Internet Architecture and Protocol

Size: px
Start display at page:

Download "Internet Architecture and Protocol"

Transcription

1 Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi

2 Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport Host-to-Host TCP, UDP Network Internet IP, ICMP Data Link Physical Network Access LAN Ethernet, Token-Ring, FDDI, Fast Ethernet...

3 LAN (Local Area Networks) A LAN is a computer network that covers a small area (home, office, building, campus) a few kilometers LANs have higher data rates (Mbps to Gbps) as compared to WANs LANs (usually) do not involve leased lines; cabling and equipments belong to the LAN owner. A LAN consists of Shared transmission medium now so valid today due to switched LANs (for wired LANs), but still valid for wireless LANs regulations for orderly access to the medium set of hardware and software for the interfacing devices

4 IEEE 802 Subgroups and their Responsibilities Internetworking Logical Link Control (LLC) CSMA/CD Token Bus LAN

5 IEEE 802 Subgroups and their Responsibilities (Cont.) Token Ring LAN Metropolitan Area Network Broadband Technical Advisory Group Fiber-Optic Technical Advisory Group

6 IEEE 802 Subgroups and their Responsibilities (Cont.) Integrated Voice/Data Networks Network Security Wireless Networks Demand Priority Access LANs

7 Ethernet Protocol Standards 10 Mbps IEEE Mbps IEEE 802.3u 1 Gbps IEEE 802.3ab 10 Gbps IEEE 802.3ae

8 LAN Protocol Architecture Corresponds to lower two layers of OSI model Current LANs are most likely to be based on Ethernet protocols developed by IEEE 802 committee IEEE 802 reference model Logical link control (LLC) Media access control (MAC) Physical

9 IEEE 802 Protocol Layers vs. OSI Model

10 IEEE 802 Layers - Physical Signal encoding/decoding Preamble generation/removal for synchronization Bit transmission/reception Specification for topology and transmission medium

11 802 Layers OSI layer 2 (Data Link) is divided into two in IEEE 802 Logical Link Control (LLC) layer Medium Access Control (MAC) layer LLC layer Interface to higher levels flow control Based on Data Link Control Protocols MAC layer Prepare data for transmission Error detection Address recognition Govern access to transmission medium

12 LAN Protocols in Context

13 Generic MAC & LLC Format Actual format differs from protocol to protocol MAC layer receives data from LLC layer MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames

14 LAN Topologies Bus Ring Star

15 Bus Topology - 1 Stations attach to linear medium (bus) Via a tap - allows for transmission and reception Transmission propagates in medium in both directions Received by all other stations Not addressed stations ignore Need to identify target station Each station has unique address Destination address included in frame header Terminator absorbs frames at the end of medium

16 Bus Topology - 2 Need to regulate transmission To avoid collisions If two stations attempt to transmit at same time, signals will overlap and become garbage To avoid continuous transmission from a single station. If one station transmits continuously, access is blocked for others Solution: Transmit Data in small blocks frames

17 Ring Topology Repeaters joined by pointto-point links in closed loop Links are unidirectional Receive data on one link and retransmit on another Stations attach to repeaters Data transmitted in frames Frame passes all stations in a circular manner Destination recognizes address and copies frame Frame circulates back to source where it is removed Medium access control is needed to determine when station can insert frame

18 Frame Transmission Ring LAN

19 Star Topology Each station connected directly to central node using a full-duplex (bi-directional) link Hub or Switch Central node can broadcast (hub) Only one station can transmit at a time; otherwise, collision occurs Central node can act as frame switch

20 Medium Access Control (MAC) Traditionally, in LANs data is broadcast there is a single medium shared by different users We need MAC sublayer for orderly and efficient use of broadcast medium This is actually a channel allocation problem Synchronous (static) solutions everyone knows when to transmit Asynchronous (dynamic) solution in response to immediate needs Two categories Round robin Contention

21 Static Channel Allocation Frequency Division Multiplexing (FDM) Channel is divided to carry different signals at different frequencies Efficient if there is a constant (one for each slot) amount of users with continous traffic Problematic if there are less or more users Even if the amount of users = # of channels, utilization is still low since typical network traffic is not uniform and some users may not have something to send all the time

22 Static Channel Allocation Time Division Multiplexing Each user is statically allocated one time slot if a particular user does not have anything to send, it remains idle and wastes the channel for that period A user may not utilize the whole channel for a time slot Thus, inefficient.

