Chapter 8 LAN Topologies
|
|
- Suzanna Barrett
- 6 years ago
- Views:
Transcription
1 Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines Advantages Univ. of Kentucky CS 471, Spring Jim Griffioen 1
2 P-t-P Networks: (continued) Disadvantages Univ. of Kentucky CS 471, Spring Jim Griffioen 2
3 Multiaccess Networks Problem: P-t-P networks have many lines => high cost Solution: IDEA: the computers must take turns we need an allocation strategy to determine who s turn it is (TDM, FDM, Statistical Multiplexing) Shared lines reduce cost But it means you only get a fraction of the line s bandwidth Univ. of Kentucky CS 471, Spring Jim Griffioen 3
4 LAN Topologies Networks are typically classified by their shape There are three popular shapes: Univ. of Kentucky CS 471, Spring Jim Griffioen 4
5 Bus Topologies Shared Bus Connector Wire Figure 2: Example Bus Topology Must solve the Channel Allocation Problem. Univ. of Kentucky CS 471, Spring Jim Griffioen 5
6 Ring Topologies Computers are connected in a closed loop/ring Packets Travel Around The Ring in Some Direction Figure 3: Example Ring Topology Univ. of Kentucky CS 471, Spring Jim Griffioen 6
7 All computers connect to Star Topologies If it is a multiaccess star, hosts must synchronize their sending. If hub does store-n-forwarding of messages, then hosts do not need to synchronize. Hub Figure 4: Example Star Topology Univ. of Kentucky CS 471, Spring Jim Griffioen 7
8 Why Multiple Topologies Each topology has advantages and disadvantages Advantages Bus: Ring: Star: Ring: Disadvantages Bus: Ring: Ring: Star: Univ. of Kentucky CS 471, Spring Jim Griffioen 8
9 Ethernet: A Bus Network is probably most popular LAN technology developed at Xerox PARC by R. Metcalf and D. Boggs 1976 DEC, Intel, and Xerox developed the DIX ethernet standard later IEEE defined the ethernet standard first versions ran at 3 Mbps current versions run at 10 Mbps and 100 Mbps is a multiaccess network technology is a broadcast-based technology is inexpensive because it uses a passive cable only provides best-effort service higher level protocols do all the real work comes in three varietys: thick net, thin net, twisted pair Univ. of Kentucky CS 471, Spring Jim Griffioen 9
10 Ethernet Basics Sending Animation Univ. of Kentucky CS 471, Spring Jim Griffioen 10
11 CSMA/CD Carrier Sense, Multiple Access with Collision Detection Ethernet is just one example of a CSMA/CD protocol The goal is to There is no THE BASIC IDEA of CSMA/CD protocols is: CSMA/CD Animation Univ. of Kentucky CS 471, Spring Jim Griffioen 11
12 Ethernet Collision Detection Note that CSMA does not prohibit two machines from sending at the same time! Consequently, their signals may collide How do you detect collisions? (Short Packet Animation) Univ. of Kentucky CS 471, Spring Jim Griffioen 12
13 Two Short Packets that will collide When Packets Collide, Garbage Results (see green line below) Red host sends: Blue host sends: Wire sees: Figure 5: Short Packets might not detect collision Univ. of Kentucky CS 471, Spring Jim Griffioen 13
14 Collision Detection: (continued) What should the minimum Length Packet be? (See min-length animation) What is the Round Trip Delay of and Ethernet? if we transmit for 51.2 usecs, we will have seen the first few bits of a colliding host before we get done transmitting thus the minimum transmission time = 51.2 usec minimum packet size = Univ. of Kentucky CS 471, Spring Jim Griffioen 14
15 Ethernet Transmission Algorithm wait till idle line, send immediately, and monitor you may only send 1500 bytes. Why? you must wait 9.6 usec before sending again if you detect a collision, continue sending a jam signal until the end of the 51.2 usec interval (the minimum packet length) to make sure everyone sees the collision. wait a certain (with slight randomness) amount of time and try again if you collide again, double the wait time, then try again, etc. called exponential backoff Univ. of Kentucky CS 471, Spring Jim Griffioen 15
