Professional Documents
Culture Documents
What is a Networking ?
Networking is connecting
computers together so that you
can exchange information
between them
Computer network
connects two or more
autonomous
computers.
Availability of data any time, anywhere
irrespective of the physical origin of the
data
Ease of management
Common Terms
SERVER
CLIENT
Who is a Server ?
• Bus
• Ring
• Star
• Extended Star
• Mesh
• Hybrid
Network Topology
The network
topology defines
the way in which
computers, printers,
and other devices
are connected. A
network topology
describes the layout
of the wire and
devices as well as
the paths used by
data transmissions.
Bus Topology
Commonly
referred to as a
linear bus, all the
devices on a bus
topology are
connected by one
single cable.
Star & Tree Topology
The star topology is the most
commonly used architecture in
Ethernet LANs.
When installed, the star topology
resembles spokes in a bicycle
wheel.
Larger networks use the extended
star topology also called tree
topology. When used with network
devices that filter frames or
packets, like bridges, switches,
and routers, this topology
significantly reduces the traffic on
the wires by sending packets only
to the wires of the destination
host.
Ring Topology
A frame travels around the ring,
stopping at each node. If a node
wants to transmit data, it adds the
data as well as the destination
address to the frame.
The frame then continues around the
ring until it finds the destination
node, which takes the data out of the
frame.
− Single ring – All the devices on the
network share a single cable
Dual ring – The dual ring topology
allows data to be sent in both
directions.
Mesh Topology
The mesh topology
connects all devices
(nodes) to each other
for redundancy and
fault tolerance.
It is used in WANs to
interconnect LANs and
for mission critical
networks like those
used by banks and
financial institutions.
Implementing the mesh
topology is expensive
and difficult.
Network Components
Physical Media
Interconnecting Devices
Computers
Networking Software
Applications
PHYSICAL MEDIA
Physical Media
Physical Media
Physical Media
Copper
Coaxial Cable - Thick or Thin
Unshielded Twisted Pair - CAT 3,4,5,5e&6
Optical Fiber
Multimode
Singlemode
Wireless
Short Range
Medium Range (Line of Sight)
Satellite
Copper Media: Coaxial Cable
Coaxial cable is a copper-
cored cable surrounded
by a heavy shielding and
is used to connect
computers in a network.
Outer conductor shields
the inner conductor from
picking up stray signal Category Impedance Use
from the air.
RG-59 75 Ω Cable TV
High bandwidth but lossy
channel. Thin
RG-58 50 Ω
Ethernet
Repeater is used to Thick
regenerate the weakened RG-11 50 Ω
Ethernet
signals.
Copper Media: Twisted Pair
Twisted-pair is a type of
cabling that is used for
telephone communications
and most modern Ethernet
networks.
A pair of wires forms a
circuit that can transmit
data. The pairs are twisted to
provide protection against
crosstalk, the noise
generated by adjacent pairs.
There are two basic types,
shielded twisted-pair (STP)
and unshielded twisted-pair
(UTP).
Shielded Twisted Pair (STP)
Unshielded Twisted Pair (UTP)
Unshielded Twisted Pair (UTP)
Consists of 4 pairs (8 wires) of
insulated copper wires typically
about 1 mm thick.
The wires are twisted together in a
helical form.
Twisting reduces the interference
between pairs of wires.
High bandwidth and High attenuation
channel.
Flexible and cheap cable.
Category rating based on number of
twists per inch and the material used
CAT 3, CAT 4, CAT 5, Enhanced CAT
5 and now CAT 6.
Categories of UTP
Single-mode fiber
Carries light
pulses along single
path
Uses Laser Light
Source
Multimode fiber
Many pulses of
light generated by
LED travel at
different angles
Fiber Media
The bandwidth of the fiber is limited due to
the dispersion effect.
Distance Bandwidth product of a fiber is
almost a constant.
Fiber optic cables consist of multiple fibers
packed inside protective covering.
