mac
DESCRIPTION
Conrol de acceso mediooTRANSCRIPT
![Page 1: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/1.jpg)
Subcapa de Control de Acceso al Medio
María Antonieta Soto Ch. - 2012
Transparencias preparadas para Tanenbaum, A. 2011. Computer Networks, 5th edition. Pearson Education – Prentice Hall
![Page 2: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/2.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Tipos de canales y sus modos de acceso
2
Enlace punto a punto Protocolo PPP Protocolo HDLC
Enlace de difusión Se usan protocolos de acceso múltiple El protocolo ideal debería, para un canal de R bps,
tener las siguientes características: Cuando haya solo un nodo con datos para tx se le asignará
R bps. Cuando haya M nodos con datos pata tx, cada nodo tendrá
una tasa de R/M bps (tasa media) El protocolo será descentralizado, esto es, no habrá nodo
maestro que pueda ser fuente de fallo El protocolo será simple
![Page 3: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/3.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Tipos de canales y sus modos de acceso
3
Enlace de difusión Protocolos de particionamiento del canal (TDM,
FDM, CDMA) Protocolos de acceso aleatorio (ALOHA, CSMA) Protocolos de toma de turnos
Protocolo de sondeo Protocolo de paso de testigo
![Page 4: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/4.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Problema de Asignación del Canal Asignación estática del canal Supuestos para asignación dinámica
4
![Page 5: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/5.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
5
Supuestos para la asignación dinámica del canal Tráfico independiente Canal único Colisiones observables Tiempo continuo o ranurado Detección de portadora o no detección de
portadora
![Page 6: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/6.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
6
Protocolos de Acceso Múltiple ALOHA Carrier Sense Multiple Access (acceso múltiple
con detección de portadora) Protocolos libres de colisiones Protocolos con contención limitada Protocolos LAN inalámbrica
![Page 7: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/7.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
7
ALOHA (1)
En ALOHA puro, las tramas se transmiten en momentos completamente arbitrarios.
CollisionCollision
Time
User
A
B
C
D
E
![Page 8: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/8.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
8
ALOHA (2)
Período vulnerable para la trama sombreada.
![Page 9: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/9.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
9
ALOHA (3)
Rendimiento total (throughput) versus tráfico ofrecido por sistemas ALOHA.
![Page 10: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/10.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
10
CSMA Persistente y No persistente
Comparación de la utilización del canal versus la carga para varios protocolos de acceso aleatorio.
![Page 11: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/11.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
11
CSMA con Detección de Colisiones
CSMA/CD puede estar en uno de tres estados: contención, transmisión o inactivo.
![Page 12: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/12.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
12
Protocolos sin Colisiones (1)
Protocolo básico de mapa de bits.
![Page 13: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/13.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
13
Protocolos sin Colisiones (2)
Token ring.
Station
Direction oftransmission
Token
![Page 14: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/14.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
14
Conteo Descendente BinarioEl protocolo cuenta atrás binario. Un guión indica
silencio.
![Page 15: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/15.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
15
Protocolos de Contención Limitada
Probabilidad de adquisición de un canal de contención simétrica
![Page 16: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/16.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocolo de Recorrido de Árbol Adaptable
16
El árbol para ocho estaciones.
![Page 17: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/17.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
17
Protocolos de LAN Inalámbrica (1)
Una LAN inalámbrica. (a) A y C son estaciones escondidas al transmitir a B.
![Page 18: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/18.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocolos de LAN Inalámbrica (2)
Una LAN inalámbrica. (b) B y C son estaciones expuestas al transmitir a A y D.
18
![Page 19: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/19.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocolos de LAN Inalámbrica (3)
El protocolo MACA. (a) A enviando un RTS a B. (b) B respondiendo con un CTS a A.
19
![Page 20: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/20.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
20
Ethernet Capa física Protocolo de subcapa MAC Desempeño de Ethernet Ethernet conmutada Fast Ethernet Gigabit Ethernet 10 Gigabit Ethernet IEEE 802.2: Control Lógico del Enlace Retrospectiva de Ethernet
![Page 21: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/21.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
21
Capa Física de Ethernet Clásica
Arquitectura de Ethernet clásica
![Page 22: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/22.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
22
Protocolo de Subcapa MAC (1)
Formatos de trama. (a) Ethernet (DIX). (b) IEEE 802.3.
![Page 23: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/23.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
23
Protocolo de Subcapa MAC (2)
La detección de colisión puede tomar hasta 2.
![Page 24: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/24.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
24
Desempeño de Ethernet
Eficiencia de Ethernet a 10 Mbps con tiempos de ranura 512-bits.
![Page 25: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/25.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
25
Ethernet Conmutada (1)
(a) Hub. (b) Switch.
![Page 26: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/26.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
26
Ethernet Conmutada (2)
Un switch Ethernet.
Switch
Twisted pair
Switch ports
Hub
![Page 27: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/27.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
27
Fast Ethernet
Cableado original de Fast Ethernet.
![Page 28: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/28.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
28
Gigabit Ethernet (1)
Ethernet de dos estaciones.
![Page 29: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/29.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
29
Gigabit Ethernet (2)
Ethernet con múltiples estaciones
![Page 30: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/30.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
30
Gigabit Ethernet (3)
Cableado de Gigabit Ethernet.
