Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 1
Introduction
Data Link Layer transform the physical layer, a raw transmission facility, to a link
responsible for node-to-node communication. Specific responsibility of DLL include
framing, addressing, flow control, error control and media access control.
Data Link Layer Design Issues The DLL has a number of specific functions it can carry
out. These functions include:
1. Providing a well-defined service interface to the network layer.
2. Dealing with transmission errors.
3. Regulating the flow of data so that slow receivers are not swamped by fast senders.
The DLL takes the packets it gets from the network layer and encapsulates them into frames
for transmission. Each frames contains a frame header, a payload field for holding the
packet, and a frame trailer. Frame management forms the heart of what the data link layer
does. In the following sections we will examine all the above mentioned issues in detail.
Diagram:- Relationship between packets and frames
Services Provided to the network Layer
The function of the data link layer is to provide service to the network layer. The principal
service is transferring data from the network layer on the source machine to the network layer
on the destination machine.
Diagram (a) Virtual Communication (b) Actual Communication
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 2
The DLL can be designed to offer various services. The actual service offered can vary from
system to system. Three reasonable possibilities that are commonly provided are
1. Unacknowledged connectionless Service:- It consists of having the source machine
send independent frames to the destination machine without having the destination
machine acknowledge them. No logical connection is established beforehand or
released afterward. If a frame is lost due to noise on the line, no attempt is made to
detect the loss or recover from it in the DLL.
2. Acknowledge connectionless Service:- This service offered , there are still no logical
connections used, but each frame sent is individually acknowledged . If it is not
arrived within a specified time interval, it can be sent again. This service is useful
over unreliable channel, such as wireless systems.
3. Acknowledge connection-oriented Service:- In this service three distinct phases.
First phase, the connection is established by having both sides initialize variables and
counters needed to keep track of which frames have been received exactly once and
that all frames are received in the right order. Second Phase, one or more frames are
received and which ones have not. Third Phase, the connection is released.
Framing
To provide service to the network layer, the data link layer must use the service provided to it
by the physical layer. What the physical layer does is accept a raw bit stream and attempt to
deliver it to the destination. This bit stream is not guaranteed to be error free. The number of
bits received may be less than, equal to, or more than the number of bits transmitted, and they
may have different values. It is up to the data link layer to detect and, if necessary, correct
errors.
The usual approach is for the DLL to break the bit stream up into discrete frames and
compute the checksum for each frame. When a frame arrives at the destination, the checksum
is recomputed. If the newly-computed checksum is different from the one contained in the
frame, the DLL knows that an error has occurred and takes steps to deal with it.
Breaking the bit stream up into frames is more difficult than it at first appears. One way to
achieve this framing is to insert time gaps between frames, much like the spaces between
words in ordinary text. However, networks rarely make any guarantees about timing, so it is
possible these gaps might be squeezed out or other gaps might be inserted during
transmission.
Since it is too risky to count on timing to mark the start and end of each frame, other methods
have been devised which are as:-
1. Character count.
2. Flag bytes with byte stuffing.
3. Starting and ending flags, with bit stuffing.
4. Physical layer coding violations.
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 3
The first framing method uses a field in the header to specify the number of characters in the
frame. When the DLL at the destinations sees the character count, it knows how many
characters follow and hence where the end of the frame is.
The second framing method gets around the problem of resynchronization after an error by
having each frame start and end with special bytes. In the past, the starting and ending bytes
were different, but in recent years most protocols have used the same byte, called a flag byte.
In this way, if the receiver ever loses synchronization, it can just for the flag byte to find the
end of the current frame. Two consecutive flag bytes indicate the end of one frame and start
of the next one.
Diagram A Character Stream (a) Without errors (b) With one error
Diagram:- (a) A frame delimited by flag bytes. (b) Four examples of byte sequences before
and after byte stuffing.
