Internet Architecture and Protocol
|
|
- Gervais Dalton
- 6 years ago
- Views:
Transcription
1 Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi
2 Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport Host-to-Host TCP, UDP Network Internet IP, ICMP Data Link Physical Network Access LAN Ethernet, Token-Ring, FDDI, Fast Ethernet...
3 LAN (Local Area Networks) A LAN is a computer network that covers a small area (home, office, building, campus) a few kilometers LANs have higher data rates (Mbps to Gbps) as compared to WANs LANs (usually) do not involve leased lines; cabling and equipments belong to the LAN owner. A LAN consists of Shared transmission medium now so valid today due to switched LANs (for wired LANs), but still valid for wireless LANs regulations for orderly access to the medium set of hardware and software for the interfacing devices
4 IEEE 802 Subgroups and their Responsibilities Internetworking Logical Link Control (LLC) CSMA/CD Token Bus LAN
5 IEEE 802 Subgroups and their Responsibilities (Cont.) Token Ring LAN Metropolitan Area Network Broadband Technical Advisory Group Fiber-Optic Technical Advisory Group
6 IEEE 802 Subgroups and their Responsibilities (Cont.) Integrated Voice/Data Networks Network Security Wireless Networks Demand Priority Access LANs
7 Ethernet Protocol Standards 10 Mbps IEEE Mbps IEEE 802.3u 1 Gbps IEEE 802.3ab 10 Gbps IEEE 802.3ae
8 LAN Protocol Architecture Corresponds to lower two layers of OSI model Current LANs are most likely to be based on Ethernet protocols developed by IEEE 802 committee IEEE 802 reference model Logical link control (LLC) Media access control (MAC) Physical
9 IEEE 802 Protocol Layers vs. OSI Model
10 IEEE 802 Layers - Physical Signal encoding/decoding Preamble generation/removal for synchronization Bit transmission/reception Specification for topology and transmission medium
11 802 Layers OSI layer 2 (Data Link) is divided into two in IEEE 802 Logical Link Control (LLC) layer Medium Access Control (MAC) layer LLC layer Interface to higher levels flow control Based on Data Link Control Protocols MAC layer Prepare data for transmission Error detection Address recognition Govern access to transmission medium
12 LAN Protocols in Context
13 Generic MAC & LLC Format Actual format differs from protocol to protocol MAC layer receives data from LLC layer MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames
14 LAN Topologies Bus Ring Star
15 Bus Topology - 1 Stations attach to linear medium (bus) Via a tap - allows for transmission and reception Transmission propagates in medium in both directions Received by all other stations Not addressed stations ignore Need to identify target station Each station has unique address Destination address included in frame header Terminator absorbs frames at the end of medium
16 Bus Topology - 2 Need to regulate transmission To avoid collisions If two stations attempt to transmit at same time, signals will overlap and become garbage To avoid continuous transmission from a single station. If one station transmits continuously, access is blocked for others Solution: Transmit Data in small blocks frames
17 Ring Topology Repeaters joined by pointto-point links in closed loop Links are unidirectional Receive data on one link and retransmit on another Stations attach to repeaters Data transmitted in frames Frame passes all stations in a circular manner Destination recognizes address and copies frame Frame circulates back to source where it is removed Medium access control is needed to determine when station can insert frame
18 Frame Transmission Ring LAN
19 Star Topology Each station connected directly to central node using a full-duplex (bi-directional) link Hub or Switch Central node can broadcast (hub) Only one station can transmit at a time; otherwise, collision occurs Central node can act as frame switch
20 Medium Access Control (MAC) Traditionally, in LANs data is broadcast there is a single medium shared by different users We need MAC sublayer for orderly and efficient use of broadcast medium This is actually a channel allocation problem Synchronous (static) solutions everyone knows when to transmit Asynchronous (dynamic) solution in response to immediate needs Two categories Round robin Contention
21 Static Channel Allocation Frequency Division Multiplexing (FDM) Channel is divided to carry different signals at different frequencies Efficient if there is a constant (one for each slot) amount of users with continous traffic Problematic if there are less or more users Even if the amount of users = # of channels, utilization is still low since typical network traffic is not uniform and some users may not have something to send all the time
22 Static Channel Allocation Time Division Multiplexing Each user is statically allocated one time slot if a particular user does not have anything to send, it remains idle and wastes the channel for that period A user may not utilize the whole channel for a time slot Thus, inefficient.
