ccn unit5 raghudathesh

Upload: raghudathesh

Post on 07-Aug-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/20/2019 Ccn Unit5 Raghudathesh

    1/25

    COMPUTER COMMUNICATION NETWORK (VTU) - 10EC71

    UNIT - 5

    Connecting LANs, Backbone and Virtual LANs, Connecting devices, Back bone Networks,

    Virtual LANs

    7 HoursTEXT BOOKS:

    1.  Data Communication and Networking, B Forouzan, 4th Ed, TMH 2006.

    2.  Computer Networks, James F. Kurose, Keith W. Ross: Pearson education, 2 nd  Edition,

    2003.

    3.  Introduction to Data communication and Networking, Wayne Tomasi: Pearson education

    2007.

    Special Thanks To:

    Faculty (Chronological): Arun A Badiger (GMIT Davengere), Dr. Manjunath N (JNNCEShimoga), Harisha G C (GMIT Davangere), Suresha V Sathegala (KVGCE Sullia)

    Students:

    BY:

    RAGHUDATHESH G P

    Asst Prof

    ECE Dept, GMIT

    Davangere 577004

    Cell: +917411459249

    Mail: [email protected] 

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 1

    mailto:[email protected]:[email protected]:[email protected]:[email protected]

  • 8/20/2019 Ccn Unit5 Raghudathesh

    2/25

  • 8/20/2019 Ccn Unit5 Raghudathesh

    3/25

  • 8/20/2019 Ccn Unit5 Raghudathesh

    4/25

    Passive Hubs:

      A passive hub is just a connector.

      It connects the wires coming from different branches.

      The signal passes through a passive hub without regeneration or amplification.

      In a star-topology Ethernet LAN, a passive hub is just a point where the signals coming

    from different stations collide; the hub is the collision point.

      This type of a hub is part of the media; its location in the Internet model is below the

     physical layer.

    Repeaters:

      A repeater is a device that operates only in the physical layer.

      A repeater can be used to increase the physical length of the network (LAN) by

    eliminating the effect of attenuation on the signal.

      It does not connect two LANs; it connects segments of a same LAN.  Figure below shows a repeater connecting two segments of a LAN

    Figure: A repeater connecting two segments of a LAN

      The repeater acts as a two-port node, but operates only in the physical layer. When it

    receives a frame from any of the ports, it regenerates and forwards it to the other port, it

    does not have filtering capability.

      A repeater does not amplify the signal; it regenerates the signal as shown below.

      The location of a repeater on a link is vital. A repeater must be placed so that a signal

    reaches it before any noise changes the meaning of any of its bits.

    Figure: Function of a repeater

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 4

  • 8/20/2019 Ccn Unit5 Raghudathesh

    5/25

    Active Hubs:

      An active hub is actually a multipart repeater.

      It is used to create connection between stations in a physical star topology.

       No protocol or rate conversion

       No error detection

      Does not filter

      Hubs can also be used to create multiple levels of hierarchy, as shown in Figure below

    Figure: A hierarchy of hubs

    Bridges:

      A bridge operates in both the physical and the data link layer.

      As a physical layer device, it regenerates the signal it receives. As a data link layer

    device, the bridge can check the physical (MAC) addresses (source and destination)

    contained in the frame.

      A bridge has filtering capability. It can check the destination address of a frame anddecide if the frame should be forwarded or dropped.

      If the frame is to be forwarded, the decision must specify the port.

      A bridge has a table that maps addresses to ports.

      The difference between bridge and repeater is that, it has filtering capability.

    Figure: A network Bridge

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 5

  • 8/20/2019 Ccn Unit5 Raghudathesh

    6/25

      Scenario:

      The figure below shows, two LANs are connected by a bridge.

      Say, if a frame destined for station 71:2B:13:45:61:42 arrives at port 1, the bridge

    consults its table to find the departing port.

      According to its table, frames for 71:2B:13:45:61:42 leave through port 1;

    therefore, there is no need for forwarding, and the frame is dropped.  Say, if a frame for 71:2B:13:45:61:42 arrives at port 2; the departing port is port 1

    and the frame is forwarded.

