1 3/13/ :25 Chapter 5Protocol Architecture1 Rivier College CS575: Advanced LANs Chapter 5: Protocol Architecture
2 3/13/ :25 Chapter 5Protocol Architecture2 IEEE 802 Protocol Layers Compared to OSI Model
3 3/13/ :25 Chapter 5Protocol Architecture3 Scope of LAN Protocols
4 3/13/ :25 Chapter 5Protocol Architecture4 Logical Link Control (LLC) Scenario
5 3/13/ :25 Chapter 5Protocol Architecture5 User Data and LAN/MAN Protocol Control Information
6 3/13/ :25 Chapter 5Protocol Architecture6 Generic MAC Frame Format
7 3/13/ :25 Chapter 5Protocol Architecture7 LAN Protocols in Context
8 3/13/ :25 Chapter 5Protocol Architecture8 Bridges 0 For interconnection of LANs that use identical protocols at the MAC layer (IEEE 802.3, FDDI) 0 Few reasons for using the bridges: -Reliability (the network can be partitioned into self-contained units) -Improve performance -Improve security of communications by allowing different types of traffic (e.g., accounting, personnel, strategic planning) and different types of users with different levels of security -Establish controlled and monitored mechanisms of communication -Geography
9 3/13/ :25 Chapter 5Protocol Architecture9 Bridge Operation
10 3/13/ :25 Chapter 5Protocol Architecture10 Protocol Architecture for Bridge
11 3/13/ :25 Chapter 5Protocol Architecture11 Routers 0 Router connects dissimilar networks and operates at layer 3 of the OSI model 0 Differences among networks include the following: -Addressing schemes (e.g., IEEE 802 LAN uses either 16-bit or 48-bit binary addresses for each attached device; an X.25 public frame-switching network uses 12-digit decimal addresses [encoded as 4-bit per digit for a 48-bit address]) -Maximum frame sizes (e.g., Ethernet imposes 1500-byte frame; X.25 – 1000-byte frame) -Interfaces (the concept of a router is independent of interfaces) -Reliability
12 3/13/ :25 Chapter 5Protocol Architecture12 Protocol Architecture for Router
13 3/13/ :25 Chapter 5Protocol Architecture13 Networking Devices
14 3/13/ :25 Chapter 5Protocol Architecture14 IEEE 802 Protocol Layers Compared to OSI Model
15 3/13/ :25 Chapter 5Protocol Architecture15 Organization of IEEE High Layer LAN Protocols Working Group Logical Link Control (LLC) Working Group Ethernet Working Group: CSMA/CD (Ethernet) Token Bus Working Group Token Ring Working Group Metropolitan Area Network Working Group Broadband Technical Advisory Group (TAG) Fiber Optic Technical Advisory Group (TAG) Isochronous LAN Working Group Security Working Group Wireless LAN Working Group Demand Priority Working Group (100VG-AnyLAN) Cable Modem Working Group Wireless Personal Area Networks Working Group Broadband Wireless Access Study Group
16 3/13/ :25 Chapter 5Protocol Architecture16 Effectiveness of the Cycle Redundancy Check (CRC) * Error-detection technique requires an Error-Detecting Code (e.g., CRC)