A serious problem occurs with this method when binary data, such as object programs or
floating-point numbers, are being transmitted. It may easily happen that the flag byte’s
pattern occurs in the data. This situation will easily happen that the flag byte’s bit pattern
occurs in the data. This situation will usually interfere with the framing. One way to solve
this problem is to have the sender’s DLL insert a special escape byte (ESC) just before each
“accidental” flag byte in the data. The DLL on the receiving end removes the escape byte
before the data are given to the network layer. This technique is called byte stuffing or
character stuffing. Thus, a frame flag byte can be distinguished from one in the data by the
absence or presence of an escape byte before it.
Whenever the sender’s DLL encounters five consecutive 1s in the data, it automatically
stuffs a 0 bit into the outgoing bit stream. This bit stuffing is analogous to byte stuffing, in
which an escape byte is stuffed into the outgoing character stream before a flag byte in the
data. When the receiver sees five consecutive incoming 1 bits, followed by a bit 0, it
automatically dyestuffs the 0 bit.
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 4
Diagram:- Bit stuffing (a) The original data (b) The data as they appear on the line (c) The
data as they are stored in the receiver’s memory after destuffing.
The last method of framing is only applicable to networks in which the encoding on the
physical medium contains some redundancy. For example, some LANs encode1 bit of data
by using 2 physical bits. Normally, a 1 bit is a high-low pair and a 0 bit is a low-high pair.
The scheme means that every data bit has a transition in the middle, making it easy for the
receiver to locate the bit boundaries. The combinations high-high and low-low are not used
for data but are used for delimiting frames in some protocols.
As a final note on framing, many DLL protocols use a combination of a character count with
one of the other methods for extra safety.
Error Control
Another Problem is that: How to make sure all frames are eventually delivered to the network
layer at the destination and in proper order.
The usual way to ensure reliable delivery is to provide the sender with some feedback about
what is happening at the order at the other end of the line. The protocol calls for the receiver
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 5
to send feedback special control frames bearing +ve and –ve acknowledgement about the
incoming frames. If the sender receive a +ve acknowledgement about a frame, it knows the
frame has arrived safely.
On the other hand, a –ve acknowledgement means that something has gone wrong, and the
frame must be transmitted again.( In some cases the receiver will not react in hardware
troubles, which may cause a frame to vanish completely.)
This possibility is dealt with by introducing timers into the DLL. When the sender transmits a
frame, it generally also starts a timer. The timer is set to expire after an interval long enough
for the frame to reach the destination, be processed there, and have the acknowledgement will
get back before the timer runs out, in which case the timer will be cancelled.
However, if the timer the frame or the acknowledgement is lost, the timer will go off, alerting
the sender to a potential problem. The obvious solution is to just transmit the frame again.
When frames may be transmitted multiple times there is a danger that the receiver will accept
the same frame two or more times and pass it to the network layer more than once. To
prevent this from happening, it is generally necessary to assign sequence number to outgoing
frames, so that the receiver can distinguish retransmission from originals.
The whole issues of managing the timers and sequence numbers so as to ensures that each
frame is ultimately passed to the network layer at the destination exactly once, no more and
no less, is an important part of the DLL’s duties.
Flow Control
Another Important issues that occurs in the DLL is what to do with a sender that
systematically wants to transmit frames faster than the receiver can accept them. This
situation can easily occur computer and the receiver is running on a slow machine. The
sender keeps pumping the frames out at a high rate until the receiver is completely swamped.
Even if the transmission is error free, at a certain point the receiver will simply e unable to
handle the frames as they arrive and will start to lose. Clearly, something has to be done to
prevent this situations.
Two approaches are commonly used. In the first one, feedback-based flow control, the
receiver sends back information to the sender giving it permission to send more data or at
least telling the sender how the receiver is doing. In the second one, rate-based flow control,
the protocol has a built-in mechanism that limits the rate at which senders may transit data,
without using feedback from the receiver.