      In the first case, LAN 2 remains free of traffic; in the second case, both LANs

    have traffic.

      Here, we show a two-port bridge; in reality a bridge usually has more ports.

      A bridge does not change the physical addresses contained in the frame.

    Figure: A bridge connecting two LANs

      There are three types of bridges: 

    1.  Simple bridge

    2.  Learning bridge

    3.  Multiport bridge

      Characteristics of Bridges:

    1.  Routing Tables:

      Contains one entry per station of network to which bridge is connected.

      Is used to determine the network of destination station of a received packet.

    2.  Filtering:

      Is used by bridge to allow only those packets destined to the remote network.

      Packets are filtered with respect to their destination and multicast addresses.

    3.  Forwarding:

      The process of passing a packet from one network to another.

    4.  Learning Algorithm:

      The process by which the bridge learns how to reach stations on the internetwork.

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 6

  • 8/20/2019 Ccn Unit5 Raghudathesh

    7/25

    Transparent Bridges:

      A transparent bridge is a bridge in which the stations are completely unaware of the

     bridge's existence.

      If a bridge is added or deleted from the system, reconfiguration of the stations is

    unnecessary.

      According to the IEEE 802.1 d specification, a system equipped with transparent

     bridges must meet three criteria:

    1.  Frames must be forwarded from one station to another.

    2.  The forwarding table is automatically made by learning frame movements in

    the network.

    3.  Loops in the system must be prevented.

    Forwarding:

      A transparent bridge must correctly forward the frames.

    Learning:

      The bridges had forwarding tables.

      The systems administrator would manually enter each table entry during bridge setup.

      If a station is added, or deleted or MAC address changed which is not a rare event

    (Inserting a new network card).

      A solution to this is to map address to ports automatically.

      In this case table is dynamic in which bridge gradually updates addresses to ports

    automatically.  To make a table dynamic, we need a bridge that gradually learns from the frame

    movements. To do this, the bridge inspects both the destination and the source addresses.

    The destination address is used for the forwarding decision (table lookup); the source

    address is used for adding entries to the table and for updating purposes.

      Consider a scenario as shown below

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 7

  • 8/20/2019 Ccn Unit5 Raghudathesh

    8/25

     Figure: A learning bridge and the process of learning

    1.  When station A sends a frame to station D, the bridge does not have an entry for either Dor A. The frame goes out from all three ports; the frame floods the network. However, by

    looking at the source address, the bridge learns that station A must be located on the LAN

    connected to port 1. This means that frames destined for A, in the future, must be sent out

    through port 1. The bridge adds this entry to its table. The table has its first entry now.

    2.  When station E sends a frame to station A, the bridge has an entry for A, so it forwards

    the frame only to port 1. There is no flooding. In addition, it uses the source address of

    the frame, E, to add a second entry to the table.

    3.  When station B sends a frame to C, the bridge has no entry for C, so once again it floods

    the network and adds one more entry to the table.4.  The process of learning continues as the bridge forwards frames.

    Loop Problem: 

      Systems administrators, like to have redundant bridges (more than one bridge between a

     pair of LANs) to make the system more reliable.

      If a bridge fails, another bridge takes over until the failed one is repaired or replaced.

      Redundancy can create loops in the system, which is very undesirable.

      Figure below shows a very simple example of a loop created in a system with two LANs

    connected by two bridges.

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 8

  • 8/20/2019 Ccn Unit5 Raghudathesh

    9/25

     

    Figure: Loop problem in a learning bridge

    1.  Station A sends a frame to station D. The tables of both bridges are empty. Both forward

    the frame and update their tables based on the source address A.

    2.   Now there are two copies of the frame on LAN 2. The copy sent out by bridge 1 is

    received by bridge 2, which does not have any information about the destination address

    D; it floods the bridge. The copy sent out by bridge 2 is received by bridge 1 and is sent

    out for lack of information about D. Note that each frame is handled separately because

     bridges, as two nodes on a network sharing the medium, use an access method such as

    CSMA/CD. The tables of both bridges are updated, but still there is no information for

    destination D.

