Local Area Networks CONSYL Introduction to Computer Communications and Networks
|
|
- Marian Garrett
- 6 years ago
- Views:
Transcription
1 Local rea Networks 4/11/40 page 1 Faculty of Engineering, Kasetsart University Local rea Networks 1-1
2 LN characteristics confined within geographical area relatively high data rate under single management LN Ingredients... Topology bus, star, ring hub hub hub stations stations station Transmission medium twisted pair, coaxial, fiber optics, wireless hub Medium access techniques protocol to coordinate the sharing of media router server 4/11/40 page 2 Communications network that serves users within a confined area is known as a Local rea Network (LN). Computers (server and workstations) are normally distributed around a single office or building, including and network device like hub, bridge or router. Messages are transmitted in LN as a series of packet with high data rate (small propagation delay). The packets may be fixed or variable length. Most LNs have broadcast capability. Faculty of Engineering, Kasetsart University Local rea Networks 1-2
3 Topology Topology defines how nodes/stations are connected LN typical topology : bus/tree : all nodes connected to a common medium star : all nodes are joined to a central nodes ring : nodes form a ring by point-to-point links to adjacent neighbors bus star ring 4/11/40 page 3 The topology of a network defines the structure of its logiacal layout. There are three main categories of LN topologies: bus/tree, star and ring. Faculty of Engineering, Kasetsart University Local rea Networks 1-3
4 Topology : Bus B C D D B and C pplication Presentation Session Transport Network Data Link Physical D pplication Presentation Session Transport Network Data Link Physical 4/11/40 page 4 In a bus network, one node s transmission traverses the entire network and is received and examined by every node The access method can be : (1) Contention scheme : multiple nodes attempt to access bus; only one node succeed at a time (e.g. CSM/CD in Ethernet) (2) Round robin scheme : a token is passed between nodes; node holds the token can use the bus (e.g.token bus) dvantages: (1) Simple access method (2) Easily add or remove stations Disadvantages: (1) Poor efficeincy with high network load (2) Relatively insecure, due to the shared medium Faculty of Engineering, Kasetsart University Local rea Networks 1-4
5 Topology : Ring nodes function as a repeater only destination copies frame to it, all other nodes have to discarded the frame Unidirectional link C B transmits frame addressed to B C C ignores frame B C B C B copies frame C absorbs returning frame 4/11/40 page 5 ring consists of a single cable in the shape of loop. Each station is only connected to each of its two nearest neighbors. Data in the form of pakests pass around the ring from one station to station in designated unidirection. dvantages : (1) ccess method supports heavy load without degradtion of performance because the medium is not shared. (2) Several packets can simulteneous circulate between different pairs of stations. Disadventages: (1) Comples and elaborate management. (2) Reinitialztion of the ring whenever a failure occurs. Faculty of Engineering, Kasetsart University Local rea Networks 1-5
6 Topology : Star Each station attaches to the central node Two point-to-point links for tranmitting and receiving Two alternatives operation broadcasting switching B C shared hub broadcast packet to every ports but only destination copies frame B C C transmitts frame addressed to B C switch hub retransmitts packet to the destination only 4/11/40 page 6 ll stations are attatched to a single central node. The main advantage of star topology is easy to manage with relative low cost. But the network is very vulnerable, since it depends entirely upon the operation of the central node. Faculty of Engineering, Kasetsart University Local rea Networks 1-6
7 Transmission media Twisted pair Cat 3 -- voice grade UTP, data rate up to 10Mbps Cat 5 -- data grade UTP, data rate 100 Mbps Coaxial cable baseband coaxial support data rates 20 Mbps at distance of up to 2 km Fiber optics support gigabit data rate and longer distances 4/11/40 page 7 Faculty of Engineering, Kasetsart University Local rea Networks 1-7
8 Medium ccess Control Protocol for controlling access to transmission medium Defined as part of Data Link layer The protocol performs: perform functions related to medium access (MC sublayer) concerned with the transmission of a link-level between two nodes (LLC sublayer) Network Data Link Physical LLC MC Logical Link Control sublayer Medium ccess Control sublayer 4/11/40 page 8 The role of Data Link layer is to permit the trasnfer of data between the stations and detect trasnmission errors. IEEE divides this layer into separated sublayer : MC (Medium ccess Control) and LLC (Logical Link Layer) The MC sublayer control the access of medium using access method. The LLC provides interface to next upper layer. Faculty of Engineering, Kasetsart University Local rea Networks 1-8
