domain DTE Delay Cable Delay Repeater Delay Cable Delay DTE Delay g To handle collision appropriately, the following rule must hold true 2 × ( Total repeater delays ) + 2 × ( Total cable delays ) + 2 × ( Total DTE delays ) < 512 bit times Prof. A. Bruce McDonald Spring’01 LAN Interconnection 11 Bridges For Shared LANs g Bridges allow for the simplest and most common form of internetworking, interconnection of homogeneous networks g IEEE 802 committees developed standards for bridges to interconnect different types of LANs b Rather a complex task Prof. A. Bruce McDonald Spring’01 LAN Interconnection 12 Typical Bridge Configuration Host Host LAN Bridge Bridge LAN Host Host Bridge-to-Bridge MAC Protocol Protocol Prof. A. Bruce McDonald Spring’01 LAN Interconnection 13 Why Bridges? g Several reasons for the use of bridges to connect LANs b Performance, by building ‘‘firewalls’’, b Reliability, network can be partitioned into self contained units b Security, control and monitor traffic Prof. A. Bruce McDonald Spring’01 LAN Interconnection 14 Bridges Characteristics g Bridges operate at the data link layer b Usually the MAC layer of LANs ` The basic bridge, with no special features, does not look any further than the address fields Prof. A. Bruce McDonald Spring’01 LAN Interconnection 15 Bridges g Bridges do not interfere with higher level proto- cols b Transparently pass traffic between upper- layer running different protocols (XNS, TCP/IP, and OSI) b Only devices running the same protocol can communicate with one another Prof. A. Bruce McDonald Spring’01 LAN Interconnection 16 Bridges Main Advantages g Bridges can connect LANs that use different phy- sical media such as coax cable, fiber optics, or twisted pairs. g Bridges can connect LANs that use different media access control protocols media such as CSMA/CD and Token Ring. b The possible difference in maximum frame size must be handled by upper layers protocol ` Passing through the bridge, the packet does not violate the maximum length on any network segment Prof. A. Bruce McDonald Spring’01 LAN Interconnection 17 Bridges Basic Functionalities g A Bridge, between network 1 and 2, performs the following functions b Reads all frames on network 1, and accepts those addressed to network 2 b Retransmits accepted frames onto network 2, using the MAC protocol for network 2 b Performs equivalent functions on network 2 to network 1 traffic Prof. A. Bruce McDonald Spring’01 LAN Interconnection 18 Bridges Basic Operations Host A Host B Layers 4-7 Network Layer PKT PKT Bridge LLC PKT PKT PKT MAC 802.3PKT 802.3PKT 802.4PKT 802.4PKT Physical 802.3PKT 802.3PKT 802.4PKT 802.4PKT 802.3PKT 802.4PKT CSMA/CD LAN Token Bus LAN Prof. A. Bruce McDonald Spring’01 LAN Interconnection 19 Bridges Over Point-To-Point Links Station Station User User ( 1 ) ( 1 ) LLC LLC ( 2) ( 2) Bridge Bridge MAC MAC ( 3) MAC Link Link MAC ( 3) PHY ()3 ()4 (4) ( 3 ) PHY PHY PHY PHY PHY LAN LAN Packet Data Unit 1 : User Data Packet Data Unit 2 : LLC-H User Data Packet Data Unit 3: MAC-H LLC-H User Data MAC-T Packet Data Unit 4 : Link-HMAC-H LLC-H User Data MAC-T Link-T Prof. A. Bruce McDonald Spring’01 LAN Interconnection 21 Routing with Bridges g Most basic form of bridges, ‘‘No Frills’’ bridges perform the following operations : b Promiscuously, listen to every packet transmitted b Store each packet until it can be transmitted b When ready transmit the packet on all adja- cent LANs, except the one on which it was received b Preferably, operates transparently not to cause protocols on stations to fail Prof. A. Bruce McDonald Spring’01 LAN Interconnection 22 Basic Bridges g ‘‘No Frills’’ bridges extend the capabilities of the LANs b Limits collisions in CSMA/CD b Extend the maximum number of stations in 802.5 Prof. A. Bruce McDonald Spring’01 LAN Interconnection 23 Basic Bridges g ‘‘No Frills’’ may waste total LAN bandwidth b Manual insertion of addresses in the database ` May involve difficult management g If it were for them to know which stations were on which LANs, bridges may become more efficient b Bridges must be equipped with greater rout- ing capabilities Prof. A. Bruce McDonald Spring’01 LAN Interconnection 24 Routing with Bridges g Three basic routing strategies : b Fixed routing ` Only suitable for small LANs ` Mostly proprietary protocols b Spanning tree, developed by IEEE 802.1 ` Intended for use in interconnecting LANs with similar