    3.   Now there are two copies of the frame on LAN 1. Step 2 is repeated, and both copies

    flood the network.

    4.  The process continues on and on. Note that bridges are also repeaters and regenerate

    frames. So in each iteration, there are newly generated fresh copies of the frames.

      To solve the looping problem, the IEEE specification requires that bridges use the

    spanning tree algorithm to create a loopless topology.

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 9

  • 8/20/2019 Ccn Unit5 Raghudathesh

    10/25

  • 8/20/2019 Ccn Unit5 Raghudathesh

    11/25

     

    Figure: Finding the shortest paths and the spanning tree in a system of bridges

      Based on the spanning tree, we mark the ports that are part of the spanning tree, the

    forwarding ports, which forward a frame that the bridge receives. We also mark those

     ports that are not part of the spanning tree, the blocking ports, which block the frames

    received by the bridge. Figure below shows the physical systems of LANs with

    forwarding points (solid lines) and blocking ports (broken lines).

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 11

  • 8/20/2019 Ccn Unit5 Raghudathesh

    12/25

     

    Figure: Forwarding and blocking ports after using spanning tree algorithm

    Source Routing Bridges:

      Another way to prevent loops in a system with redundant bridges is to use source routing

     bridges.

      A transparent bridge's duties include filtering frames, forwarding, and blocking.

      In a system that has source routing bridges; these duties are performed by the source

    station and, to some extent, the destination station.

      In source routing, a sending station defines the bridges that the frame must visit.

      The addresses of these bridges are included in the frame. In other words, the frame

    contains not only the source and destination addresses, but also the addresses of all

     bridges to be visited.

      The source gets these bridge addresses through the exchange of special frames with the

    destination prior to sending the data frame.

      Source routing bridges were designed by IEEE to be used with Token Ring LANs.

      These LANs are not very common today.

    Bridges Connecting Different LANs:

      A bridge should be able to connect LANs using different protocols at the data link layer,

    such as an Ethernet LAN to a wireless LAN.

      The issues many issues to be considered:

      Frame format:

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 12

  • 8/20/2019 Ccn Unit5 Raghudathesh

    13/25

      Each LAN type has its own frame format (compare an Ethernet frame with a

    wireless LAN frame).

      Maximum data size:

      If an incoming frame's size is too large for the destination LAN, the data must be

    fragmented into several frames. The data then need to be reassembled at the

    destination.   No protocol at the data link layer allows the fragmentation and reassembly of

    frames

      The bridge must therefore discard any frames too large for its system.

      Data rate:

      Each LAN type has its own data rate. (Compare the 10-Mbps data rate of an

    Ethernet with the 1-Mbps data rate of a wireless LAN.)

      The bridge must buffer the frame to compensate for this difference.

      Bit order:

      Each LAN type has its own strategy in the sending of bits. Some send the most

    significant bit in a byte first; others send the least significant bit first.

      Security:

      Some LANs, such as wireless LANs, implement security measures in the data link

    layer. Other LANs, such as Ethernet, do not. Security often involves.

      When a bridge receives a frame from a wireless LAN, it needs to decrypt the

    message before forwarding it to an Ethernet LAN.

      Multimedia support:

      Some LANs support multimedia and the quality of services needed for this type

    of communication; others do not.

    Advantages & Disadvantages of Bridges:

    1.  Advantages of using a bridge:

      Extend physical network  

      Reduce network traffic with minor segmentation

      Creates separate collision domains

      Reduce collisions  Connect different architecture

    2.  Disadvantages of using bridges:

      Slower that repeaters due to filtering

      Do not filter broadcasts

      More expensive than repeaters

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 13

  • 8/20/2019 Ccn Unit5 Raghudathesh

    14/25

    Switches: 

      Switch is a device that filters and forwards packets between LAN segments.

      Switches operate at the data link layer (layer 2) and sometimes the network layer (layer

    3) of the OSI Reference Model and therefore support any packet protocol.

