Guide to Networking Essentials Fifth Edition. Chapter 7 Network Architectures

Size: px
Start display at page:

Download "Guide to Networking Essentials Fifth Edition. Chapter 7 Network Architectures"

Transcription

1 Guide to Networking Essentials Fifth Edition Chapter 7 Network Architectures

2 Objectives Compare and contrast media access methods used in network architectures Describe the operation of Ethernet Differentiate between Ethernet standards and speeds Explain the four Ethernet frame types and how they are used Guide to Networking Essentials, Fifth Edition 2

3 Objectives (continued) Describe the token ring architecture and its components Describe the AppleTalk network architecture Explain the function of Fiber Distributed Data Interface Describe other LAN and WAN architectures and their role in today s networks Guide to Networking Essentials, Fifth Edition 3

4 Putting Data on the Cable: Access Methods Given that network architectures communicate in a number of different ways, some factors in network communications must be considered How computers put data on the cable How they ensure that the data reaches its destination undamaged Guide to Networking Essentials, Fifth Edition 4

5 Function of Access Methods How computers share the network medium must be defined A collision results from two or more devices trying to use the channel (medium) at the same time Splitting data in small chunks helps prevent collisions Channel access methods specify when computers can access the cable/medium/data channel Ensure that data reaches destination by preventing computers from sending messages that might collide Every computer on a network must use the same access method Guide to Networking Essentials, Fifth Edition 5

6 Major Access Methods Channel access is handled at the MAC sublayer of the Data Link layer in the OSI model Five major types of channel access Contention Switching Token passing Demand priority Polling Guide to Networking Essentials, Fifth Edition 6

7 Contention In early networks based on contention, computers sent data whenever they had data to send As networks grow, outgoing messages collide more frequently, must be sent again, and then collide again To organize contention-based networks, two carrier access methods were created CSMA/CD CSMA/CA Guide to Networking Essentials, Fifth Edition 7

8 Switching Switching: nodes are interconnected through a a switch, which controls access to the media Contention occurs only when multiple senders ask to reach the same receiver simultaneously or when the simultaneous transmission requests exceed the switch s capability to handle multiple connections Advantages: fairer, centralized management (enables QoS), switch can have connection ports that operate at different speeds Disadvantage: higher cost Guide to Networking Essentials, Fifth Edition 8

9 Token Passing Guide to Networking Essentials, Fifth Edition 9

10 Token Passing Illustrations Guide to Networking Essentials, Fifth Edition 10

11 More Token Passing Illustrations Guide to Networking Essentials, Fifth Edition 11

12 Demand Priority Demand priority: channel access method used solely by the 100VG-AnyLAN 100 Mbps Ethernet standard (IEEE ) 100VG-AnyLAN runs on a star bus topology Intelligent hubs control access to the network Hub searches all connections in a round-robin fashion When an end node has data to send, it transmits a demand signal to the hub The hub then sends an acknowledgement that the computer can start transmitting its data The major disadvantage of demand priority is price Guide to Networking Essentials, Fifth Edition 12

13 Demand Priority Illustration Graphic from Hub receives two frames to transmit (to the next hub) Higher-priority frame is sent first Guide to Networking Essentials, Fifth Edition 13

14 Polling Guide to Networking Essentials, Fifth Edition 14

15 Choosing an Access Method Guide to Networking Essentials, Fifth Edition 15

16 Choosing an Access Method (continued) Guide to Networking Essentials, Fifth Edition 16

17 The Ethernet Architecture 1960s 1970s: many organizations worked on methods to connect computers and share data ALOHA network at the University of Hawaii 1972: Metcalfe and Boggs develop an early version 1975: 1st commercial version (3 Mbps, up to 100 computers, max. 1 km of total cable) DIX developed standard based on Xerox s Ethernet (10 Mbps) 1990: IEEE defined the specification Defines how Ethernet networks operate at layers 1-2 Guide to Networking Essentials, Fifth Edition 17

18 Overview of Ethernet Ethernet is the most popular network architecture Advantages: easy to install, scalable, broad media support, and low cost Supported transmission speeds: 10 Mbps to 10 Gbps Uses the NIC s MAC address to address frames Ethernet variations are compatible with one another Basic operation and frame formatting is the same Cabling, speed of transmission, and method by which bits are encoded on the medium differ Guide to Networking Essentials, Fifth Edition 18