23 Dynamic Channel Allocation Categories Round robin each station has a turn to transmit declines or transmits up to a certain data limit Performs well if many stations have data to transmit for most of the time otherwise passing the turn would cause inefficiency

24 Dynamic Channel Allocation Categories Contention All stations contend to transmit No control to determine whose turn is it Stations send data by taking risk of collision (with others packets/frames) however they understand collisions by listening to the channel, so that they can retransmit In general, good for bursty traffic which is the typical traffic types for most networks Efficient under light or moderate load Performance is bad under heavy load

25 ALOHA When station has frame, it sends collisions may occur Station listens for max round trip time If no collision, fine. If collision, retransmit after a random waiting time Collison is understood by listening

26 Slotted ALOHA Divide the time into discrete intervals (slots) equal to frame transmission time need central clock (or other sync mechanism) transmission begins at slot boundary Collided frames will do so totally or will not collide Algorithm If a node has a packet to send, sends it at the beginning of the next slot If collision occurred, retransmit at the next

27 Aloha & Slotted Aloha

28 CSMA (Carrier Sense Multiple Access) First listen for clear medium (carrier sense) If medium idle, transmit If busy, continuously check the channel until it is idle and then transmit If collision occurs Wait random time and retransmit (called back-off ) Collision probability depends on the propagation delay Longer propagation delay, worse the utilization

29 Ethernet (CSMA/CD) Carriers Sense Multiple Access with Collision Detection is the underlying technology (protocol) for medium access control IEEE standard (1983) Contention technique that has basis in famous ALOHA network

30 Access Method: CSMA/CD The Ethernet architecture does not have a regulated access to the medium. Whenever multiple users have unregulated access to a single line, there is a danger of signals overlapping and destroying each other. Such overlaps, which turn the signals into unusable noise, are called collisions. As traffic increases on a multiple-access link, so do collisions.

31 Access Method: CSMA/CD The access mechanism used in an Ethernet is called carrier sense multiple access with collision detection CSMA/CD In CSMA/CD system, any workstation wishing to transmit must first listen for existing traffic on the line. A device listens by checking for a voltage. If no voltage is detected, the line is considered idle and the transmission is initiated. During the data transmission, the station checks the line for the extremely high voltages that indicate a collision.

32

33 If a collision is detected, the station quits the current transmission and waits a predetermined amount of time for the line to clear, then sends its data again. Addressing Each station on an Ethernet network has its own network interface card (NIC). The NIC usually fits inside the station and provides the station with a six-byte physical address. The number on the NIC is unique. Data Rate Ethernet LANs can support different data rates between 1 and 1000Mbps.

34 Frame Format IEEE specifies one type of frame containing seven fields:

35 Frame Format Preamble The preamble contains seven bytes (56 bits) of alternating 0s and 1s that alert the receiving system to the coming frame and enable it to synchronize its input timing. Start Frame delimiter SFD The SFD tells the receiver that everything that follows is data, starting with the addresses. Destination Addresses DA The DA field contains the physical destination address (six bytes) of the frame s next destination CRC The last field in the frame contains the error detection information, in this case CRC-32.

36 Frame Format Source Address The SA field contains the physical address ( six bytes) of the last device to forward the frame. That device can be the sending station. Length/type of Protocol Data Unit (PDU) This field contains two bytes indicating the number of bytes in the PDU. If the length of the PDU is fixed, this field can be used to indicate type, or as a base for other protocols. Protocol Data Unit PDU The PDU is generated by the upper LLC sublayer, then linked to the frame. The PDU can be anywhere from 46 to 1500 bytes long, depending on the type of frame and the length of the information field.