23 Dynamic Channel Allocation Categories Round robin each station has a turn to transmit declines or transmits up to a certain data limit Performs well if many stations have data to transmit for most of the time otherwise passing the turn would cause inefficiency
24 Dynamic Channel Allocation Categories Contention All stations contend to transmit No control to determine whose turn is it Stations send data by taking risk of collision (with others packets/frames) however they understand collisions by listening to the channel, so that they can retransmit In general, good for bursty traffic which is the typical traffic types for most networks Efficient under light or moderate load Performance is bad under heavy load
25 ALOHA When station has frame, it sends collisions may occur Station listens for max round trip time If no collision, fine. If collision, retransmit after a random waiting time Collison is understood by listening
26 Slotted ALOHA Divide the time into discrete intervals (slots) equal to frame transmission time need central clock (or other sync mechanism) transmission begins at slot boundary Collided frames will do so totally or will not collide Algorithm If a node has a packet to send, sends it at the beginning of the next slot If collision occurred, retransmit at the next
27 Aloha & Slotted Aloha
28 CSMA (Carrier Sense Multiple Access) First listen for clear medium (carrier sense) If medium idle, transmit If busy, continuously check the channel until it is idle and then transmit If collision occurs Wait random time and retransmit (called back-off ) Collision probability depends on the propagation delay Longer propagation delay, worse the utilization
29 Ethernet (CSMA/CD) Carriers Sense Multiple Access with Collision Detection is the underlying technology (protocol) for medium access control IEEE standard (1983) Contention technique that has basis in famous ALOHA network
30 Access Method: CSMA/CD The Ethernet architecture does not have a regulated access to the medium. Whenever multiple users have unregulated access to a single line, there is a danger of signals overlapping and destroying each other. Such overlaps, which turn the signals into unusable noise, are called collisions. As traffic increases on a multiple-access link, so do collisions.
31 Access Method: CSMA/CD The access mechanism used in an Ethernet is called carrier sense multiple access with collision detection CSMA/CD In CSMA/CD system, any workstation wishing to transmit must first listen for existing traffic on the line. A device listens by checking for a voltage. If no voltage is detected, the line is considered idle and the transmission is initiated. During the data transmission, the station checks the line for the extremely high voltages that indicate a collision.
32
33 If a collision is detected, the station quits the current transmission and waits a predetermined amount of time for the line to clear, then sends its data again. Addressing Each station on an Ethernet network has its own network interface card (NIC). The NIC usually fits inside the station and provides the station with a six-byte physical address. The number on the NIC is unique. Data Rate Ethernet LANs can support different data rates between 1 and 1000Mbps.
34 Frame Format IEEE specifies one type of frame containing seven fields:
35 Frame Format Preamble The preamble contains seven bytes (56 bits) of alternating 0s and 1s that alert the receiving system to the coming frame and enable it to synchronize its input timing. Start Frame delimiter SFD The SFD tells the receiver that everything that follows is data, starting with the addresses. Destination Addresses DA The DA field contains the physical destination address (six bytes) of the frame s next destination CRC The last field in the frame contains the error detection information, in this case CRC-32.
36 Frame Format Source Address The SA field contains the physical address ( six bytes) of the last device to forward the frame. That device can be the sending station. Length/type of Protocol Data Unit (PDU) This field contains two bytes indicating the number of bytes in the PDU. If the length of the PDU is fixed, this field can be used to indicate type, or as a base for other protocols. Protocol Data Unit PDU The PDU is generated by the upper LLC sublayer, then linked to the frame. The PDU can be anywhere from 46 to 1500 bytes long, depending on the type of frame and the length of the information field.
