Introduction to LAN Protocols

Similar documents
Introduction to LAN Protocols

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

CN [Network Devices]

Chapter 6 Connecting Device

Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Different network topologies

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Bridging and Switching Basics

Full file at

CHAPTER 2 - NETWORK DEVICES

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

More on LANS. LAN Wiring, Interface

LAN Overview (part 2) Interconnecting LANs - Hubs

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

CH : 15 LOCAL AREA NETWORK OVERVIEW

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Chapter 15 Local Area Network Overview

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Interface The exit interface a packet will take when destined for a specific network.

Chapter 4 NETWORK HARDWARE

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Raj Jain. The Ohio State University Columbus, OH

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

LAN PROTOCOLS. Beulah A AP/CSE

Integrating Information Systems: Technology, Strategy, and Organizational Factors

ET4254 Communications and Networking 1

Lecture (04) Network Layer (Physical/Data link) 2

Introduction to Networking Devices

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

CCNA Exploration1 Chapter 7: OSI Data Link Layer

ก ก Information Technology II

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Data Link Layer -2- Network Access

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Lecture (04) Data link layer

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

1: Review Of Semester Provide an overview of encapsulation.

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Data Link Layer -2- Network Access

IT 2004 Data Communication & Networking

The Internet software layers

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

Data Link Layer, Part 5. Medium Access Control

Chapter 11 in Stallings 10 th Edition

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

LAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Layer 2 functionality bridging and switching

Local Area Network Overview

Computer Networks Principles LAN - Ethernet

Computer Network Architecture

Image courtesy Cisco Systems, Inc. Illustration of a Cisco Catalyst switch

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Chapter 6: Network Communications and Protocols

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

Computer Science Department 2 nd semester- Lecture13

ECE 333: Introduction to Communication Networks Fall 2001

NETWORKING COMPONENTS

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

2. LAN Topologies Gilbert Ndjatou Page 1

Data Communication. Chapter # 1: Introduction. By: William Stalling

Lecture (04 & 05) Data link layer fundamental

Switched Ethernet Virtual LANs

(Network Programming) Basic Networking Hardware

3.5 CONNECTING DEVICES

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Internet Architecture

1. Data Link Layer Protocols

Chapter 4: Network Access

Networks Hardware Components

CS610- Computer Network Solved Subjective From Midterm Papers

Lesson 1: Network Communications

Data Link Layer, Part 3 Medium Access Control. Preface

Full file at

Introducing Cisco Data Center Networking

Cisco Networking Academy Curriculum - Semester Three Scope and Sequence

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

1. Data Link Layer (Layer 2)

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Local Area Network(LAN)

Network &Network Devices Introduction. 2000, Cisco Systems, Inc. 1-1

Module 16: Distributed System Structures

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Transcription:

CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local-area network (LAN). Topics addressed focus on the methods and devices used in Ethernet/IEEE 802.3, Token Ring/IEEE 802.5, and Fiber Distributed Data Interface (FDDI). Subsequent chapters in Part II, LAN Protocols, address specific protocols in more detail. Figure 2-1 illustrates the basic layout of these three implementations. 2-1

What Is a LAN? Chapter 2 Figure 2-1 Three LAN Implementations Are Used Most Commonly FDDI Ethernet/IEEE 802.3 100BaseT Token Ring/IEEE 802.5 What Is a LAN? A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. LAN Protocols and the OSI Reference Model LAN protocols function at the lowest two layers of the OSI reference model, as discussed in Chapter 1, Internetworking Basics, between the physical layer and the data link layer. Figure 2-2 illustrates how several popular LAN protocols map to the OSI reference model. 2-2

Chapter 2 LAN Media-Access Methods Figure 2-2 Popular LAN Protocols Mapped to the OSI Reference Model LLC sublayer IEEE 802.2 Data link layer Physical layer MAC sublayer Ethernet IEEE 802.3 100BaseT Token Ring/IEEE 802.5 FDDI OSI layers LAN specification LAN Media-Access Methods Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing. In networks using CSMA/CD technology such as Ethernet, network devices contend for the network media. When a device has data to send, it first listens to see if any other device is currently using the network. If not, it starts sending its data. After finishing its transmission, it listens again to see if a collision occurred. A collision occurs when two devices send data simultaneously. When a collision happens, each device waits a random length of time before resending its data. In most cases, a collision will not occur again between the two devices. Because of this type of network contention, the busier a network becomes, the more collisions occur. This is why performance of Ethernet degrades rapidly as the number of devices on a single network increases. In token-passing networks such as Token Ring and FDDI, a special network packet called a token is passed around the network from device to device. When a device has data to send, it must wait until it has the token and then sends its data. When the data transmission is complete, the token is released so that other devices may use the network media. The main advantage of token-passing networks is that they are deterministic. In other words, it is easy to calculate the maximum time that will pass before a device has the opportunity to send data. This explains the popularity of token-passing networks in some real-time environments such as factories, where machinery must be capable of communicating at a determinable interval. For CSMA/CD networks, switches segment the network into multiple collision domains. This reduces the number of devices per network segment that must contend for the media. By creating smaller collision domains, the performance of a network can be increased significantly without requiring addressing changes. 2-3