19 Ethernet Operation Ethernet is a best-effort delivery system It works at the Data Link layer of the OSI model Relies on the upper-layer protocols to ensure reliable delivery of data Understanding the following concepts is important: How Ethernet accesses network media Collisions and collision domains How Ethernet handles errors Half-duplex and full-duplex communications Guide to Networking Essentials, Fifth Edition 19

20 Accessing Network Media Ethernet uses CSMA/CD in a shared-media environment (a logical bus) Ethernet device listens for a signal or carrier (carrier sense) on the medium first If no signal is present, no other device is using the medium, so a frame can be sent Ethernet devices have circuitry that detects collisions and automatically resends the frame that was involved in the collision Guide to Networking Essentials, Fifth Edition 20

21 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Guide to Networking Essentials, Fifth Edition 21

22 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) CSMA: This is the "Carrier-Sense Multiple Access" part Listen for prior transmission if none, go ahead and transmit if medium in use, "back off" and try again later worst case: two hosts listen at the same time; neither hears anything; both begin to transmit at the same time CD This is the "Collision Detection" part Listen to your own transmission if interference is detected, "back off" and try again later "Exponential Backoff": If a host backs off more than once (e.g. repeated collisions), wait up to twice as long after each time Guide to Networking Essentials, Fifth Edition 22

23 In this screen capture, transmissions from node 1 and node 4 have just collided. Node 3 is about to detect the collision Nodes 2 and 4 will detect it next The Senders, nodes 1 and 5, will be the last to notice Source: thernet/index.html CSMA/CD simulation Guide to Networking Essentials, Fifth Edition 23

24 Collisions and Collision Domains Guide to Networking Essentials, Fifth Edition 24

25 Ethernet Error Handling Collisions are the only type of error for which Ethernet automatically attempts to resend the data Errors can occur when data is altered in medium Usually caused by noise or faulty media connections When the destination computer receives a frame, the CRC is recalculated and compared against the CRC value in the FCS If values match, the data is assumed to be okay If values don t match, the data was corrupted Destination computer discards the frame No notice is given to the sender Guide to Networking Essentials, Fifth Edition 25

26 Half-Duplex Versus Full-Duplex Communications When half-duplex communication is used with Ethernet, CSMA/CD must also be used When using a switched topology, a computer can send and receive data simultaneously (full-duplex communication) The collision detection circuitry is turned off because collisions aren t possible Results in a considerable performance advantage Guide to Networking Essentials, Fifth Edition 26

27 Ethernet Standards Each Ethernet variation is associated with an IEEE standard The following sections discuss many of the standards, some of which are obsolete or had limited use Keep in mind that Ethernet over UTP cabling has been the dominant technology since the early 1990s, and will likely to continue to be for the foreseeable future Guide to Networking Essentials, Fifth Edition 27

28 IEEE 802 Elements From the online document standards.ieee.org/getieee802/download/ pdf Guide to Networking Essentials, Fifth Edition 28

29 Ethernet and IEEE milestones 1970 ALOHAnet (Norm Abramson, UHawaii) 1973 Ethernet (Metcalfe, Xerox PARC) 1982 Ethernet II (DEC/Intel/Xerox) Base a 10Base i 10Base-T u 100Base-TX, -T4, -FX (Fast Ethernet) z 1000Base-X (optical fiber) (GigE) ab 1000Base-T ae 10Gbps over optical fiber (10GigE) an 10GBase-T 2010? 802.3ba 40 Gbps, 100 Gbps Guide to Networking Essentials, Fifth Edition 29

30 (an Intel Marketing image) Guide to Networking Essentials, Fifth Edition 30

31 10 Mbps IEEE Standards Four major implementations of 10 Mbps Ethernet 10Base5: Ethernet using thicknet coaxial cable 10Base2: Ethernet using thinnet coaxial cable 10BaseT: Ethernet over UTP cable 10BaseF: Ethernet over fiber-optic cable Of these 10 Mbps standards, only 10BaseT and 10BaseF are seen today "legacy" installations that aren't worth upgrading 10Base2 and 10Base5 are essentially obsolete Guide to Networking Essentials, Fifth Edition 31