37 Implementation Ethernet LANs are configured as logical buses, although they may be physically implemented in bus, ring or star topologies. Each frame is transmitted to every station on the link but read only by the station to which it is addressed.
38 Categories of traditional Ethernet
39 10BASE5: Thick Ethernet 10Base5 is a bus topology LAN that uses based signaling and has a maximum segment length of 500 meters. To reduce collisions, the total length of the bus should not exceed 2500 meters (five segments). Also, the standard demands that each station be separated from each neighbor by 2.5 meters. The physical components includes coaxial cable, network interface cards, transceivers, and attachment unit interface (AUI) cables. RG-8 cable is thick coaxial cable that provides the backbone of the IEEE802.3 standard. Transceiver Each station is attached by an AUI cable to an intermediary device called a medium attachment unit (MAU) or transceiver.
40 10BASE5: Thick Ethernet The transceiver performs CSMA/CD function of checking for voltages and collisions on the line and may contain an small buffer. It also serves as the connector that attaches a station to the thick coaxial cable itself via a tap. AUI cables Each station is linked to its corresponding transceiver by an attachment unit interface (AUI), also called a transceiver cable. AUIs are restricted to a maximum length of 50 meters. Transceiver tap Each transceiver contains a connecting mechanism, called a tap because it allows the transceiver to tap into the line at any point.
41 Topology of 10BASE5
42 10BASE2:Thin Ethernet Like 10Base5, 10Base2 is a bus topology LAN. The advantages of thin Ethernet are reduced cost and ease of installation. The disadvantages are shorter range (185 meters) The NICs in a thin Ethernet system provide all the same functionality as those in a thick Ethernet, plus the functions of the transceivers. The cable required to implement the 10Base2 standard is RG-58. These cables are relatively easy to install and move.
43 Topology of 10BASE2
44 10Base-T: Twisted-Pair Ethernet A star-topology LAN using unshielded twisted pair (UTP) cable instead of coaxial cable. It supports a data rate of 10Mbps and has a maximum length (hub to station) of 100 meters. It requires a hub with a port for each station. The hub fans out any transmitted frame to all to all its connected stations.
45 Topology 10BASE-T
46 10Base-FL: Fiber Link Ethernet 10Base-FL uses a star topology to connect stations to a hub. The standard is normally implemented using an external transceiver called fiber-optic MAU. The station is connected to the external transceiver by an AUI cable. The transceiver is connected to the hub by using two pairs of fiber-optic cables.
47 Switched Ethernet The 10Base-T Ethernet is a shared media network, which means that the entire media is involved in each transmission. Any frame produced by one station is retransmitted by the hub to all stations in the network. Thus, if two stations try to send frames simultaneously, there is a collision. If we replace the hub by a switch, a device that can recognize the destination address and can route the frame to the port to which the destination station is connected, the rest of the media are not involved in the transmission process.
48
49 Full-duplex switched Ethernet In Full-duplex switched Ethernet each station is connected to the switch through two links: one to transmit and one to receive. The speed passes from 10Mbps to 20Mbps. There is no need for the CSMA/CD method.
50 Fast Ethernet implementations
51 Fast Ethernet Fast Ethernet operates to 100 Mbps. Star topology 100Base-TX The 100Base-TX design uses two category 5 unshielded twistedpair (UTP) or two shielded twisted-pair (STP) cables to connect a station to the hub. One pair is used to carry frames from the station to the hub and the other to carry frames from the hub to the station. The distance between the station and the hub should be less than 100 meters.
52 Fast Ethernet 100Base-FX The 100Base-FX design uses two optical fibers, one to carry frames from the station to the hub and the other from the hub to the station. The distance between the station and the hub should be less than 2000 meters. 100Base-T4 It requires four pairs of category 3 (voice grade) UTP. Two of the four pairs are bidirectional; the other two are unidirectional. The 100 Mbps flow of data is divided into three Mbps flows
53 Gigabit Ethernet It supports a data rate of 1 Gbps (1000 Mbps) Usually serves as a backbone to connect Fast Ethernet Networks. Four implementations have been designed for Gigabit Ethernet: 1000Base-LX, 100Base-SX, 1000Base-CX and 1000Base-T.
