A comparison of DQDB and FDDI for the interconnection of LANs

Size: px
Start display at page:

Download "A comparison of DQDB and FDDI for the interconnection of LANs"

Transcription

1 Distributed Systems Engineering A comparison of DQDB and FDDI for the interconnection of LANs To cite this article: R Ahmad and F Halsall 1994 Distrib. Syst. Engng View the article online for updates and enhancements. Related content - Totally ordered gigabit multicasting X Chen, L E Moser and P M Melliar-Smith - Performance engineering of the Totem group communication system R K Budhia, L E Moser and P M Melliar- Smith - Design and evaluation of a connection management mechanism for an ATMbased connectionless service Geert Heijenk and Boudewijn R Haverkort This content was downloaded from IP address on 13/08/2018 at 21:25

2 Distrib. Syst. Engng i(1994) A comparison of DQDB and FDDl for the interconnection of LANs Riaz Ahmad and Fred Halsall Communications Research Group, Department of Electrical and Electronic Engineering, University College of Swansea, Swansea, SA2 8PP, UK Received 5 November 1993 Abstract. This paper identifies the design issues that must be considered when interconnecting IEEE 802 LANs through either DQDB or FDDI backbone subnetworks using MAC bridges. A series of simulation results are presented that compare the performance of both subnetwork types for various types of LAN traffic, backbone subnetwork sizes (physical coverage and number of LANs) and other performance-critical parameters. The paper concludes with some guidelines to be followed to achieve an optimal performance to meet specific application requirements. 1. Introduction The interconnection of LANs over a complete site, without any performance loss, is currently a major issue being addressed by network designers. The emerging IEEE DQDB [l] and ANSI FDDI [2] standards are the two candidate networks being considered to meet such requirements. Among the alternative interconnection methods, MAC bridges are popular since they are transparent to end stations and can provide a high throughput 131. Moreover, they are now being standardized [4]. One of the prefkrred ways to interconnect LANs that are distributed over a site is by the connection of each LAN, via a bridge, to a high-speed backbone subnetwork [5]. The general scheme is shown in figure 1. Bridges are being proposed also for interconnecting highspeed LANs and backbones [6]. This paper is concerned with a detailed performance comparison of DQDB and FDDI when each is being used as a backbone subnetwork. In the next section, the essential features of both subnetwork types and bridges are presented and this is followed by a description of the issues relating to the interconnection of IEEE 802 LANs that must be addressed. This is followed by a set of performance results which have been obtained from a series of computer simulations. The paper concludes with some guidelines to be followed to achieve an optimum performance to meet specific application requirements. Figure 1. A typical network comprising a high-speed backbone interconnecting several heterogeneous LANs /94/ $19.50@1994 The British Computer Society, The institution of Electrical Engineers and IOP Publishing Ltd

3 R Ahmad and F Halsall 2. FDDI The architecture of a fibre distributed data interface (FDDI) subnetwork consists of two independent optical fibre rings. These are referred to as the primary ring and the secondary ring, each carrying data in opposite directions at a rate of 100Mbps. The proposed standard specifies the maximum fibre path length to be 200km with up to 500 physical connections. A typical FDDI network configuration is shown in figure 2. As can be seen, there are two types of station: a dual attachment station, which is connected to both rings, and a single attachment station, which is attached only to the primary Mg. In practice, most stations are attached to the ring via a wiring concentrator. Further information on the FDDI standard can be found in [7,8]. FDDI uses a timed token rotation protocol to control access to the medium. Each station measures the time that has elapsed since a token was last received. As part of the ring initialization prmess, all stations negotiate a target token rotation time (TTRT). The asynchronous service allows the use of a token only when the time since a token was last received has not exceeded the established TTRT. Each station on the ring measures the time since it last received the token. The time interval between two successive receptions of the token by a station is called the I /U -.\ I Secondary Ring U Figure 2. FDDl network schematic layout. token rotation time (TRT). On receipt of the token, if a station has asynchronous (data) traffic to send, it computes the difference in the time between the TTRT and the actual token rotation time (TRT); that is (TTRT - 'RT). The difference is known as the token holding time (THT). If THT is positive, the station can transmit for this interval prior to releasing the token. As can be deduced from this, the TTRT establishes a guaranteed maximum response time for the ring since, in the worst case, the time between the arrival of two successive tokens will never exceed twice the TTRT value. Various performance studies of FDDI parameters have been reported in [9, IO], where the performance of FDDI has been shown to be dependent on the TTRT, the size of the network (length of cable), the total number of stations and the frame size. The TTRT, however, has been shown to be the key parameter that can be used to optimize the performance of network. As will be seen, unlike DQDB, FDDI provides fair access for all users for any network size and traffic load. 3. DQDB The architecture of a distributed queue dual bus (DQDB) subnetwork consists of two unidirectional buses as shown in figure 3. Both buses, referred to as bus A and bus B, cany data in opposite directions allowing full duplex communication between any pair of stations connected to the network. As both buses are operational at all times, the total available bandwidth is up to twice the bandwidth of a single bus. The operation of the two buses in the transfer of data is independent. The head of each bus generates fixedlength slots which are used to cany data between stations on their respective buses. All data flow on both buses terminates at the end of the bus. As specified in the IEEE standard, a station cannot remove data and can only alter it when permitted by the access protocol. The DQDB layer provides two modes of access control to the dual buses: prearbitrated (PA) and queued arbitrated (QA), which are used to provide isochronous and asynchronous services respectively. This paper quantifies the performance of a single DQDB subnetwork for the interconnection of LANs carrying connectionless data only. The following Bus A Slotwithdirectionof flow U-- Figure 3. DQDB dual bus architecture. AU, access unit: 8, busy bit; R, request bit. 128