Various feedback-based flow control schemes are known, but most of them use the same
basic principles. The protocol contains well-defined rules about when a sender may transmit
the next frame. These rules often prohibit frames from being sent until the receiver has
guaranteed permission, either implicitly or explicitly.
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 6
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 7
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 8
Elementary Data link Protocols
The physical layer, data link layer and network layer are independent processes that
communicate by passing message back and forth. In many cases, the physical and DLL
processes will be running on a processor inside a special network I/O chip and the network
layer code will be running on a on the main CPU.
As far as the DLL is concerned, the packet across the interface to it from the network layer is
pure data, whose every bit is to be delivered to the destination’s network layer. The fact that
the destination’s network layer may interpret part of the packet as a header is of no concern to
the DLL.
When the DLL accepts a packet, it encapsulates the packet in a frame by adding a data link
header and trailer to it.
These core functions are necessary for all different types of data protocols.
1. wait_for_event
2. to_network_layer
3. from_network_layer
4. from_physical_layer
5. to_physical_layer
6. start_timer
7. stop_timer
8. start_ack_timer
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 9
9. stop_ack_timer
10. void
11. Kind
Elementary Data Link Protocols
1. An Unrestricted Simplex Protocol : This is an ideal situation. In this simple protocol
the sender keeps sending frames and the receiver keeps receiving frames. No errors ever occur; no re-transmissions are ever needed.
Assumption:
1. Data transmission in one direction only (simplex) 2. No errors take place on the physical channel 3. The sender/receiver can generate/consume an infinite amount of data
4. Always ready for sending/receiving
2. A Simplex Stop-and-Wait Protocol: Flow control deals with problem that sender
transmits frames faster than receiver can accept, and solution is to limit sender into
sending no faster than receiver can handle.
• Consider the simplex case: data is transmitted in one direction (Note although data frames
are transmitted in one direction, frames are going in both directions, i.e. link is duplex) sender
sends
• Stop and wait : one data frame, waits for acknowledgement (ACK) from receiver before
proceeding to transmit next frame
– This simple flow control will breakdown if ACK gets lost or errorsoccur → sender may
wait for ACK that never arrives.
Simplex Stop and Wait with ARQ
• For noisy link, pure stop and wait protocol will break down, and solution is to incorporate
some error control mechanism
• Stop and wait with ARQ: Automatic Repeat reQuest (ARQ), an error control method, is
incorporated with stop and wait flow control protocol
– If error is detected by receiver, it discards the frame and send a negative ACK (NAK),
causing sender to re-send the frame
– In case a frame never got to receiver, sender has a timer: each time a frame is sent, timer is
set
→ If no ACK or NAK is received during timeout period, it re-sends the frame
– Timer introduces a problem: Suppose timeout and sender retransmits a frame but receiver
actually received the previous transmission → receiver has duplicated copies
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 10
– To avoid receiving and accepting two copies of same frame, frames and ACKs are
alternatively labeled 0 or 1: ACK0 for frame 1, ACK1 for frame 0
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 11
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 12
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 13
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 14
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 15
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 16
Protocol Verification
1. Finite State Machine Models
2. Petri Net Models
Finite State Machine Models
A Key concept used in many protocols models is the finite state machine. With this
technique, each protocol machine is always in a specific sate at every instant of time. Its state
consists of all the values of its variables, including the program counter.
Formally, a finite state machine model of a protocol can be regarded as a quadruple (S, M, I,
T), where:
S is the states the processes and channel can be in.
M is the set of frames that can be exchanged over the channel.
I is the set of initial states of the processes.
T is the set of transitions between states.
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 17
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 18
The finite state machine is not the only technique for formally specifying protocols. A Petri
net has four basic elements: places, transitions, arcs, and tokens. A place represents a state
which of the system may be in a figure a Petri net with two places, A and B, both shown as
circles. The system is currently in state A, indicated by the token in place A. A transition is
indicated by a horizontal or vertical bar. Each transitions has zero or more input arcs coming
from its input places, and zero or more output arcs, going to its places.