62.5/125 µm (850/1310 nm) multimode fiber
50/125 µm (850/1310 nm) multimode fiber
10 µm (1310 nm) single-mode fiber
Physical Media
Fiber-Optic Cable
Contains one or several
glass fibers at its core
Surrounding the fibers is
a layer called cladding
Fiber Optic Cable
FO Cable may have 1 to
over 1000 fibers
Wireless Media
Very useful in difficult
terrain where cable
laying is not possible.
Provides mobility to
communication
nodes.
Right of way and
cable laying costs
can be reduced.
Susceptible to rain,
atmospheric
variations and
Objects in
transmission path.
Wireless Media
Indoor : 10 – 50m : BlueTooth, WLAN
Short range Outdoor : 50 – 200m: WLAN
Mid Range Outdoor : 200m – 5 Km : GSM,
CDMA, WLAN Point-to-Point, Wi-Max
Long Range Outdoor : 5 Km – 100 Km :
Microwave Point-to-Point
Long Distance Communication : Across
Continents : Satellite Communication
Frequency Bands
Propagatio
Band Range Application
n
VLF 3–30 KHz Ground Long-range radio navigation
Radio beacons and
LF 30–300 KHz Ground
navigational locators
MF 300 KHz–3 MHz Sky AM radio
Citizens band (CB),
HF 3–30 MHz Sky
ship/aircraft communication
Sky and VHF TV,
VHF 30–300 MHz
line-of-sight FM radio
Line-of- UHF TV, cellular phones,
UHF 300 MHz–3 GHz
sight paging, satellite
Line-of-
SHF 3–30 GHz Satellite communication
sight
Line-of-
EHF 30–300 GHz Long-range radio navigation
sight
Wireless LAN
PC
Access Point
Internet Switch
Router
PC
Access Point
Terrestrial Microwave
Microwaves do not
follow the curvature of
earth
Line-of-Sight
transmission
Height allows the signal
to travel farther
Two frequencies for
two way
communication
Repeater is used to
increase the distance
Hop-by-Hop
Satellite Communication
Physical vs. Logical
Topology
The actual layout of a network and its media
is its Physical Topology
The way in which the data access the
medium and transmits packets is the Logical
Topology
A glance at a network is not always
revealing. Cables emerging from a Hub does
not make it necessarily a Star Topology – it
may actually be a bus or a ring
Physical vs. Logical Topology
Your choice of Logical Topology will affect
the Physical Topology – and vice versa
Scalability
Bandwidth Capacity
Ease of Installation
Advantages Disadvantages
Inexpensive to
No longer recommended
install Backbone breaks, whole
Easy to add stations
network down
Limited no of devices can
Use less cable than
be attached
other topologies Difficult to isolate problems
Works well for small
Sharing same cable slows
networks response rates
Ring Topology
Ring Topology
No beginning or end (a ring in fact !!)
All devices of equality of access to media
Single ring – data travels in one direction only, guess what a
double ring allows !?
Each device has to wait its turn to transmit
Most common type is Token Ring (IEEE 802.5)
A token contains the data, reaches the destination, data
extracted, acknowledgement of receipt sent back to
transmitting device, removed, empty token passed on for
another device to use
Ring Topology
Advantages
Data packets travel
Disadvantages
at great speed Requires more cable
No collisions
than a bus
Easier to fault find
A break in the ring
No terminators will bring it down
required Not as common as the
bus – less devices
available
Star Topology
Star Topology
A Star
Network
which has
been
expanded to
include an
additional
hub or hubs.
Hybrid Topology
Hybrid Topology
A C
HUB / Switch
D
B
Data Link Layer
Then what……………………….?
Data Link Layer
A number that will identify each
computer uniquely….