4 A comparison of DQDB and FDDI for the interconnection of LANs Bus A.1 <., & Count down for each empty QA slot on bus A.._..._ Transfer RQ count Counter (RQ) 't Count new requests on bus B counter (CO) Bus E Figure 4. DQDB access control using busy and request bits. description, therefore. refers to the DQDB protocol for the QA access mode only. The operation of the access control protocol is based upon two control bits contained in the access control field of the slot header: the BUSY bit and the REQUEST (REQ) bit. The BUSY bit indicates the slot status whether empty or occupied. The REQ bit is used to indicate when a segment has been queued for transmission on the opposite bus. Each station, by counting REQ bits from bus B and empty slots that pass on bus A, can determine the number of segments that are ahead of it in the distributed queue for bus A. The distributed queue uses two counters in each station: a request (RQ) counter and a count down (CD) counter as shown in figure 4. The RQ counter is used to maintain a count of the number of stations downstream on bus A which have requested access to bus A via REP bits on bus B. A station that has a segment to transmit on bus A sets a REQ bit on bus B, and transfers the current value of the RQ counter into the CD counter. The CD counter thus indicates the number of segments which are queued by the downstream stations before the current request was made and hence the number of empty slots the station must allow to pass on bus A. For each empty slot allowed to pass downstream on bus A, the CD counter is decremented. When the CD counter becomes zero, the station can send its segment in the next empty slot that passes on bus A. Each station can place only one segment at a time in the distributed queue. A separate queue is operated for each of the two buses, with separate counters at each station for each bus. A performance study of the DQDB protocol reported in [ll] shows that the basic access protocol has unfair bandwidth sharing for users when there are heavy traffic demands; especially at higher network speeds and larger station separations. The proposed IEEE standard specifies a bandwidth balancing (BWB) mechanism to ensure fair sharing of bandwidth between stations operating at a single priority. The impact of the bandwidth balancing mechanism on network performance will be expanded upon later. 4. Transparent bridges Bridges operate at the medium access control (MAC) sublayer and are transparent to end stations. A description of the detailed operation of transparent bridges is given in [3]. A bridge receives and buffers all frames in their entirety before performing the relaying (interconnection) function. During normal operation, the MAC address of each end station is leamt by the bridge and retained in a routing table known as the forwarding database. After the learning phase, when a frame is received at a bridge port, the forwarding database is searched to determine whether the destination address is present for this port. If so, the frame is discarded, otherwise it is relayed to the appropriate port for forwarding. The bridges do not inspect or change the data carried by the MAC frame and end stations perceive the bridged network as a single, extended LAN. 5. LAN interconnection issues The various IEEE 802 LAN standards differ at the physical layer and medium access control (MAC) sublayer, but are compatible at the logical link control (LLC) sublayer [12]. The relationship between FDDI, BEE and the different 802 LANs within the three lower layers of the IS0 reference model is shown in figure 5. Both FDDI and IEEE provide a connectionless MAC service to the LLC sublayer in a manner consistent with other 802 LANs. I Network Laver I Figure 5. Position of IEEE 802 LANs, FDDl and IEEE in IS0 reference model. LLC, logical link control; MAC, medium access control. 129