54
55 Token Bus Local area networks have a direct application in factory automation and process control. In this case the nodes are computers controlling manufacturing process. Ethernet (IEEE802.3) is not a suitable protocol for these purposes because the number of collisions is not predictable and the delay in sending data from a control center (a computer in the network) to other devices or computers along the assembly line is not a fixed value.
56 Token Bus Token Bus (IEEE 802.4) combines features of Ethernet (a bus topology) and Token ring. Token bus is a physical bus that operates as a logical ring using tokens. Stations are logically organized into a ring. A token is passed among the stations. If a station wants to send data, it must wait and capture the token. Token Bus is limited to factory automation and process control and has no commercial applications in data communication.
57 Token Ring (IEEE 802.5) Token ring requires that stations take turns sending data. Each station may transmit only during its turn and may send only one frame during each turn. The mechanism that coordinates this rotation is called token passing.
58 Token Passing
59 Token Passing
60 Token Passing
61 Token Passing
62 Token Ring (IEEE 802.5) Access Method: Token passing Whenever the network is unoccupied, it circulates a simple threebyte token. This token is passed from NIC to NIC in sequence until it encounters a station with data to send. That station waits for the token to enter its network board. If the token is free the station may send a data frame. This data frame proceeds around the ring regenerated by each station.
63 Token Ring (IEEE 802.5) Each intermediate station examines the destination address, if the frame is addressed to another station, the station relays it to its neighbor. If the station recognizes its own address, copies the message, checks for errors, and changes four bits in the last byte of the frame to indicate address recognized and frame copied. The full packet then continues around the ring until it returns to the station that sent it.
64 Token Ring (IEEE 802.5) The sender receives the frame and recognizes itself in the source address field. It then checks the address- recognized bits. If they are set, it knows that the frame was received. The sender then discards the used data frame and releases the token back to the ring.
65 Priority and reservation A busy token can be reserved by a station waiting to transmit regardless of that station s location on the ring. Each station has a priority code. As a frame passes by, a station waiting to transmit it may reserve the next open token by entering its priority code in the access control (AC) field of the token or data frame. A station with a higher priority may remove a lower priority reservation and replace it with its own.
66 Token Ring Frame
67 Monitor stations Several problems may occur to disrupt the operation of a token ring network. 1. A station may neglect to retransmit a token 2. A token may be destroyed by noise 3. A sending station may not release the token once its turn has ended 4. A sending station may neglect to remove its used data frame from the ring To handle these situations, one station on the ring is designated as monitor station.
68 Addressing Token ring uses a six-byte address, which is imprinted on the NIC card. Data Rate Token ring supports data rates of up to 16 Mbps. Frame formats The token ring protocol specifies three types of frames: 1. Data/command Frames 2. Token Frames 3. Abort Frames
69 The data/command frame is the only one of the three types of frames that can carry a PDU and is the only addressed to a specified destination. The nine fields of the frame are start delimiter (SD), access control (AC), frame control (FC), destination address (DA), source address (SA), PDU, CRC, en delimiter (ED), frame status (FM). The AC field is one byte long and includes four subfields: Priority ( 3 bits), Token ( 1 bit), Monitor (1bit), reservation (3bits)
70 Token bit: 1 indicates that the frame is a data/command frame; 0 indicates a token or abort frame. The frame control (FC) field is one byte long and contains two fields: type and special information. Type is one bit field used to indicate the type of information contained in the PDU ( control information or data). Special information field is a 7 bits field. This field contains information used by the Token ring logic.