MAC Address
Data Link Layer
Physical Address
Hardware Address
Data Link Layer
D
B
Data Link Layer
Broadcast Packet Reaches to all Computers
Identifying
Destination FF-FF-FF MAC Who is Parameter
MAC Address FF-FF-FF Address Computer Normally the
Of A D? C Computer Name
D
B
Data Link Layer
Only Computer D Sends a Reply
Identifying
Destination MAC MAC I AM Parameter
MAC Address Address Address D Normally the
Of A Of D C Computer Name
D
B
Data Link Layer
ipconfig /all
Data Link Layer
Flow Control
Error control
Logical Link Control
Flow Control
This Controls the amount of data that is transferred
between the computers at a time during the
communication.
Two Methods
Static – Data is sent at a fix rate through out the
communication.
Dynamic – Data is sent at a varying rate depending
on status of both the computers.
Logical Link Control
Error Control
B
A Pune Office Network
D E F
C
This
OSI layer provides an addressing
scheme called IP Addressing.
What is a protocol ?
What is a Protocol
A protocol is a set of rules or procedure of
carrying out a particular task.
As an example of the, we can consider human
behaviour. A person behaves differently when
he is with his friends than when he is with
family members.
He follows the protocols defined for both the
situations.
A true life example would be finding MAC
address of another computer.
Network Layer….. IP
Address
It is in Binary.
IP Address
1100000010101000011001000000101
0
11000000.10101000.01100100.00001010
IP Address
How to convert from Binary to Decimal ?
As each octet is of 8 bits we have to calculate the
value for the 8 bit binary numbers only.
8 7 6 5 4 3 2 1
27 26 2 5 24 23 22 21 20
128 64 32 16 8 4 2 1
Above are the decimal values of the corresponding
binary bits.
Converting from Binary to
Decimal
Let’s Convert our earlier binary IP
address to decimal.
octet 1 octet 2 octet 3 octet 4
11000000.10101000.01100100.0000101
0
Consider The first octet……
11000000
Write the corresponding decimal value
for the bits where there is 1.
Converting from Binary to
Decimal
Thus we have…….
1 1 0 0 0 0 0 0
128+64+0+0+0+0+0+0 = 192
11000000.10101000.01100100.0000101
0
00000000
Then the decimal value for it is also 0
When we write as below….
11111111
Then the decimal value for it is
128+64+32+16+8+4+2+1 = 255
IP Address
Class C
Class D
Class E
IP Address
How the class of an IP Address is
decided…..?
The network
&
The Computer in that network
IP Address ……
Thus any IP address is made of two
addresses ……
192.168.100 .10
Thus 192.168.100.0 is the network address
& 0.0.0.10 will be the address of the
computer ( Host Address) in that network.
IP Address ……
A B C
INPUT A 0 0 0
1 0 0
0 1 0
INPUT B OUTPUT C 1 1 1
IP Address …… Subnet
mask
Nowconsider our earlier IP address &
subnet mask……….
& we apply AND gate Logic
11000000.10101000.01100100.000010
10
11111111.11111111.11111111.00000000
11000000.10101000.01100100.000000
IP Address …… Subnet
mask
To avoid compatibility issues for each
IP address class a default subnet mask
is specified.
Class Address Range Default Subnet Mask
A 1 – 127 255.0.0.0
B 128 – 191 255.255.0.0
C 192 – 223 255.255.255.0
IP Address …… Subnet
mask
Thus ….
In Class A there are only 8 bits used for
network addressing & 24 bits are used
for Host addressing.
Hence Class A gives you less number of
networks i.e. 126 networks but it can
have 16777216 number of computers in
a single network.
IP Address …… Subnet
mask
Similarlyas you move from Class A to
Class B or Class C the number of
networks that are available increases
but the number of host within a single
network decreases.
Class C network can have only 255
Computers.
IP Address ……
NOT Allowed…….
A 192.168.100.10 C
192.168.100.10
HUB / Switch
D
B
IP Address ……
A C
172.16.10.100 172.10.129.175
HUB / Switch
D 172.10.157.220
B 172.16.100.95
IP Address…….
In the previous figure ….
