Integrating Information Systems: Technology, Strategy, and Organizational Factors

Similar documents
Outline: Connecting Many Computers

Introduction to LAN Protocols

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

CN [Network Devices]

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

ก ก Information Technology II

Chapter 4 NETWORK HARDWARE

What is a Network? A connection of two or more computers so that they can share resources.

Different network topologies

Introduction to LAN Protocols

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

CH : 15 LOCAL AREA NETWORK OVERVIEW

CHAPTER 2 - NETWORK DEVICES

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Chapter 2. Network Classifications (Cont.)

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Guide to Networking Essentials Fifth Edition. Chapter 2 Network Design Essentials

Chapter 6 Connecting Device

1: Review Of Semester Provide an overview of encapsulation.

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.

IT 2004 Data Communication & Networking

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Local Area Networks (LANs) & Networks Inter-Connection Chapter 5

Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

Local Area Network(LAN)

2. LAN Topologies Gilbert Ndjatou Page 1

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Computer Science Department 2 nd semester- Lecture13

Local Area Network Overview

Data Communication. Chapter # 1: Introduction. By: William Stalling

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Data Link Layer -2- Network Access

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

INTRODUCTION TO ICT.

Data Link Layer -2- Network Access

ET4254 Communications and Networking 1

More on LANS. LAN Wiring, Interface

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network

(Network Programming) Basic Networking Hardware

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

M242 COMPUTER NETWORS AND SECURITY

Full file at

Data and Computer Communications

Data Communications. Connecting Devices

Introduction to Networking Devices

Local Area Network(LAN)

Internet Architecture and Protocol

LAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Chapter One: Networking Fundamentals Computer Networks

CS610- Computer Network Solved Subjective From Midterm Papers

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Contents. Introduction to Networking. Preface...i. Introduction... xix

Silberschatz and Galvin Chapter 15

Fundamentals of Networking Introduction to Networking Devices

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Additional Slides (Basics) Intermediate Systems

CSCD 330 Network Programming Spring 2017

Summary of MAC protocols

Lesson 1: Network Communications

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Lecture 05 Chapter 16 High Speed LANs

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Data Link Layer, Part 5. Medium Access Control


Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Module 16: Distributed System Structures

Darshan Institute of Engineering & Technology for Diploma Studies

Medium Access Protocols

Lecture 4b. Local Area Networks and Bridges

NETWORKING COMPONENTS

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

CSE 461: Multiple Access Networks. This Lecture

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Highly Available Networks

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Chapter 4: Network Access

Introduction to Networks and the Internet

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

Data Link Layer, Part 3 Medium Access Control. Preface

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Lecture 8: Switched Ethernet and Collision Domains

Chapter 9 & 12: Wired LAN

Networks Hardware Components

Comp277 Assignment 1 Fall 2011 Due 20 th December 2011 at 11:00am

CS 3201 Computer Networks 2014/2015 Handout: Lab 3

Transcription:

MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications & Connectivity Among Information Systems Spring 2002 Lecture 7 LOCAL AREA NETWORKS (LAN)

LOCAL AREA NETWORKS (LAN) CONNECTING BETWEEN INFORMATION ENTITIES IN CLOSE PROXIMITY - USUALLY ON COMPANY PREMISES - LOCAL AREA NETWORK (LAN) CONNECTING BETWEEN INFORMATION ENTITIES IN DISTANT LOCATIONS - INTER-PREMISES NETWORK (IPN) / WIDE AREA NETWORK (WAN) INTER-PREMISES NETWORK (IPN) LOCAL-AREA NETWORK (LAN) LAN LAN LAN ENVIRONMENTS - GREAT DIVERSITY 2

TRADITIONAL MASTER-SLAVE LOCAL NETWORK MAINFRAME / PBX MODERN PEER-TO-PEER LOCAL NETWORKS SERVER MAINFRAME PC / WORKSTATIONS SERVER (PRINT/FILE/ COMMUNICATIONS) 3

LOCAL AREA NETWORK CHARACTERISTICS 1. COMMUNICATE AMONG INTELLIGENT DATA DEVICES 2. SMALL AREA (USUALLY SINGLE BUILDING, UP TO 50 KM) 3. USUALLY PRIVATELY OWNED 4. HIGH DATA RATES (1--100M BPS) NOVEL APPLICATIONS EMERGING Topography of vehicle multi-plex system with central control, modules for the instrument readings, lights, doors, seats, centre console and central rear light unit. 4

NETWORK TOPOLOGIES (LOGICAL VS PHYSICAL) STAR BUS RING 5

MEDIA ACCESS CONTROL--BUS BUS CARRIER SENSE MULTIPLE ACCESS WITH COLLISION DETECTION (CSMA/CD) ETHERNET (1972) AND IEEE 802.3 -- COLLISION HANDLING - IF COLLISION DETECTED, IMMEDIATELY STOP TRANSMISSION - WAIT RANDOM AMOUNT OF TIME, THEN RETRANSMIT (AMOUNT GROWS WITH EACH COLLISION) -- COLLISION DETECTION - SIGNAL EXCEEDS VOLTAGE LIMIT (2 OR MORE TRANSMISSIONS) - LIMITATION ON MIN PACKET SIZE AND CABLE LENGTH TO GUARANTEE COLLISION DETECTION VOLTAGE (e.g., 500 METERS) - COLLISION MUST BE PROPAGATED ACROSS REPEATERS 6

MEDIA ACCESS CONTROL--RING RING TOKEN RING -- IEEE 802.5 -- STATIONS FORM LOGICAL ORDERED RING -- CONTROL PACKET (TOKEN) REGULATES ACCESS -- TOKEN PASSED IN STATION ORDER (LOGICAL) CSMA/CD VERSUS TOKEN RING CSMA/CD TOKEN SIMPLER REGULATE TRAFFIC (HOLD PERIOD) NO TOKEN PASSING DELAY DETERMINISTIC (?) 7