32 10Base-T, 10Base-F Guide to Networking Essentials, Fifth Edition 32

33 100 Mbps IEEE Standards The most widely accepted Ethernet standard today is 100BaseT, which is also called fast Ethernet The current IEEE standard for 100BaseT is 802.3u Subcategories: 100BaseTX: Two-pair Category 5 or higher UTP 100BaseT4: Four-pair Category 3 or higher UTP 100BaseFX: Two-strand fiber-optic cable Because of its widespread use, the cable and equipment in fast Ethernet are inexpensive Architecture of choice for all but heavily used servers and multimedia applications Guide to Networking Essentials, Fifth Edition 33

34 100BaseTX 100BaseTX is the standard that s usually in mind when discussing 100 Mbps Ethernet Requires two of the four pairs bundled in a Category 5 twisted-pair cable Although three cable types are available for 100BaseT, 100BaseTX is the most widely accepted Generally called fast Ethernet Guide to Networking Essentials, Fifth Edition 34

35 100BaseT4 100BaseT4 Ethernet uses all four pairs of wires bundled in a UTP cable Advantage: capability to run over Category 3 cable One of the biggest expenses of building a network is cable installation, so many organizations with Category 3 cabling chose to get the higher speed with the existing cable plant by using 100BaseT4 instead of 100BaseTX Guide to Networking Essentials, Fifth Edition 35

36 100BaseFX 100BaseFX uses two strands of fiber-optic cable Advantages: Impervious to electrical noise and electronic eavesdropping Can span much greater distances between devices Disadvantage: far more expensive than twisted-pair Rarely used as a complete 100BaseTX replacement Used as backbone cabling between hubs or switches and to connect wiring closets between floors or buildings Connect client or server computers to the network when immunity to noise and eavesdropping is required Guide to Networking Essentials, Fifth Edition 36

37 100BaseT Design Considerations Guide to Networking Essentials, Fifth Edition 37

38 100BaseT Design Considerations (continued) Guide to Networking Essentials, Fifth Edition 38

39 Gigabit Ethernet: IEEE 802.3ab and 802.3z Standards 802.3z BaseX specifications, including LX and SX (laser/fiber-optic), and CX (copper jumper cables) 802.3ab BaseT specifications, which require four pairs of 100 ohm Category 5 or higher cable Guide to Networking Essentials, Fifth Edition 39

40 10 Gigabit Ethernet IEEE 802.3ae 10Gbps over fiber-optic cable Defined to run only on fiber-optic cabling, both SMF and MMF, on a maximum distance of 40 km Provides bandwidth that can transform how WAN speeds are thought of IEEE802.an 10Gbps over twisted-pair wiring Runs in full-duplex mode only CSMA/CD is not necessary Primary use: as network backbone Also useful in storage area networks (SANs) Good for enterprise-level servers Guide to Networking Essentials, Fifth Edition 40

41 IEEE 802.3ae fiber-optic variants Standards 10GBASE-SR: Runs over short lengths (between 26 and 82 meters) over MMF For high-speed servers, SANs, etc. 10GBASE-LR: Runs up to 10 km on SMF For campus backbones and MANs 10GBASE-ER: Runs up to 40 km over SMF Primary applications are for MANs 10GBASE-SW: Uses MMF for distances up to 300 m 10GBASE-LW: Uses SMF for distances up to 10 km 10GBASE-EW: Uses SMF for distances up to 40 km Guide to Networking Essentials, Fifth Edition 41

42 What s Next for Ethernet? Implementations of 40 Gbps Ethernet are underway Ethernet could increase tenfold every 4-6 years 100 Gbps Ethernet available by 2006 to 2008, terabit Ethernet by 2011, and 10 terabit Ethernet by 2015 In October 2005, Lucent Technologies demonstrated for the first time the transmission of Ethernet over fiber-optic cable at 100 Gbps transfer data across the city faster than today s CPUs can transfer data to memory major implications for entertainment industry, many other areas Ethernet is increasingly applied to situations other than LANs PoE Power over Ethernet, provides power to remote devices EPON Ethernet Passive Optical Networks for multi-channel, long-distance communications etc. Guide to Networking Essentials, Fifth Edition 42

43 Comparing the Ethernets The differing speeds and cabling considerations refer to the physical (PHY) layer viz. the NIC hardware The variants share a common Media Access Control (MAC) sublayer format This common format makes Ethernet appealing to network administrators Minor format variations (Ethernet II versus 802.3/802.2) can co-exist "on the wire" The Wireshark packet sniffer sees the MAC frame. It doesn't see the physical details. Guide to Networking Essentials, Fifth Edition 43