5 R Ahmad and F Halsall This makes both network types suitable for use as backbones for LAN intekonnection using MAC bridges. The maximum frame size specified in FDDI is 4500 bytes and in 802.6,9188 bytes, both of which are greater than the maximum frame size range of (CSMAKD) LANs (1518bytes). Although the= is no specifiedframe size limit in (token ring) when interconnected via MAC bridges the frame size with these LANs must not exceed the allowable limits of the backbones. Moreover, FDDI, IEEE and each of the 802 LANs use and can recognise only unique frame formats specific to their MAC protocol. Hence, in the same way that frames between dissimilar 802 LANs cannot be relayed, LAN frames cannot be transmitted directly onto either an FDDI or DQDB backbone. The bridge, therefore, must encapsulate a LAN frame within a FDDI or DQDB MAC frame before forwarding it onto the backbone. Then, prior to forwarding the frame onto the destination LAN subnetwork, the MAC frame must be decapsulated and retransmitted in the correct format. In order to encapsulate a LAN frame within a FDDI MAC frame, 27 bytes are added. For DQDB, at least 28 bytes are added to form an initial MAC protocol data unit (TMPDU). In FDDI, MAC frames are transmitted on the medium without segmentation. In the w e of DQDB, each JMPDU is segmented into fixed length (44byte) units. Control and message identifier fields are then added to each segment prior to transmission in a 53-byte DQDB slot. These are used by the destination stations to reassemble segments into the original IMPDU. To avoid the unnecessary use of both buses, the source bridge must know which of the two buses to use for transmitting each frame. One suggestion E In 8 50 m m 30 v) s 20 5l 10.,.... _ I..... _ I _ _....._._.... I.. given in the standard is the generation of a bus selection table for evely end station on the entire bridged network. With this scheme, however, table maintenance can become unacceptably large as the size of the bridged network increases. In general, therefore, this is not used and each frame is transmitted on both buses. All bridges then reassemble all segments received back into their initial MAC PDU and, from thejr stored forwarding database, relay appropriate frames onto their required LAN subnetwork. As can be concluded from the foregoing, DQDB requires additional segmentation/reassembly overheads compared with FDDI. Moreover, if both rings in FDDI are used, this yields a more efficient utilization of transmission bandwidth. To enhance the performance of the DQDB, a scheme known as destination release has been proposed A special bit, called previous slot received (PSR), is defined in the slot header which indicates whether or not the previous slot has been read. Some special access nodes, called eraser nodes, 'erase' all the slots that have been marked as 'read' so that they can be reused downstream by other users. In practice, however, because of the similar reasons meddoned before, bridges cannot set PSR bits. Hence, with bridges, the total available bandwidth of a DQDB backbone remains equal to the transmission rate of a single bus. 6. Simulation environment The results presented in the following section have all been derived using a commercial simulation packag- NETWORK II.5 [14]. For comparison purposes, both FDDI and DQDB have been modelled for similar network configurations and similar LAN traffic. Both run at the. I....'....'. L....,.. I...-. A..... I.... _ I -... _I.. ~. L... I -. -.,... _ I_ _ ~. _ _.,...~..., ". ~ User location..,., t 1 0 k m +50km +100hm-+r200km Figure 6. Unfair behaviour of DQDB for various stations at different positions on the bus. 130

6 A comparison of DQDB and FDDl for the interconnection of LANs Node Number -+ Unbalanced + 6W6-M = 8 BWB-M = 4 Figure 7. impact of bandwidth balancing mechanism on the fairness of DQDB Total Load (Mbps) I DQDB(BWB-M = 6) + FDDlmRT =4 ms) X FDDI(TTRT= 8 ms) I Figure 8. Performance comparison of DQDB and FDDl subnetworks (frame size = 64 bytes, network size = 100 km). transmission rate of 100Mbps. In DQDB, each frame is transmitted on both buses and, to keep the same bandwidth, a single FDDI ring is used. The physical size of the backbone is varied from 1!un to 300 b. The TTRT values used for FDDI are 4 and 8 milliseconds. The bandwidth balancing modulus (BWB- M) values for DQDB vary from 4-8. Each backbone contains 10 bridges and each bridge connects two similar LANs to the backbone. The performance of each backbone type was measured for three frame and 1218bytes (to represent 131

