LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Similar documents
Data Link Layer, Part 3 Medium Access Control. Preface

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Data Link Layer, Part 5. Medium Access Control

Lecture 6: Example LAN: Ethernet

Chapter 8 LAN Topologies

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Ethernet. Networks: Ethernet 1

Networking Technologies and Applications

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Internet Architecture and Protocol

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Contention Protocols and Networks

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Introduction to Networks and the Internet

IEEE 802 LANs SECTION C

Local Area Networks (LANs) SMU CSE 5344 /

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Chapter 10: Local Area Networks

Lecture 4b. Local Area Networks and Bridges

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

LAN PROTOCOLS. Beulah A AP/CSE

CSE 461: Multiple Access Networks. This Lecture

ET4254 Communications and Networking 1

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Outline: Connecting Many Computers

Link Layer and Ethernet

Link Layer and Ethernet

1. Data Link Layer Protocols

Part3. Local Area Networks (LAN)

Chapter 15 Local Area Network Overview

Protocols for Multiaccess Networks

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Local Area Network Overview

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Data Link Layer -2- Network Access

TYPES OF COMPUTER NETWORKS

Direct Link Communication II: Wired Media. Multi-Access Communication

Campus Network Design

Unit II. Part A (2 Marks)

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Link Layer -2- Network Access

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Distributed Video Systems Chapter 4 Network Technologies

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Chapter 12 Multiple Access 12.1

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Summary of MAC protocols

EE 122: Ethernet and

Chapter 9. Ethernet. Part II

ก ก Information Technology II

1999, Scott F. Midkiff

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Computer Networks. Medium Access Sublayer (Part I)

2. LAN Topologies Gilbert Ndjatou Page 1

Module 15: Network Structures

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Medium Access Protocols

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Redes de Computadores. Medium Access Control

Chapter 9 Ethernet Part 1

CSCD 330 Network Programming Winter 2016

Computer and Network Security

CS610- Computer Network Solved Subjective From Midterm Papers

Lecture (04) Data link layer

Data and Computer Communications

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

ECE 4450:427/527 - Computer Networks Spring 2017

Zarządzanie sieciami telekomunikacyjnymi

Multiple Access Channels

Other Protocols. Arash Habibi Lashkari

Local Area Networks. Ethernet LAN

Computer Networks and Internet

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Layer: Collisions

Lecture (04 & 05) Data link layer fundamental

Transcription:

1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we will see how a group of computers can communicate to each other over a shared network. Point-to-Point Links LAN Topologies Example Bus Network: Ethernet Example Ring Network: IBM Token Ring Example Star Network: ATM Hardware Addressing First computers networks were point to point. LECT-4, S-3 LECT-4, S-4 Advantages Disadvantage Each connection can have appropriate hardware. Each connection can have its error detection, frame format and transmission protocol appropriate for the pair. Easy to enforce security and privacy. No sharing of bandwidth. (N 2 -N)/2 links. Too expensive! If we have 100 computers how many links will be needed to add another one? How do we manage wires? LECT-4, S-5 LECT-4, S-6

2 Sharing of Links The history of computer changed dramatically during 1960 s and 70s when researchers developed a form of computer network known as Local Area Network which use shared communication media to communicate to each other. Various LAN technologies vary based on how computers are connected, the voltage and modulation techniques and mechanism/ protocol to coordinate the communication. Primary benefit: Sharing reduces cost. Coordination Temporal & Geographical Locality of Reference in Computer Communication, also in Humans! LAN Topologies-1 Star Topology Computers Hub If sharing reduces cost why these techniques are not used for long distance communication? LECT-4, S-7 N links Reliability? LECT-4, S-8 LAN Topologies-2 LAN Topologies-3 Ring Topology Shared Bus Logical vs. Physical Topilogy N links, But 2 way reachability! But, Entire ring can stop if two wires are cut! LECT-4, S-9 1 link only LECT-4, S-10 Example Bus: Ethernet Invented in Xerox Palo Alto lab in early 1970s. DEC, INTEL, XEROX contributed. IEEE now controls it (IEEE802.3). Popular in campus labs. Example Bus: Ethernet (cont..) Maximum cable length 50 feet. Minimum distance between two computers must be 3 feet. Computers are connected by a single coaxial cable which is the ether. Operates at 10MBps speed. A faster version now operates at 100 Mbps (like this laptop). A later version operates at 1 Gbps (1000 Mbps) speed. LECT-4, S-11 LECT-4, S-12