71 The last byte of the frame is the Frame status field (FS). It can be set by the receiver to indicate that the frame has been read, or by the monitor to indicate that the frame has already been around the ring. Token frame This frame includes only three fields: the SD, AC, and ED. The SD indicates that a frame is coming. The AC indicates that the frame is a token and includes the priority and reservation fields. Abort frame An abort frame carries no information at all, just starting and ending delimiters. It can be generated either by the sender to stop its own transmission or by the monitor to purge an old transmission from the line.
72 FDDI: Fiber Distributed Data Interface Supports transmission rates of up to 200 Mbps Uses a dual ring First ring used to carry data at 100 Mbps Second ring used for primary backup in case first ring fails If no backup is needed, second ring can also carry data, increasing the data rate up to 200 Mbps Supports up to 1000 nodes Has a range of up to 200 km
73 FDDI Architecture
74 The physical layer defines the electrical, mechanical, and logical characteristics for transmitting bits across the physical medium. Examples of physical media include twisted pair, coaxial, and fiber optic cable. Dual ring FDDI specifies fiber optic cable as the physical medium. The data link layer specifies the way a node accesses the underlying physical medium and how it formats data for transmission. FDDI specifies formatting data into frames, using a special set of symbols and following a special set of rules. The MAC sub layer within the data link layer specifies the physical address (MAC address) used for uniquely identifying FDDI nodes
75 Transmission Media FDDI uses optical fiber as the primary transmission medium, but it also can run over copper cabling. FDDI over copper is referred to as Copper-Distributed Data Interface (CDDI). FDDI defines two types of optical fiber: single-mode and multimode. Multimode: Multimode fiber uses LED as the light-generating device. Multimode fiber allows multiple modes of light to propagate through the fiber.. multimode fiber is generally used for connectivity within a building or a relatively geographically contained environment. Single-mode: single-mode fiber generally uses lasers. Single-mode fiber allows only one mode of light to propagate through the fiber. Therefore, single-mode fiber is capable of delivering considerably higher performance connectivity over much larger distances, which is why it generally is used for connectivity between buildings and within environments that are more geographically dispersed.
76
77 FDDI Specification/Component FDDI is defined by four separate specifications: 1. Media Access Control (MAC)---Defines how the medium is accessed, including frame format, token handling, addressing, algorithm for calculating a cyclic redundancy check value, error recovery mechanism 2. Physical Layer Protocol (PHY)---Defines data encoding/decoding procedures, clocking requirement, framing and other function. 3. Physical Layer Medium (PMD)---Defines the characteristics of the transmission medium, including the fiber-optic link, power levels, bit error rates, optical components, and connectors. 4. Station Management (SMT)---Defines the FDDI station configuration, ring configuration, and ring control features, including station insertion and removal, initialization, fault isolation and recovery, scheduling, and collection of statistics.
78 FDDI Basic Principle Token circulates around a ring in network. A station first capture the token,send packet of data to network. After transmission token is released. Every station on the network will receive the transmission and repeat it. The transmission will travel around the ring until it is received by the station which originally sent it, which removes it from the ring. If a station does not receive its transmission back, it assumes that an error occurred some where. To solve this problem fault isolation techniques is used.
79 Cable Types: There are four cable types which can be used with FDDI. They are: Multimode Fiber Optic Cable Fiber optic cable, usually with a core size of 62.5 microns. It allows distances up to 2000 meters (6600 feet). Single-mode Fiber Optic Cable Fiber optic cable with a core size of 7 to 11 microns. It allows distances up to 10,000 meters (33,000 feet). Category 5 UTP An unshielded copper cable, usually with eight wires. The wires are twisted together in pairs, and the cable is rated at frequencies up to 100 MHz. It allows distances up to 100 meters (330 feet). IBM Type 1 STP A heavy, shielded copper cable. It consists of four wires, twisted in to two pairs. Each pair is covered with an individual shield, and an overall shield covers the entire cable. It allows distances up to 100 meters (330 feet).
80 FDDI Frame Format The FDDI frame format is similar to the format of a Token Ring frame. FDDI frames can be as large as 4,500 bytes.
