11 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from notes By Lami Kaya, © 2009 Pearson Education.

Slides:



Advertisements
Similar presentations
1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from the notes By Lami Kaya, © 2009 Pearson Education.
Advertisements

Chapter 7 Data Link Layer
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
CSCI 4550/8556 Computer Networks Comer, Chapter 7: Packets, Frames, And Error Detection.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Chapter 9 Hardware Addressing & Frame Type Identification EE 526 Presentation by Ryan Star.
Review on Networking Technologies Linda Wu (CMPT )
COMPUTER NETWORKS.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Computer Communication and Networks Muhammad Waseem Iqbal Lecture # 07.
Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 5 Networks Communicating and Sharing Resources
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
Q and A for Chapter 7, 13 CS-332 Victor Norman. Coaxial Cable Q: What exactly is at the center of a coaxial cable? Is it just one wire in the middle?
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Chapter 4 Computer Networks – Part 1
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
1 Lecture 7 LAN Wiring, Physical Topology, and Interface Hardware Computer Networks CS 4316.
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
Telecommunications, the Internet, and Wireless Technology.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Models.
13-LAN, packets, frames and topologies Dr. John Abraham Professor UTPA.
WAN Transmission Media
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
NETWORKS. Example Web Browsing application Software Protocols involved Software NIC / Modem Hardware Telephone line / Co-axial cable / Air interface.
COMPUTER NETWORKS CS610 Lecture-13 Hammad Khalid Khan.
What we’ve learned so far Ch. 6 Ch. 7 Ch. 8 Ch. 10 Ch. 11.
The Concept of Universal Service
Chapter 9 Introduction To Data-Link Layer 9.# 1
Chapter Objectives In this chapter, you will learn:
A Taxonomy of Mechanisms for Multi-Access
Circuit Switching Circuit switching refers to a communication mechanism that establishes a path between a sender and receiver with guaranteed isolation.
Local Area Networks: Topologies
Computer Networks and Internets, 5e By Douglas E. Comer
Transmission Modes The term transmission mode to refer to the manner in which data is sent over the underlying medium Transmission modes can be divided.
Department of Engineering Science ES465/CES 440, Intro
TCP/IP Protocol Suite: Review
Chapter 4: Data Communication and Networks
13-LAN, packets, frames and topologies
Presentation transcript:

11 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from notes By Lami Kaya, © 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.

22 PART III Packet Switching and Network Technologies An overview of packet switching and packet technologies that use wired and wireless media

33 Chapter 13 Local Area Networks: Packets, Frames, and Topologies

44 Topics Covered 13.1 Introduction 13.2 Circuit Switching 13.3 Packet Switching 13.4 Local and Wide Area Packet Networks 13.5 Standards for Packet Format and Identification 13.6 IEEE 802 Model and Standards 13.7 Point-to-Point and Multi-Access Networks 13.8 LAN Topologies 13.9 Packet Identification, Demultiplexing, MAC Addresses Unicast, Broadcast, and Multicast Addresses Broadcast, Multicast, and Efficient Multi-Point Delivery Frames and Framing Byte and Bit Stuffing

Introduction This chapter –begins the part of the text that examines packet switching and computer network technologies –explains the IEEE standards model –concentrates on the concepts of hardware addressing and frame identification Later chapters –expand the discussion by considering the use of packets in Wide Area Networks –cover a variety of wired and wireless networking technologies that accept and deliver packets

Circuit Switching Circuit switching refers to a communication mechanism that establishes a path between a sender and receiver –with guaranteed isolation from paths used by other pairs of senders and receivers Circuit switching is usually associated with telephone technology –because a telephone system provides a dedicated connection between two telephones Next page figure illustrates the concept –Circuit switching networks use electronic devices to establish circuits

Circuit Switching 7 Telco network Subscriber loop

Circuit Switching Three general properties define a circuit switched paradigm: –Point-to-point communication means that a circuit is formed between exactly two endpoints –Separate steps for circuit creation, use, and termination distinguishes circuits that are switched (i.e., established when needed) from circuits that are permanent(usually called as “leased lines”) –Performance equivalent to an isolated physical path communication between two parties is not affected in any way by communication among other parties circuit switching must provide the illusion of an isolated path for each pair of communicating entities Switched circuits use a three-step process analogous to placing a phone call –a circuit is established between two parties--Initialize –the two parties use the circuit to communicate--Maintain –the two parties terminate use--Terminate

Packet Switching A packet switching system uses statistical multiplexing –multiple sources compete for the use of shared media Figure 13.2 (below) illustrates the concept

Packet Switching A packet switching system requires a sender to divide each message into blocks of data that are known as packets –the size of a packet varies –each packet switching technology defines a maximum packet size Three general properties define a packet switching Arbitrary, asynchronous communication –allows a sender to communicate with one recipient or multiple recipients a given recipient can receive messages from one sender or multiple senders –communication can occur at any time and a sender can delay arbitrarily long between successive communications No set-up required before communication begins –system remains ready to deliver a packet to any destination at any time a sender does not need to perform initialization before communicating –system does not need to notify the underlying system when communication terminates Performance varies due to statistical multiplexing among packets –multiplexing occurs among packets rather than among bits or bytes

