Chapter 8 LAN Technologies and Network Topology

Slides:



Advertisements
Similar presentations
Shape of a Network.
Advertisements

Data Communications and Networking
Computer Network Topologies
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 Fall 2005 LAN Technologies and Network Topology Qutaibah Malluhi Computer Science and Engineering Department Qatar University.
CSCI 4550/8556 Computer Networks Comer, Chapter 8: LAN Technology and Network Topologies.
CS335 Networking & Network Administration Wednesday, April 7 PacketsPackets, Frames, and Error DetectionFramesError Detection.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
Local Area Networks Chapter 17, Exploring the Digital Domain.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
NETWORK TOPOLOGIES HNC COMPUTING - Network Concepts 1 Network Concepts Topologies.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Local Area Networks.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
NETWORK TOPOLOGY. NETWORK TOPOLOGY The layout of a network Two major classes Physical Network Topology The physical layout of the network i.e. the arrangement.
Chapter 21 Topologies Chapter 2. 2 Chapter Objectives Explain the different topologies Explain the structure of various topologies Compare different topologies.
1 Network Topology 2 Introduction 8Physical and Logical Topologies 8Topologies 8Bus 8Ring 8Star 8Extended Star 8Mesh 8Hybrid.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Network Topologies.
Network Concepts Topologies
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
Chapter 11 Local Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis.
1 Part IV Local Area Networks (LANs). 2 Classification Terminology  Network technologies classified into three broad categories  Local Area Network.
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
NETWORK TOPOLOGY Network topology is the study of the arrangement or mapping of the elements of a network,especially the physical.
Chapter 1 : Computer Networks.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Network types Point-to-Point (Direct) Connection Dedicated circuit boards connected by cable; To transfer data from A to B: – A writes on its circuit board;
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Local Area Network Topology. LAN Architecture - Protocol architecture - Topologies - Media access control - Logical Link Control.
COMPUTER NETWORKS CS610 Lecture-7 Hammad Khalid Khan.
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
SIMS-201 Computer Networks.
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
IEEE standards.
Chapter 16 – Networking Outline 16.1 Introduction
CS4470 Computer Networking Protocols
Computer Network Collection of computers and devices connected by communications channels that facilitates communications among users and allows users.
Network Protocols.
CT301 LECTURE 8.
Nada Al Dosary CT 1502 Planning and Design of Communication Networks Local Area Networks (LANs) & Networks.
Computer Network Topologies
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
William Stallings Data and Computer Communications
Net301 lecture9 11/5/2015 Lect 9 NET301.
Telecommunication ELEC503
Computer Networks.
Understand Network Topologies and Access Methods
2 Basic Concepts: data and computer networking
Multiple Access Methods
Network Topology.
Network Topologies & Standards
Business Data Communications, 4e
广西医科大学 Computer Networking 网络课件 双语教学 模拟实验 计算机网络教研室.
7- chapter Seven Local Area Networks (LAN)
Chapter 4 Ethernet Technology
SIMS-201 Computer Networks.
Local Area Networks (LANs)
Multiple Access Methods
Chapter 2: Basic Concepts
Physical Topologies -K. M. THANVI
Presentation transcript:

Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI LocalTalk Wireless LAN

Direct Point-to-Point Communication used in early computer communications systems Advantages - Each point-to-point connection can use different network hardware, frame format, and bandwidth (fig 8.1) - Each point-to-point connection has exclusive access - Easy to enforce security and privacy Disadvantages - fully meshed network becomes exponentially expensive as number of nodes increases (fig 8.2) - number of direct connections required = (N2 - N) / 2

Local Area Networks (LANs) based on sharing the same communications medium. emerged in 1980’s in local communications as alternative to expensive, dedicated point-to-point connections shared networks confined to local communication because more time would be spent coordinating the of sharing of network and less time spent actually transmitting data if two nodes are separated farther apart Cost of providing high bandwidth is more expensive over long distance than over short distance Locality of reference: computers usually communicate to another nearby computer.

LAN Topologies Star network Ring network Bus network all computers attached to a central point such as a hub (fig 8.3) Fault tolerant advantage Ring network computers are logically arranged in circular loop (fig 8.4) Physical orientation may be different ( offices on various floors using token ring). One bad cable may disable the entire ring. Token ring may be logical ring but physical star. Bus network usually consist of a single shared long cable to which computers attach (fig 8.5) One bad cable may cripple the entire bus. Ethernet network can be logical bus but physical star.

Ethernet Network Manchester Encoding (fig 8.6) Originally a bus network (ANIM06_1.MOV) in which multiple computers share a single transmission medium. While one computer transmits a frame, all other computers must wait (fig 8.7) Uses CSMA (carrier sense multiple access with collision detect) (ANIM06_2.MOV) Uses binary exponential backup in recovering from collision. Delay time is doubled after each successive collision.

Wireless LAN Uses antennas to broadcast RF signals through air Carrier Sense Multiple Access with Collision Avoidance CSMA/CA (fig 8.8) IEEE 802.11b Up to 11 Mbps frequency hopping spread spectrum (FHSP) direct sequence spread spectrum (DSSS) radio frequencies in range of 2.4 GHz - 2.483 GHz IEEE 802.11a Up to 50 Mbps radio frequencies in range of 5 GHz

LocalTalk Network bus network designed by Apple. Uses modified CSMA/CA (a short message is sent to reserve the medium before transmitting a large message) Limited to 230 kbps Easy to install: daisy-chain computers (fig 10.9)

Token Ring Network token passing ring network (fig 8.9) IBM’s token ring operate at 16Mbps token is a special bit pattern or message different from normal data frames (bit stuffing of data may be used) only one token circulates the ring at any time. To send data, computer waits for token to arrive, transmit one frame, and then pass token to next node (ANIM06_3.MOV) guarantees fair access because nodes take turns.

FDDI Network Fiber Distributed Data Interconnect (FDDI) token ring technology operating at 100 Mbps using fiber. Uses counter rotating ring for fault tolerance (fig 8.10) Self healing Ring is still up if there is one break in the ring