37 Implementation Ethernet LANs are configured as logical buses, although they may be physically implemented in bus, ring or star topologies. Each frame is transmitted to every station on the link but read only by the station to which it is addressed.

38 Categories of traditional Ethernet

39 10BASE5: Thick Ethernet 10Base5 is a bus topology LAN that uses based signaling and has a maximum segment length of 500 meters. To reduce collisions, the total length of the bus should not exceed 2500 meters (five segments). Also, the standard demands that each station be separated from each neighbor by 2.5 meters. The physical components includes coaxial cable, network interface cards, transceivers, and attachment unit interface (AUI) cables. RG-8 cable is thick coaxial cable that provides the backbone of the IEEE802.3 standard. Transceiver Each station is attached by an AUI cable to an intermediary device called a medium attachment unit (MAU) or transceiver.

40 10BASE5: Thick Ethernet The transceiver performs CSMA/CD function of checking for voltages and collisions on the line and may contain an small buffer. It also serves as the connector that attaches a station to the thick coaxial cable itself via a tap. AUI cables Each station is linked to its corresponding transceiver by an attachment unit interface (AUI), also called a transceiver cable. AUIs are restricted to a maximum length of 50 meters. Transceiver tap Each transceiver contains a connecting mechanism, called a tap because it allows the transceiver to tap into the line at any point.

41 Topology of 10BASE5

42 10BASE2:Thin Ethernet Like 10Base5, 10Base2 is a bus topology LAN. The advantages of thin Ethernet are reduced cost and ease of installation. The disadvantages are shorter range (185 meters) The NICs in a thin Ethernet system provide all the same functionality as those in a thick Ethernet, plus the functions of the transceivers. The cable required to implement the 10Base2 standard is RG-58. These cables are relatively easy to install and move.

43 Topology of 10BASE2

44 10Base-T: Twisted-Pair Ethernet A star-topology LAN using unshielded twisted pair (UTP) cable instead of coaxial cable. It supports a data rate of 10Mbps and has a maximum length (hub to station) of 100 meters. It requires a hub with a port for each station. The hub fans out any transmitted frame to all to all its connected stations.

45 Topology 10BASE-T

46 10Base-FL: Fiber Link Ethernet 10Base-FL uses a star topology to connect stations to a hub. The standard is normally implemented using an external transceiver called fiber-optic MAU. The station is connected to the external transceiver by an AUI cable. The transceiver is connected to the hub by using two pairs of fiber-optic cables.

47 Switched Ethernet The 10Base-T Ethernet is a shared media network, which means that the entire media is involved in each transmission. Any frame produced by one station is retransmitted by the hub to all stations in the network. Thus, if two stations try to send frames simultaneously, there is a collision. If we replace the hub by a switch, a device that can recognize the destination address and can route the frame to the port to which the destination station is connected, the rest of the media are not involved in the transmission process.

48

49 Full-duplex switched Ethernet In Full-duplex switched Ethernet each station is connected to the switch through two links: one to transmit and one to receive. The speed passes from 10Mbps to 20Mbps. There is no need for the CSMA/CD method.

50 Fast Ethernet implementations

51 Fast Ethernet Fast Ethernet operates to 100 Mbps. Star topology 100Base-TX The 100Base-TX design uses two category 5 unshielded twistedpair (UTP) or two shielded twisted-pair (STP) cables to connect a station to the hub. One pair is used to carry frames from the station to the hub and the other to carry frames from the hub to the station. The distance between the station and the hub should be less than 100 meters.