LAN Transmission Methods Chapter 2 Normally CSMA/CD networks are half-duplex, meaning that while a device sends information, it cannot receive at the time. While that device is talking, it is incapable of also listening for other traffic. This is much like a walkie-talkie. When one person wants to talk, he presses the transmit button and begins speaking. While he is talking, no one else on the same frequency can talk. When the sending person is finished, he releases the transmit button and the frequency is available to others. When switches are introduced, full-duplex operation is possible. Full-duplex works much like a telephone you can listen as well as talk at the same time. When a network device is attached directly to the port of a network switch, the two devices may be capable of operating in full-duplex mode. In full-duplex mode, performance can be increased, but not quite as much as some like to claim. A 100-Mbps Ethernet segment is capable of transmitting 200 Mbps of data, but only 100 Mbps can travel in one direction at a time. Because most data connections are asymmetric (with more data traveling in one direction than the other), the gain is not as great as many claim. However, full-duplex operation does increase the throughput of most applications because the network media is no longer shared. Two devices on a full-duplex connection can send data as soon as it is ready. Token-passing networks such as Token Ring can also benefit from network switches. In large networks, the delay between turns to transmit may be significant because the token is passed around the network. LAN Transmission Methods LAN data transmissions fall into three classifications: unicast, multicast, and broadcast. In each type of transmission, a single packet is sent to one or more nodes. In a unicast transmission, a single packet is sent from the source to a destination on a network. First, the source node addresses the packet by using the address of the destination node. The package is then sent onto the network, and finally, the network passes the packet to its destination. A multicast transmission consists of a single data packet that is copied and sent to a specific subset of nodes on the network. First, the source node addresses the packet by using a multicast address. The packet is then sent into the network, which makes copies of the packet and sends a copy to each node that is part of the multicast address. A broadcast transmission consists of a single data packet that is copied and sent to all nodes on the network. In these types of transmissions, the source node addresses the packet by using the broadcast address. The packet is then sent on to the network, which makes copies of the packet and sends a copy to every node on the network. LAN Topologies LAN topologies define the manner in which network devices are organized. Four common LAN topologies exist: bus, ring, star, and tree. These topologies are logical architectures, but the actual devices need not be physically organized in these configurations. Logical bus and ring topologies, for example, are commonly organized physically as a star. A bus topology is a linear LAN architecture in which transmissions from network stations propagate the length of the medium and are received by all other stations. Of the three most widely used LAN implementations, Ethernet/IEEE 802.3 networks including 100BaseT implement a bus topology, which is illustrated in Figure 2-3. 2-4

Chapter 2 LAN Topologies Figure 2-3 Some Networks Implement a Local Bus Topology A ring topology is a LAN architecture that consists of a series of devices connected to one another by unidirectional transmission links to form a single closed loop. Both Token Ring/IEEE 802.5 and FDDI networks implement a ring topology. Figure 2-4 depicts a logical ring topology. Figure 2-4 Some Networks Implement a Logical Ring Topology A star topology is a LAN architecture in which the endpoints on a network are connected to a common central hub, or switch, by dedicated links. Logical bus and ring topologies are often implemented physically in a star topology, which is illustrated in Figure 2-5. A tree topology is a LAN architecture that is identical to the bus topology, except that branches with multiple nodes are possible in this case. Figure 2-5 illustrates a logical tree topology. 2-5

LAN Devices Chapter 2 Figure 2-5 A Logical Tree Topology Can Contain Multiple Nodes LAN Devices Devices commonly used in LANs include repeaters, hubs, LAN extenders, bridges, LAN switches, and routers. Note Repeaters, hubs, and LAN extenders are discussed briefly in this section. The function and operation of bridges, switches, and routers are discussed generally in Chapter 4, Bridging and Switching Basics, and Chapter 5, Routing Basics. A repeater is a physical layer device used to interconnect the media segments of an extended network. A repeater essentially enables a series of cable segments to be treated as a single cable. Repeaters receive signals from one network segment and amplify, retime, and retransmit those signals to another network segment. These actions prevent signal deterioration caused by long cable lengths and large numbers of connected devices. Repeaters are incapable of performing complex filtering and other traffic processing. In addition, all electrical signals, including electrical disturbances and other errors, are repeated and amplified. The total number of repeaters and network segments that can be connected is limited due to timing and other issues. Figure 2-6 illustrates a repeater connecting two network segments. Figure 2-6 A Repeater Connects Two Network Segments Repeater A hub is a physical layer device that connects multiple user stations, each via a dedicated cable. Electrical interconnections are established inside the hub. Hubs are used to create a physical star network while maintaining the logical bus or ring configuration of the LAN. In some respects, a hub functions as a multiport repeater. 2-6

Chapter 2 Review Questions A LAN extender is a remote-access multilayer switch that connects to a host router. LAN extenders forward traffic from all the standard network layer protocols (such as IP, IPX, and AppleTalk) and filter traffic based on the MAC address or network layer protocol type. LAN extenders scale well because the host router filters out unwanted broadcasts and multicasts. However, LAN extenders are not capable of segmenting traffic or creating security firewalls. Figure 2 7 illustrates multiple LAN extenders connected to the host router through a WAN. Figure 2-7 Multiple LAN Extenders Can Connect to the Host Router Through a WAN WAN LAN extender Review Questions Q Describe the type of media access used by Ethernet. A Ethernet uses carrier sense multiple access collision detect (CSMA/CD). Each network station listens before and after transmitting data. If a collision is detected, both stations wait a random time before trying to resend. Q Describe the type of media access used by Token Ring. A Token Ring passes a special type of packet called a token around the network. If a network device has data to send, it must wait until it has the token to send it. After the data has been sent, the token is released back on the network. Q Describe unicast, multicast, and broadcast transmissions. A A unicast is a transmission from one source to one destination. A multicast is a transmission from one source to many stations that register to receive the traffic. A broadcast is a transmission from one source to every station on the local network segment. 2-7

For More Information Chapter 2 For More Information Cisco s web site (www.cisco.com) is a wonderful source for more information about these topics. The Documentation section includes in-depth discussions on many of the topics covered in this chapter. Teare, Diane. Designing Cisco Networks. Indianapolis: Cisco Press, July 1999. 2-8