7 ~ ~ R Ahmad and F Halsall Total Load (Mbps) + DODB(BW8-M-6) -e- FDDI(TRT=4mS) + FDDI(lTRT=BmS) Figure 9. Performance comparison of DQDB and FDDl subnetworks (frame size = 1218 bytes, networksize = 100 km). m 0 I Total Load (Mbps) + DQDB(BW5M = 6) + FDDl(rTRTr4 ms) X F DDIWT =8 ms) Figure 10. Performance comparison of DQDB and FDDl subnetworks (fmme size = 4000 bytes, network size = 100 km). CSMA/CD frames) and 4000bytes (to represent token ring.) The anival of frames at bridges from each of the LANs is exponentially distributed and the total traffic over the backbones is uniformly distributed between the bridges. The performance measures are. the mean response time of the backbone with varying offered load and the maximum effective throughput for various backbone sizes and varying traffic. The mean backbone response time is 132

8 A comarison of DQDB and FDDI for the interconnection of LANs defined as the delay between the frame arriving at the source bridge and the corresponding destination bridge receiving the entire frame. For the comparison of the two backbone subnetworks, the bridge processing overheads are assumed to be negligible. The presented simulation results are after the steady state network conditions have been reached. 7. Simulation results As indicated earlier, a feature of a DQDB subnetwork is that, under heavy load conditions, the access delay of stations varies depending on their position on the bus. This is shown in figure 6. Station numbers indicate their relative position on the bus; station 1 is close to the head of bus A and station 10 is close to the bead of bus B. To simulate heavy load conditions, all stations always have a segment ready to transmit on bus A. As seen from the graphs the stations located in the middle experience longer access delays. Also the extent of unfairness increases with increasing network size. Stations located next to the bus heads always show a better performance. Such unfairness is unacceptable for backbone networks and it is for this reason that the bandwidth balancing (BWB) mechanism has been introduced. To implement the BWB mechanism, each station has a BWB counter which is incremented after every transmission. Then, whenever the BWB counter reaches a limit known as the BWB-modulus, M, the RQ counter is incremented by one thereby forcing the station to let a free slot pass. The impact of using a BWB - M = 4 and 8 for a 200km network is shown in figure 7. The network still shows a level of unfairness with a BWB - M = 8 and completely fair with a BWB - M = 4. From other simulation results it was found that a BWB - M = 6 for lookm and 8 for smaller network sizes is suitable. Hence in the rest of the simulation results presented, these BWB - M values have been used for corresponding network sizes. The performance comparison of FDDI and DQDB backbones for various frame sizes is presented in figures The backbone size is lookm and the total offered load varies from 1 to 100Mbps. A frame size of 64bytes has been used for the results in figure 8. The effective throughput of a FDDI backbone is 60.5 Mbps with a TTRT = 4 and 65.5 Mbps with a ltrt = 8. The DQDB backbone gives a throughput of only 39.6Mbps with this frame size. The MAC frame encapsulation overheads are responsible for the low throughputs in both types of backbone. The segmentation overheads in DQDB further reduce the effective throughput. After encapsulation, the 64 byte MAC frame size is increased to 92 bytes to form an IMPDU with DQDB which, in turn, requires 3 slots. For larger frames, the impact of encapsulation overheads is relatively small as shown in figures 9 and 10. These are for 1518byte and 4000 byte frame sizes respectively. Similar results have also been reported in 1151 for a different traffic model. For both FDDI and DQDB, the backbone response times are Backbone Size (km) (byte) (byte) -e, (byte) Figure 11. Maximum throughput of DQDB and FDDI subnetworks at various frame and network sizes. 133