Packet Switching One of the chief advantages of packet switching is the lower cost that arises from sharing To provide communication among N computers –With a circuit-switched network must have a connection for each computer plus at least N/2 independent paths –With packet switching, a network must have a connection for each computer, but only requires one path that is shared

12 Circuit vs Message vs Packet switching Used in telegraph

Local and Wide Area Packet Networks Packet switching technologies are commonly classified according to the distance they span –The least expensive networks use technologies that span a short distance (e.g., inside a single building) –The most expensive span long distances (e.g., across several cities) Figure 13.3 (below) summarizes the terminology used

14

Standards for Packet Format and Identification Each packet sent across such a network must contain the identification of the intended recipient All senders must agree on the exact details of how to identify a recipient and where to place the identification in a packet Standards organizations create protocol documents that specify all details Standards have been created by various organizations –Institute for Electrical and Electronic Engineers (IEEE) is most famous In 1980, IEEE organized the Project 802 LAN/MAN Standards Committee to produce standards for networking

16 Protocol Definition: “A strict rule that governs the interactions between communicating entities” Defines : –Format of messages –Interaction mechanism –Electrical specification –Physical dimensions of interface –Etc.

17 TCP/IP Protocol Suite LAN Protocols defined by IEEE

Standards for Packet Format and Identification IEEE is mostly composed of engineers who focus on the lower two layers of the protocol In fact, if one reads the IEEE documents –it may seem that all other aspects of networking are unimportant However, other standards organizations exist –and each emphasizes particular layers of the stack Figure 13.4 gives a humorous illustration of a protocol as viewed by various standards organizations, such as –IEEE (Institute of Electrical and Electronics Engineers (IEEE) –World Wide Web Consortium (W3C) –Internet Engineering Task Force (IETF) The point is :Each standards organization focuses on particular layers of the protocol stack

Standards for Packet Format and Identification 19

IEEE 802 Model and Standards IEEE divides Layer 2 of the protocol stack into two conceptual sub-layers, as Figure 13.5 (below) illustrates –The Logical Link Control (LLC) sublayer specifies addressing and the use of addresses for demultiplexing as described later in the chapter –The Media Access Control (MAC) sublayer specifies how multiple computers share underlying medium

21

IEEE 802 Model and Standards IEEE assigns a multi-part identifier of the form XXX.YYY.ZZZ – XXX denotes the category of the standard – YYY denotes a subcategory –If a subcategory is large enough, a third level can be added IEEE has created many working groups that are each intended to standardize one type of network technology –Each working group consists of representatives from the industrial and academic communities; meets regularly to discuss approaches and devise standards –IEEE allows a working group to remain active provided the group makes progress and the technology is still deemed important –If a working group decides that the technology under investigation is no longer relevant, the group can decide to disband

23 IEEE Standards IEEE Bridging (networking) and Network ManagementIEEE 802.1Bridging (networking) IEEE Logical link control (inactive)IEEE 802.2Logical link control IEEE EthernetIEEE 802.3Ethernet IEEE Token bus (disbanded)IEEE 802.4Token bus IEEE Defines the MAC layer for a Token Ring (inactive)IEEE 802.5Token Ring IEEE Metropolitan Area Networks (disbanded)IEEE 802.6Metropolitan Area Networks IEEE Broadband LAN using Coaxial Cable (disbanded)IEEE IEEE Fiber Optic TAG (disbanded)IEEE IEEE Integrated Services LAN (disbanded)IEEE IEEE Interoperable LAN Security (disbanded)IEEE IEEE Wireless LAN & Mesh (Wi-Fi certification)IEEE Wireless LANWi-Fi IEEE demand priority (disbanded)IEEE IEEE Not Used IEEE Cable modems (disbanded)Cable modems IEEE Wireless PANIEEE Wireless PAN –IEEE (Bluetooth certification)IEEE Bluetooth –IEEE (ZigBee certification)IEEE ZigBee IEEE Broadband Wireless Access (WiMAX certification)IEEE Broadband Wireless AccessWiMAX –IEEE e (Mobile) Broadband Wireless AccessIEEE e IEEE Resilient packet ringIEEE IEEE Radio Regulatory TAGIEEE IEEE Coexistence TAGIEEE IEEE Mobile Broadband Wireless AccessIEEE IEEE Media Independent HandoffIEEE IEEE Wireless Regional Area NetworkIEEE

Point-to-Point and Multi-Access Networks LAN technologies allow multiple computers to share –a medium in such a way that any computer on the LAN can communicate with any other –we use the term multi-access to describe this and we say that a LAN is a multi-access network In general, LAN technologies provide direct connection among communicating entities Professionals say that LANs connect computers –with the understanding that a device such as a printer can also connect to a multi-access LAN