      Switches are classified based on number of layers they operate:

      Two Layer switch:

      Operates at physical and data link layer

      Ex: Bridge with few ports, can connect a few LANs together

      Makes filtering decision based on MAC address

      Three Layer switch:

      Operates at Network layer

      Ex: Routers

      A router normally connects LANs and WANs in the Internet and has a routing

    table that is used for making decision about the route.

      The routing tables are normally dynamic and are updated using routing protocols.

      LANs that use switches to join segments are called switched LANs or, in the case of

    Ethernet networks, switched Ethernet LANs. 

      Figure below shows a network switch 

    Figure: Network Switch

      Cut Through Switches:

      Use circuit-switching to immediately connect the port with the incoming message to

    the correct outgoing port

      Very fast as decisions are done in hardware

      Outgoing packet is lost if port is in use

      Store-and-forward switches

      Copy the incoming packet to memory prior to processing the destination address

    transmit it when the outgoing port is ready

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 14

  • 8/20/2019 Ccn Unit5 Raghudathesh

    15/25

    Routers:

      A router is a three-layer device that routes packets based on their logical addresses (host-

    to-host addressing).

      A router normally connects LANs and WANs in the Internet and has a routing table that

    is used for making decisions about the route.

      The routing tables are normally dynamic and are updated using routing protocols.

      Figure below shows a part of the Internet that uses routers to connect LANs and WANs.

    Figure: Routers connecting independent LANs and WANs

    Advantages and Disadvantages of Routers:

      Advantages:

    1.  Provide sophisticated routing, flow control, and traffic isolation

    2.  Are configurable, which allows network manager to make policy based on routing

    decisions

    3.  Allow active loops so that redundant paths are available

      Disadvantages:

    1.  Are protocol dependent devices that must understand the protocol they are

    forwarding

    2.  Can require a considerable amount of initial configuration

    3.  Are relatively complex devices, and generally are more expensive than bridges

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 15

  • 8/20/2019 Ccn Unit5 Raghudathesh

    16/25

    Gateway:

      A gateway is normally a computer that operates in all five layers of the Internet or

    seven layers of OSI model.

      A Complex machine that are interfaces between two or more dissimilar networks

      A Connecting device between two internetworks that use different models (one with

    OSI and other with Internet model)

      Connect two or more LANs that use the same or different data link layer, network

    layer, and cable types

      Forwards only those messages that need to go out

      A combination of both hardware and software

      Translates one network protocol to another

      Translates data formats

      Translates open sessions between application programs

      Gateways can provide security  Ex: Broadband-modem-router

    Figure: Network Gateway

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 16

  • 8/20/2019 Ccn Unit5 Raghudathesh

    17/25

    Comparison between Different Network Devices:

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 17

  • 8/20/2019 Ccn Unit5 Raghudathesh

    18/25

    Backbone Networks:

      A backbone network allows several LANs to be connected.

      In a backbone network, no station is directly connected to the backbone; the stations are

     part of a LAN, and the backbone connects the LANs.

      The backbone is itself a LAN that uses a LAN protocol such as Ethernet; each connection

    to the backbone is itself another LAN.

      The two most common different architectures used for a backbone include:

    1.  Bus Backbone

    2.  Star Backbone

    3.  Connecting Remote LANs 

    Bus Backbone:

    In a bus backbone, the topology of the backbone is a bus.

    Bus backbones are normally used as a distribution backbone to connect different buildings in an

    organization.

    Each building can comprise either a single LAN or another backbone (normally a star backbone).

    Ex: single or multiple floor buildings on a campus, each single floor usually have a single LAN,

    each multiple floor building has a backbone (star) that connects each LAN. A bus backbone can

    interconnect these LANs and backbone.

    Figure below shows an example of a bridge-based backbone with four LANs.

    Figure: Bus backbone

      Frame within a LAN will not be allowed go out by bridge.