![Page 31: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/31.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
31
10 Gigabit Ethernet
Cableado 10 Gigabit Ethernet.
![Page 32: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/32.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
32
LANs Inalámbricas Arquitectura y pila de protocolos de 802.11 Capa física de 802.11 Protocolo de subcapa MAC de 802.11 Estructura de la trama de 802.11 Servicios
![Page 33: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/33.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
33
Arquitectura y Pila de Protocolos de 802.11 (1)
Arquitectura 802.11 – modo infraestructura
AccessPoint
Client
To Network
![Page 34: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/34.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
34
Arquitectura y Pila de Protocolos de 802.11(2)
Arquitectura 802.11 – modo ad-hoc
![Page 35: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/35.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Arquitectura y Pila de Protocolos de 802.11(3)
Parte de la pila de protocolo del 802.11.35
![Page 36: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/36.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
36
Protocolo de la Subcapa MAC del 802.11 (1)
Enviando una trama con CSMA/CA.
![Page 37: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/37.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocolo de la Subcapa MAC del 802.11 (2)
El problema de la estación oculta.
37
![Page 38: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/38.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocolo de la Subcapa MAC del 802.11 (3)
El problema de la estación expuesta.
38
![Page 39: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/39.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocolo de la Subcapa MAC del 802.11 (4)
El uso de la detección de canal virtual utilizando CSMA/CA.
39
![Page 40: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/40.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocolo de la Subcapa MAC del 802.11 (5)
Espaciado entre tramas 802.11
40
![Page 41: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/41.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Estructura de una trama 802.11
Formato de la trama de datos 802.11.
41
![Page 42: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/42.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
42
Banda ancha inalámbrica Comparación entre 802.16 y 802.11, 3G Arquitectura y pila de protocolos 802.16 Capa física 802.16 Estructura de trama de 802.16
![Page 43: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/43.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
43
Comparación de 802.16 con 802.11 y 3G
Arquitectura de 802.16
![Page 44: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/44.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
44
Arquitectura y Pila de Protocolos de 802.16
Pila de protocolos de 802.16.
![Page 45: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/45.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
45
Capa física de 802.16Estructura de tramas de OFDMA con duplexación por
división de tiempo (TDD).
![Page 46: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/46.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
46
Protocolo Subcapa MAC 802.16 Clases de servicio
Servicio de tasa de bits constante (voz descomprimida).
Servicio de tasa de bits variable en tiempo real (multimedia comprimida).
Servicio de tasa de bits variable en no tiempo real (archivos).
Servicio de mejor esfuerzo (otras).
![Page 47: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/47.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
47
Estructura de la Trama 802.16
(a) Una trama genérica.
(b) Una trama de solicitud de ancho de banda.
![Page 48: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/48.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
48
Bluetooth (IEEE 802.15) Arquitectura Pila de protocolos Capa de Radio Capas de enlace Estructura de la trama
![Page 49: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/49.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Arquitectura de Bluetooth
Dos piconets se pueden conectar para formar una scatternet
49
![Page 50: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/50.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Pila de protocolos de Bluetooth
Arquitectura de protocolos de Bluetooth.
50
![Page 51: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/51.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Estructura de la Trama de Bluetooth
Trama de datos típica de Bluetooth en (a) básica, y (b) mejorada, tasa de datos.
51
![Page 52: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/52.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
52
Conmutación en la Capa de Enlace de Datos Uso de puentes Puentes transparentes (aprenden) Puentes con árbol de expansión Repetidores, hubs, puentes, switches, routers,
y gateways LANs virtuales
![Page 53: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/53.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
53
Puentes transparentes (1)
Puente conectando dos LANs multipunto
![Page 54: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/54.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
54
Puentes transparentes (2)
Puentes (y un hub) conectando siete estaciones punto a punto.
![Page 55: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/55.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Puentes transparentes (3)
Procesamiento de protocolo en un puente.
55
![Page 56: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/56.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
56
Puentes con Árbol de Expansión (1)Puentes con dos enlaces paralelos
![Page 57: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/57.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Puentes con Árbol de Expansión (2)
Un árbol de expansión conectando cinco puentes. Las líneas punteadas son enlaces que no forman parte del árbol de expansión.
57
![Page 58: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/58.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Repetidores, Hubs, Puentes, Switches, Routers, y Gateways
(a) Cuál dispositivo está en qué capa. (b) Tramas, paquetes, y cabeceras.
58
![Page 59: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/59.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
59
LANs Virtuales (1)
Un edificio con cableado centralizado usando hubs y un switch.
![Page 60: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/60.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
LANs Virtuales (2)
Dos VLANs, gris y blanca, en una LAN puenteada.
60
![Page 61: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/61.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
61
El estándar IEEE 802.1Q (1)
LAN puenteada que sólo es parcialmente consciente de la VLAN. Los símbolos sombreados son conscientes de la VLAN. Los vacíos no lo son.
![Page 62: MAC](https://reader033.vdocuments.us/reader033/viewer/2022061110/54521a78b1af9ffc7c8b456f/html5/thumbnails/62.jpg)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
El estándar IEEE 802.1Q (2)
Formatos de trama Ethernet 802.3 (heredada) y 802.1Q.
62