Local Area Networks: Topologies

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Repeaters can Mix PHY Standards Repeater NIC BNC AUI Connectors RJ-45 UTPDrop Cables 10Base5 Trunk Cable 10Base2 10Base-T.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-2 Local Area Networks (LANs) Frame.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Chapter 9 Hardware Addressing & Frame Type Identification EE 526 Presentation by Ryan Star.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
COMPUTER NETWORKS.
Data Link Layer IS250 Spring 2010
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Network Topologies An introduction to Network Topologies and the Link Layer.
Chapter 1-3 The Ethernet LAN. Ethernet The networking protocol used in most modern computer networks is Ethernet. Ethernet is a CSMA/CD LAN protocol.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
1 Ch 9 Hardware Addressing and Frame Type Identification.
1 Part IV Local Area Networks (LANs). 2 Classification Terminology  Network technologies classified into three broad categories  Local Area Network.
Ethernet Overview it the IEEE standard for Ethernet.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
CS470 Computer Networking Protocols Huiping Guo Department of Computer Science California State University, Los Angeles 2. Ethernet.
1 Hardware Addressing and Frame Type Identification.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Wired LAN Technology (Ethernet and 802.3). The Ethernet The first Ethernet was tested in – Invented by Robert Metcalfe in Xerox – Competitive technology:
Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.
What we’ve learned so far Ch. 6 Ch. 7 Ch. 8 Ch. 10 Ch. 11.
COMPUTER NETWORKS CS610 Lecture-7 Hammad Khalid Khan.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Multiple Access Methods
Datagram Forwarding.
IEEE standards.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Now (switched network)
Circuit Switching Circuit switching refers to a communication mechanism that establishes a path between a sender and receiver with guaranteed isolation.
COMPUTER NETWORKS CS610 Lecture-9 Hammad Khalid Khan.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
CS 457 – Lecture 6 Ethernet Spring 2012.
Chapter 5 Networks Communicating and Sharing Resources
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
Multiple Access Methods
Data-link Layer Computer Networks.
Protocol layering and data
Lecture 5- Data Link Layer
7- chapter Seven Local Area Networks (LAN)
Chapter 12 Local Area Networks
Protocol layering and data
Local Area Networks (LANs)
Chapter 12 Local Area Networks
Multiple Access Methods
13-LAN, packets, frames and topologies
Presentation transcript:

Local Area Networks: Topologies

Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. Demultiplexing uses the identifier known as an address. IEEE (Institute for Electrical and Electronic Engineers) allocates a unique address for each piece of network interface hardware, i.e., a network interface card (NIC) Media Access Control (MAC) address A device may have multiple MAC addresses depending on how many network interface cards it has.

48 bits in hexadecimal number

MAC Addresses Composition Vendor ID + NIC ID IEEE assigns a vendor ID VV:VV:VV:NN:NN:NN IEEE assigns a vendor ID Organizationally Unique ID (OUI) http://standards.ieee.org/regauth/oui/oui.txt The vendor assigns a unique NIC value to each device

Exercise: Find MAC address of your computer Start Command Prompt (Start Runcmd) and type ipconfig /all Do a google search to find the vendor name of the NIC of your computer

Compose a Packet: Step 1 I like you A packet consists of two conceptual parts: Header that contains metadata, such as an address Payload that contains the data being sent header payload 54:DD:91 11:CA:3B E8:25:32 46:C2:8F I like you 6 bytes dest. address 6 bytes source address 46-1500 bytes

Compose a Packet: Step 2 Framing: using extra bits to delineate the start and end of a frame SOH: Start of Header (ASCII code: 0000001) EOT: End of Transmission (ASCII code: 0000100) To enable computer to distinguish two packets, the SOH and EOT must be unique and different from the payload. Frame: Layer-2 packet SOH header payload EOT 1 byte 1 byte

Compose a Packet: Step 3 Add error checking code Cable Ethernet use Cyclic Redundancy Check (CRC), a form of channel coding for high-speed data network SOH header payload EOT CRC Cable modulation More on CRC: Chapter 8.13 – 8.14

How to Transmit a Packet? Depends on the network type and topology Three main categories of packet switching network:

LAN Example

LAN Topologies Each LAN is classified into a category according to its topology or general shape