A C
172.16.10.100 172.16.129.175
HUB / Switch
D 172.16.157.220
B 172.16.100.95
IP Address ……
Ifcomputer A wants to send data to
computer D, it requires to know the IP
Address of computer D.
i.e. 192.168.100.11111111
So it comes to …. 192.168.100.255
IP Address …… Broadcast
Thus Computer A will send a packet
with 192.168.100.255 in the destination
address field & 172.16.10.100
( Computer A IP address ) in the source
address field.
This packet will be received by all
computers in the network but only
computer D will reply to it.
Let’s Consider earlier
example.
192.168.101.0
B
A Pune Office Network
D E F
C
D E F
C
To
avoid this we give separate network
address to LAN at both the locations.
IP address …..
10.0.0.0 / 255.0.0.0
10.3.0.0 / 255.255.0.0
11111111.11111111.00000000.00000000
i.e. 255.255.0.0
IP Address ….. Subnet
10.1.0.0
10.2.0.0 till
10.255.0/0
IP Address ….. Subnet
Sub net setting will be…..
10.2.0.0 / 255.255.0.0
10.1.0.0 / 255.255.0.0
10.3.0.0 / 255.255.0.0
192.168.100.0 / 255.255.255.0
23 -2 = 6
So we get 6 networks ….. & we require
5
IP Address …. Subnet
So we have decided to take 3 bits from
the 8 hosts bits.
Let’s calculate our new subnet mask…
i.e. 255.255.255.224
IP Address …
Now let’s see which network we get….
To get the first network address
subtract your new sub net mask value
from 256
i.e.
256 -224 = 32
Thus your first network address will
be ….. 192.168.100.32
IP Address …. Subnet
Listof the networks you get…..
192.168.100.32
192.168.100.64
192.168.100.96
192.168.100.128
192.168.100.160
192.168.100.192
IP Address ….. Subnet
List
Of Networks & their host
addresses.
Network 1
Network Address 192.168.100.32
First Host address 192.168.100.33
Last Node address 192.168.100.62
Broadcast address 192.168.100.63
IP Address ….. Subnet
Network 2
Network Address 192.168.100.64
First Host address 192.168.100.65
Last Node address 192.168.100.94
Broadcast address 192.168.100.95
IP Address ….. Subnet
Network 3
Network Address 192.168.100.96
First Host address 192.168.100.97
Last Node address 192.168.100.126
Broadcast address 192.168.100.127
IP Address ….. Subnet
Network 4
Network Address 192.168.100.128
First Host address 192.168.100.129
Last Node address 192.168.100.158
Broadcast address 192.168.100.159
IP Address ….. Subnet
Network 5
Network Address 192.168.100.160
First Host address 192.168.100.161
Last Node address 192.168.100.190
Broadcast address 192.168.100.191
Network 6
Network Address 192.168.100.192
First Host address 192.168.100.193
Last Node address 192.168.100.222
Broadcast address 192.168.100.223
IP Address ….. Subnet
Home Work……
Toconnect to different IP
Networks we require a device
called …………
………………… ROUTER
Router
How Router work……. ?
NET C NET D
NET B
NET E
NET A
Router……
NET C NET D
NET B
Router4
Router1
NET E
NET A
Router……
A router has its operating system.
When you turn a router on its operating
system starts.
A router’ operating system is stored in a
ROM.
You have to configure a router before
you start using the router.
A router has a small amount of RAM.
Router…….
NET C NET D
NET B
Router4
Router1
NET E
NET A
Router…….
Routing Table of router1
Distance Vector
Link State
Router……
Distance Vector
In distance vector the routers send
updated table every 30 to 90 seconds.
A router sends its entire routing table to
its neighbor.
New routes to other networks that are
learned from other routers are entered
in a routers routing table.
Router
Router 1 sends its table ….