      If a station needs to send frame to station in another LAN the bridge passes the frame to

    the backbone which is received by the appropriate bridge and is delivered to the

    destination LAN

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 18

  • 8/20/2019 Ccn Unit5 Raghudathesh

    19/25

    Star Backbone:

      Also known as a collapsed or switched backbone.

      The topology of the backbone is a star.

      In this configuration, the backbone is just one switch (that is why it is called, erroneously,

    a collapsed backbone) that connects the LANs.

      In a multi-floor building, we usually find one LAN that serves each particular floor. A

    star backbone connects these LANs.

    Figure: Star backbone

    Note:

      The backbone network, which is just a switch, can be installed in the basement or the first

    floor, and separate cables can run from the switch to each LAN.

      If the individual LANs have a physical star topology, either the hubs (or switches) can be

    installed in a closet on the corresponding floor, or all can be installed close to the switch.  We often find a rack or chassis in the basement where the backbone switch and all hubs

    or switches are installed.

    Connecting Remote LANs:

      This type of backbone network is useful when a company has several offices with LANs

    and needs to connect them.

      The connection can be done through bridges, sometimes called remote bridges.

      The bridges act as connecting devices connecting LANs and point-to-point networks,

    such as leased telephone lines or ADSL lines.

      The point-to-point network in this case is considered a LAN without stations.

      The point-to-point link can use a protocol such as PPP. Figure below shows a backbone

    connecting remote LANs.

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 19

  • 8/20/2019 Ccn Unit5 Raghudathesh

    20/25

  • 8/20/2019 Ccn Unit5 Raghudathesh

    21/25

      Work around needed:

      The LAN configuration would need to be changed.

      The network technician must rewire.

      Problem:

      Say, in another week, the two engineers move back to their previous group.

      In a switched LAN, changes in the work group mean physical changes in thenetwork configuration.

      Solution:

      A virtual Local Area Network (VLAN) provides a solution for the above problem.

      Figure below shows the same switched LAN divided into VLANs.

    Figure: A switch using VLAN software

      The whole idea of VLAN technology is to divide a LAN into logical, instead of physical,

    segments.

      A LAN can be divided into several logical LANs called VLANs. Each VLAN is a workgroup in the organization.

      If a person moves from one group to another, there is no need to change the physical

    configuration.

      The group membership in VLANs is defined by software, not hardware. Any station can

     be logically moved to another VLAN.

      All members belonging to a VLAN can receive broadcast messages sent to that particular

    VLAN.

      Thus, if a station moves from VLAN 1 to VLAN 2, it receives broadcast messages sent to

    VLAN 2, but no longer receives broadcast messages sent to VLAN 1.

      It is obvious that the problem in our previous example can easily be solved by using

    VLANs.

      Moving Stations Between different VLANs:

      VLAN technology even allows the grouping of stations connected to different

    switches in a VLAN.

      Figure below shows a backbone local area network with two switches and three

    VLANs. Stations from switches A and B belong to each VLAN.

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 21

  • 8/20/2019 Ccn Unit5 Raghudathesh

    22/25

     

    Figure: Two switches in a backbone using VLAN software

      This is a good configuration for a company with two separate buildings.

      Each building can have its own switched LAN connected by a backbone.

      People in the first building and people in the second building can be in the same

    work group even though they are connected to different physical LANs.

    Characteristic of VLAN:

      The three important Characteristic includes:

    1.  Membership

    2.  Configuration

    3.  Communication between Switches

    Membership:

      Vendors of different companies use different characteristics such as

    1.  Port numbers

    2.  MAC addresses

    3.  IP addresses

    4.  IP multicast addresses

    5.  A combination of two or more characteristics

      To group stations in a VLAN

    Configuration:

      Stations are configured in one of three ways:

    1.  Manual

    2.  Semiautomatic

    3.  Automatic

      To group stations in a VLAN

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 22

  • 8/20/2019 Ccn Unit5 Raghudathesh

    23/25

    Manual Configuration:

      The network administrator uses the VLAN software to manually assign the stations into

    different VLANs at setup.

      The migration from one VLAN to another is also done manually.

      Here configuration logical not physical.