16 Receiever Algorithm the ethernet card sees all packets sent over the ether the ethernet card runs in one of two modes: Univ. of Kentucky CS 471, Spring Jim Griffioen 16
17 LocalTalk LAN technology that uses bus topology Interface included with all Macintosh computers Relatively low speed (230.4 Kbps) Low cost ( free with a Macintosh); easy to install and connect Univ. of Kentucky CS 471, Spring Jim Griffioen 17
18 CSMA/CA LocalTalk uses collision avoidance rather than collision detection CA = Collision Avoidance Transmitting computer sends very short message to reserve bus If reservation succeeds, transmitter can use bus without conflict Univ. of Kentucky CS 471, Spring Jim Griffioen 18
19 Two popular examples: IBM Token Ring FDDI Example Ring Networks Univ. of Kentucky CS 471, Spring Jim Griffioen 19
20 IBM Token Ring network manages access to the shared ring via a token Univ. of Kentucky CS 471, Spring Jim Griffioen 20
21 forward packet s Token Ring Access Points Receiver Sender copy packet and forward Figure 6: (Left) Abstract Ring (Right) Ring in Operation Token Ring Animation Univ. of Kentucky CS 471, Spring Jim Griffioen 21
22 The Token The token is There is only A computer must hold the token Univ. of Kentucky CS 471, Spring Jim Griffioen 22
23 Token Passing Algorithm Univ. of Kentucky CS 471, Spring Jim Griffioen 23
24 Token Ring Failures What kinds of problems/failurs can occur? Univ. of Kentucky CS 471, Spring Jim Griffioen 24
25 FDDI (Fiber Distributed Data Interface) FDDI was a very popular ring technology Ran at 100 Mbps Still used in some places, but has been largely replaced by other technologies. Gigabit ring networks (follow-ons to FDDI) have also been developed (CSMA/RN) Univ. of Kentucky CS 471, Spring Jim Griffioen 25
26 Physical Characteristics runs over fiber an alternative version called CDDI runs over copper the attachment stations form a Dual, Counter-Rotating Ring Concentrator DAS SAS SAS Dual Attachment Station (Concentrator) 2 fibers in / 2 fibers out SAS hang off it expensive/complex To a To a Figure 7: Rings, DAS, and SAS only use the outer ring, the inner ring is idle until a failure occurs Univ. of Kentucky CS 471, Spring Jim Griffioen 26
27 Physical Characteristics: (continued) two types of attachments Dual Attachment Stations (DAS) Single Attachment Stations (SAS) the network is said to be self-healing a DAS has an optical by-pass that fixes SAS failures each DAS monitors connectivity and reverses the ring if a failure occurs X X X Figure 8: Self-Healing Capability Univ. of Kentucky CS 471, Spring Jim Griffioen 27
28 Physical Characteristics: (continued) has a bandwidth of 100 Mbps, latency depends on ring size max ring size is 100 Kilometers (really 200 Km / 2 rings) max dist between stations is 2 Km max of 500 stations each station adds a 50 ns delay because of an elasticity buffer. uses 4B/5B encoding max packet length is approx 4500 bytes Univ. of Kentucky CS 471, Spring Jim Griffioen 28
29 Token Rotation Algorithm you are allowed to send data as long as you hold the token How long can you hold the token? Univ. of Kentucky CS 471, Spring Jim Griffioen 29
30 Setting THT if (THT is small) if (THT is large) TTRT (Target Token Rotation Time) want a TTRT Target Token Rotation Time for the ring that is as big as possible to get the best efficiency, but small enough so that everyone is happy FDDI selects the minimum of all hosts desired TRT s as the ring s TTRT (vie a bidding algorithm) each machine tries to keep the token rotating at the TTRT speed Univ. of Kentucky CS 471, Spring Jim Griffioen 30