Unlike the finite state machine model, there are no composite sates here; the sender’s state,
channel state, and receiver’s state are represented separately. Transitions 1 and 2 correspond
to transmission of frame 0 by the sender, normally, and on a timeout respectively. Transitions
3 and 4 are analogous for frame 1. Transitions 5, 6 and 7 correspond to the loss of frame 0, an
acknowledgement, and frame 1, respectively. Transitions 8 and 9 occur when a data frame
with the wrong sequence number arrives at the receiver. Transitions 10 and 11 represent the
arrival at the receiver of the next frame in sequence and its delivery to the network layer.
Petri net can be used to detect protocol failures in a way similar to use of finite state machine.
It can be represented in convenient algebraic form resembling a grammar. The concept of a
deadlock in a Petri net is similar to its finite sate machine counterpart.
Example of Data Link Protocols
1. HDLC- High Level Data Link Control
2. The Data Link Layer in the Internet
High Level Data Link Control
DLL protocol first used in the IBM mainframe world: SDLC (Synchronous Data Link
Control) protocol. After developing SDLC, IBM submitted it to ANSI and ISO for
acceptance as U.S. and international standards, resp. ANSI modified it to become ADCCP
(Advanced Data Communication Control Procedure). CCITT then adopted and modified
HDLC for its LAP (Link Access Procedure) as part of the X.25 network interface standard
but later modified it again to LAPB, to make it more compatible.
The original "normal response mode" is a master-slave mode where the computer
(or primary terminal/Command ) gives each peripheral (secondary terminal/ Response) permission to speak in turn. Because all communication is either to or from the primary
terminal, frames include only one address, that of the secondary terminal; the primary terminal is not assigned an address. There is also a strong distinction between commandssent by the primary to a secondary, and responses sent by a secondary to the primary. Commands
and responses are in fact indistinguishable; the only difference is the direction in which they are transmitted.
Normal response mode allows operation over half-duplex communication links, as long as the primary is aware that it may not transmit when it has given permission to a secondary.
Asynchronous response mode is an HDLC addition for use over full-duplex links. While
retaining the primary/secondary distinction, it allows the secondary to transmit at any time.
Asynchronous balanced mode added the concept of a combined terminal which can act as
both a primary and a secondary. There are some subtleties about this mode of operation;
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 19
while many features of the protocol do not care whether they are in a command or response frame, some do, and the address field of a received frame must be examined to determine
whether it contains a command (the address received is ours) or a response (the address received is that of the other terminal).
Some HDLC variants extend the address field to include both source and destination addresses, or an explicit command/response bit.
Diagram:- Frame format for bit-Oriented protocols.
These protocols are based on the same principles. All are bit-Oriented, and all use bit stuffing
for data transparency. All the bit-Oriented protocols use the frame structure shown in Fig.
Address Field – is primarily of importance on lines with multiple terminals, where it is used
to identify one of the terminals.
Control Field – is used for sequence numbers, acknowledgements, and other purposes.
Data Field – may contain information.
Checksum field – is a cyclic redundancy code.
The frame is delimited with another flag sequence (01111110)
There are three kinds of frames:
1. Information 2. Supervisory 3. Unnumbered
The various kinds of Supervisory frames are:
1. Type 0 – is an acknowledgement frame RR (Receive Ready) used to indicate the next
frame expected. This frame is used when there is no reverse traffic to use for
piggybacking.
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 20
2. Type 1 – is a –ve acknowledgement frame (Reject). It is used to indicate that a
transmission error has been detected.
3. Type 2 – is Receive Not Ready. It acknowledgement frame up to but not including
Next.
4. Type 3 – is the Selective Reject. It calls for transmission of only the frame specified.
The Data Link Layer in the Internet
The internet consists of individual machines and the communication infrastructures that
connect them. In practice, point-to-point communication is primarily used in two
communications.