and dissimilar MAC Standards, (802.3, 802.4, 802.5, FDDI) ` Routing technique is used is referred to as Spanning Tree b Source Routing, developed by IEEE 802.5 ` Intended for use in interconnecting Token Rings Prof. A. Bruce McDonald Spring’01 LAN Interconnection 25 Interconnection of Different Types of LANs To CSMA/CD Token Bus Token Ring From 802.3 802.4 802.5 802.3 1,4 1,2,4,8 802.4 1,5,8,9,10 9 1,2,3,8,9,10 802.5 1,2,5,6,7,10 1,2,3,6,7 6,7 1 Reformat the frame, compute new checksum 2 Reverse the bit order 3 Copy priority, even if not meaningful 4 Generate fictitious priority 5 Discard priority 6 Drain the ring 7 Fake A and C bits 8 Deal with congestion 9 Deal with temporary token handoff 10 Deal with long frames for receiving LAN Prof. A. Bruce McDonald Spring’01 LAN Interconnection 26 Bridging with Different LANs g Two techniques are widely used : b Encapsulation, b Translation (Mapping) Prof. A. Bruce McDonald Spring’01 LAN Interconnection 27 Encapsulation g The frame of the in-bound LAN is included in the information field of the frame of the out-bound LAN g The receiving bridge performs de-encapsulation Prof. A. Bruce McDonald Spring’01 LAN Interconnection 28 Encapsulation g Major limitations : b No standards for encapsulation are defined b Requires that both bridges subscribe to the same encapsulation proprietary scheme ` Limits interoperability ` Limits transparency Prof. A. Bruce McDonald Spring’01 LAN Interconnection 29 Translation Concept g Bridges map the content of incoming incoming frame into the outbound frame that conforms to the outbound LAN g Translation may require higher processing rate than encapsulation Prof. A. Bruce McDonald Spring’01 LAN Interconnection 30 Translation g To achieve translation, bridge internal sublayer performs : b Frame disassembly at the in-bound LAN b Altering of certain field of the in-bound LAN frame b Reconstruction of the out-bound LAN frame g These services are defined within the bridge by a set of primitives and parameters Prof. A. Bruce McDonald Spring’01 LAN Interconnection 31 Bridge Architecture Service Relationship Higher Layer Entities (Bridge Protocol Entity, Bridge Management,...) LLC LLC MAC Relay Entity Media Access Method Independent MAC Services MAC Services ISS ISS MAC Entity MAC Entity Media Access Media Access Method Dependent Method Dependent ISS : Internal Sublayer Service Prof.
Recommended publications
  • Securing the Everywhere Perimeter Iot, BYOD, and Cloud Have Fragmented the Traditional Network Perimeter
    White Paper Securing the Everywhere Perimeter IoT, BYOD, and Cloud have fragmented the traditional network perimeter. This revolution necessitates a new approach that is comprehensive, pervasive, and automated. Businesses need an effective strategy to differentiate critical applications and confidential data, partition user and devices, establish policy boundaries, and reduce their exposure. Leveraging Extreme Networks technology, organizations can hide much of their network and protect those elements that remain visible. Borders are established that defend against unauthorized lateral movement, the attack profile is reduced, and highly effective breach isolation is delivered. This improves the effectiveness of anomaly scanning and the value of specialist security appliances. Redundant network configuration is rolled back, leaving an edge that is “clean” and protected from hacking. Businesses avoid many of the conventional hooks and tools that hackers seek to exploit. Additionally, flipping the convention of access-by-default, effective access control policy enforcement denies unauthorized connectivity. The Business Imperative As businesses undertake the digital transformation, the trends of cloud, mobility, and IoT converge. Organizations need to take a holistic approach to protecting critical systems and data, and important areas for attention are the ability to isolate traffic belonging to different applications, to reduce the network’s exposure and attack profile, and to dynamically control connectivity to network assets. In addition to all of the normal challenges and demands, businesses are also starting to experience IoT. This networking phenomenon sees unconventional embedded system devices appearing, seemingly from nowhere, requiring connectivity. WWW.EXTREMENETWORKS.COM 1 IoT is being positioned as the enabling technology for all manner of “Smart” initiatives.
