Network Topology. By Dr. Piya Techateerawat. Bus Topology Ring Topology Star Topology Fully Connected Topology. Combined Topology

Similar documents
Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 5. Medium Access Control

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Token Ring/IEEE 802.5

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

LAN PROTOCOLS. Beulah A AP/CSE

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Lecture 4b. Local Area Networks and Bridges

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Introduction to Networks and the Internet

Other Protocols. Arash Habibi Lashkari

Introduction to LAN Protocols

Data Link Protocols. TCP/IP Suite and OSI Reference Model

CHAPTER 8: LAN Standards

Contention Protocols and Networks

Ethernet. Networks: Ethernet 1

ก ก Information Technology II

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Part3. Local Area Networks (LAN)

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.

Link Layer and Ethernet

Introduction to LAN Protocols

Communicating over the Network

Integrating Information Systems: Technology, Strategy, and Organizational Factors

EECS 122, Lecture 7. Kevin Fall Jean Walrand

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

Lecture 05 Chapter 16 High Speed LANs

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Lecture 8: Switched Ethernet and Collision Domains

Local Area Networks (LANs) SMU CSE 5344 /

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Internet Architecture and Protocol

Unit II. Part A (2 Marks)

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

TYPES OF COMPUTER NETWORKS

Link Layer and Ethernet

Local Area Networks. Ethernet LAN

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Lecture 6: Example LAN: Ethernet

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

Local Area Networks (LANs) & Networks Inter-Connection Chapter 5

CSCI Spring Final Exam Solution

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Data Link Layer -2- Network Access

2. LAN Topologies Gilbert Ndjatou Page 1

Frames, Packets and Topologies

Medium Access Protocols

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Chapter 16 Networking

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks. Medium Access Sublayer (Part I)

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Campus Network Design

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

IEEE 802 LANs SECTION C

Data Link Layer -2- Network Access

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

The Medium Access Sublayer

IEEE standards for local area networks

M242 COMPUTER NETWORS AND SECURITY

Chapter 8 LAN Topologies

CS610- Computer Network Solved Subjective From Midterm Papers

QUESTION BANK UNIT-I

The following pages contain a guide for the installation

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

CSE/EE 461 Section 2

ET4254 Communications and Networking 1

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

Outline: Connecting Many Computers

Summary of MAC protocols

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Different network topologies

CS1302 / Computer Networks

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Computer Networks and Distributed Systems

Data and Computer Communications

Networking Technologies and Applications

Direct Link Communication II: Wired Media. Multi-Access Communication

The Link Layer and LANs. Chapter 6: Link layer and LANs

6th Slide Set Computer Networks

Introduction to Networking

Local Area Network Overview

Direct Link Communication II: Wired Media. Multi-Access Communication

Layer 2 functionality bridging and switching

CH : 15 LOCAL AREA NETWORK OVERVIEW

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Transcription:

By Dr. Piya Techateerawat Network Topology Bus Topology Ring Topology Star Topology Fully Connected Topology (Please refer to the 1 st lecture) Combined Topology

Local Area Network IEEE 802.3:- Ethernet Relation to OSI Network Layer Logical Link Control Medium Access Control Data Link Layer Physical Layer

Local Area Network IEEE 802.3:- Ethernet Transceiver Cable 5 Twisted Pairs 2 Pairs:- Send Data/Control 2 Pairs:- Receive Data/Control 1 Pair:- Power & Ground Support Multiple Devices (Multiplexers)

IEEE 802.3:- Ethernet Sequence of Activities:- 1. PC sends packet information to interface card 2. Interface creates frame and wait signal from transceiver 3. Transceiver detects quite, Frame is passing to the medium. (Operate with protocol:- CD, backoff, ) 4. At receiver, transceiver detects frame and pass to interface 5. Interface has CRC check and pass to PC. 6. PC validate data and pass to higher layer. Local Area Network

IEEE 802.3:- Ethernet Cable Specifications Type Detail Max Dist Max Rate 10 Base 5 50 ohm 10 mm diameter 500 m 10 Mbpsn 10 Base 2 50 ohm 5 mm diameter 185 10 Mbps 10 Broad 36 75 ohm coax cable 3600 10 Mbps 1 Base 5 unshielded twisted pair 250 1 Mbps 10 Base-T unshielded twisted pair 100 10 Mbps Repeater Local Area Network

IEEE 802.3:- Ethernet IEEE 802.3:- Ethernet Utilization U= 100 * (F/R) / (F/R + T*C) U= Percent Utilization R = Transmission Rate F = Number of bits in a frame T = Slot Time C = Number of Contention Intervals = (1-1/N) 1-N - 1 N = Number stations

IEEE 802.3:- Ethernet 802.3 LAN (10 Base 5) with 500 Stations connected to five 500-meter segments. The data rate is 10 Mbps, and the slot time is 51.2 µsec (standard). If all stations transmit with equal probability, what is the channel utilization using a frame size of 512 bytes? Ans: 82 % how to do this? IEEE 802.3:- Ethernet F = 512 *8 = 4096 bits F/R = 4096 bits/10mbps = 410 µsec C = (1-1/N) 1-N 1 = 1.716 where N = 500 U = 100* 410/ (410+51.2*1.716) = 82%

Local Area Network IEEE 802.5:- Token Ring Connected as Ring Topology Interface pass data to Ring Contention. Ring Contention is handled through a token. When token arrives:- If have nothing to send, pass the token. If have something, claim token remove from ring and then send data frame. Each station will check destination data until arrive receiver. Receiver pick data frame, generate new token and placing in the ring.

Local Area Network IEEE 802.5:- Token Ring

Local Area Network IEEE 802.5:- Token Ring What if Priority Data? QoS? Using Priority bits in AC (Access Control) If lower priority cannot claim the token. Who define token s priority? Reservation system.

IEEE 802.5:- Token Ring Only stations with a priority equal to or higher than the priority value contained in a token can seize that token. After the token is seized and changed to an information frame, only stations with a priority value higher than that of the transmitting station can reserve the token for the next pass around the network. When the next token is generated, it includes the higher priority of the reserving station. Stations that raise a token's priority level must reinstate the previous priority after their transmission is complete. IEEE 802.5:- Token Ring What if system is crashed/noise? Note: Unable drain frame called orphan frame Discussion 15-20 design the solution.

Local Area Network IEEE 802.5:- Token Ring Informal name:- Token Ring over Fiber Using 2 rings instead of 1.

IEEE 802.5:- Token Ring Incase that one station is down IEEE 802.5:- Token Ring FDDI Frame

IEEE 802.5:- Token Ring Slotted Ring It uses slot similar to token but act as an empty frame There are more than one slot in the ring. If slot arrive and empty the station filling data in slot Station cannot use the same slot to avoid monopolizing. Efficiency U = 100* (time to send a frame) (time to send a frame + time to send a token) Reference http://cfs9.tistory.com/upload_control/download.blog? fhandle=ymxvzze4nty1mebmczkudglzdg9yes5jb206 L2F0dGFjaC8xLzA2MDAwMDAwMDExNC5qcGc= @ 12/1/2009 http://www.cisco.com/en/us/docs/internetworking/te chnology/handbook/token-ring.html @ 12/1/2009 http://ik.ku.lt/lessons/konspekt/tinklai/10_03_network _architecture.htm http://www.cisco.com/en/us/docs/internetworking/te chnology/handbook/fddi.html