First, thousands of organizations have one or more LANs, each with some number of hosts
along with a router. Often, the routers are interconnected by LAN. Typically, all connections
to the outside world go through one or two routers that have point-to-point leased lines to
distant routers.
Second, in which point-to-point lines play a major role in the Internet is the millions of
individuals who have home connections to the Internet using modems and dial-up telephone
lines. A home PC calling an Internet service provider is shown in fig.
Diagram:- A home personal computer acting as an Internet host.
PPP – The Point-to-Point Protocol
The Internet needs a point-to-point protocol for a variety of purposes, including router-to-
router traffic and home user-to-ISP traffic. This protocol is PPP, which is used in RFC 1661.
PPP handles error detection, supports multiple protocols, allows IP address to be negotiated
at connection time, permits authentication, and has many other features.
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 21
1. A framing method that unambiguously delineates the end of one frame and the start of
the next one. The frame also handles error detection.
2. A link control protocol for bringing lines up, testing them, negotiating options and
bringing them down again gracefully when they are no longer needed. This protocol is
called LCP (Link Control Protocol). It supports synchronous and asynchronous
circuits and byte-oriented and bit-oriented encodings.
3. A way to negotiate network-layer options in a way that is independent of the network
layer protocol to be used. The method chosen is to have a different NCP (Network
Control Protocol) for each network layer supported.
Diagram:- The PPP full frame format for unnumbered mode operation.
All PPP frames begin with the standard HDLC flag byte (01111110), which is stuffed if it
occurs within the payload field.
Address field – which is always set to the binary value 11111111 to indicate that all stations
are to accept the frame. It is followed by the control field.
Control field – the default value of which is 00000011. It indicate an unnumbered frame.
Protocol field – Its job is to tell what kind of packet is in the payload field.
Payload field – is variable length, up to some negotiate maximum.
Checksum field – used a CRC.
PPP is a multiprotocol framing mechanism suitable for use over modems, HDLC bit-serial
lines, SONET, and other physical layers. It supports error detection, option negotiation,
header compression, and optionally, reliable transmission using an HDLC-type frame format.
Diagram: A Simplified phase diagram for bringing a line up and down
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 22
The protocol start with the line in the DEAD state, which means that no physical layer carrier
is present and no physical layer connection exists. After physical connection is established,
the line moves to ESTABLISH. At that point LCP option negotiation begins, which, if
successful, leads to AUTHENCTICATE. Now the two parties can check on each other’s
identities if desired. When the NETWORK phase is entered, the appropriate NCP protocol is
invoked to configure the network layer. If the configuration is successful, OPEN is reached
and data transports take place. When the data transport is finished, the line moves into the
TERMINATE phase, and from there, back to DEAD when the carrier is dropped.
Diagram: The LCP frame types
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 23
Binary Synchronous Communication (BSC or Bisync) is an IBM character-oriented, half-
duplex link protocol, announced in 1967 after the introduction of System/360. It replaced
the synchronous transmit-receive (STR) protocol used with second generation computers.
The intent was that common link management rules could be used with three different
alphabets for encoding messages. Six-bit Transcode looked backwards to older
systems; USASCII with 128 characters and EBCDIC with 256 characters looked forward.
Transcode disappeared very quickly but the EBCDIC and USASCII dialects of Bisync
continued in use.
Bisync differs from protocols that succeeded it in the complexity of message framing. Later protocols used a single framing scheme for all messages sent by the protocol. HDLC, Digital Data Communications Message Protocol (DDCMP), Point-to-Point Protocol (PPP), etc. each
have different framing schemes but only one frame format exists within a specific protocol. Bisync had five different framing formats.