Star Topology in Detail P-B NIC-B P-S P-A NIC-2 P-C NIC-A NIC-1 NIC-3 NIC-C NIC-4 P-D NIC-D

Star Topology in Detail Steps for P-A to send “I like you” to P-C: P-A will compose the packet P-A forwards the packet to NIC-A NIC-A calculates the CRC, adds SOH, EOT NIC-A modulates the packet  send out After a while, NIC-1 will receive the m-carrier NIC-1 demodulates the m-carrier and put the packet into a queue P-S checks this packet and find destination is “C” NIC-3 modulates the packet  send out After a while, NIC-C will receive the m-carrier NIC-C demodulates the packet and put it into its cache NIC-C does two checkings; If failed, the packet will be discarded Length checking: the payload should be between 46 and 1500 bytes CRC checking If the packet passes all checkings, NIC-C will strip off SOH, EOT, CRC, and forward “|C|A|I like you|” to P-C I like you C A CRC I like you SOH EOT C A

Bus Topology P-B P-D P-A P-C Bus topology usually consists of a single cable to which computers are attached. The ends of a bus network must be terminated. Preventing electrical signals from reflecting back along the bus. P-B P-D NIC-B NIC-D P-A NIC-A P-C NIC-C

Bus Topology in Detail Steps for P-A to send “I like you” to P-C: P-A will compose the packet P-A forwards the packet to NIC-A NIC-A calculates the CRC, adds SOH, EOT NIC-A modulates the packet  send out After a while, NIC-C will receive the m-carrier NIC-C demodulates the packet and put it into its cache NIC-C does address checking; if the packet is not for P-C, discard it NIC-C does length and CRC checkings; If failed, the packet will be discarded If the packet passes all checkings, NIC-C will strip off SOH, EOT, CRC, and send “|C|A|I like you|” to P-C I like you C A CRC I like you SOH EOT C A

Bus Topology When there is a signal on the bus, everybody can sense it. What if multiple computers are sending packets simultaneously? Collisions may happen!

Bus Topology: The Collision Problem Basic solution: CSMA (Carrier Sense Multiple Access) Before any packet is sent out, the sender will first senses its connecting point to see if the bus is idle. If nothing is sensed, it will send out a packet, otherwise it will wait until nothing is sensed. Q1: Do you believe that CSMA can avoid all collisions? No

Bus Topology: The Collision Problem Advanced solution: CSMA/CD (CD = Collisions Detection) During the whole transmission period of any packet (after it is send out) the sender keeps on sensing the bus. If any other m-carrier is sensed, stop transmitting instantly; wait for a random amount of time; then retransmit Q2: If collision occurs, who will detect the collision? Every computer will sense the collision

Bus Topology: The Collision Problem Advanced solution: CSMA/CD (CD = Collisions Detection) During the whole transmission period of any packet (after it is send out) the sender keeps on sensing the bus. If any other m-carrier is sensed, stop transmitting instantly; wait for a random amount of time; then retransmit Q3: Why do we wait a random amount of time? So that we are sure that there isn’t as great a chance that the packets collide again

Bus Topology: The Collision Problem Advanced solution: CSMA/CD (CD = Collisions Detection) During the whole transmission period of any packet (after it is send out) the sender keeps on sensing the bus. If any other m-carrier is sensed, stop transmitting instantly; wait for a random amount of time; then retransmit Q4: When a NIC senses a collided m-carrier, will the NIC card demodulate it? Yes. You have to demodulate the packet in order to know if it is corrupted

Bus Topology: The Collision Problem Advanced solution: CSMA/CD (CD = Collisions Detection) During the whole transmission period of any packet (after it is send out) the sender keeps on sensing the bus. If any other m-carrier is sensed, stop transmitting instantly; wait for a random amount of time; then retransmit Q5: When a NIC senses a collided m-carrier, will the NIC forward the packet to the computer? No. The packet will be discarded.

Why Different Topologies? Ring: Easy for computers to coordinate access and to detect whether the network is operating correctly An entire ring network is disabled if one of the cables is cut Star: Protecting the network from damage to a single cable No collisions at all Requiring more wires Bus: Fewer wires A network is disabled if someone accidentally cuts the main cable Difficult to add new devices if no tap exists. As such, bus topology is losing popularity but Plenty still around.