44 Early compatibility issues: Ethernet Frame Types "Ethernet II" used by TCP/IP "Ethernet 802.3" (a.k.a. "802.3 raw") used by IPX/SPX on Novell NetWare 2.x and 3.x networks "Ethernet 802.2" used by IPX/SPX on Novell NetWare 3.12 and 4.x networks Supported by default in Microsoft NWLink "Ethernet SNAP" used in EtherTalk and mainframes Frame types are distinguished by their headers All frame types support a frame size between 64 and 1518 bytes, and can be used by all network architectures mentioned previously Guide to Networking Essentials, Fifth Edition 44

45 Ethernet II versus headers Ethernet II and frames are very similar Ethernet II Preamble is identical to Preamble + Start-Frame-Delimiter Type / Length values differentiate Values <= 1500 must be lengths Values > 1500 must be Ethernet II types Guide to Networking Essentials, Fifth Edition 45

46 802.3 and Headers IEEE standards divide the OSI "Datalink" layer into the "Logical Link Control" sublayer and the "Media Access Control sublayer standards specify MAC headers for a frame standards specify LLC headers that go within a MAC frame Guide to Networking Essentials, Fifth Edition 46

47 "Ethernet 802.2" frames Ethernet frames comply completely with the Ethernet standard The IEEE group didn t address Ethernet, only the LLC sublayer of the OSI model s layer 2 Since Novell had already decided to use the term Ethernet to describe Ethernet "raw", it s generally accepted that Ethernet means a fully and compliant Ethernet frame Ethernet frames contain an LLC header, with three LLC fields, inside an frame Each field is one byte long, so the maximum payload is reduced from 1500 bytes to 1497 bytes Guide to Networking Essentials, Fifth Edition 47

48 Ethernet SNAP Ethernet SubNetwork Address Protocol (SNAP) is generally used on the AppleTalk Phase 2 It contains enhancements to the frame, including a protocol type field, which indicates the network protocol used in the frame s data section Guide to Networking Essentials, Fifth Edition 48

49 Distinguishing Between Frame Types 1. Receive good frame. 2. Analyze frame. Perform the following steps, in order: 1. If the EtherType/Length value is greater than 0x05DC (decimal 1500), then process the frame as Ethernet II. Otherwise, it's an length. Ethernet II "EtherType" values are greater than 0x05DC Examples: 0x0800 for IP, 0x8137 for NetWare IPX/SPX 2. If the Length field is followed by an IPX header (0xFFFF), interpret the frame as "802.3 raw" carrying Netware IPX/SPX traffic. Standard SSAP and DSAP values do not include hexadecimal FF, so the (Raw) frame can be distinguished from LLC frames (Ethernet SNAP, 802.2). 3. Otherwise, if the DSAP and SSAP values are 0xAA, the frame is interpreted as a SNAP frame. 4. Any other DSAP/SSAP combination is interpreted as a frame. Guide to Networking Essentials, Fifth Edition 49

50 Wireless LANs Radio transmitters cannot transmit and receive on the same channel/frequency simultaneously Cellphones use two channels to provide simultaneous talk/listen functionality CSMA Carrier-Sense Multiple Access is still possible, and necessary CD Collision Detection is not possible CA Collision Avoidance is used instead Range is variable, depending on local environment Privacy is much harder to provide Guide to Networking Essentials, Fifth Edition 50

51 IEEE milestones IEEE defines a MAC sublayer similar to frames carry LLC payloads Increasing performance for , just like for Mbps, 2 Mbps; 2.4GHz b 5.5 Mbps, 11 Mbps; 2.4GHz a 54 Mbps; 5GHz g 54 Mbps; 2.4 GHz; compatible w/ b 2010? n MIMO; 2.4GHz & 5GHz; compatible w/ a/b/g; up to 600Mbps? Guide to Networking Essentials, Fifth Edition 51

52 Wireless Ethernet: IEEE Ad-hoc mode allows nodes to communicate directly with each other true bus topology not commonly used Managed mode employs an access point (AP) as the center of a star topology network No fixed segment length Maximum of 300 feet without obstructions Can be extended with large, high-quality antennas Stations can t send and receive at the same time CSMA/CA is used instead of CSMA/CD b/a/g use handshaking before transmission Station sends AP an RTS and it responds with CTS Standards define a maximum transmission rate, but speeds might be dropped to increase reliability Guide to Networking Essentials, Fifth Edition 52