52 Fast Ethernet 100Base-FX The 100Base-FX design uses two optical fibers, one to carry frames from the station to the hub and the other from the hub to the station. The distance between the station and the hub should be less than 2000 meters. 100Base-T4 It requires four pairs of category 3 (voice grade) UTP. Two of the four pairs are bidirectional; the other two are unidirectional. The 100 Mbps flow of data is divided into three Mbps flows

53 Gigabit Ethernet It supports a data rate of 1 Gbps (1000 Mbps) Usually serves as a backbone to connect Fast Ethernet Networks. Four implementations have been designed for Gigabit Ethernet: 1000Base-LX, 100Base-SX, 1000Base-CX and 1000Base-T.

54

55 Token Bus Local area networks have a direct application in factory automation and process control. In this case the nodes are computers controlling manufacturing process. Ethernet (IEEE802.3) is not a suitable protocol for these purposes because the number of collisions is not predictable and the delay in sending data from a control center (a computer in the network) to other devices or computers along the assembly line is not a fixed value.

56 Token Bus Token Bus (IEEE 802.4) combines features of Ethernet (a bus topology) and Token ring. Token bus is a physical bus that operates as a logical ring using tokens. Stations are logically organized into a ring. A token is passed among the stations. If a station wants to send data, it must wait and capture the token. Token Bus is limited to factory automation and process control and has no commercial applications in data communication.

57 Token Ring (IEEE 802.5) Token ring requires that stations take turns sending data. Each station may transmit only during its turn and may send only one frame during each turn. The mechanism that coordinates this rotation is called token passing.

58 Token Passing

59 Token Passing

60 Token Passing

61 Token Passing

62 Token Ring (IEEE 802.5) Access Method: Token passing Whenever the network is unoccupied, it circulates a simple threebyte token. This token is passed from NIC to NIC in sequence until it encounters a station with data to send. That station waits for the token to enter its network board. If the token is free the station may send a data frame. This data frame proceeds around the ring regenerated by each station.

63 Token Ring (IEEE 802.5) Each intermediate station examines the destination address, if the frame is addressed to another station, the station relays it to its neighbor. If the station recognizes its own address, copies the message, checks for errors, and changes four bits in the last byte of the frame to indicate address recognized and frame copied. The full packet then continues around the ring until it returns to the station that sent it.

64 Token Ring (IEEE 802.5) The sender receives the frame and recognizes itself in the source address field. It then checks the address- recognized bits. If they are set, it knows that the frame was received. The sender then discards the used data frame and releases the token back to the ring.

65 Priority and reservation A busy token can be reserved by a station waiting to transmit regardless of that station s location on the ring. Each station has a priority code. As a frame passes by, a station waiting to transmit it may reserve the next open token by entering its priority code in the access control (AC) field of the token or data frame. A station with a higher priority may remove a lower priority reservation and replace it with its own.

66 Token Ring Frame

67 Monitor stations Several problems may occur to disrupt the operation of a token ring network. 1. A station may neglect to retransmit a token 2. A token may be destroyed by noise 3. A sending station may not release the token once its turn has ended 4. A sending station may neglect to remove its used data frame from the ring To handle these situations, one station on the ring is designated as monitor station.

68 Addressing Token ring uses a six-byte address, which is imprinted on the NIC card. Data Rate Token ring supports data rates of up to 16 Mbps. Frame formats The token ring protocol specifies three types of frames: 1. Data/command Frames 2. Token Frames 3. Abort Frames

69 The data/command frame is the only one of the three types of frames that can carry a PDU and is the only addressed to a specified destination. The nine fields of the frame are start delimiter (SD), access control (AC), frame control (FC), destination address (DA), source address (SA), PDU, CRC, en delimiter (ED), frame status (FM). The AC field is one byte long and includes four subfields: Priority ( 3 bits), Token ( 1 bit), Monitor (1bit), reservation (3bits)

70 Token bit: 1 indicates that the frame is a data/command frame; 0 indicates a token or abort frame. The frame control (FC) field is one byte long and contains two fields: type and special information. Type is one bit field used to indicate the type of information contained in the PDU ( control information or data). Special information field is a 7 bits field. This field contains information used by the Token ring logic.