9 R Ahmad and F Halsall relatively low. The DQDB has relatively lower delays within its effective bandwidth range compared to FDDI. Using a "RT=8, the FDDI throughput is further increased compared with a TTRT = 4. The maximum throughput obtained for different frame sizes with varying backbone lengths is shown in figure 11. As can be seen, for a 1 km FDDI backbone (TTRT = 4), 99 Mbps throughput can be obtained with a 4000 byte frame size. Also, the throughput of FDDI decreases with longer distances whilst there is almost no change 'U the throughput with DQDB. 8. Conclusions This paper has presented simulation results relating to the use of FDDI and DQDB networks for the interconnection of LANs. Both networks have been used as backbone subnetworks and the effect on their performance of veing operational parameters investigated. In the case of DQDB, the unfair access delay of stations in relation to their position on the bus has been identified and the effect of the use of a bandwidth balancing mechanism demonstrated. It may be concluded from the throughput delay graphs that both networks give a low access delay up to their throughput limits. However the FDDI backbone gives a higher maximum throughput for all frame sizes providing the network size is less than 140km. This is particularly the case with the lowest frame size because of the larger segmentation overheads with DQDB. For distances greater than 140!un, then DQDB gives a better throughput for the larger frame sizes which demonstrates its appeal for metropolitan area networks. References [I] Draft of Proposed IEEE Standard Distributed Queue Dual Buses (DQDB) Subnetwork of a Metropolitan Area Network (MAN) 1990 Media Access Control (MACJ and Physical Luyer Protocol Documents Draft P802.6D12 [2] American National Standard 1989 FDDI Token-Ring Media Access Control (MAC) ANSI X [3] Backes F 1988 Transparent bridges for interconnection of leee SO2 LANs IEEE Network 2 (1) 5-9 [4] Draft of Proposed IEEE standard MAC Bridges 1989 DraftP802.1 dd8 [51 Ahmad R and Halsall F 1992 Performance analysis of bridged LANs IEE Proc. E [6] Ahmad R and Halsall F 1993 Interconnecting high-speed LANs and backbones IEEE Network 7 (5) [q Ross F E and Hamstra I R 1993 Forging FDDI IEEE J. Selected Areus Commun Jain R 1993 FDDI: Current issues and future plans IEEE Commun.Mug.31(31) Dykeman D and Bux W 1988 Analysis and tuning of the FDDI media access control protocol IEEE J. Selected Areas Commun Jain R 1991 Performance analvsis of FDDI token rinr networks: effect of paramete& and guidelines for setting TTRT IEEE LTS 2 (2) [ll] Hahne E L, Choudhuy A K and Maxemchuk N F 1992 DODB networks with and without bandwidth balancinr IEEE Trans. Commun Halsall F 1992 Data Communications, Comouter Networks and Open Systems 3rd edn (Reading, 'MA Addison- Wesley) [13] Zukerman M and Potter P 1990 A protocol for eraser node implementation within the DQDB framework Proc. IEEE GLOBECOM' 90 Vo13 (New York: IEEE) pp 1400 [14] Network D User's Manual, Version 7.0 CACI Producs Company, La Jolla, California 1151 Wainwright N and Myles A 1989 A comparison of FDDI Fiber Optic Network with the Engineering IEEE Metropolitan Area. Network IEE Coll. on Fiber Optic LANs and Techniques for the Local Loop (London) (London: IEE) Digest No

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

DQDB. Distributed Queue Dual Bus (DQDB) DQDB is a MAN. Unlike FDDI, DQDB is an IEEE standard: 802.6

DQDB. Distributed Queue Dual Bus (DQDB) DQDB is a MAN. Unlike FDDI, DQDB is an IEEE standard: 802.6 DQDB Distributed Queue Dual Bus (DQDB) DQDB is a MAN. Unlike FDDI, DQDB is an IEEE standard: 802.6 1 Topology: Dual Bus DQDB (cont d) Head End Host Host Host Host Head End 2 DQDB Frame Format 53-byte frame

More information

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

More information

Switched Multimegabit Data Service (SMDS)

Switched Multimegabit Data Service (SMDS) CHAPTER 14 Switched Multimegabit Data Service (SMDS) Background Switched Multimegabit Data Service (SMDS) is a high-speed, packet-switched, datagram-based WAN networking technology used for communication

More information

Switched Multimegabit Data Service

Switched Multimegabit Data Service CHAPTER 14 Chapter Goals Tell how SMDS works, and describe its components. Describe the operational elements of the SMDS environment, and outline its underlying protocol. Discuss related technologies.

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Performance Analysis of FDDI. By Raj Jain

Performance Analysis of FDDI. By Raj Jain Performance Analysis of FDDI By Raj Jain This paper is a modified version of "Performance Analysis of FDDI Token Ring Networks: Effect of Parameters and Guidelines for Setting TTRT," by Raj Jain, published

More information

THROUGHPUT IN THE DQDB NETWORK y. Shun Yan Cheung. Emory University, Atlanta, GA 30322, U.S.A. made the request.