9 LLC Sublayer Functions Provides a compatibility interface, irrespective of the MC layer used. Service ccess Points (SPs) interface sublayers to upper-layer functions Optional connection, flow control, and sequencing services 4/11/40 page 9 The LLC sublayer rests on top of the other 802 protocols to provide interface flexibility. Upper layers, for example IP at Layer 3, can operate autonomously without regards for the specific type of LN media. This layer remains consistent no matter what type of MC protocol (Token ring, Token bus or CSM/CD) is used.. From the perspective of these lower MC sublayers, the service access point (SP) process provides a convenient interface to the upper OSI layers. These SP entries simplify access to the shared channel up to the specified upper-layer service identified by LLC SP entities. LLC sublayer options include support for connections between applications running on the LN, flow control to the upper layer by means of ready/not ready codes, and sequence control bits. Faculty of Engineering, Kasetsart University Local rea Networks 1-9
10 MC frame format MC control Destination ddress Source ddress Type LLC PDU CRC MC Frame (802.3) SPs define a protocol for upper layer DSP SSP CTRL Data LLC PDU DSP: Destination Service ccess Point SSP: Source Service ccess Point Control: Command and response functions Data: LLC SDU 4/11/40 page 10 From the perspective of these lower MC sublayers, the service access point (SP) process provides a convenient interface to the upper layers. These SP entries simplify access to the shared channel up to the specified upper-layer service identified by LLC SP entities. LLC carries two 8-bit addresses, the destination SP and the source SP LLC sublayer options include support for connections between applications running on the LN, flow control to the upper layer by means of ready/not ready codes, and sequence control bits. Faculty of Engineering, Kasetsart University Local rea Networks 1-10
11 MC ddress 24 bits 24 bits Vendor Code Serial Number c ROM RM MC address is burned into ROM on a network interface card 4/11/40 page 11 The MC sublayer defines a hardware address called the MC address. The MC address is unique for each LN interface. The MC address is burned into ROM-hence the term, burned-in address (BI) in most interface cards. When the network interface card initializes, this address is copied into RM. The MC address is a 48-bit addressed as 12 hexadecimal digits. The first 6 hexadecimal digits of a MC address contain a manufacture identification (vender code) also known as the Organizationally Unique Identifier (OUI). IEEE administers OUIs to ensure vender uniqueness. The last 6 hexadecimal digits are administered by each vendor and represent the interface serial number. Faculty of Engineering, Kasetsart University Local rea Networks 1-11
12 MC Strategies Where? centralized : a designated station has an authurity to grant access to the network distributed : stations can dynamically determined transmission order How? Sychronous : dedicated specific capacity to a conection synchronous : dynamic allocate capacity (3 categories available) Round-robin Reservation Contention 4/11/40 page 12 Faculty of Engineering, Kasetsart University Local rea Networks 1-12
13 MC techniques Contention Medium is free for all node senses the free medium and occupies it Example: Ethernet, IEEE Round robin Give every body a turn Inefficient for lightly loaded network Example: Token Ring/IEEE 802.5, Token Bus/IEEE 802.4, FDDI Reservation schedule a time slot like TDM Example: DQDB 4/11/40 page 13 The access method corresponds to the protocol for managing the transmission and can be categorized as above. Faculty of Engineering, Kasetsart University Local rea Networks 1-13
14 Overview of LN Standard FDDI Overview Logical Link Control CSM/CD (Ethernet) Token Bus Token Ring Distributed Queue Dual BUS --MN standard Fiber Distributed Data Interface CSM/CD Token Bus LLC Token Ring DQDB FDDI 4/11/40 page 14 Standard LN/MN Ethernet and IEEE The major LN technologies, it runs the largest number of LNs. Token Bus -- Bus topoly with logical ring connection Token Ring -- From IBM, it followed Ethernet and is now widely used in the large number of IBM networks. FDDI -- lso using tokens, it is now a popular campus LN. DQDB -- use in Metropolitan rea Network Faculty of Engineering, Kasetsart University Local rea Networks 1-14
15 Ethenet/802.3 Operation Every node can receive a transmission by all other nodes need addressing scheme to identify a destination only destination copies frame to it, all other nodes have to discarded the frame B C B C terminator C finds the bus is free C transmits frame addressed to B C B C B ignores frame copies frame signal is absorbed by the terminators 4/11/40 page 16 packet in an Ethernet network traverses the entire network and is received and examined by every node. When the signal reaches the ends of a segment, it is absorbed by terminators to prevent it from going back onto the segment. If two or more station try to tranmitt packets at the same time, a collision is occured and the packet can not be used. Faculty of Engineering, Kasetsart University Local rea Networks 1-16
