Chapter-4
Chapter-4
Chapter-4
Chapter 4:
‘‘Part I’’: Network Devices
‘‘Part II’’: Designing and Installing a
New Network
Introduction to Network Devices
➢Computer networking devices are units that mediate data in a
computer network and are also called network equipment.
➢Units that are the last receiver or generate data are called hosts
or data terminal equipment.
Repeaters
➢When a signal travels through a medium its energy is lost, resulting in
decrease in the amplitude of the wave, for the wave to travel longer
distance there is a need to regenerate the signal which can be
transmitted forward.
➢ Attenuation
Repeaters
6
7
Hub
➢ Generic connection devices are used to tie several networking
cables together to create a link between different stations on a
network.
When network administrators place too many nodes on the same network
segment causes the number of collisions to increase
16
Bridges
Bridge is a product that connects a local area network (LAN) to another local area network
that uses the same protocol.
Filter traffic between network segments by examining the destination MAC address
➢ Based on the destination MAC address, the bridge either forwards or discards the frame
Reduce collisions
Some bridges connect networks using different media types and architectures.
Disadvantages
✓ Slower than repeaters and hubs
Extra processing by viewing MAC addresses
✓ Forward broadcast frames indiscriminately, so they do not
filter broadcast traffic
✓ Devices connect to switches via twisted-pair cabling, one cable for each device.
✓ Whereas a hub forwards the data it receives to all of the ports on the device, a switch
✓ A switch must be able to read the MAC address of each frame it receives.
✓ This information allows switches to repeat incoming data frames only to the computer or
➢ Unlike less advanced network hubs, a network switch forwards data only to
one or multiple devices that need to receive it, rather than broadcasting the
same data out of each of its ports.
Switches
➢The main objective of switch is to connect various devices simultaneously.
➢While through switch, data is sent in the form of packet and frame.
17
Features of Switches
➢It is an intelligent network device that can be conceived as a
multiport network bridge.
18
Features of Switches
➢Switches can perform some error checking before forwarding data to the
destined port.
19
Types of Switches
20
Types of Switches
1. Unmanaged Switch − These are inexpensive switches commonly used
in home networks and small businesses.
✓ They can be set up by simply plugging in to the network, after which they
instantly start operating.
✓ When more devices needs to be added, more switches are simply added by
this plug and play method.
21
Types of Switches
2. Managed Switch − These are costly switches that are used in
organizations with large and complex networks, since they can be
customized to augment the functionalities of a standard switch.
✓The augmented features may be QoS (Quality of Service) like higher
security levels, better precision control and complete network management.
22
Types of Switches
Store-and-forward
Cut-through
Fast-forward
Fragment-free
25
The method of switching dictates how the switch deals with the data it receives.
✓ This method is very fast, but creates the possibility of errors being propagated through
the network, as there is no error checking.
Forwards a frame before it is entirely received.
At a minimum, it must read the destination and source MAC addresses.
Faster than store-and-forward.
No error checking.
Any corrupt frames are still forwarded and consume network bandwidth
Switch Forwarding Methods
Cut-through – Fast-forward:
• Typical method of cut-through.
• Forwards a frame immediately after it reads and finds the destination
address.
Cut-through – Fragment-free:
• Stores the first 64 bytes of the frame before forwarding.
• The first 64 bytes of the frame is where most network errors and
collisions occur.
• Checks for a collision before forwarding the frame.
27
✓The upside of Store-and-forward method is that errors are not propagated through the
network.
✓The downside is that the error checking process takes a relatively long time, and store-and-
forward switching is considerably slower as a result.
Fragment Free: To take advantage of the error checking of store-and-forward switching, but
still offer performance levels nearing that of cut-through switching,
✓ In a Fragment Free, enough of the packet is read so that the switch can determine whether
the packet has been involved in a collision.
✓ As soon as the collision status has been determined, the packet is forwarded.
CON’T
✓ Operate at the Data Link layer of the OSI model
✓ Increase network performance by reducing the number of frames transmitted to the rest
of the network
✓ Switch opens a virtual circuit between the source and the destination
33
Routers
✓ Operate at the Network layer of the OSI model
✓ Provide filtering and network traffic control on LANs and WANs
Can connect multiple segments and multiple networks
Internetworks
➢ Networks connected by multiple routers
➢ Similar to switches and bridges in that they segment a network and filter traffic
➢ Routers use the logical address
29
Routers
➢Routers: are small electronic devices that join multiple computer networks together via
either wired or wireless connections.
➢ The main objective of router is to connect various networks simultaneously and it works in
network layer, whereas the main objective of switch is to connect various devices
simultaneously and it works in data link layer.
Routers
➢A switch connects multiple devices to create a network; a router connects multiple
switches, and their respective networks, to form an even larger network.
38
Router
A hardware device designed to
• take incoming packets,
• analyze the packets,
• moving the packets to another network,
• converting the packets to another network interface,
• dropping the packets,
• directing packets to the appropriate locations
39
Why Routing?
➢The router is responsible for the routing of traffic between
networks.
➢Routers can connect multiple networks.
➢Routers have multiple interfaces, each on a different IP
network.
40
Basic Settings on a Router
41
A big WAN
42
What’s Routing
Network A Network B
43
IP Routing
• IP performs:
• search for a matching host address
• search for a matching network address
• search for a default entry
• Routing done by IP router, when it searches the routing
table and decide which interface to end a packet out.
incoming
which interface ?