53 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Wireless (Radio) systems cannot detect collisions theoretical problems practical (cost) concerns Transmission-and-Acknowledgement is the basic solution "Collision tolerance"? Nodes that detect transmissions in progress must wait a fixed amount of time before attempting their own transmissions Allow for the acknowledgement to be sent Optional features improve performance RTS/CTS Guide to Networking Essentials, Fifth Edition 53

54 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Used in wireless LANs Sending hosts signal intent to transmit with RTS ("Ready To Send") frame RTS declares length (time duration) of transmission Access point (if any) acknowledges with CTS ("Clear To Send") frame that also declares the duration Other hosts wait until transmission has finished Time duration, in the RTS/CTS frames, tells other hosts how long to wait The overhead created by these additional intentto-transmit frames reduces network throughput significantly Guide to Networking Essentials, Fifth Edition 54

55 CSMA/CA: 3 Terminals In this network, the WAP can hear all three hosts; each host can hear the WAP and the other hosts Hosts with data will send RTS "Ready-To-Send" frames Any host hearing an RTS must wait until it's done the "CSMA" part RTS's may still collide, in effect nullifying each one WAP will acknowledge one RTS with a CTS "Clear-To-Send" frame Other hosts must wait as long as specified in the CTS before trying another RTS the "CA" part Guide to Networking Essentials, Fifth Edition 55

56 CSMA/CA Busy Network 1. Sta1, Sta2, Sta3 all try at the same time 2. Sta1 waits little time, sends another RTS 3. WAP sends CTS to Sta1 4. Once Sta1 is finished, WAP sends an ACK; then Sta2 and Sta3 send more RTS's 5. Sta2, Sta3 back off 6. WAP sends CTS for Sta2's 3 rd RTS 7. Sta2 finishes, receives an ACK; Sta3 sends another RTS 8. WAP sends a CTS to Sta3; Sta3 begins transmitting Guide to Networking Essentials, Fifth Edition 56

57 CSMA/CA: Hidden Terminals In this network, the WAP can hear all three hosts (and the hosts can hear the WAP), but none of them can hear each other The hosts are "hidden" from each other Hosts can send RTS's, but cannot tell whether any other host is sending also Only the WAP detects any RTS collisions WAP will broadcast a CTS that all hosts hear Hosts must wait as long as specified in the CTS, even though they can't hear the sending host's transmission Guide to Networking Essentials, Fifth Edition 57

58 CSMA/CA Hidden Terminals 1. Sta1, Sta2 send overlapping RTS's 2. Neither hears a response, so they "countdown" 3. Each sends another overlapping RTS 4. No response, so countdown 5. Sta1 sends an RTS first, WAP sends a CTS, so Sta2 keeps waiting 6. Sta1 receives an ACK; Sta2 resumes and finishes its countdown before sending another RTS Guide to Networking Essentials, Fifth Edition 58

59 Multiple-In, Multiple- Out transmission Multiple antennas for transmission and reception take advantage of reflected signals Better throughput and range for given power levels Part of the n standard for wireless networks MIMO Guide to Networking Essentials, Fifth Edition 59

60 The Token Ring Architecture Guide to Networking Essentials, Fifth Edition 60

61 Token Ring Function A token passes around the ring If an in use token is received from NAUN, and the computer has data to send, it attaches its data to the token and sends it to its NADN If received token is in use, NIC verifies if it is the destination station If not, the computer re-creates the token and the data exactly and sends them to its NADN If it is, data is sent to the upper-layer protocols Two bits in data packet are toggled and token is sent to NADN; when original sender receives it, it frees the token and then passes it along Guide to Networking Essentials, Fifth Edition 61

62 Beaconing Guide to Networking Essentials, Fifth Edition 62

63 Hardware Components A hub can be a multistation access unit (MSAU) or smart multistation access unit (SMAU) IBM s token ring implementation is the most popular adaptation of the IEEE standard Minor variations but very similar to IEEE specs IBM equipment is most often used 8228 MSAU has 10 connection ports, eight of which can be used for connecting computers The RO port on one hub connects to RI port on the next hub, and so on, to form a ring among the hubs IBM allows connecting 33 hubs Guide to Networking Essentials, Fifth Edition 63