    [Show full text]
  • LAB MANUAL for Computer Network
    LAB MANUAL for Computer Network CSE-310 F Computer Network Lab L T P - - 3 Class Work : 25 Marks Exam : 25 MARKS Total : 50 Marks This course provides students with hands on training regarding the design, troubleshooting, modeling and evaluation of computer networks. In this course, students are going to experiment in a real test-bed networking environment, and learn about network design and troubleshooting topics and tools such as: network addressing, Address Resolution Protocol (ARP), basic troubleshooting tools (e.g. ping, ICMP), IP routing (e,g, RIP), route discovery (e.g. traceroute), TCP and UDP, IP fragmentation and many others. Student will also be introduced to the network modeling and simulation, and they will have the opportunity to build some simple networking models using the tool and perform simulations that will help them evaluate their design approaches and expected network performance. S.No Experiment 1 Study of different types of Network cables and Practically implement the cross-wired cable and straight through cable using clamping tool. 2 Study of Network Devices in Detail. 3 Study of network IP. 4 Connect the computers in Local Area Network. 5 Study of basic network command and Network configuration commands. 6 Configure a Network topology using packet tracer software. 7 Configure a Network topology using packet tracer software. 8 Configure a Network using Distance Vector Routing protocol. 9 Configure Network using Link State Vector Routing protocol. Hardware and Software Requirement Hardware Requirement RJ-45 connector, Climping Tool, Twisted pair Cable Software Requirement Command Prompt And Packet Tracer. EXPERIMENT-1 Aim: Study of different types of Network cables and Practically implement the cross-wired cable and straight through cable using clamping tool.
    [Show full text]
  • Understanding CIDR Notation Used for IP Address Display on 2500 Series® Processors
    Application Note 2500 Series® Programmable Automation Control System Understanding CIDR Notation Used for IP Address Display on 2500 Series® Processors Newer CTI products featuring Ethernet ports, such as the 2500 Series® processor, the 2500P-ECC1, and 2500P-ACP1, display the IP address of the product on the front panel multi-segment display. This information has proven very useful to most customers, facilitating the connection of browsers to obtain diagnostic data and providing visual confirmation of the operating IP address. Beginning with Version 8.02 of the 2500 Series® processor firmware, we’ve added the capability to display the subnet mask in CIDR notation. This gives users more complete information about the IP address setting to allow them to easily get connected. This application note shows how to interpret the CIDR notation displayed on the front of the processor. What is CIDR Notation? CIDR notation (Classless Inter-Domain Routing) is an alternate method of representing a subnet mask. It is simply a count of the number of network bits (bits that are set to 1) in the subnet mask. Subnet mask bits are explained in a following section. The CIDR number is typically preceded by a slash “/” and follows the IP address. For example, an IP address of 131.10.55.70 with a subnet mask of 255.0.0.0 (which has 8 network bits) would be represented as 131.10.55.70 /8. CIDR notation is more concise method for designating the subnet mask. Compared to Dotted Decimal notation, which represents the mask as four values, each representing the decimal value of an octet of the mask, the CIDR format represents the mask as a single value.
    [Show full text]
  • LAN Topologies
    0390.book Page 13 Wednesday, November 14, 2001 3:28 PM C H A P T E R 2 LAN Topologies The application in use, such as multimedia, database updates, e-mail, or file and print sharing, generally determines the type of data transmission. LAN transmissions fit into one of three categories: • Unicast • Multicast • Broadcast Unicast With unicast transmissions, a single packet is sent from the source to a destination on a network. The source-node addresses the packet by using the network address of the destination node. The packet is then forwarded to the destination network and the network passes the packet to its final destination. Figure 2-1 is an example of a unicast network. Figure 2-1 Unicast Network Server Client Client Client 0390.book Page 14 Wednesday, November 14, 2001 3:28 PM 14 Chapter 2: LAN Topologies Multicast With a multicast transmission, a single data packet is copied and forwarded to a specific subset of nodes on the network. The source node addresses the packet by using a multicast address. For example, the TCP/IP suite uses 224.0.0.0 to 239.255.255.255. The packet is then sent to the network, which makes copies of the packet and sends a copy to each segment with a node that is part of the multicast address. Figure 2-2 is an example of a multicast network. Figure 2-2 Multicast Network Server Client Client Client Broadcast Broadcasts are found in LAN environments. Broadcasts do not traverse a WAN unless the Layer 3 edge-routing device is configured with a helper address (or the like) to direct these broadcasts to a specified network address.