Router2 Router3
NET C NET D
NET B
Router4
Hi… I am connected to Net A &
Router1 Net B with Hop Count 1
NET E
NET A
Router
Routing table of Router 2 after it receives router 1
routing table ….
Router2 Router3
NET C NET D
NET B
Router4
Network Hop Network Hop
Router1 B 1 B 1
C 1 C 1
A 2
NET E
NET A
OLD NEW
Router
Consider the following Figure….
Router2 Router3
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
Ha … I can Also
Router1 reach Net B in
same hop count
…& to Net A I
can reach faster NET E
NET A
than U ..
So I don’t need
u
Router
Consider the following Figure….
Router2 Router3
NET C NET D
NET B
Router4
Hey …. But
Router1 router 2 says he
can reach to
NET C in 1 hop
count … right NET E
NET A
now I can not
reach their
Router
Consider the following Figure….
Router2 Router3
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
Network Hop Network Hop
Router1 A 1 A 1
B 1 B 1
C 2
NET E
NET A
OLD NEW
Router
Consider the following Figure….
Router2 Router3
NET C NET D
NET B
Router4
Hi.. I am router 3 …. I am
Router1 connected to Net C &
Net D with Hop Count 1
… Also Net B with a Hop
Count 2 & NET A With NET E
NET A
Hop Count 3
Router
Consider the following Figure….
Router2 Router3
NET C NET D
NET B
Router4
Hey… router
Router1 3 says he can
reach NET A ,
NET B & NET NET E
NET A
C
Router
Consider the following Figure….
Router2 Router3
NET C NET D
NET B
Router4
I need to
Router1 remember it
in my routing
table. NET E
NET A
Router……
……… CONVERGENCE
Routers…..
Final Routing tables of all the
routers
Router 1 NET A 1 Router 2
NET A 2 R1
NET B 1 NET B 1
NET C 2 R2 NET C 1
NET D 3 R2 NET D 2 R3
NET E 4 R2 NET E 3 R3
Router 3
NET A 3 R2 Router 4
NET A 4 R3
NET B 2 R2 NET B 3 R3
NET C 1 NET C 2 R3
NET D 1 NET D 1
NET E 2 R4 NET E 1
Routers…..
NET C NET D
NET B
Router4
Router1
NET E
NET A
Comp
Comp
E5
A1
Router
Computer A1 Creates data Packets to send to
Computer E5 ….
Router2 Router3
NET C NET D
NET B
Router4
Router1
NET E
NET A
Comp
Comp
E5
A1
Router
As Computer A1 Finds That Packets to send Is meant
for The Computer Outside The network ….
Router2 Router3
NET C NET D
NET B
Router4
It Sends that packet to
Router1
the default
NET E
NET A Gateway i.e. Router1 Comp
Comp
E5
A1
Routers…..
IP Address of Router1 Should be
specified in the default gateway field
either by Administrator or it should be
given by the DHCP Server.
A Computer can not communicate with
any other computer outside it’s network
if it does not know the IP Address of the
Default Gateway i.e. Router.
Router
Computer A1 Creates data Packets to send to
Computer E5 Gives it to Router 1….
Router2 Router3
NET C NET D
NET B
Router1
packet.
Computer A1 wants to
NET E
NET A send it to Computer E5.
SO I have to Send it to Comp
Comp
Network E E5
A1
Router
Computer A1 Creates data Packets to send to
Computer E5 ….
Router2 Router3
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
NET A 1
Router1 NET B 1
NET C 2 R2 NET E
NET A
NET D 3 R2 Comp
Comp NET E 4 R2
This is my routing table.
E5
A1
Router
Computer A1 Creates data Packets to send to
Computer E5 ….
Router2 Router3
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
Router1 NET A 2 R1
NET B 1 NET E
NET A NET C 1
NET D 2 R3 Comp
Comp
NET E 3 R3 E5
A1
Router
Computer A1 Creates data Packets to send to
Computer E5 ….
