SlideShare a Scribd company logo
1 of 30
Chapter 15 Connecting LANs,  Backbone Networks,  and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
15-1  CONNECTING DEVICES In this section, we divide connecting devices into five different categories based on the layer in which they operate in a network. Passive Hubs Active Hubs Bridges Two-Layer Switches Routers Three-Layer Switches Gateways Topics discussed in this section:
Figure 15.1  Five categories of connecting devices
Figure 15.2  A repeater connecting two segments of a LAN
A repeater connects segments of a LAN. Note
A repeater forwards every frame;  it has no filtering capability. Note
A repeater is a regenerator,  not an amplifier. Note
Figure 15.3  Function of a repeater
Figure 15.4  A hierarchy of hubs
A bridge has a table used in  filtering decisions. Note
Figure 15.5  A bridge connecting two LANs
A bridge does not change the physical (MAC) addresses in a frame. Note
Figure 15.6  A learning bridge and the process of learning
Figure 15.7  Loop problem in a learning bridge
Figure 15.8  A system of connected LANs and its graph representation
Figure 15.9  Finding the shortest paths and the spanning    tree in a system of bridges
Figure 15.10  Forwarding and blocking ports after using spanning    tree algorithm
Figure 15.11  Routers connecting independent LANs and WANs
15-2  BACKBONE NETWORKS A backbone network allows several LANs to be connected. In a backbone network, no station is directly connected to the backbone; the stations are part of a LAN, and the backbone connects the LANs.  Bus Backbone Star Backbone Connecting Remote LANs Topics discussed in this section:
In a bus backbone, the topology  of the backbone is a bus. Note
Figure 15.12  Bus backbone
In a star backbone, the topology of the backbone is a star; the backbone is just one switch. Note
Figure 15.13  Star backbone
Figure 15.14  Connecting remote LANs with bridges
A point-to-point link acts as a LAN in a remote backbone connected by  remote bridges. Note
15-3  VIRTUAL LANs We can roughly define a  virtual local area network  (VLAN) as a local area network configured by software, not by physical wiring. Membership Configuration Communication between Switches IEEE Standard Advantages Topics discussed in this section:
Figure 15.15  A switch connecting three LANs
Figure 15.16  A switch using VLAN software
Figure 15.17  Two switches in a backbone using VLAN software
VLANs create broadcast domains. Note

More Related Content

What's hot

What's hot (20)

Ch10
Ch10Ch10
Ch10
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
Chapter 22
Chapter 22Chapter 22
Chapter 22
 
Ch22
Ch22Ch22
Ch22
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Resource reservation protocol
Resource reservation protocolResource reservation protocol
Resource reservation protocol
 
Chapter 17
Chapter 17Chapter 17
Chapter 17
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 

Viewers also liked (20)

Ch09
Ch09Ch09
Ch09
 
Data transmission
Data transmissionData transmission
Data transmission
 
Serial transmission
Serial transmissionSerial transmission
Serial transmission
 
Ch21
Ch21Ch21
Ch21
 
Ch25
Ch25Ch25
Ch25
 
Analog transmission
Analog transmissionAnalog transmission
Analog transmission
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 
2[1].1 data transmission
2[1].1 data transmission2[1].1 data transmission
2[1].1 data transmission
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
Digital & analog transmission
Digital & analog transmissionDigital & analog transmission
Digital & analog transmission
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Data communications
Data communicationsData communications
Data communications
 
Ch31
Ch31Ch31
Ch31
 
Ch08
Ch08Ch08
Ch08
 
Ch06
Ch06Ch06
Ch06
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
 
Ch18
Ch18Ch18
Ch18
 
Digital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shapingDigital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shaping
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 

Similar to Ch15

3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
kavish dani
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
MelkamtseganewTigabi1
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
Rahul Kumar
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
Rahul Kumar
 
High level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptxHigh level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptx
MullaiVendan8
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
abdnazar2003
 
Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010
irbas
 
Ccna 3 v4.0 final-exam-17-07-2010
Ccna 3 v4.0  final-exam-17-07-2010Ccna 3 v4.0  final-exam-17-07-2010
Ccna 3 v4.0 final-exam-17-07-2010
irbas
 
Ch6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wirelessCh6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wireless
kratos2424
 

Similar to Ch15 (20)

15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
Ch15
Ch15Ch15
Ch15
 
connecting devices.ppt
connecting devices.pptconnecting devices.ppt
connecting devices.ppt
 
lan connecting device
lan connecting devicelan connecting device
lan connecting device
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
 