    [Show full text]
  • Draft NIST SP 800-125B, Secure Virtual Network Configuration for Virtual Machine
    The attached DRAFT document (provided here for historical purposes) has been superseded by the following publication: Publication Number: NIST Special Publication (SP) 800-125B Title: Secure Virtual Network Configuration for Virtual Machine (VM) Protection Publication Date: 3/29/2016 • Final Publication: http://dx.doi.org/10.6028/NIST.SP.800-125B (which links to http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125B.pdf). • Related Information on CSRC: http://csrc.nist.gov/publications/PubsSPs.html#SP-800-125-B • Information on other NIST cybersecurity publications and programs can be found at: http://csrc.nist.gov/ The following information was posted with the attached DRAFT document: Sep. 29, 2015 SP 800-125 B DRAFT Secure Virtual Network Configuration for Virtual Machine (VM) Protection NIST requests public comments on Draft Special Publication 800-125B, Secure Virtual Network Configuration for Virtual Machine (VM) Protection. VMs constitute the primary resource to be protected in a virtualized infrastructure, since they are the compute engines on which business/mission critical applications of the enterprise are run. Further, since VMs are end-nodes of a virtual network, the configuration of virtual network forms an important element in the security of VMs and their hosted applications. The virtual network configuration areas considered for VM protection in this document are – Network Segmentation, Network Path Redundancy, Firewall Deployment Architecture and VM Traffic Monitoring. The configuration options in each of these areas are analyzed for their advantages and disadvantages and security recommendations are provided. The specific areas where comments are solicited are: • Advantages and Disadvantages of the various configuration options in the four virtual network configuration areas.
    [Show full text]
  • 1.2. OSI Model
    1.2. OSI Model The OSI model classifies and organizes the tasks that hosts perform to prepare data for transport across the network. You should be familiar with the OSI model because it is the most widely used method for understanding and talking about network communications. However, remember that it is only a theoretical model that defines standards for programmers and network administrators, not a model of actual physical layers. Using the OSI model to discuss networking concepts has the following advantages: Provides a common language or reference point between network professionals Divides networking tasks into logical layers for easier comprehension Allows specialization of features at different levels Aids in troubleshooting Promotes standards interoperability between networks and devices Provides modularity in networking features (developers can change features without changing the entire approach) However, you must remember the following limitations of the OSI model: OSI layers are theoretical and do not actually perform real functions. Industry implementations rarely have a layer‐to‐layer correspondence with the OSI layers. Different protocols within the stack perform different functions that help send or receive the overall message. A particular protocol implementation may not represent every OSI layer (or may spread across multiple layers). To help remember the layer names of the OSI model, try the following mnemonic devices: Mnemonic Mnemonic Layer Name (Bottom to top) (Top to bottom) Layer 7 Application Away All Layer 6 Presentation Pizza People Layer 5 Session Sausage Seem Layer 4 Transport Throw To Layer 3 Network Not Need Layer 2 Data Link Do Data Layer 1 Physical Please Processing Have some fun and come up with your own mnemonic for the OSI model, but stick to just one so you don't get confused.