71 The last byte of the frame is the Frame status field (FS). It can be set by the receiver to indicate that the frame has been read, or by the monitor to indicate that the frame has already been around the ring. Token frame This frame includes only three fields: the SD, AC, and ED. The SD indicates that a frame is coming. The AC indicates that the frame is a token and includes the priority and reservation fields. Abort frame An abort frame carries no information at all, just starting and ending delimiters. It can be generated either by the sender to stop its own transmission or by the monitor to purge an old transmission from the line.

72 FDDI: Fiber Distributed Data Interface Supports transmission rates of up to 200 Mbps Uses a dual ring First ring used to carry data at 100 Mbps Second ring used for primary backup in case first ring fails If no backup is needed, second ring can also carry data, increasing the data rate up to 200 Mbps Supports up to 1000 nodes Has a range of up to 200 km

73 FDDI Architecture

74 The physical layer defines the electrical, mechanical, and logical characteristics for transmitting bits across the physical medium. Examples of physical media include twisted pair, coaxial, and fiber optic cable. Dual ring FDDI specifies fiber optic cable as the physical medium. The data link layer specifies the way a node accesses the underlying physical medium and how it formats data for transmission. FDDI specifies formatting data into frames, using a special set of symbols and following a special set of rules. The MAC sub layer within the data link layer specifies the physical address (MAC address) used for uniquely identifying FDDI nodes

75 Transmission Media FDDI uses optical fiber as the primary transmission medium, but it also can run over copper cabling. FDDI over copper is referred to as Copper-Distributed Data Interface (CDDI). FDDI defines two types of optical fiber: single-mode and multimode. Multimode: Multimode fiber uses LED as the light-generating device. Multimode fiber allows multiple modes of light to propagate through the fiber.. multimode fiber is generally used for connectivity within a building or a relatively geographically contained environment. Single-mode: single-mode fiber generally uses lasers. Single-mode fiber allows only one mode of light to propagate through the fiber. Therefore, single-mode fiber is capable of delivering considerably higher performance connectivity over much larger distances, which is why it generally is used for connectivity between buildings and within environments that are more geographically dispersed.

76

77 FDDI Specification/Component FDDI is defined by four separate specifications: 1. Media Access Control (MAC)---Defines how the medium is accessed, including frame format, token handling, addressing, algorithm for calculating a cyclic redundancy check value, error recovery mechanism 2. Physical Layer Protocol (PHY)---Defines data encoding/decoding procedures, clocking requirement, framing and other function. 3. Physical Layer Medium (PMD)---Defines the characteristics of the transmission medium, including the fiber-optic link, power levels, bit error rates, optical components, and connectors. 4. Station Management (SMT)---Defines the FDDI station configuration, ring configuration, and ring control features, including station insertion and removal, initialization, fault isolation and recovery, scheduling, and collection of statistics.

78 FDDI Basic Principle Token circulates around a ring in network. A station first capture the token,send packet of data to network. After transmission token is released. Every station on the network will receive the transmission and repeat it. The transmission will travel around the ring until it is received by the station which originally sent it, which removes it from the ring. If a station does not receive its transmission back, it assumes that an error occurred some where. To solve this problem fault isolation techniques is used.

79 Cable Types: There are four cable types which can be used with FDDI. They are: Multimode Fiber Optic Cable Fiber optic cable, usually with a core size of 62.5 microns. It allows distances up to 2000 meters (6600 feet). Single-mode Fiber Optic Cable Fiber optic cable with a core size of 7 to 11 microns. It allows distances up to 10,000 meters (33,000 feet). Category 5 UTP An unshielded copper cable, usually with eight wires. The wires are twisted together in pairs, and the cable is rated at frequencies up to 100 MHz. It allows distances up to 100 meters (330 feet). IBM Type 1 STP A heavy, shielded copper cable. It consists of four wires, twisted in to two pairs. Each pair is covered with an individual shield, and an overall shield covers the entire cable. It allows distances up to 100 meters (330 feet).