81 The following descriptions summarize the FDDI data frame and token fields illustrated in the above figure. Preamble (16 bits)- Gives a unique sequence that prepares each station for an upcoming frame. Start delimiter (8 bits)- - Indicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame. Frame control (8 bits)- Type and special information in PDU Destination address (48bits)- - Contains a unicast (singular), multicast (group), or broadcast (every station) address. As with Ethernet and Token Ring addresses, FDDI destination addresses are 6 bytes long. Source address (48 bits)- - Identifies the single station that sent the frame. As with Ethernet and Token Ring addresses, FDDI source addresses are 6 bytes long.
82 Data - Contains either information destined for an upper-layer protocol or control information. Frame check sequence (FCS) (32 bits)- - Is filed by the source station with a calculated cyclic redundancy check value dependent on frame contents (as with Token Ring and Ethernet). The destination address recalculates the value to determine whether the frame was damaged in transit. If so, the frame is discarded. End delimiter (16 bits)- - Contains unique symbols; cannot be data symbols that indicate the end of the frame. Frame status (16 bits)- - Allows the source station to determine whether an error occurred; identifies whether the frame was recognized and copied by a receiving station.
83 FDDI Benefits high bandwidth (10 times more than ethernet). larger distances between fddi nodes because of very low attenuation. improved signal-to-noise ratio because of no interference from external radio frequencies and electromagnetic noise Limitation of FDDI high cost of optical components required for transmission/reception of signals (especially for single mode fiber networks) more complex to implement.
84 Q & A IAP, University of Sargodha, CS & IT Dept
IEEE 802 LANs SECTION C
IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationData and Computer Communications. Chapter 11 Local Area Network
Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet HTML tutorial today. Announcements CMPE 80N Spring 2003 Week 5 1 2 MAC Protocols MAC Protocols Round-robin. Scheduled-access. Contention-based. Contention-based
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationA LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,
CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer
More information10- and 100-Mbps Ethernet
Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationRaj Jain. The Ohio State University Columbus, OH
Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationLAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science
1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we
More informationContent. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control
Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media
More informationIEEE standards for local area networks
IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More information! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks
Local Area Networks A Local Area Netw ork is a communications netw ork that provides interconnection of a variety of data communicating devices w ithin a small area. Typical Characteristics! High Data
More informationHigh Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2
High Speed LANs CS420/520 Axel Krings Page 1 High Speed LANs Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs CS420/520 Axel Krings Page 2 1 Why High Speed LANs? Office
More informationChapter 11 in Stallings 10 th Edition
Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large
More informationThe random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of
More informationIntroduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control
168 430 Computer Networks Chapter 16 High Speed LANs Introduction Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs Why High Speed LANs? Office LANs used to provide
More informationLocal Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.
Review of Lecture 7 Local rea Network! Question - What are the station types supported by HDLC? Describe each. References: Chapters 15 and 16 Stallings Chapters 14 and 16 Forouzan Study Guide 8 Review
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationCampus Network Design
Campus Network Design Thana Hongsuwan 2003, Cisco Systems, Inc. All rights reserved. 1-1 Content Ethernet Standard Transparent Bridges LAN Switches LAN and Switch Operation Loop Resolution Virtual LANs,
More informationToken Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1
Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationLAN PROTOCOLS. Beulah A AP/CSE
LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationNetwork Media and Layer 1 Functionality
Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)
More informationThe Network Access Layer. In This Lecture. Network Access Layer. Hour 3
The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture
More informationLocal Area Networks CONSYL Introduction to Computer Communications and Networks
Local rea Networks 4/11/40 page 1 Faculty of Engineering, Kasetsart University Local rea Networks 1-1 LN characteristics confined within geographical area relatively high data rate under single management
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationLocal Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring
Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link
More informationCS343: Data Communication LAN Overview
CS343: Data Communication LAN Overview by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Guwahati E-mail: manaskhatua@iitg.ac.in Communication Network Topology Topology refers to the way in which
More informationChapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationMore on LANS. LAN Wiring, Interface
More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network
More informationIntroductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.
Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory
More informationEthernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan
Campus etwork Design Thana Hongsuwan Ethernet Standard 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMS v2.0 1-2 OSI Model Ethernet address Six bytes
More informationData Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs
Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Hello and welcome to today s lecture on high speed
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationComputer Networks. Lecture 8 Local Area Network, IEEE 802.x
Computer Networks Lecture 8 Local Area Network, IEEE 802.x Local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school,
More informationIntegrating Information Systems: Technology, Strategy, and Organizational Factors
MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications
More informationIT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1
IT 4504 Section 4.0 Network Architectures 2008, University of Colombo School of Computing 1 Section 4.1 Introduction to Computer Networks 2008, University of Colombo School of Computing 2 Introduction
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationChapter 9 Ethernet Part 1
Chapter 9 Ethernet Part 1 Introduction to Ethernet Ethernet Local Area Networks (LANs) LAN (Local Area Network) - A computer network connected through a wired or wireless medium by networking devices (s,
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More informationChapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)
Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG
Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationTCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming
2 TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming Network Technologies 3 4 Elements of the Network Sender
More informationInternetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on
CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network
More informationIntroduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1
Introduction to LAN Topologies Cabling 2000, Cisco Systems, Inc. 3-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Media / Cabling Local Area Network Cabling
More informationObjectives. Learn how computers are connected. Become familiar with different types of transmission media
Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives
More informationCCNA Exploration Network Fundamentals. Chapter 09 Ethernet
CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services
More informationLAN Systems. Bus topology LANs
Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong
More information2. LAN Topologies Gilbert Ndjatou Page 1
2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationLecture (04 & 05) Data link layer fundamental
Lecture (04 & 05) Data link layer fundamental Dr. Ahmed M. ElShafee ١ Agenda Foundation Topics Typical LAN Features for OSI Layer 1 Typical LAN Features for OSI Layer 2 Standards Overview 10BASE2 and 10BASE5
More informationLecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking
Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationLecture 05 Chapter 16 High Speed LANs
NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationLecture (04) Network Access layer fundamentals I
Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee Typical LAN Features for Physical layer Typical LAN Features for Data link layer Standards Overview 10BASE2 and 10BASE5 10BASE T
More informationLecture (04) Network Access layer fundamentals I
Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Typical LAN Features for Physical layer Typical LAN Features for Data
More informationChapter 8 LAN Topologies
Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises
More informationก ก Information Technology II
ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationFibre Channel: This standard provides a low-cost, easily scalable approach to achieving very high data rates in local areas.
Chapter 16 High Speed LANs by William Stallings The most important of these are Fast Ethernet and Gigabit Ethernet: The extension of 10-Mbps CSMA/CD (carrier sense multiple access with collision detection)
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationGoal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste
Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a
More informationNT1210 Introduction to Networking. Unit 5:
NT1210 Introduction to Networking Unit 5: Chapter 5, Ethernet LANs 1 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationChapter 9. Ethernet. Part II
Chapter 9 Ethernet Part II CCNA1-1 Chapter 9-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks must go
More informationMedia Access Control (MAC) Sub-layer and Ethernet
Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer
More informationKIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B
KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:
More information06/02/2006. Local & Metropolitan Area Networks 1. INTRODUCTION. Why Study Local and Metropolitan Area Networks? ACOE322. Lecture 1 Introduction
Local & Metropolitan Area Networks ACOE322 Lecture 1 Introduction 1 1. INTRODUCTION In this section we will cover : 1. Overview of data communications and networking 2. Definition and overview of LANs,
More informationLAN Systems. Bus topology LANs
Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong
More informationThe following pages contain a guide for the installation
INDEX The goal of this section is to illustrate how Siemon Company products can be used to support some of the most popular and emerging networks on the market. Section Contents 100Base-T....................................
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationBABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017
5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?
More information