MEDIA ACCESS CONTROL--RING TOKEN RING--IBM AND IEEE 802.5 EXAMPLE: A WANTS TO SEND DATA TO C SENDER LOOKS FOR FREE TOKEN A CHANGES FREE TOKEN TO BUSY TOKEN AND APPENDS DATA B FREE TOKEN D C A DATA B D RECEIVER COPIES DATA ADDRESSED TO IT. C A SENDER GENERATES FREE TOKEN UPON PHYSICAL TRANSMISSION HEADER (FROM ADDRESSEE) B FREE TOKEN D DATA C 8

BUSY TOKEN -- DESTINATION STATION ADDS STATUS INFO TO TOKEN -- SOURCE STATION REMOVES BUSY TOKEN (CHECK STATUS) ACTIVE MONITOR STATION -- DETECTS LOST TOKEN USING TIME-OUT -- DETECTS CIRCULATING BUSY TOKEN (VIA MONITOR BIT ) OTHERS STATIONS CHECK STATUS OF ACTIVE MONITOR -- TAKE ON ROLE IF NECESSARY ADVANTAGES -- TRAFFIC REGULATION -- DETERMINISTIC, ALSO ALLOWS PRIORITIES DISADVANTAGES -- TOKEN MAINTENANCE 9

-- -- -- -- -- -- BUS VERSUS RING TOPOLOGY BUS FAIRLY STRAIGHTFORWARD RING PROBLEMS (INITIALLY) CABLE VULNERABILITY: SINGLE BREAK FATAL REPEATER FAILURE: EACH REPEATER CRITICAL FAILURE LOCATION DETERMINATION: EACH REPEATER MUST BE EXAMINED INSTALLATION DISRUPTION: INSERTION OF NEW REPEATER NECESSARY RECOVERY CONTROL: HOW ARE PROBLEMS HANDLED (E.G., FAULTY ADDRESS) SIZE LIMITATION: EACH REPEATER ADDS TO DELAY AROUND RING 10

ENHANCED RING ARCHITECTURE CONCENTRATOR BOX -- CENTRALIZES REPEATERS Multi-Station Access Unit (MAU) 11

RING BRIDGES -- SPLITS LARGE RING INTO SMALLER RINGS BRIDGE NODE NODE NODE RING WIRING CONCENTRATIONS LOBE ACTIVE NODE TP LINKS LOBE BY-PASSED GATEWAY NODE E51 E52 12

BUS VERSUS RING TOPOLOGY (REVISITED) ADVANTAGES BUS - PASSIVE TAP - MEDIA FAILURE UNLIKELY RING -- REGENERATED BIT MINIMIZES ERROR PROPAGATION -- GREATER DISTANCES POSSIBLE (VIA BRIDGES) -- FAULT LOCATION CENTRALIZED -- SUITABLE FOR FIBER OPTICS [ e.g., FIBER DISTRIBUTED DATA INTERFACE ( FDDI ) ] 13

CSMA/CD BUS VS. TOKEN RING PERFORMANCE PERFORMANCE STUDY -- LIGHT LOAD: 1 OUT OF 100 STATIONS BUSY -- HEAVY LOAD: ALL 100 STATIONS BUSY RESULTS -- SHORTER PACKETS FAVOR TOKEN RING -- TOKEN RING LEAST EFFECTED BY LOAD -- CSMA/CD DETERIORATES UNDER HEAVY LOAD -- TOKEN RING HAS MORE DELAY UNDER LIGHT LOAD 14

CSMA/CD BUS VS. TOKEN RING PERFORMANCE 25 LIGHT LOAD: 1 station active out of 100 stations. 20 15 10 Token-ring CSMA/CD TOKEN-RING CSMA/CD 5 0 25 Comments: 2000 bits per packet 0 4 8 12 16 20 24 Axis: Data rates (M bps) HEAVY LOAD: 100 stations active out of 100 stations. 20 15 10 Token-ring TOKEN-RING CSMA/CD 5 0 CSMA/CD 0 4 8 12 16 20 24 15

IMPORTANT FACTORS SUMMARY POINTS WORKSTATIONS MORE POWERFUL & LANS PROLIFERATING FIBER COST DROPPING LANS INCREASINGLY INTERCONNECTED (LOCAL & WIDE AREA) HUB - CONNECTS PARTS OF NETWORK, TYPICALLY DIFFERENT PARTS OF SAME LAN BRIDGE - CONNECTS TWO LANS, TYPICALLY USING SOFTWARE SWITCH - CONNECTS DIFFERENT LANS, TYPICALLY USING HARDWARE ONLY ROUTER - CONNECTS TWO NETWORKS THAT MAY OR MAY NOT BE SIMILAR AND ROUTES PACKETS APPROPRIATELY GATEWAY - CONNECTS NETWORKS THAT USE DIFFERENT PROTOCOLS 16

APPENDIX: INTERCONNECTING LANs SOME TECHNIQUES REPEATER BRIDGE ROUTER GATEWAY Why use it? Extends cable longer than 500 meters (IEEE 802.3) Connects two LANs using same protocols - but different medium -(e.g. twisted pair cable + coaxial cable) Network routing of packets Routing between networks w/ different protocols Isolates a part of a LAN (no access) Can work as a level of security Connection between LAN and WAN w/ different protocols What does it do? Accepts signal and Amplifies it Extend cable 2,500 meters (4 segments) Interpret data link portion Determines to send to connected LAN Operates at Data link layer of OSI model Sophisticated bridge Chooses the best path for data transmission to avoid digital jams Operates at Network layer of OSI model Protocol converter Operates at Network layer of OSI model 17