Ch 16
Ch 16Ch 16
Ch 16
 
Chap 03
Chap 03Chap 03
Chap 03
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
connecting LANs.pptx
connecting LANs.pptxconnecting LANs.pptx
connecting LANs.pptx
 
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptxChapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
 
High level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptxHigh level data link control and point to point protocol.pptx
High level data link control and point to point protocol.pptx
 
3 2
3 23 2
3 2
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
 
Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010
 
Ccna 3 v4.0 final-exam-17-07-2010
Ccna 3 v4.0  final-exam-17-07-2010Ccna 3 v4.0  final-exam-17-07-2010
Ccna 3 v4.0 final-exam-17-07-2010
 
Ch6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wirelessCh6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wireless
 
Connecting devices ece 702
Connecting devices ece 702Connecting devices ece 702
Connecting devices ece 702
 
Connecting devices ece 702
Connecting devices ece 702Connecting devices ece 702
Connecting devices ece 702
 

More from Wayne Jones Jnr (18)

Ch23
Ch23Ch23
Ch23
 
Ch20
Ch20Ch20
Ch20
 
Ch17
Ch17Ch17
Ch17
 
Ch16
Ch16Ch16
Ch16
 
Ch14
Ch14Ch14
Ch14
 
Ch13
Ch13Ch13
Ch13
 
Ch12
Ch12Ch12
Ch12
 
Ch07
Ch07Ch07
Ch07
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05
 
Ch32
Ch32Ch32
Ch32
 
Chapter 30 - Cry
Chapter 30 - CryChapter 30 - Cry
Chapter 30 - Cry
 
Chapter 29 - Mutimedia
Chapter 29 - MutimediaChapter 29 - Mutimedia
Chapter 29 - Mutimedia
 
Ch28
Ch28Ch28
Ch28
 
Ch27
Ch27Ch27
Ch27
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
 
Chapter 3 - Data and Signals
Chapter 3 - Data and SignalsChapter 3 - Data and Signals
Chapter 3 - Data and Signals
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - Introduction
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Ch15

  • 1. Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 15-1 CONNECTING DEVICES In this section, we divide connecting devices into five different categories based on the layer in which they operate in a network. Passive Hubs Active Hubs Bridges Two-Layer Switches Routers Three-Layer Switches Gateways Topics discussed in this section:
  • 3. Figure 15.1 Five categories of connecting devices
  • 4. Figure 15.2 A repeater connecting two segments of a LAN
  • 5. A repeater connects segments of a LAN. Note
  • 6. A repeater forwards every frame; it has no filtering capability. Note
  • 7. A repeater is a regenerator, not an amplifier. Note
  • 8. Figure 15.3 Function of a repeater
  • 9. Figure 15.4 A hierarchy of hubs
  • 10. A bridge has a table used in filtering decisions. Note
  • 11. Figure 15.5 A bridge connecting two LANs
  • 12. A bridge does not change the physical (MAC) addresses in a frame. Note
  • 13. Figure 15.6 A learning bridge and the process of learning
  • 14. Figure 15.7 Loop problem in a learning bridge
  • 15. Figure 15.8 A system of connected LANs and its graph representation
  • 16. Figure 15.9 Finding the shortest paths and the spanning tree in a system of bridges
  • 17. Figure 15.10 Forwarding and blocking ports after using spanning tree algorithm
  • 18. Figure 15.11 Routers connecting independent LANs and WANs
  • 19. 15-2 BACKBONE NETWORKS A backbone network allows several LANs to be connected. In a backbone network, no station is directly connected to the backbone; the stations are part of a LAN, and the backbone connects the LANs. Bus Backbone Star Backbone Connecting Remote LANs Topics discussed in this section:
  • 20. In a bus backbone, the topology of the backbone is a bus. Note
  • 21. Figure 15.12 Bus backbone
  • 22. In a star backbone, the topology of the backbone is a star; the backbone is just one switch. Note
  • 23. Figure 15.13 Star backbone
  • 24. Figure 15.14 Connecting remote LANs with bridges
  • 25. A point-to-point link acts as a LAN in a remote backbone connected by remote bridges. Note
  • 26. 15-3 VIRTUAL LANs We can roughly define a virtual local area network (VLAN) as a local area network configured by software, not by physical wiring. Membership Configuration Communication between Switches IEEE Standard Advantages Topics discussed in this section:
  • 27. Figure 15.15 A switch connecting three LANs
  • 28. Figure 15.16 A switch using VLAN software
  • 29. Figure 15.17 Two switches in a backbone using VLAN software
  • 30. VLANs create broadcast domains. Note