Router2 Router3
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
Router1 NET A 3 R2
NET B 2 R2 NET E
NET A NET C 1
NET D 1 Comp
Comp
NET E 2 R4 E5
A1
Router
Computer A1 Creates data Packets to send to
Computer E5 ….
Router2 Router3
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
Whom I have to
Router1 send this packet..?
NET A
Computer 5 in the NET E
network E … Let me Comp
Comp
find out it’s MAC E5
A1
Address
Router
Computer A1 Creates data Packets to send to
Computer E5 ….
Router2 Router3
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
NET C NET D
NET B
Router4
Router1
Hi…. Computer A1… NET E
NET A
Received the packet Comp
Comp
From You….. E5
A1
Routers…. The real life
Leased Line Modem
192.168.100.0 /255.255.255.0
Router1
192.168.100.254 10.1.1.1
192.168.100.1 Leased Line Modem
255.255.255.0
192.168.100.254
Router 2
172.16.1.10
255.255.0.0 10.1.1.2
172.16.255.254
172.16.255.254
Routers…..
NET C NET D
NET B
Router4
Router1
NET E
NET A
Comp
Comp
E5
A1
Routers…..
Final Routing tables of all the
routers
Router 1 NET A 1 Router 2
NET A 2 R1
NET B 1 NET B 1
NET C 2 R2 NET C 1
NET D 3 R2 NET D 2 R3
NET E 4 R2 NET E 3 R3
Router 3
NET A 3 R2 Router 4
NET A 4 R3
NET B 2 R2 NET B 3 R3
NET C 1 NET C 2 R3
NET D 1 NET D 1
NET E 2 R4 NET E 1
Router
Now if Router 4 Fails…. It means no one can reach
NET E ……..
Router2 Router3
NET C NET D
NET B
Router4
Router1
NET E
NET A
Comp
Comp
E5
A1
Routers…….
Now Router 3 Waits for some time to receive
routing table from Router 4 .
NET C NET D
NET B
Router4
Hi.. I am router 2 …. I am
Router1 connected to Net B &
Net C with Hop Count 1
… Also Net A with a Hop
Count 2 & NET E With NET E
NET A
Hop Count 3 & NET D
with Hop count 2
Routers…….
NET A 3 R2
NET B 2 R2
NET C 1
NET D 1
NET E 2 R4 BAD
NET E 4 R2
Routers…….
NET C NET D
NET B
Router4
Hi.. I am router 2 …. I am
Router1 connected to Net B &
Net C with Hop Count 1
… Also Net A with a Hop
Count 2 & NET E With NET E
NET A
Hop Count 5
Routers…….
NET A 3 R2
NET B 2 R2
NET C 1
NET D 1
NET E 2 R4 BAD
NET E 6 R2
Routers …..
Inreal both router 2 & router 3 can not
reach NET E.
But due to problem in advertising
method, they think that they can reach
NET E through each other.
So on receiving other routers routing
table they increase their hop count.
Routers….
NET C NET D
NET B
Router4
Hi.. I am router 2 …. I am
Router1 connected to Net B &
Net C with Hop Count 1
… Also Net A with a Hop
Count 2 & NET E With NET E
NET A
Hop Count 3 & NET D
with Hop count 2
Count to infinity
solutions….
With SPLIT HORIZON ….
Router2 Router3
NET C NET D
NET B
Router4
Hi.. I am router 2 …. I am
Router1 connected to Net B &
Net C with Hop Count 1
… Also Net A with a Hop
Count 2 NET E
NET A
Count to infinity
solutions….
SPLIT HORIZON :
So
after certain time Router 3 will
mark NET E as unreachable.
Count to infinity
solutions….
3. ROUTE POISONING:
In
this method, when a router
comes to know that it can not
reach a network it marks the
entry of that network with a hop
count of 16 ….i.e. Unreachable.
Count to infinity
solutions….
ROUTE POISIONING ….
Router2 Router3
NET C NET D
NET B
Router4
Hi.. I am router 4 ….