      The term manually here means that the administrator types the port numbers, the IP

    addresses, or other characteristics, using the VLAN software.

    Automatic Configuration:

      The stations are automatically connected or disconnected from a VLAN using criteria

    defined by the administrator.

      Ex.:

      The administrator can define the project number as the criterion for being a

    member of a group. When a user changes the project, he or she automatically

    migrates to a new VLAN.

    Semiautomatic Configuration:

      A semiautomatic configuration is somewhere between a manual configuration and an

    automatic configuration.

      Usually, the initializing is done manually, with migrations done automatically.

    Communication Between Switches:

      In a multi-switched backbone, each switch must know not only which station belongs towhich VLAN, but also the membership of stations connected to other switches.

      In figure below, switch A must know the membership status of stations connected to

    switch B, and switch B must know the same about switch A.

    Figure: Two switches in a backbone using VLAN software 

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 23

  • 8/20/2019 Ccn Unit5 Raghudathesh

    24/25

      Three methods have been devised for this purpose:

    1.  Table maintenance

    2.  Frame tagging

    3.  Time-division multiplexing

    Table Maintenance:

      When a station sends a broadcast frame to its group members, the switch creates an entry

    in a table and records station membership.

      The switches send their tables to one another periodically for updating.

    Frame Tagging:

      When a frame is traveling between switches, an extra header is added to the MAC frame

    to define the destination VLAN.

      The frame tag is used by the receiving switches to determine the VLANs to be receiving

    the broadcast message.

    Time-Division Multiplexing (TDM):

      The connection (trunk) between switches is divided into timeshared.

      Ex:

      If the total number of VLANs in a backbone is five, each trunk is divided into five

    channels.

      The traffic destined for VLAN 1 travels in channel, the traffic destined for VLAN

    2 travels in channel 2, and so on.

      The receiving switch determines the destination VLAN by checking the channel

    from which the frame arrived.

    Advantages of using VLANs:

    1.  Cost and Time Reduction:

      VLANs can reduce the migration cost of stations going from one group to another.

      Physical reconfiguration takes time and is costly. Instead of physically moving one

    station to another segment or even to another switch, it is much easier and quicker to

    move it by using software.2.  Creating Virtual Work Groups:

      VLANs can be used to create virtual work groups. For example, in a campus

    environment, professors working on the same project can send broadcast messages to

    one another without the necessity of belonging to the same department.

      This can reduce traffic if the multicasting capability of IP was previously used.

    3.  Security:

      VLANs provide an extra measure of security.

    Network Devices RAGHUDATHESH G P Asst Professor  

    Department of ECE raghudathesh.weebly.com Page No - 24

  • 8/20/2019 Ccn Unit5 Raghudathesh

    25/25

      People belonging to the same group can send broadcast messages with the guaranteed

    assurance that users in other groups will not receive these messages.

    VTU Questions:

    1.  Explain briefly the three criteria of the transparent bridge. (December 2010 10M)

    2.  Explain virtual LAN systems. (December 2010 10M, December 2012 04M)

    3.  Define repeater, hub, switch, router and gate way with necessary neat diagram. (July

    2011 10M, December 2012 08M, July 2013 06M)

    4.  Create a system of three LANs with four brides. The brides(B1 to B4) connect the LANs

    as follows:

    a.  B1 connects LAN1 and LAN2.

     b.  B2 connects LAN1 and LAN3.

    c.  B3 connects LAN2 and LAN3.

    d.  B4 connects LAN1, LAN2 and LAN3.

    Choose B1 as the root bridge. Show the forwarding and blocking parts, after applying the

    spanning tree procedure (July 2011 10M, July 2013 10M)

    5.  Why spanning tree algorithm is used? Explain the same, with a graphical representation.

    (December 10M, December 2012 08M)

    6.  Mention the different characteristics of VLAN and explain briefly. (December 10M)

    7.  Differentiate between a bus backbone network and star backbone network. ( July 2013

    04M)

    Network Devices RAGHUDATHESH G P Asst Professor