64 Cabling in a Token Ring Environment Guide to Networking Essentials, Fifth Edition 64

65 The Token Ring Architecture (summary) Guide to Networking Essentials, Fifth Edition 65

66 The AppleTalk Environment Designed for use in Macintosh networks (1983) Can be run over several physical architectures; commonly run over Ethernet (EtherTalk) Easy to implement Dynamic scheme used to determine device s address AppleTalk Phase 1 supported only 32 computers per network, and only with LocalTalk cabling With hubs/repeaters, increased the number to 254 AppleTalk Phase 2, EtherTalk, and TokenTalk (1989) allow more than 16 million computers Guide to Networking Essentials, Fifth Edition 66

67 LocalTalk LocalTalk uses STP in a bus topology to allow users to share peripherals and data in a small home or office environment CSMA/CA channel access method Avoids more collisions, but cumbersome Maximum transmission speed of Kbps Thus, this architecture was used primarily in small, Macintosh-only environments Guide to Networking Essentials, Fifth Edition 67

68 EtherTalk and TokenTalk EtherTalk is the AppleTalk protocol running over a 10 Mbps IEEE Ethernet network TokenTalk is the AppleTalk protocol running over a 4 or 16 Mbps IEEE token ring network Both implementations require using a different NIC Since 1996, Apple Computer has offered systems with built-in Ethernet NICs or with options to add Ethernet or token ring to its systems at a low cost Mac OS X with an Ethernet interface can freely participate in a Windows-based network Guide to Networking Essentials, Fifth Edition 68

69 The Fiber Distributed Data Interface (FDDI) Architecture Guide to Networking Essentials, Fifth Edition 69

70 The Fiber Distributed Data Interface (FDDI) Architecture (continued) Guide to Networking Essentials, Fifth Edition 70

71 Networking Alternatives Many other network architectures are available Some are good for specialized applications, and others are emerging as new standards Topics Broadband technologies (cable modem and DSL) Broadcast technologies ATM ATM and SONET Signaling Rates High Performance Parallel Interface (HIPPI) Guide to Networking Essentials, Fifth Edition 71

72 Broadband Technologies Baseband systems use a digital encoding scheme at a single fixed frequency Broadband systems use analog techniques to encode information across a continuous range of values Signals move across the medium in the form of continuous electromagnetic or optical waves Data flows one way only, so two channels are necessary for computers to send and receive data E.g., cable TV Guide to Networking Essentials, Fifth Edition 72

73 Cable Modem Technology Guide to Networking Essentials, Fifth Edition 73

74 Digital Subscriber Line (DSL) Competes with cable modem for Internet access Broadband technology that uses existing phone lines to carry voice and data simultaneously Most prominent variation for home Internet access is Asymmetric DSL (ADSL) Splits phone line in two ranges: Frequencies below 4 KHz are used for voice transmission, and frequencies above 4 KHz are used to transmit data Typical connection speeds for downloading data range from 256 Kbps to 8 Mbps; upload speeds are in the range of 16 Kbps to 640 Kbps Guide to Networking Essentials, Fifth Edition 74

75 Broadcast Technologies By definition: one-way transmissions This changed in Internet access by satellite television systems Work on the principle that most traffic a user generates is to receive files, text, and graphics The average user s computer sends very little traffic User connects to service provider through a modem Service provider sends data by satellite to the user s home at speeds up to 400 Kbps E.g., service offered by DirectTV, through its DirectPC add-on products Guide to Networking Essentials, Fifth Edition 75

76 Asynchronous Transfer Mode (ATM) High-speed network technology for LANs and WANs Connection-oriented switches Dedicated circuits are set up before communicating Data travels in fixed-size 53-byte cells (5 byteheader) Enables ATM to work at extremely high speeds Quick switching Predictable traffic flow Enables ATM to guarantee QoS Used quite heavily for the backbone and infrastructure in large communications companies LAN emulation (LANE) required for LAN applications Guide to Networking Essentials, Fifth Edition 76