16 Token Ring/802.5 Operation T T = 0 T = 0 T T = 1 T Data Token Ring LNs continuously pass a token or a Token Ring frame 4/11/40 page 17 Token-passing networks move a small frame, called a token, around the network. Possession of the token grants the right to transmit. If a station receiving the token has no information to send, it simply passes the token to the next station. If a station possessing the token has information to transmit, it claims the token by altering one bit of the frame, the T bit. The station then appends the information it wishes to transmit and sends the information frame to the next station on the Token Ring. The information frame circulates the ring until it reaches the destination station where the frame is copied by the station and tagged as having been copied. The information frame continues around the ring until it returns to the station that originated it, and is removed. Faculty of Engineering, Kasetsart University Local rea Networks 1-17
17 FDDI FDDI Dual Ring 4/11/40 page 18 FDDI is logically and physically a ring topology. lthough it operates at higher speeds, FDDI is similar to Token Ring. The two network types share many features such as token passing and predictable deterministic delays. ccess to the FDDI dual ring is determined by token possession. However, stations attach new tokens to the ends of their transmissions and a downstream station is allowed to add its frame to the existing frame. Thus, at any given time, several information frames can be circling the ring. Faculty of Engineering, Kasetsart University Local rea Networks 1-18
18 LN Frame Format Summary LLC DSP 1 SSP 1 CTRL 1 Data >=0 FDDI FDDI uses 4-bits symbols Preamble 16 SD 2 FC 2 D 12 S LLC FCS 8 ED 1 or 2 FS SD 1 C 1 FC 1 D 6 S LLC FCS 4 ED 1 FS 1 Preamble 8 D 6 S 6 Length LLC FCS 4 Ethernet Preamble 8 D 6 S 6 Type 2 Data FCS 4 4/11/40 page 19 The LLC uses a source service access point (SSP) and a destination service access point (DSP) to identify the source and destination protocols of the data being carried in the LLC subframe. These service access point (SP) fields are 8-bits each and are used to define only one of a few registered SPs. The FDDI frame format is similar to the Token Ring format. However, because of FDDI s 4B/5B reliability mechanism, data is described in groups of four bits called symbols. The fields are actually the same size as the fields used in Token Ring. The first three fields of the Ethernet frame and the frame are identical. However, has changed the fourth field the type field, into a length field and added the LLC fields. Faculty of Engineering, Kasetsart University Local rea Networks 1-19
Campus Network Design
Content Campus Network Design Thana Hongsuwan Ethernet Standard Transparent Bridges LN Switches LN and Switch Operation Loop Resolution Virtual LNs, InterVLN Routing Router Redundancy Switch Security Campus
More informationCampus Network Design
Campus Network Design Thana Hongsuwan 2003, Cisco Systems, Inc. All rights reserved. 1-1 Content Ethernet Standard Transparent Bridges LAN Switches LAN and Switch Operation Loop Resolution Virtual LANs,
More informationLocal Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.
Review of Lecture 7 Local rea Network! Question - What are the station types supported by HDLC? Describe each. References: Chapters 15 and 16 Stallings Chapters 14 and 16 Forouzan Study Guide 8 Review
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationIntroduction to LAN Protocols
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
More informationThis Lecture. BUS Computer Facilities Network Management. Information Sharing. Local Area Network
This Lecture US3150 - omputer Facilities Network Management Local rea Network (LN). LN applications. LN topologies: us, Tree, Ring, Faculty of Information Technology Monash University Star. LN protocol
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationToken Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1
Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationInternet Architecture and Protocol
Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationก ก Information Technology II
ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access
More informationLocal Area Network(LAN)
Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building
More informationChapter 11 in Stallings 10 th Edition
Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large
More informationChapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationIntroductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.
Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory
More informationComputer Networks. Lecture 8 Local Area Network, IEEE 802.x
Computer Networks Lecture 8 Local Area Network, IEEE 802.x Local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school,
More informationIEEE 802 LANs SECTION C
IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationToken Ring/IEEE 802.5
CHAPTER 9 Token /IEEE 802.5 Background The Token network was originally developed by IBM in the 1970s. It is still IBM s primary local area network (LAN) technology and is second only to Ethernet/IEEE
More informationTest Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair
Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationLAN Local Area Networks. CSMA/CD restriction. Bits on the Wire. PacketSize 2 * COMP476 Networked Computer Systems. Interconnecting
Interconnecting s COMP476 ed Computer Systems LN Local rea s There is a Limit to the Maximum Length of a LN - Ethernet cables (segments) can be up to 500m. - The restrictions are due to power and propagation
More informationA LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,
CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer
More informationIntegrating Information Systems: Technology, Strategy, and Organizational Factors
MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications
More informationCH : 15 LOCAL AREA NETWORK OVERVIEW
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet HTML tutorial today. Announcements CMPE 80N Spring 2003 Week 5 1 2 MAC Protocols MAC Protocols Round-robin. Scheduled-access. Contention-based. Contention-based
More informationLocal Area Networks. Ethernet LAN
Local Area Networks Ethernet 802.3 LAN -7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN -7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationComputer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand
Jan May 2018 Computer Networks รศ.ดร.อน นต ผลเพ ม Assoc. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
More information2. LAN Topologies Gilbert Ndjatou Page 1
2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationLAN PROTOCOLS. Beulah A AP/CSE
LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety
More informationIT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1
IT 4504 Section 4.0 Network Architectures 2008, University of Colombo School of Computing 1 Section 4.1 Introduction to Computer Networks 2008, University of Colombo School of Computing 2 Introduction
More informationIEEE standards for local area networks
IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationLocal Area Network: Ethernet and Advanced Bridging
Local rea Network: Ethernet and dvanced Bridging http://cours.touta.in/?page id=56 for discussion and exercises Laurent Toutain ugust 27, 20 Table of Contents Introduction 2 Network Classification By scope
More informationDifferent network topologies
Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical
More informationInternetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on
CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationAdaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols
Link Layer: Introduction daptors ommunicating Terminology: hosts and routers are nodes communication channels that connect adjacent nodes along communication path are links wired links wireless links LNs
More informationIntroduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1
Introduction to LAN Topologies Cabling 2000, Cisco Systems, Inc. 3-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Media / Cabling Local Area Network Cabling
More informationAdaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols
Link Layer: Introduction daptors ommunicating hosts and routers are nodes links connect nodes wired links wireless links layer-2 packet is a frame, encapsulates datagram datagram controller sending host
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationBrief Summary of the Chapter: CHAPTER 1 NETWORKING AND OPEN STANDARDS In this chapter we are going to study about computer Networks, associated terminology and related concept along with network devices.
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationLecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking
Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationThe Network Access Layer. In This Lecture. Network Access Layer. Hour 3
The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture
More informationCSE/EE 461 Wireless and Contention-Free Protocols
CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application
More informationTypes of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN
Types of Computer and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area ) 1 MAN (Metropolitan Area ) 2 WAN (Wide Area ) 3 Problems to be discussed when presenting
More informationContent. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control
Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media
More informationHigh Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2
High Speed LANs CS420/520 Axel Krings Page 1 High Speed LANs Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs CS420/520 Axel Krings Page 2 1 Why High Speed LANs? Office
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationKIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B
KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:
More informationCS343: Data Communication LAN Overview
CS343: Data Communication LAN Overview by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Guwahati E-mail: manaskhatua@iitg.ac.in Communication Network Topology Topology refers to the way in which
More informationIntroduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control
168 430 Computer Networks Chapter 16 High Speed LANs Introduction Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs Why High Speed LANs? Office LANs used to provide
More informationLAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science
1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we
More informationRaj Jain. The Ohio State University Columbus, OH
Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More information! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks
Local Area Networks A Local Area Netw ork is a communications netw ork that provides interconnection of a variety of data communicating devices w ithin a small area. Typical Characteristics! High Data
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More information1. Data Link Layer (Layer 2)
1. Data Link Layer (Layer 2) The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: Allows the upper layers to access the media
More informationDistributed Queue Dual Bus
Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.5: Ethernet Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks
More informationThe Link Layer and LANs: Ethernet and Swiches
The Link Layer and LNs: Ethernet and Swiches EECS3214 2018-03-21 Link layer, LNs: outline 6.1 introduction, services 6.2 error detection, correction 6.3 multiple access protocols 6.4 LNs addressing, RP
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationLocal Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring
Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link
More informationChapter 4. Local Area Networks. Why a Computer Network?