80 FDDI Frame Format The FDDI frame format is similar to the format of a Token Ring frame. FDDI frames can be as large as 4,500 bytes.

81 The following descriptions summarize the FDDI data frame and token fields illustrated in the above figure. Preamble (16 bits)- Gives a unique sequence that prepares each station for an upcoming frame. Start delimiter (8 bits)- - Indicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame. Frame control (8 bits)- Type and special information in PDU Destination address (48bits)- - Contains a unicast (singular), multicast (group), or broadcast (every station) address. As with Ethernet and Token Ring addresses, FDDI destination addresses are 6 bytes long. Source address (48 bits)- - Identifies the single station that sent the frame. As with Ethernet and Token Ring addresses, FDDI source addresses are 6 bytes long.

82 Data - Contains either information destined for an upper-layer protocol or control information. Frame check sequence (FCS) (32 bits)- - Is filed by the source station with a calculated cyclic redundancy check value dependent on frame contents (as with Token Ring and Ethernet). The destination address recalculates the value to determine whether the frame was damaged in transit. If so, the frame is discarded. End delimiter (16 bits)- - Contains unique symbols; cannot be data symbols that indicate the end of the frame. Frame status (16 bits)- - Allows the source station to determine whether an error occurred; identifies whether the frame was recognized and copied by a receiving station.

83 FDDI Benefits high bandwidth (10 times more than ethernet). larger distances between fddi nodes because of very low attenuation. improved signal-to-noise ratio because of no interference from external radio frequencies and electromagnetic noise Limitation of FDDI high cost of optical components required for transmission/reception of signals (especially for single mode fiber networks) more complex to implement.

84 Q & A IAP, University of Sargodha, CS & IT Dept

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Chapter 15 Local Area Network Overview

Chapter 15 Local Area Network Overview Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet HTML tutorial today. Announcements CMPE 80N Spring 2003 Week 5 1 2 MAC Protocols MAC Protocols Round-robin. Scheduled-access. Contention-based. Contention-based

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

More information

10- and 100-Mbps Ethernet

10- and 100-Mbps Ethernet Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Raj Jain. The Ohio State University Columbus, OH

Raj Jain. The Ohio State University Columbus, OH Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science 1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we

More information

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media

More information

IEEE standards for local area networks

IEEE standards for local area networks IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks Local Area Networks A Local Area Netw ork is a communications netw ork that provides interconnection of a variety of data communicating devices w ithin a small area. Typical Characteristics! High Data

More information

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2 High Speed LANs CS420/520 Axel Krings Page 1 High Speed LANs Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs CS420/520 Axel Krings Page 2 1 Why High Speed LANs? Office

More information

Chapter 11 in Stallings 10 th Edition

Chapter 11 in Stallings 10 th Edition Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large

More information

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of

More information

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control 168 430 Computer Networks Chapter 16 High Speed LANs Introduction Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs Why High Speed LANs? Office LANs used to provide

More information

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7 Local rea Network! Question - What are the station types supported by HDLC? Describe each. References: Chapters 15 and 16 Stallings Chapters 14 and 16 Forouzan Study Guide 8 Review

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

Campus Network Design

Campus Network Design Campus Network Design Thana Hongsuwan 2003, Cisco Systems, Inc. All rights reserved. 1-1 Content Ethernet Standard Transparent Bridges LAN Switches LAN and Switch Operation Loop Resolution Virtual LANs,

More information

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

Network Media and Layer 1 Functionality

Network Media and Layer 1 Functionality Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)

More information

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3 The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture

More information

Local Area Networks CONSYL Introduction to Computer Communications and Networks

Local Area Networks CONSYL Introduction to Computer Communications and Networks Local rea Networks 4/11/40 page 1 Faculty of Engineering, Kasetsart University Local rea Networks 1-1 LN characteristics confined within geographical area relatively high data rate under single management