77 ATM and SONET Signaling Rates Guide to Networking Essentials, Fifth Edition 77

78 High Performance Parallel Interface (HIPPI) HIPPI (late 1980s): high-speed interface developed for supercomputers and high-end workstations Serial HIPPI is a fiber-optic version that uses pointto-point optical links for bandwidth up to 800 Mbps In early 1990s, it was used as a network backbone and for interconnecting supercomputers With the advent of Gigabit Ethernet, interest in HIPPI as a LAN backbone decreased HIPPI-6400 (1998): up to 6.4 Gbps transfer rates Known as Gigabyte System Network (GSN) HIPPI and GSN are now exotic networking products and aren t often found in typical corporate networks Guide to Networking Essentials, Fifth Edition 78

79 Summary Cable access methods determine how a network architecture gains access to the network medium A network architecture defines how data is placed, transmitted, and at what speed, and how problems in the network are handled DIX introduced Ethernet, which later became the IEEE standard, transmitting data at 10 Mbps Standards for 10Mbps, 100Mbps, 1000Mbps (Gigabit), and 10G indicate the supported network mediums 10 Gigabit Ethernet runs only over fiber-optic cable and only in full-duplex mode Guide to Networking Essentials, Fifth Edition 79

80 Summary (continued) Token ring networks are reliable, fast, and efficient Capable of transmitting at 4 Mbps or 16 Mbps Macintosh computers use AppleTalk to communicate FDDI is an extremely reliable, fast network architecture that uses dual counter-rotating rings Cable modem technology delivers high-speed Internet access to homes and businesses ATM, a high-speed network technology designed both for LANs and WANs, uses connectionoriented switches Guide to Networking Essentials, Fifth Edition 80

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol

More information

10- and 100-Mbps Ethernet

10- and 100-Mbps Ethernet Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use

More information

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr. Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science 1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we

More information

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model Network basics Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model Topic A Topic A: Network concepts Topic B: Network architectures

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x Computer Networks Lecture 8 Local Area Network, IEEE 802.x Local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school,

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are

More information

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed

More information

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant

More information

Chapter 10: Local Area Networks

Chapter 10: Local Area Networks Chapter 10: Local Area Networks MULTIPLE CHOICE 1. CSMA stands for: a. Client-Server Multi-Access c. Carrier Server Master Application b. Carrier Sense Multiple Access d. none of the above 2. The CD in

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Media and Access Method. Tory Klementsen, MCP A+ Sno Isle Skill Center Network+ Module 2

Media and Access Method. Tory Klementsen, MCP A+ Sno Isle Skill Center Network+ Module 2 Media and Access Method Tory Klementsen, MCP A+ Sno Isle Skill Center Network+ Module 2 Transmission Media The stuff that carries signals from computer to computer or device on a network. Different media

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Local Area Networks. Ethernet LAN

Local Area Networks. Ethernet LAN Local Area Networks Ethernet 802.3 LAN -7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN -7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

Chapter 4: Network Access

Chapter 4: Network Access 4.0.1.1 Chapter 4: Network Access To support our communication, the OSI model divides the functions of a data network into layers. Each layer works with the layers above and below to transmit data. 4.0.1.2

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

NT1210 Introduction to Networking. Unit 5:

NT1210 Introduction to Networking. Unit 5: NT1210 Introduction to Networking Unit 5: Chapter 5, Ethernet LANs 1 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of

More information

Lecture 6: Example LAN: Ethernet

Lecture 6: Example LAN: Ethernet Lecture 6: Example LAN: Ethernet Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Network Types Local Area Networks (LANs):privately-owned networks

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one

More information

Chapter 8 LAN Topologies

Chapter 8 LAN Topologies Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the

More information

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial

More information

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1 Introduction to LAN Topologies Cabling 2000, Cisco Systems, Inc. 3-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Media / Cabling Local Area Network Cabling

More information

Ethernet. Computer Networks. Lecture 4.

Ethernet. Computer Networks. Lecture 4. Ethernet Computer Networks Lecture 4 http://goo.gl/pze5o8 The History of Ethernet Originally: DIX Ethernet (DEC-Intel-Xerox, Ethernet II) - 10Mbps. No LLC sublayer Later standardized as: IEEE 802.3 Frame

More information

Contents. Introduction to Networking. Preface...i. Introduction... xix

Contents. Introduction to Networking. Preface...i. Introduction... xix Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and

More information

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1 Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing

More information

10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless

10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless TRANSMISSION MEDIA LOCAL AREA NETWORK (LAN) TECHNOLOGY 10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless page - 2 LAN TECHNOLOGY Protocol What is a Protocol? A protocol is

More information

CHAPTER -1. Introduction to Computer Networks

CHAPTER -1. Introduction to Computer Networks CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a