Chapter 4 Local Area Networks By Masud-ul-Hasan 1 Why a Computer Network? Distribute pieces of computation among computers (called nodes) Coordination between processes running on different nodes Remote
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for
More informationNETWORK SECURITY ITEC 435
NETWORK SECURITY ITEC 435 Agenda Chapter 2: Introduction to Networking Introduction to Networking Networking Fundamentals Reasons to Network Getting the Message Across Analog Information on an Analog Medium
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes
CS 421: COMPUTR NTWORKS SPRIN 2016 INL May 8, 2016 150 minutes Name: Student No: Q1 Q2 Q3 TOT 1) a) (6 pts) iven the following parameters for a datagram packet switching network: N: number of hops between
More informationLocal Area Networks (LANs) & Networks Inter-Connection Chapter 5
CT 1502 Planning and Design of Communication Networks Local Area Networks (LANs) & Networks Inter-Connection Chapter 5 Nada Al Dosary Aldosary.na@gmail.com http://ct1502.edublogs.org 1 Outlines Understanding
More informationContents. Introduction to Networking. Preface...i. Introduction... xix
Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and
More informationNT1210 Introduction to Networking. Unit 5:
NT1210 Introduction to Networking Unit 5: Chapter 5, Ethernet LANs 1 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components
More information10- and 100-Mbps Ethernet
Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use
More informationIT 2004 Data Communication & Networking
IT 2004 Data Communication & Networking Week 4 Network Topology, Architecture & Access Methods P.G.R Nayomi Gamlath MSc(Pdn), BSc (Rajarata) ATI -Kurunegala Why networks? To share resources (such as printer,
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationComputer Networks Robin Sharp Informatics and Mathematical Modelling Technical University of Denmark Phone: (+45)
Computer Networks Robin Sharp Informatics and Mathematical Modelling Technical University of Denmark Phone: (+45) 4525 3749 e-mail: robin@imm.dtu.dk Basic Network Concepts A computer network is a set of
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control
More informationObjectives. Learn how computers are connected. Become familiar with different types of transmission media
Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationTCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming
2 TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming Network Technologies 3 4 Elements of the Network Sender
More informationComputer Networks and Internet
Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data
More informationLecture 05 Chapter 16 High Speed LANs
NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education
More informationChapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security
Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationThe Medium Access Sublayer
The Medium Access Sublayer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU), K. Vastola (RPI) Overview Multiple Access: Aloha,
More informationLink layer, LANs: outline. Chapter 5-2 Link Layer. MAC addresses (more) MAC addresses
Chapter 5-2 Link Layer Computer Networking: Top Down pproach 6 th edition Jim Kurose, Keith Ross ddison-wesley March 2012 Link layer, LNs: outline 5.1 introduction, services 5.2 error detection, correction
More informationIntroduction to Networks
Introduction to Networks Lecture Topics History and motivation Network architecture Layered models Definitions and abstractions OSI Reference Model Network design issues Definitions Components Message,
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationBroadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses
roadcast Links, ddressing and Media ccess Control Message M C Message M Link Layer In a broadcast, there are two additional issues that must be resolved How do the nodes agree on who gets to use the next?
More informationLAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic
1 LAN Protocols Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8 CSE 3213, Fall 2015 Instructor: N. Vlajic What is LAN? 2 Local Area Network (LAN) properties private ownership freedom to choose/change/upgrade
More information