BSC Link Control Characters
Ch
ar
EBCDIC
(hexadeci
mal)
USASCII
(hexadeci
mal)
Transcode
(hexadeci
mal)
Description
SY
N 32 16 3A
Synchronous
idle
SO
H 01 01 00
Start of
heading
ST
X 02 02 0A Start of text
ET
B 26 17 0F
End of
transmission
block
ET
X 03 03 2E End of text
EO
T 37 04 1E
End of
transmission
EN
Q 2D 05 2D Enquiry
NA
K 3D 15 3D
Negative
acknow ledge
ment
DL
E 10 10 1F
Data link
escape
ITB 1F 1F(US) 1D(US)
Intermediate
block check
character
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 24
Bridges
A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges broadcast to all ports except the port on which the broadcast was received. However, bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address to that port only.
Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port. The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived.
Diagram: Multiple LANs connected by a backbone to handle a total load higher than the capacity
of a Single.
Bridges come in three basic types:
Local bridges: Directly connect LANs
Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers.
Wireless bridges: Can be used to join LANs or connect remote stations to LANs.
Ideally, bridges should be fully transparent, meaning it should be possible to move a machine from one cable segment to another without changing any hardware, software, or configuration tables.
Diagram: Operation of a LANs bridge from 802.11 to 802.3
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 25
Local Internetworking
In large organizations with many LANs, just interconnecting them all raises a variety of issues, even
if they are all just ethernet. Ideally, it should be possible to go out and buy bridges designed to the
IEEE standard, plug the connectors into the bridges, and evrything should work perfectly, instantly.
There should be no hardware and software changes required. In other words, the bridges should be
completely transparent. v
The routing procedure for an incoming frame depends on the LAN it arrives on (the source LAN) and
the LAN its destination is on (the destination LAN) as follows:
1. If destiantion and source LANs are the same, discard the frame.
2. If destiantion and source LANs are the different, forward the frame.
3. If destiantion LANs is unknown, use flooding.
Diagram: A Configuration with four LANs and two bridges
Spanning Tree Bridges
To increase reliability, some sites use two or more bridges in parallel between pairs of LANs. This
arrangement, however, also introduces some additional problems because it creates loops in the
topology.
Example: A frame F, with unknown destination is handled in diagram. Each bridge, following the
normal rules for handling unknown destinations, uses flooding, which in this example just means
copying it to LAN 2. Shortly thereafter, bridge 1 sees F2, a frame with an unknown destination, which
it copies to LAN 1, generating F3. Similarly, bridge 2 copies F1 to LAn1 generating F4 Bridge 1 now
forwards F4 and bridge 2 copies F3. This cycle goes on forever.
Diagram: Two parallel transparent bridges
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 26
The Solution to this difficulty is for the bridges to communicate with each other and overlay the actual
topology with a spanning tree that reaches every interests of constructing a fictitious loop-free
topology.
The result of this algorithm is that a unique path is established from every LAN to the root and thus to
every other LAN.
Diagram: (a) Interconnected LANs. (b) A Spanning tree covering the LANs. The dotted lines are
not part of the Spanning Tree.
Remote Bridges
A common use of Bridges is to connect two distant LANs. For example, a company might have plans
in several cities, each with its own LAN. Ideally, all the LANs should be interconnected, so the
complete system acts like one large LAN.
This goal can be achieved by putting a bridge on each LAN and connecting the bridges pair wise with
point-to-point lines. The simplest way to see this is to regard the three point-to-point lines as hostless
LANs.
Diagram: Remote bridges can be used to interconnect distant LANs.
Repeaters, Hubs, Bridges, Switches Routers and Gateways
All of these devices are in common use, but they all differ in subtle and not-so-subtle ways.
Unit – II/Computer Networking Truba College of Science & Tenhnology, Bhopal
Prepared By:- Ms. Nandini Sharma(CSE Deptt.) Page 27
The layer matters because different devices use different pieces of information to decide how to
switch. In a typical scenario, the user generates some data to be sent to a remote machine. Those data
are passed to the transport layer, with then adds a header.
Diagram: (a) Which device is in which layer (b) Frames, packets and headers
Diagram: (a)A Hub (b) A Bridge (c) A Switch