More information

Lecture 05 Chapter 16 High Speed LANs

Lecture 05 Chapter 16 High Speed LANs NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education

More information

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan Campus etwork Design Thana Hongsuwan Ethernet Standard 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMS v2.0 1-2 OSI Model Ethernet address Six bytes

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved. Unit 10 Networks Copyright 2005 Heathkit Company, Inc. All rights reserved. The basic components of a network: Connections (Physical Medium) Protocols (Common language) Services (Clients, Servers, and

More information

The following pages contain a guide for the installation

The following pages contain a guide for the installation INDEX The goal of this section is to illustrate how Siemon Company products can be used to support some of the most popular and emerging networks on the market. Section Contents 100Base-T....................................

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee Typical LAN Features for Physical layer Typical LAN Features for Data link layer Standards Overview 10BASE2 and 10BASE5 10BASE T

More information

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Typical LAN Features for Physical layer Typical LAN Features for Data

More information

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2 High Speed LANs CS420/520 Axel Krings Page 1 High Speed LANs Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs CS420/520 Axel Krings Page 2 1 Why High Speed LANs? Office

More information

Lecture (04 & 05) Data link layer fundamental

Lecture (04 & 05) Data link layer fundamental Lecture (04 & 05) Data link layer fundamental Dr. Ahmed M. ElShafee ١ Agenda Foundation Topics Typical LAN Features for OSI Layer 1 Typical LAN Features for OSI Layer 2 Standards Overview 10BASE2 and 10BASE5

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Computer Networks. Medium Access Sublayer (Part I)

Computer Networks. Medium Access Sublayer (Part I) Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,

More information

Ethernet Technologies

Ethernet Technologies Ethernet Technologies CCNA 1 v3 Module 7 NESCOT CATC 1 10 Mbps Ethernet Legacy Ethernet means: 10BASE5 10BASE2 10BASE-T Common features are: frame format timing parameters transmission process basic design

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control 168 430 Computer Networks Chapter 16 High Speed LANs Introduction Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs Why High Speed LANs? Office LANs used to provide

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling A+ Guide to Managing & Maintaining Your PC, Chapter 16 Networking Types, Devices, and Cabling Objectives Learn about network types and topologies Learn about the hardware used to build local networks Learn

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

end systems, access networks, links circuit switching, packet switching, network structure

end systems, access networks, links circuit switching, packet switching, network structure Introduction Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and

More information

Internet Architecture and Protocol

Internet Architecture and Protocol Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services

More information

Introduction to Networking Devices

Introduction to Networking Devices Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. The number of nodes on a network and the length of cable used influence the quality of communication on the network. 2. Repeaters and

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Modern Ethernet variations. based on Chapter 5 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Modern Ethernet variations. based on Chapter 5 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Modern Ethernet variations based on Chapter 5 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers recap: obsolete versions of Ethernet Coaxial cable physical bus topology 10Base5 (standard IEEE 802.3,

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Chapter 9 Ethernet Part 1

Chapter 9 Ethernet Part 1 Chapter 9 Ethernet Part 1 Introduction to Ethernet Ethernet Local Area Networks (LANs) LAN (Local Area Network) - A computer network connected through a wired or wireless medium by networking devices (s,

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Raj Jain. The Ohio State University Columbus, OH

Raj Jain. The Ohio State University Columbus, OH Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

The Internet software layers

The Internet software layers 1 2 The Internet software layers SMTP, Telnet, FTP, POP3, IMAP TCP, UDP IP: RIP, BGP, OSPF Ethernet, Wireless LAN, Token Ring Twisted pair, coaxial, microwave, optical fiber 3 4 Ethernet 1973 Xerox s researcher

More information

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of

More information

Chapter One: Networking Fundamentals Computer Networks

Chapter One: Networking Fundamentals Computer Networks 1.1 Bandwidth Bandwidth is defined as the amount of information that can flow through a network connection in a given period of time. It is important to understand the concept of bandwidth for the following

More information

CS 3201 Computer Networks 2014/2015 Handout: Lab 3

CS 3201 Computer Networks 2014/2015 Handout: Lab 3 Lab Content: - Network Devices - Ethernet Network - MAC Address Network Devices: - Hubs, MAU s, and Repeaters Hubs Hubs are one of the most important components of a network because they act as a central

More information