    [Show full text]
  • Collision & Broadcast Domain a Collision Domain Is a Section of A
    Computer Networking & Communication 4th Class Arranged By: Dr.Ahmed Chalak Shakir Collision & Broadcast Domain A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium or through repeaters, particularly when using early versions of Ethernet. A network collision occurs when more than one device attempts to send a packet on a network segment at the same time. A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer. LAYER 1 - PHYSICAL LAYER Devices - Hubs, Repeaters Collision Domain: As you might have studied both these devices just forward the data as it is to all the devices that are connected to them after attenuating it (making it stronger so that it travels more distance). All the devices fall in the SAME COLLISION DOMAIN because two or more devices might send the data at the same time even when we have CSMA/CD working. So, the data can collide and nullify each other that way no one gets nothing. Broadcast Domain: These devices don't use any type of addressing schemes to help them forward the data like MAC or IP addresses. So, if a PC A sends something for PC B and there are also C,D and E PC's connected to the hub then all the devices i.e. B,C,D and E would receive the data ( Only PC B accepts it while others drop it ). This is what is being in a single BROADCAST DOMAIN.
    [Show full text]
  • Memex Ethernet Networking Guide
    Ethernet Network Construct In recent years, networking computers has taken on greater Ethernet importance as organizations rely on a network for Ethernet is the most popular physical layer LAN technology communication applications like electronic mail and for core in use today. Other Lan types include Token Ring, Fast business operations functions like database applications. Ethernet, Fiber Distributed Data Interface (FDDI), This tutorial helps to explain Ethernet and Fast Ethernet, Asynchronous Transfer Mode (ATM) and LocalTalk. which are two of the most popular technologies used in Ethernet is popular because it strikes a good balance networking between speed, cost and ease of installation. These strong points, combined with wide acceptance in the computer LANs marketplace and the ability to support virtually all popular Networks are collections of independent computers that network protocols, make Ethernet an ideal networking communicate with one another over a shared network technology for most computer users today. The Ethernet medium. Local area networks (LANs) are those networks standard is defined by the Institute for Electrical and usually confined to a geographic area, such as a single Electronic Engineers (IEEE) as IEEE Standard 802.3. This building or a college campus. LANs, however, are not standard defines rules for configuring an Ethernet as well as necessarily simple in design, as they may link many specifying how elements in an Ethernet network interact hundreds of computers and be used by many thousands of with one another. By adhering to the IEEE standard, users. The development of various standards for networking network equipment and network protocols will interoperate protocols and media has made possible the proliferation of efficiently.
    [Show full text]
  • Broadcast Domain
    Broadcast Domain A broadcast domain is a logical part of a network (a network segment) in which any network equipment can transmit data directly to other equipment or device without going through arouting device (assuming the devices share the same subnet and use the same gateway; also, they must be in the same VLAN). A more specific broadcast domain definition is the area of the computer network that consists of every single computer or network equipment that can be reached directly by sending a simple frame to the data link layer’s broadcast address. Details on Broadcast Domains While any layer 2 device is able to divide the collision domains, broadcast domains are only divided by layer 3 network devices such as routers or layer 3 switches. Frames are normally addressed to a specific destination device on the network. While all devices detect the frame transmission on the network, only the device to which the frame is addressed actually receives it. A special broadcast address consisting of all is used to send frames to all devices on the network. The VLAN (Virtual Local Area Network) technology can also create a so-called “virtual” broadcast domain. A network built with switching devices can see each network device as an independent system. These groups of independent systems can be joined into one broadcast domain, even if the computers are not physically connected to each other. This is very useful when administrating large networks where there is the need for better network management and control. How to Restrict the Broadcast Domain Since a broadcast domain is the area where broadcasts can be received, routers restrict broadcasts.