THROUGHPUT IN THE DQDB NETWORK y. Shun Yan Cheung. Emory University, Atlanta, GA 30322, U.S.A. made the request. CONTROLLED REQUEST DQDB: ACHIEVING FAIRNESS AND MAXIMUM THROUGHPUT IN THE DQDB NETWORK y Shun Yan Cheung Department of Mathematics and Computer Science Emory University, Atlanta, GA 30322, U.S.A. ABSTRACT

More information

Figure 10.1 Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing.

Figure 10.1 Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing. Figure. Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing. (a) PCI =,,, 4 4 PCI =, 4 4 6 PCI = 6, Link/Port RT Link/Port RT Link/Port RT In Port PCI 4 Out Port PCI 4 6 Port

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

1999, Scott F. Midkiff

1999, Scott F. Midkiff Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

FDDI. L26 - Fibre Distributed Data Interface (FDDI) L26 - Fibre Distributed Data Interface (FDDI) FDDI - Fiber Distributed Data Interface

FDDI. L26 - Fibre Distributed Data Interface (FDDI) L26 - Fibre Distributed Data Interface (FDDI) FDDI - Fiber Distributed Data Interface FDDI - Fiber Distributed Data Interface FDDI Fiber Distributed Data Interface Principles, Framing and Procedures set of standards defining a shared media 100 Mbps LAN (MAN) main topology: dual ring of

More information

Computer Communication Networks

Computer Communication Networks Chapter 3 Computer Communication Networks Objective of this chapter: The performance of any distributed system is significantly dependent on its communication network. The performance of the computer network

More information

Chapter 15 Local Area Network Overview

Chapter 15 Local Area Network Overview Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

DESIGN AND IMPLEMENTATION OF A CAN / ETHERNET BRIDGE

DESIGN AND IMPLEMENTATION OF A CAN / ETHERNET BRIDGE DESIGN AND IMPLEMENTATION OF A CAN / ETHERNET BRIDGE H.Ekiz, A.Kutlu, M.D.Baba, E.T.Powner University of Sussex, Brighton BN1 9QT, United Kingdom Abstract The Controller Area Network (CAN) is a serial

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC Kang G. Shin Real-time Computing Laboratory EECS Department The University of Michigan Ann Arbor, Michigan 48109 &in Zheng Mitsubishi

More information

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Hello and welcome to today s lecture on high speed

More information

Local Area Network(LAN)

Local Area Network(LAN) Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Good day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc.

Good day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc. Computer Networks Prof. Sujoy Ghosh Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Token-Based MAC Good day. In the last lecture, we talked about various

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

FDDI by default supports Early Token Release. Below is the operation of FDDI ring.

FDDI by default supports Early Token Release. Below is the operation of FDDI ring. Lecture 9 Fault Tolerance FDDI is also built for fault tolerance. It is actually two networks, one going counter-clockwise and the other clockwise (as usually drawn). Normally only the primary links, i.e.

More information

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media

More information

LAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks

LAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks LAN Interconnection different interconnecting devices, many approaches 1 Need for ability to expand beyond single LAN; appears concept of Extended LAN, extending the number of attached stations and maximum

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

DQDB Networks with and without Bandwidth Balancing

DQDB Networks with and without Bandwidth Balancing DQDB Networks with and without Bandwidth Balancing Ellen L. Hahne Abhijit K. Choudhury Nicholas F. Maxemchuk AT&T Bell Laboratories Murray Hill, NJ 07974 ABSTRACT This paper explains why long Distributed

More information

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub Campus Network Design Thana Hongsuwan Ethernet Hub 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 1-2 Sending and receiving Ethernet frames

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr. Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

More information

Unit II. Part A (2 Marks)

Unit II. Part A (2 Marks) Unit II Part A (2 Marks) 1. Differentiate fast Ethernet and Gigabit Ethernet. Fast Ethernet increased speed from 10 to 100 megabits per second (Mbit/s). Gigabit Ethernet was the next iteration, increasing

More information

Chapter 11 in Stallings 10 th Edition

Chapter 11 in Stallings 10 th Edition Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Local Area Networks CONSYL Introduction to Computer Communications and Networks

Local Area Networks CONSYL Introduction to Computer Communications and Networks Local rea Networks 4/11/40 page 1 Faculty of Engineering, Kasetsart University Local rea Networks 1-1 LN characteristics confined within geographical area relatively high data rate under single management

