COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.

Slides:



Advertisements
Similar presentations
Topic 7 Local Area Networks (LAN)
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
1 Fall 2005 LAN Technologies and Network Topology Qutaibah Malluhi Computer Science and Engineering Department Qatar University.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Ethernet Kenneth Castelino. Network Architecture - Protocols Physical: Actual signal transmission Data-Link: Framing / Error Detection Network: Routing.
CSCI 4550/8556 Computer Networks Comer, Chapter 8: LAN Technology and Network Topologies.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 8 Introduction to Networks and the Internet.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Media, LAN Technologies, and Network Topologies Lecture 5.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
Data Link Layer IS250 Spring 2010
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
Lecture 2 Computer Communications and Networks Boriana Koleva Room: C54 Phone:
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Introduction network Protocol
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Local Area Networks.
LAN Topologies and Standards Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Chapter 7 - LAN Technologies and Network Topology Direct point-to-point communication Connections in a point-to-point network Reducing the number of communication.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
Chapter 11 Local Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis.
1 Part IV Local Area Networks (LANs). 2 Classification Terminology  Network technologies classified into three broad categories  Local Area Network.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Chapter 8-10 Local Area Networks (LANs). Comparison 4e and 5e  Ch 7, 4eCh 8, 5e Ch 10, Forouzan  Ch 8, 4eCh 14, 5e Ch 13, Forouzan  Ch 9, 4eCh 13,
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
Chapter 8 LAN Technologies and Network Topology
SIMS-201 Computer Networks.
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
CS4470 Computer Networking Protocols
Network Protocols.
Advanced Computer Networks
CS 457 – Lecture 6 Ethernet Spring 2012.
Multiple Access Methods
7- chapter Seven Local Area Networks (LAN)
SIMS-201 Computer Networks.
Local Area Networks (LANs)
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Presentation transcript:

COMPUTER NETWORKS Lecture-8 Husnain Sherazi

Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star – Ring – Bus  Ethernet

Carrier Sense Multiple Access  A coordination scheme that defines how to take turns using a shared cable  A computer listens to the cable (carrier sense) – If the cable is idle then starts transmitting – If the cable is in use, then waits  If Simultaneous transmissions occur, the frames interfere with each other called a Collision

Collision Detection - CD  Signals from two computers will interfere with each other  Overlapping frames is called a Collision – No harm to hardware – Data from both frames is Garbled

Ethernet CD  Ethernet interfaces include hardware to detect transmission – Monitor outgoing signal – Garbled signal is interpreted as a collision  After collision is detected, computer stops transmitting  So, Ethernet uses CSMA/CD to coordinate transmissions

Recovery from Collision  Computer that detects a collision sends special signal to force all other interfaces to detect collision  Computer then waits for ether to be idle before transmitting – If both computers wait same length of time, frames will collide again – Standard specifies maximum delay, and both computers choose random delay less than maximum

Recovery from Collision  After waiting, computers use carrier sense to avoid subsequent collision – Computer with shorter delay will go first – Other computers may transmit later

Exponential Backoff  Even with random delays, collisions may occur  Especially likely with busy segments  Computers double delay with each subsequent collision  Reduces likelihood of sequence of collisions

Wireless LANs And CSMA/CA  Use radio signals at 2.4 GHz (IEEE )  Data rate at 11Mbps  Older devices use radio signals at 900MHz  Data rate of 2Mbps  Bluetooth specifies a wireless LAN for short distances  Shared medium - radio instead of coax

Limited Connectivity with Wireless  In contrast with wired LAN, not all participants may be able to reach each other – Low signal strength – Propagation blocked by walls, etc.  Can't depend on CD; not all participants may hear

Limited Connectivity with Wireless

CSMA/CA  Wireless uses Collision Avoidance rather than Collision Detection – Transmitting computer sends very short message to receiver – Receiver responds with short message reserving slot for transmitter  Response from receiver is broadcast, so all potential transmitters receive reservation

Collisions  Receiver may receive simultaneous requests – Results in collision at receiver – Both requests are lost – Neither transmitter receives reservation; both use backoff and retry  Receiver may receive closely spaced requests – Selects one – Selected transmitter sends message – Transmitter not selected uses backoff and retries

Local Talk  LAN technology invented by Apple that uses bus topology  Interface included with all Macintosh computers  Relatively low speed Kbps  Low cost (``free'' with a Macintosh); easy to install and connect  Uses CSMA/CA

Token Ring  Many LAN technologies that use ring topology use token passing for synchronized access to the ring  Ring itself is treated as a single, shared communication medium  Bits pass from transmitter, past other computers and are copied by destination

Token Ring  Hardware must be designed to pass token even if attached computer is powered down

Using the token  When a computer wants to transmit, it waits for the token  After transmission, computer transmits token on ring   Next computer ready to transmit receives token and then transmits

Token and Synchronization  Because there is only one token, only one computer will transmit at a time – Token is short, reserved frame that cannot appear in data – Hardware must regenerate token if lost

Token and Synchronization  Token gives computer permission to send one frame – If all ready to transmit, enforces ``Round-Robin'' access – If none ready to transmit, token circulates around ring

IBM Token Ring  Very widely used  Originally 4mbps, now 16Mbps  Uses special connector cable between computer and ring interface

FDDI  Fiber Distributed Data Interconnect (FDDI) is another ring technology – Uses fiber optics between stations – Transmits data at 100Mbps  Uses pairs of fibers to form two concentric rings

FDDI and Reliability  FDDI uses counter-rotating rings in which data flows in opposite directions   In case of fiber or station failure, remaining stations loop back and reroute data through spare ring  All stations automatically configure loop back by monitoring data ring

FDDI and Reliability

ATM – Star Network  Asynchronous Transfer Mode technology consists of electronic packet switches to which computers can connect  ATM switches form hub into which computers connect in a star topology  Computers get point-to-point connections - data from transmitter is routed directly through hub switches to destination – If none ready to transmit, token circulates around ring – If all ready to transmit, enforces ``Round-Robin'' access

ATM – Star Network

ATM Details  Transmits data at over 100Mbps  Uses fiber optics to connect computer to switch  Each connection includes two fibers

ATM Details

ATM Switches

Summary  CSMA/CD  Wireless LANs and CSMA/CA  Token Ring  FDDI  ATM