Router1 My link to NET E is
down… so now I can
not reach NET E NET E
NET A
Count to infinity
solutions….
ROUTE POISIONING (Practically) ….
Router2 Router3
NET C NET D
NET B
Router4
Router 4
Router1 NET A 4 R3
NET B 3 R3
NET C 2 R3
NET E
NET A NET D 1
NET E 16
Routers……
LINK-STATE ROUTING
This is a more complex method used
by the routers for routing packets.
Router2 Router3
NET C NET D
NET B
Router4
Router1
64 KBPS Link
NET E
NET A
Routers……
LINK STATE ROUTING
IP Address Class.
Sub netting.
Routers
Switches……
Layer 3 Switches :
192.168.100.26
192.168.100.120
Switches…….
192.168.100.57
Layer 3 Switch receives a data packet
192.168.100.10
192.168.100.26 192.168.100.120
Switches…….
192.168.100.57
Layer 3
192.168.100.10
The Address
192.168.100.120 is
My port no.10……
So I have to send this
packet to port no. 10
192.168.100.26 192.168.100.120
Switches…….
192.168.100.57
Layer 3 Switch receives a data packet
192.168.100.10
192.168.100.26 192.168.100.120
Bridges….
Segment 1
Segment 2
Bridge
Segment 3
Bridge
Functions at the Data Link
Layer of the OSI Model.
Bridges
Increase usable bandwidth of a
Network.
Bridge
Segment C
A C Data
Segment 2
Bridge
Segment 3
A C Data
Segment 2
Bridge
Segment 3
Segment 1
Thus sends data on all segments
How Bridges work ….
But Makes an entry …
Comp C Comp D
A C Data
Segment 2
Bridge
Segment 1
How Bridges work ….
Similarly .. Slowly .. It creates
Segment 1 Comp C Comp D
Segment 2
Segment 3
Bridge
Comp A Comp B
A C Data
Segment 2
Segment 1
Bridge
Segment 3
It will send data only on the segment on which the destination computer is
How Bridges work ….
So…..if
Comp C Comp D
A B Data
Segment 2
Bridge
Segment 3
Segment 1
OSI Layers …… Layer 4
TRANSPORT LAYER
Transport Layer …..
Transportlayer works between the OSI
lower layers & OSI upper layers.
192.168.10.1
Switch
Application :
Application : Outlook Express
FTP Client
192.168.10.125
192.168.10.12
Transport Layer …..
The packets from each client will be …
Destination Source IP Destination Source MAC
IP Address Address MAC Address Address
1
2 5
192.168.10.1 192.168.10.12 00-FA-8C-9A-A7-BA 00-FA-8C-9A-A7-BA DATA
0 2
7
1 1
192.168.10.1 192.168.10.125 1 9
8 00-FA-8C-9A-A7-BA 00-FA-8C-9A-A7-BA DATA
0 5
1
8 6
192.168.10.1 192.168.10.54 00-FA-8C-9A-A7-BA 00-F4-8C-BA-80-7A DATA
0 4
9
Transport Layer …..
Thus when a computer wants to access
a service running on another computer,
transport layer first opens a port on it,
then when it creates a packet, it
mentions the port number of the service
which it wants to access, in the
destination port field & the port number
opened on it in the source port field.
Transport Layer …..
Thereare TWO Protocols at the
Transport Layer
SESSION LAYER
SESSION
L A Y E R………
PRESENTATION
LAYER
PRESENTATION
L A Y E R………
o What is ENCRYPTION…. …
….. ?????
PRESENTA
TION LAYE
R………
o Why ENCRYPTION is
required …. …….. ?????
PRESENTA
TION LAYE
R………
o Example………….
o You go to bank to gat a locker.
o The bank has two keys for the
locker… a public key & a private
key.
o The bank gives the public key to
the customer who has taken that
locker
PRESENTA
TION LAYE
R………
Application Layer
APPLICATION
L A Y E R………