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of

More information

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

CSE/EE 461 Section 2

CSE/EE 461 Section 2 CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan

More information

1. Data Link Layer Protocols

1. Data Link Layer Protocols 1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

Chapter 8 LAN Topologies

Chapter 8 LAN Topologies Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines

More information

More on LANS. LAN Wiring, Interface

More on LANS. LAN Wiring, Interface More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network

More information

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan

More information

Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Data Transport Networks

Data Transport Networks DC 8-1 DATACOMM John Abbott College JPC Data Transport Networks M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright 1998 JINBU Corp. All rights reserved DC 8-2 Data Transport

More information

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations

More information

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

1. Data Link Layer (Layer 2)

1. Data Link Layer (Layer 2) 1. Data Link Layer (Layer 2) The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: Allows the upper layers to access the media

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

LLC and Bridges. Raj Jain. Professor of CIS. The Ohio State University

LLC and Bridges. Raj Jain. Professor of CIS. The Ohio State University LLC and Bridges Professor of CIS Columbus, OH 43210 Jain@ACM.Org This presentation is available on-line at: http://www.cis.ohio-state.edu/~jain/cis677-00/ 7-1 Overview Logical Link Control Bridges Path

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS 15.1 Computer room networks require very high data rates and usually are concerned with transfer of large blocks of data. 15.2 Backend LAN: Backend networks

More information

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

More information

Campus Network Design

Campus Network Design Campus Network Design Thana Hongsuwan 2003, Cisco Systems, Inc. All rights reserved. 1-1 Content Ethernet Standard Transparent Bridges LAN Switches LAN and Switch Operation Loop Resolution Virtual LANs,

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

Troubleshooting Transparent Bridging Environments

Troubleshooting Transparent Bridging Environments Troubleshooting Transparent Bridging Environments Document ID: 10543 This information from the Internetwork Troubleshooting Guide was first posted on CCO here. As a service to our customers, selected chapters

More information

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7 Local rea Network! Question - What are the station types supported by HDLC? Describe each. References: Chapters 15 and 16 Stallings Chapters 14 and 16 Forouzan Study Guide 8 Review

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21! CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also

More information

LAN Overview (part 2) Interconnecting LANs - Hubs

LAN Overview (part 2) Interconnecting LANs - Hubs LAN Overview (part 2) CSE 3213 Fall 2011 1 November 2011 Interconnecting LANs - Hubs active central element of star layout each station connected to hub by two UTP lines hub acts as a repeater limited

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION TO DATA COMMUNICATION NETWORKS Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable.

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

PERFORMANCE OF INTERCONNECTING FDDI NETWORKS THROUGH ATM WHEN MANAGING VIDEO TRAFFIC *

PERFORMANCE OF INTERCONNECTING FDDI NETWORKS THROUGH ATM WHEN MANAGING VIDEO TRAFFIC * PERFORMANCE OF INTERCONNECTING FDDI NETWORKS THROUGH ATM WHEN MANAGING VIDEO TRAFFIC * David Andrés, Joan Vila, Jordi Domingo and Josep Solé Departament d Arquitectura de Computadors, Universitat Politècnica

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Local Area Networks. Ethernet LAN

Local Area Networks. Ethernet LAN Local Area Networks Ethernet 802.3 LAN -7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN -7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Metro technologies GE, SRP, RPR and more abbreviations. Lars Hanson, Stefan Lindeberg,

Metro technologies GE, SRP, RPR and more abbreviations. Lars Hanson, Stefan Lindeberg, Metro technologies GE, SRP, RPR and more abbreviations Lars Hanson, lha@cisco.com Stefan Lindeberg, stefan@lindeberg.net Agenda Introduction Gigabit Ethernet Cisco Spatial Reuse Protocol, SRP Building

More information

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Local Area Networks. Lecture 17 Fall Token Ring and FDDI Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science 1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we

More information

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Implement VTP. LAN Switching and Wireless Chapter 4 Modified by Tony Chen 10/01/2008

Implement VTP. LAN Switching and Wireless Chapter 4 Modified by Tony Chen 10/01/2008 Implement VTP LAN Switching and Wireless Chapter 4 Modified by Tony Chen 10/01/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you see any mistake on my PowerPoint

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 455 Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 Assistant Professor, Department of Computer Science and Engineering Punjabi University

More information