31 Setting THT: (continued) each hosts measures the last rotation time MTRT (Measured Token Rotation Time) if (MTRT < TTRT) the token is moving faster than it needs to you are allowed to hold the token for a maximum of THT = (TTRT - MTRT) if (MTRT >= TTRT) the token is behind schedule you must forfeit your turn and send the token on immediately Univ. of Kentucky CS 471, Spring Jim Griffioen 31
32 When do you send the token? Token Token Packet Packet Figure 9: When to send the Token? Univ. of Kentucky CS 471, Spring Jim Griffioen 32
33 Univ. of Kentucky CS 471, Spring Jim Griffioen 33
34 ATM (Asynchronous Transfer Mode) does not stand for Automated Teller Machine is a packet switching system spans the physical, data link, and network levels standards are still in development (CCITT and ATM forum) highly influenced by the Telephone industry a goal of ATM was to be able to send voice, data, and video over the same network (merge computer and voice networks) also need to carry control information (things needed to support new telephone services like call forwarding, call-waiting, discount dialing plans, etc) In the past this information ran over a parallel network to the voice network. Univ. of Kentucky CS 471, Spring Jim Griffioen 34
35 Goals and Assumptions 1. ATM networks will be organized as a two-level hierarchy consisting of user and network level machines/switches we need a network-network interface (NNI) and we need a user-network interface (UNI) 2. should provide connection-oriented service; set up a channel to communicate 3. should be run over fiber and have very low error rates subgoal is to provide Quality-of-Service such as guaranteed bandwidth, latency, interpacket arrival times, etc. can only do this is the communication links do not introduce errors 4. should allow low cost attachements (ATM telephone devices) standards body decided to prohibit cell reordering cells must arrive at the receiver in order across the link Univ. of Kentucky CS 471, Spring Jim Griffioen 35
36 this means end-point devices can be made with much simpler bufferring schemes in particular, they can use FIFO memory instead of RAM memory ATM telephones can just play the samples as they arrive ATM typically carried over some fiber-based data link layer like SONET uses cells (really just another term for packet) Univ. of Kentucky CS 471, Spring Jim Griffioen 36
37 What is a Cell? Recall that Packets can be any size (i.e., they adjust their size to fit the data) A Cell is just a fixed length packet (usually a small packet) Cells are always the same size (even if you want to send a single bit or byte) ATM uses 53 byte cells : 48 bytes of payload and 5 bytes of header Univ. of Kentucky CS 471, Spring Jim Griffioen 37
38 small packet caught behind big packet big packet divided into cells Time Packets can cause wasted bandwidth Figure 10: Cells have small queueing delays Univ. of Kentucky CS 471, Spring Jim Griffioen 38
39 Characteristics of ATM each switch is a star topology switches can by hooked together uses connection-oriented communication between machines destination identified by a connection id ATM ATM Figure 11: Example ATM Network Univ. of Kentucky CS 471, Spring Jim Griffioen 39
40 Pictures of Real ATM Switches Each machine uses two fiber optic lines to connect to the switch Typically multimode fiber is used running at 155 Mbps Figure 12: Fibers into back of a Sparc IPC Univ. of Kentucky CS 471, Spring Jim Griffioen 40
41 Pictures of Real ATM Switches Univ. of Kentucky CS 471, Spring Jim Griffioen 41
42 Univ. of Kentucky CS 471, Spring Jim Griffioen 42
LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science
1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationCOMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1
Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.5: Ethernet Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks
More informationIntroductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.
Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationLecture 6: Example LAN: Ethernet
Lecture 6: Example LAN: Ethernet Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Network Types Local Area Networks (LANs):privately-owned networks
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationLocal Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring
Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationIntroduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1
Introduction to LAN Topologies Cabling 2000, Cisco Systems, Inc. 3-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Media / Cabling Local Area Network Cabling
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationUnit II. Part A (2 Marks)
Unit II Part A (2 Marks) 1. Differentiate fast Ethernet and Gigabit Ethernet. Fast Ethernet increased speed from 10 to 100 megabits per second (Mbit/s). Gigabit Ethernet was the next iteration, increasing
More informationMedia Access Control (MAC) Sub-layer and Ethernet
Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationToken Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1
Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework
More informationPrinciples behind data link layer services
Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationThe random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of
More informationCS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006
CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationContent. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control
Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media
More informationComputer Networks. Medium Access Sublayer (Part I)
Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationCS4516 Advanced Computer Networks. Final Review
Final Review ------------------------------ Final Material Begins Here --------------------------- V. Local Area Networks A. "The Channel Allocation Problem" 1. assumptions B. LAN Performance Notation
More informationProtocols for Multiaccess Networks
Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha
More informationIntroduction to Computer Networks. IEEE Ethernet
Introduction to Computer Networks IEEE 802.3 Ethernet All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationChapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)
Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial
More informationDirect Link Networks (II)
Direct Link Networks (II) Computer Networking Lecture 03 HKU SPACE Community College January 30, 2012 HKU SPACE CC CN Lecture 03 1/25 Outline Reliable Link Service Stop-and-Wait Sliding Window Media Access
More informationComputer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:
More informationMultiple Access Channels
Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium
More information1999, Scott F. Midkiff
Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationZarządzanie sieciami telekomunikacyjnymi
Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are
More informationIEEE 802 LANs SECTION C
IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationA LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,
CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the
More informationChapter 10: Local Area Networks
Chapter 10: Local Area Networks MULTIPLE CHOICE 1. CSMA stands for: a. Client-Server Multi-Access c. Carrier Server Master Application b. Carrier Sense Multiple Access d. none of the above 2. The CD in
More informationComputer Networks. Lecture 8 Local Area Network, IEEE 802.x
Computer Networks Lecture 8 Local Area Network, IEEE 802.x Local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school,
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationLAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic
1 LAN Protocols Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8 CSE 3213, Fall 2015 Instructor: N. Vlajic What is LAN? 2 Local Area Network (LAN) properties private ownership freedom to choose/change/upgrade
More informationEthernet. Networks: Ethernet 1
Ethernet Networks: Ethernet 1 Ethernet [DEC, Intel, Xerox] 1-persistent, CSMA-CD with Binary Exponential Backoff Manchester encoding Networks: Ethernet 2 Ethernet [operational in 1974] Initially 3 Mbps
More informationCSE/EE 461 Wireless and Contention-Free Protocols
CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application
More informationCSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58
CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG
Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we
More informationLocal Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.
Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationEthernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers
Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationCSE/EE 461 Section 2
CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan
More informationLecture 9: Bridging & Switching"
Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link
More informationLecture (04) Data link layer
Lecture (04) Data link layer By: Dr. Ahmed ElShafee Standards Overview CSMA/CD Ethernet standards 10 base 5 10 base 2 10 base T Fast Ethernet Gigabit Ethernet ١ ٢ Standards Overview Like most protocols,
More informationInternet Architecture and Protocol
Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport
More informationData Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs
Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Hello and welcome to today s lecture on high speed
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one
More informationReview of Topology and Access Techniques / Switching Concepts
Review of Topology and s / Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Three base wired topologies Bus, star, ring Two wireless topologies Ad-hoc, infrastructure
More informationCommunication (III) Kai Huang
Communication (III) Kai Huang Ethernet Turns 40 12/17/2013 Kai.Huang@tum 2 Outline Bus basics Multiple Master Bus Network-on-Chip Examples o SPI o CAN o FlexRay o Ethernet Basic OSI model Real-Time Ethernet
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationThe Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.
The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)
More informationCSE 461 Multiple Access. David Wetherall
CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4 th edition.
More informationLinks. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel
Link Layer Error Detection Nodes Links Frame R yclic Redundancy hecksum Parity its More about this in exercise! Data Link Layer -1 Data Link Layer -2 Links Two types of links : point-to-point broadcast
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationCOMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a
COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION Q-1(a) In half-duplex transmission, only one entity can send at a time; in a full-duplex transmission, both entities can send at the same time. (b)
More informationComputer Communication Networks
Chapter 3 Computer Communication Networks Objective of this chapter: The performance of any distributed system is significantly dependent on its communication network. The performance of the computer network
More informationLAN PROTOCOLS. Beulah A AP/CSE
LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety
More informationLecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1
Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationLecture 05 Chapter 16 High Speed LANs
NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education
More information