44
Routing
Routing protocol
Goal: determine “good” path 5
(sequence of routers) thru 3
network from source to dest. B C 5
2
A 2 1 F
Graph abstraction for routing 3
1 2
algorithms: D
1
E
• graph nodes are routers
• graph edges are physical links “good” path:
• link cost: delay, $ cost, or typically means minimum cost
congestion level path
other definitions possible
45
Routing Component
• Three important routing elements :
• algorithm
• database
• protocol
• Algorithm : can be differentiated based on several key
characteristics
• Database : table in routers or routing table
• Protocol: the way information for routing to be gathered
and distributed
46
Routing Tables
• Routing is carried out in a router by consulting routing
table.
• No unique format for routing tables, typically table
contains:
• address of a destination
• IP address of next hop router
• network interface to be used
• subnet mask for this interface
• distance to the destination
47
Routing Table Sources
Show ip route command is used to display the contents of the routing table
1. Link local Interfaces –Added to the routing table when an interface is
configured.
2. Directly connected interfaces -Added to the routing table when an
interface is configured and active.
3. Static routes - Added when a route is manually configured and the exit
interface is active.
4. Dynamic routing protocol - Added when EIGRP or OSPF are
implemented and networks are identified.
EIGRP (Enhanced Interior Gateway Routing Protocol) and OSPF (Open Shortest Path First) are two common
Interior Gateway Protocols (IGP) specifying how routers or data switches communicate with each other48
Routing Algorithm
Design goals
• Optimality - compute the best route
• Simplicity/low overhead - efficient with a minimum software and
utilization overhead
• Robustness/stability- perform correctly in the face of unusual
circumstances
• Rapid convergence- responds quickly when the network changes
• Flexibility- accurate adapt to a variety of network
49
Routing Protocols
• Routing protocol: protocol to exchange of information
between routers about the current state of the network
50
Routing Protocol Metrics
• How do we decide that one route is better than another?
Metric: the determining factor used by a routing algorithm to
decide which route to a network is better than another
Examples of metrics:
Bandwidth - capacity
Delay - time
Load - amount of network traffic
Reliability - error rate
Hop count - number of routers that a packet must travel
through before reaching the destination network
Cost - arbitrary value defined by the protocol or
administrator
51
How Routers Work
➢In technical terms, a router is a Layer 3 network gateway device, meaning that it connects
two or more networks and that the router operates at the network layer of the OSI model.
➢Routers contain a processor (CPU), several kinds of digital memory, and input- output (I/O)
interfaces. They function as special-purpose computers, one that does not require a
keyboard or display.
➢The router’s memory stores an embedded operating system (O/S). Compared to general-
purpose OS products like Microsoft Windows or Apple Mac OS, router operating systems
limit what kind of applications can be run on them and also need much smaller amounts of
storage space.
Routing Mechanisms
➢ There are several routing mechanisms that may be used as input sources to
assist a router in building its route table.
➢ Static
➢ Default
➢ Dynamic
Static Routing
➢Static routing is a type of network routing technique.
➢The default route is generally the address of another router, which treats the
packet the same way: if a route matches, the packet is forwarded accordingly;
otherwise, the packet is forwarded to the default route of that router.
Dynamic Routing
➢Dynamic routing is a networking technique that provides optimal data routing.
➢In static routing, all these jobs are manually done by the system administrator.
Dynamic Routing
➢Dynamic routing uses multiple algorithms and protocols. The most popular are
Routing Information Protocol (RIP) and Open Shortest Path First (OSPF).
➢ Operates at both the Data Link and Network layers and can replace
separate bridges and routers.
➢ A Brouter transmits two types of traffic at the exact same time: bridged
traffic and routed traffic.
Gateways
✓ A gateway is a device used to connect networks using different protocols.
✓ Gateways operate at the network layer of the OSI model.
✓ Usually a combination of hardware and software
✓ Translates between different protocol suites
✓ Has the most negative effect on network performance
✓ Packets must be rebuilt not just at the lower levels but at the very upper levels
✓ So that actual data content can be converted into a format the destination can
process
✓ Creates the most latency
NICs (Network Interface Card)
✓ NIC is a hardware card installed in a computer so it can communicate on a
network.
✓ The network adapter provides one or more ports for the network cable to
connect to.
✓ Every networked computer must also have a network adapter driver, which
controls the network adapter.
✓ Each network adapter driver is configured to run with a certain type of network
adapter.
MODEM
✓ A modem, short for modulator/demodulator.
✓ Is a device that converts the digital signals generated by a computer into analog
signals that can travel over conventional phone lines.
✓ Because standard telephone lines use analog signals, and computers digital
signals,
✓ A sending modem must modulate its digital signals into analog signals.
✓ The computers modem on the receiving end must then demodulate the analog
signals into digital signals
Firewalls
They detect the broadcasted SSID of the various access points in the area
Attempt to associate with the one that has the highest signal level and
the lowest error rate
Device Access Methods
Most common methods to access the Command Line Interface
❑ Console
❑ Telnet or SSH
❑ AUX port
Console Access
Method
❑ Device is accessible even if no networking services have been
configured (out-of-band)
Management Design
Simulation/
Prototyping
Monitoring
Implementation