3 How Ethernet Works? Carrier Sense Multiple Access (CSMA). Invented at University of Hawaii as ALOHA Protocol by Norman Abramson. How it Works: There is no centralized controller. A computer which wants to send listens for a carrier signal. When it detects no signal, it transmits a frame. When it transmits all other computers listen. Only the receiver opens the packet. All other listen, but do nothing. What if two computers send together? Collision: It is possible that more than one can start transmitting together. If two computers sense no carrier together they may try to transmit together. This is known as collision. How it is Resolved: On collision, each computer backs off. Picks a random delay d between 0 and R seconds Waits, and retransmits after d sec. If there is again collision, they perform binary exponential backoff, they double their delay range R. LECT-4, S-13 LECT-4, S-14 Data Delivery in Ethernet Bus Arbitration in Ethernet Click Here Click Here Apple LocalTalk another bus, but with reservation. LECT-4, S-15 LECT-4, S-16 Example: CSMA/CA Wireless LAN Example Ring: IBM Token Ring Uses Radio Frequency instead of a cable. Examples are NCR s WaveLAN, Solectek s AirLAN, Proxim s RageLAN. Developed by IBM in 1970s. Now it is also IEEE 802.5. Used almost in all IBM network, 2nd in popularity. A ring made of twisted pair cables and multi-station access units (MSAU). Operates at 16 Mbps How they work Uses 900 Mhz frequencies, permits 2Mbps data rate. They cannot directly use CD technique. Because of weak power all of them may not be within the reach of other. They use control message first. Once reply is received from the intended recipient only then the sender sends. Collision can happen during control message. Each ring can have at most 260 (76 UTP) stations. Performance is deterministic. That is handled using random backoff. LECT-4, S-17 LECT-4, S-18

4 How Token Ring Works? The communication is mediated by a circulating Token in the network. Not a CSAMA/CD Communication in Token Ring Token is a special reserved message. Bitstuffing is used often to avoid multiple token. Click Here LECT-4, S-19 LECT-4, S-20 Advantages of Token Ring If all has data to send, they take turn. It is fair. If none has data to send, the token circulates once in every millisecond. It is still fast because the ring is small and the token passing is done in hardware. Only problem is if only one computer fails it can halt all the communication. MAU can be made intelligent to continue token passing, even if the hardware is not there. But cannot recover from single link failure. There are other Token Passing technology, but IBM token ring is the most popular. Example Ring: FDDI (fiber distributed data internconnect) Developed by ANSI (X3T9.5) in mid 80s. Robust and fast. Popular as high speed LAN. Use special Optical Fiber as media (copper version is CDDI). Operates at 100MBps (8x15 or 10x10) Two counter rings in same fiber housing. Extremely robust. 2 km between segments with multimode fiber (100 m CDDI) What if both the links are cut together? LECT-4, S-21 LECT-4, S-22 How it Works? Example STAR: ATM Telephone companies have developed the asynchronous transfer mode switches in mid 80s. A serious contender in WAN. Uses Optical Fiber What if both the links are cut together? Operates at 100MBps/ 612 MBps Each link can be 2 km with multimode fiber LECT-4, S-23 LECT-4, S-24

5 Hardware Addressing LAN ADDRESSING & FRAMING How a computers identify which computer or computers should receive a copy of a given frame? Each station on a LAN is assigned a unique numeric value called a hardware address or the physical address. When a sender transmits a frame across the LAN, the sender includes the physical address of the intended recipient in the header. Although sharing allows all stations to receive a copy of the bits the LAN hardware on each station takes the address of each incoming frame to determine if it should accept the frame. How can CPU do any other thing when connected to a Network? 25 LECT-4, S-26 Network Interface Card Network Interface Card Each computer is connected to the network via a network interface card. NIC cards Handles: frame transmission and reception, compares the address with station s and physical address. checks CRC. Saves CPU when transmitting or receiving bits of a frame. Faster than CPU! LECT-4, S-27 LECT-4, S-28 Format of Physical Address Broadcast Address Address Forms: static addressing: hardware manufacture assigns unique physical address to each network interface. A static physical address does not change unless the hardware is replaced. Advanced configurable addressing customer can set a physical address. SA: +easy to maintain. +no conflict, but large address size. In addition to the NIC addresses, a network also generally reserves one particular address as broadcast address. Afterall, all NICs actually receive the packet anyway! LECT-4, S-29 LECT-4, S-30

6 Frame Format Example: Ethernet Frame Format Each LAN technology defines the exact frame format used with the technology. However, almost all frames has two parts. Header and Body. Preamble 64 (8 octates) 10101010.. synchronizes hardware. LECT-4, S-31 48 bits static destination and source address. 16 bit frame type describe content forms. 0800 IP Version 4 8035 Internet reverse ARP, etc. 46-1500 byte data. 32 bit CRC. IEEE assigns an unique hardware address to every NIC manufactured in this world! LECT-4, S-32 Example of Frame Types used with Ethernet Logical Link Control (LLC) Subnetwork Attachment Point (SNAP) Header It is important to have standard values for each types of content. However, there are too many standardization organizations! Solution is. LECT-4, S-33 IEEE 802.2 solution to multi standard organizations. LECT-4, S-34 Variations in Physical Topology Thick Ethernet A connection multiplexor can attach multiple networks using single transreceiver. 35 Media: Large coax. NIC is digital. Requires termination. LECT-4, S-36

7 Thin Ethernet Thin Ethernet Wiring Easy to Insert a new computer! LECT-4, S-37 LECT-4, S-38 Twisted Pair Ethernet Which is the best way to connect? Actually a Star! LECT-4, S-39 LECT-4, S-40 Summary Until now we have seen how a group of computers can be connected in a small area Network. In the next class we will how these links are established when every computer are not on the same network. But before that in the remaining time we will quickly overview the latest technology options available to us to build long distance links. Next Topic: Digital Trunk Lines LECT-4, S-41 42