    [Show full text]
  • Network Troubleshooting
    SECTION I SECTION II SECTION III SECTION IV SECTION V TROUBLESHOOTING LOCAL-AREA NETWORKS Excerpts taken from: Network Troubleshooting By Othmar Kyas An Agilent Technologies Publication Section II Troubleshooting Local-Area-Networks Chapter 7 10/100/1,000 Mbit/s Ethernet 7.2 Troubleshooting in 10/100/1,000 Mbit/s Ethernet 7.2.1 Gathering Information on Symptoms and Recent Changes 7.2.2 Starting the Troubleshooting Procedure 7.2.3 Error Symptoms in Ethernet 7.2.4 Cabling Problems 7.2.5 Problems with Ethernet Interface Cards 7.2.6 Problems with Media Access Units (MAUs) 7.2.7 Problems with Repeaters and Hubs 7.2.8 Problems with Bridges 7.2.9 Problems with Routers 7.1.10 Symptoms and Causes: 10/100/1,000 MBit/s Ethernet For additional excerpts from this chapter and other Network Troubleshooting book sections, be sure to regularly visit our web site at: www.FreeTroubleshootingBook.com New chapters will be posted every 2 to 3 weeks. Be sure to visit our web site and vote for the chapters you would like to see posted! 182 10/100/1,000 MBIT/S ETHERNET 7 7.2 Troubleshooting in 10/100/1,000 Mbit/s Ethernet 7.2.1 Gathering Information on Symptoms and Recent Changes The first step in any troubleshooting process is to gather information. The more information you have about the symptoms and characteristics of a problem— including when it first occurred—the better your chances of solving the problem quickly and efficiently. Typical questions you might ask at this stage include: Do the symptoms occur regularly or intermittently? Are the symptoms related
    [Show full text]
  • Cabletron Systems Ethernet Technology Guide
    Cabletron Systems ETHERNET TECHNOLOGY GUIDE Notice Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletron Systems to determine whether any such changes have been made. The hardware, firmware, or software described in this manual is subject to change without notice. IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES. Copyright 1997 by Cabletron Systems, Inc. All rights reserved. Printed in the United States of America. Order Number: 9031913-01 April 1997 Cabletron Systems, Inc. P.O. Box 5005 Rochester, NH 03866-5005 Cabletron Systems, SPECTRUM, BRIM, DNI, FNB, INA, Integrated Network Architecture, LANVIEW, LANVIEW Secure, Multi Media Access Center, and MicroMMAC are registered trademarks, and Bridge/Router Interface Modules, BRIM-A100, CXRMIM, Desktop Network Interface, Distributed LAN Monitoring, Distributed Network Server, DLM, EFDMIM, EMM-E6, EMME, EPIM, EPIM-3PS, EPIM-A, EPIM-C, EPIM-F1, EPIM-F2, EPIM-F3, EPIM-T, EPIM-T1, EPIM-X, ESXMIM, ETSMIM, ETWMIM, FDCMIM-04, FDCMIM-08, FDMMIM, FDMMIM-04, Flexible Network Bus, FOMIM, FORMIM, HubSTACK, IRBM, IRM, IRM-2, IRM-3, Media Interface Module, MIM, MMAC, MMAC-3, MMAC-3FNB, MMAC-5, MMAC-5FNB, MMAC-8, MMAC-8FNB, MMAC-M8FNB, MMAC-Plus, MRX, MRXI, MRXI-24, MultiChannel, NB20E, NB25E, NB30, NB35, NBR-220/420/620, RMIM, SecureFast Switching, SecureFast Packet Switching, SFPS, SPECTRUM Element Manager, SPECTRUM for Open Systems, TPMIM, TPMIM-22, TPMIM-T1, TPRMIM, TPRMIM-36, TPT-T, TRBMIM, TRMM-2, and TRMMIM are trademarks of Cabletron Systems, Inc.
    [Show full text]
  • 1. Data Link Layer (Layer 2) the Data Link Layer Provides a Means for Exchanging Data Over a Common Local Media
    University of Babylon/College of Information Technology/ Information Network Dept. / First Class / Second Semester/ Subject : Network and Distributed System/ Lecture : 4 1. Data Link Layer (Layer 2) The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: • Allows the upper layers to access the media using techniques such as framing. Controls how data is placed onto the media and is received from the media using techniques such as media access control and error detection. The Data Link layer is responsible for the exchange of frames between nodes over the media of a physical network. It is important to understand the meaning of the words medium and media within the context of this chapter. Here, these words refer to the material that actually carries the signals representing the transmitted data. Media is the physical copper cable, optical fiber, or atmosphere through which the signals travel. In this chapter media does not refer to content programming such as audio, animation, television, and video as used when referring to digital content and multimedia. • A physical network is different from a logical network. Logical networks are defined at the Network layer by the arrangement of the hierarchical addressing scheme. Physical networks represent the interconnection of devices on a common media. Sometimes, a physical network is also referred to as a network segment. Lecturer : Ahmed M. Al-Saleh & Mouayad Najim Page 36 University of Babylon/College of Information Technology/ Information Network Dept. / First Class / Second Semester/ Subject : Network and Distributed System/ Lecture : 4 The description of a frame is a key element of each Data Link layer protocol.
    [Show full text]