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

More information

CS343: Data Communication LAN Overview

CS343: Data Communication LAN Overview CS343: Data Communication LAN Overview by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Guwahati E-mail: manaskhatua@iitg.ac.in Communication Network Topology Topology refers to the way in which

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

More on LANS. LAN Wiring, Interface

More on LANS. LAN Wiring, Interface More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network

More information

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr. Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

More information

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan Campus etwork Design Thana Hongsuwan Ethernet Standard 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMS v2.0 1-2 OSI Model Ethernet address Six bytes

More information

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Hello and welcome to today s lecture on high speed

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x Computer Networks Lecture 8 Local Area Network, IEEE 802.x Local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school,

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1 IT 4504 Section 4.0 Network Architectures 2008, University of Colombo School of Computing 1 Section 4.1 Introduction to Computer Networks 2008, University of Colombo School of Computing 2 Introduction

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Chapter 9 Ethernet Part 1

Chapter 9 Ethernet Part 1 Chapter 9 Ethernet Part 1 Introduction to Ethernet Ethernet Local Area Networks (LANs) LAN (Local Area Network) - A computer network connected through a wired or wireless medium by networking devices (s,

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming 2 TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming Network Technologies 3 4 Elements of the Network Sender

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1 Introduction to LAN Topologies Cabling 2000, Cisco Systems, Inc. 3-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Media / Cabling Local Area Network Cabling

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

Lecture (04 & 05) Data link layer fundamental

Lecture (04 & 05) Data link layer fundamental Lecture (04 & 05) Data link layer fundamental Dr. Ahmed M. ElShafee ١ Agenda Foundation Topics Typical LAN Features for OSI Layer 1 Typical LAN Features for OSI Layer 2 Standards Overview 10BASE2 and 10BASE5

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Lecture 05 Chapter 16 High Speed LANs

Lecture 05 Chapter 16 High Speed LANs NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee Typical LAN Features for Physical layer Typical LAN Features for Data link layer Standards Overview 10BASE2 and 10BASE5 10BASE T

More information

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Typical LAN Features for Physical layer Typical LAN Features for Data

More information

Chapter 8 LAN Topologies

Chapter 8 LAN Topologies Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

ก ก Information Technology II

ก ก Information Technology II ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

Fibre Channel: This standard provides a low-cost, easily scalable approach to achieving very high data rates in local areas.

Fibre Channel: This standard provides a low-cost, easily scalable approach to achieving very high data rates in local areas. Chapter 16 High Speed LANs by William Stallings The most important of these are Fast Ethernet and Gigabit Ethernet: The extension of 10-Mbps CSMA/CD (carrier sense multiple access with collision detection)

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

NT1210 Introduction to Networking. Unit 5:

NT1210 Introduction to Networking. Unit 5: NT1210 Introduction to Networking Unit 5: Chapter 5, Ethernet LANs 1 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Chapter 9. Ethernet. Part II

Chapter 9. Ethernet. Part II Chapter 9 Ethernet Part II CCNA1-1 Chapter 9-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks must go

More information

Media Access Control (MAC) Sub-layer and Ethernet

Media Access Control (MAC) Sub-layer and Ethernet Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer

More information

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:

More information

06/02/2006. Local & Metropolitan Area Networks 1. INTRODUCTION. Why Study Local and Metropolitan Area Networks? ACOE322. Lecture 1 Introduction

06/02/2006. Local & Metropolitan Area Networks 1. INTRODUCTION. Why Study Local and Metropolitan Area Networks? ACOE322. Lecture 1 Introduction Local & Metropolitan Area Networks ACOE322 Lecture 1 Introduction 1 1. INTRODUCTION In this section we will cover : 1. Overview of data communications and networking 2. Definition and overview of LANs,

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

The following pages contain a guide for the installation

The following pages contain a guide for the installation INDEX The goal of this section is to illustrate how Siemon Company products can be used to support some of the most popular and emerging networks on the market. Section Contents 100Base-T....................................

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017 5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?

More information