LAN Topologies Many LAN technologies have been invented –How specific technologies are similar and how they differ? Each network is classified into a category according to its topology or general shape This section describes four basic topologies that are used to construct – Bus Topology – Ring Topology – Mesh Topology – Star Topology Figure 13.7 illustrates the topologies

LAN Topologies 26

LAN Topologies Bus Topology Bus topology usually consists of a single cable to which computers attach The ends of a bus network must be terminated –to prevent electrical signals from reflecting back along the bus Any computer attached to a bus can send on the cable –and all computers receive the signal Because all computers attach directly to the cable –any computer can send data to any other computer The computers attached to a bus network must coordinate – to ensure that only one computer sends a signal at any time

LAN Topologies Ring Topology Ring topology arranges for computers to be connected in a closed loop –a cable connects the first computer to a second computer, another cable connects the second computer to a third, and so on, until a cable connects the final computer back to the first –name ring arises because one can imagine the computers and the cables connecting them arranged in a circle as Figure 13.7 illustrates In practice, the cables in a ring network do not form a circle Instead, they run along hallways or rise vertically from one floor of a building to another Ring topology requires a computer to connect to a small device that forms the ring –this is needed for the ring to continue operation even if some of the computers are disconnected

LAN Topologies Mesh Topology A network that uses a mesh topology provides a direct connection between each pair of computers The chief disadvantage of a mesh arises from the cost: –A mesh network connecting n computers requires: –The important point is that the number of connections needed for a mesh network grows faster than the number of computers Because connections are expensive –few LANs employ a mesh topology in special circumstances

LAN Topologies Star Topology In star topology, all computers attach to a central point The center of a star network is often called a hub A typical hub consists of an electronic device –that accepts data from a sending computer and delivers it to the appropriate destination In practice, star networks seldom have a symmetric shape (hub is located an equal distance from all computers) –Instead, a hub often resides in a location separate from the computers attached to it For example, computers can reside in individual offices, while the hub resides in a location accessible to an organization's networking staff

LAN Topologies The Reason for Multiple Topologies Each topology has advantages and disadvantages A ring makes it easy for computers to coordinate access and to detect whether the network is operating correctly –However, an entire ring network is disabled if one of the cables is cut A star helps protect the network from damage to a single cable because each cable connects only one machine A bus requires fewer wires than a star, but has the same disadvantage as a ring –a network is disabled if someone accidentally cuts the main cable Later chapters that describe specific network technologies provide additional details about differences

Packet Identification, Demultiplexing, MAC Addresses IEEE has created a standard for addressing Consider packets traversing a shared medium as Figure 13.2 (below) illustrates

Packet Identification, Demultiplexing, MAC Addresses Each packet that travels across the shared medium is intended for a specific recipient –and only the intended recipient should process the packet Demultiplexing uses an identifier known as an address Each computer is assigned a unique address –and each packet contains the address of the intended recipient In the IEEE addressing scheme, each address consists of 48 bits; IEEE uses the term Media Access Control address (or simply MAC address) –networking professionals often use the term Ethernet address IEEE allocates a unique address for each piece of interface –Each Network Interface Card (NIC) contains a unique IEEE address assigned when the device was manufactured

Packet Identification, Demultiplexing, MAC Addresses IEEE assigns a block of addresses to each vendor –and allows the vendor to assign a unique value to each device –there is a 3-byte Organizationally Unique ID (OUI) OUI identifies the equipment vendor a 3-byte block that identifies a particular NIC Figure 13.8 (below) illustrates the division Com Intel OUI finder

Unicast, Broadcast, and Multicast Addresses The IEEE addressing supports three types of addresses –that correspond to three types of packet delivery Figure 13.9 (below) provides a summary

Unicast, Broadcast, and Multicast Addresses It may seem odd that the IEEE address format reserves a bit to distinguish between unicast and multicast –but does not provide a way to designate a broadcast address The standard specifies that a broadcast address consists of 48 bits that are all 1s –Thus, a broadcast address has the multicast bit set Broadcast can be viewed as a special form of multicast –Each multicast address corresponds to a group of computers –Broadcast address corresponds to a group that includes all computers on the network

Broadcast, Multicast, and Efficient Multi-Point Delivery Broadcast and multicast addresses are useful in LANs –because they permit efficient delivery to many computers To understand the efficiency –recall that a LAN transmits packets over a shared medium In a typical LAN –each computer on the LAN monitors the shared medium – extracts a copy of each packet –and then examines the address in the packet –determine whether the packet should be processed or ignored Algorithm 13.1 gives the algorithm a computer uses to process packets

Broadcast, Multicast, and Efficient Multi-Point Delivery

Frames and Framing Chapter 9 introduces the concept of framing –in synchronous communication systems it is used as a mechanism that allows a receiver to know where a message begins and ends In more general terms, framing refers to the structure added to a sequence of bits or bytes that allows a sender and receiver to agree on the exact format of the message In a packet-switched network, each frame corresponds to a packet A frame consists of two conceptual parts: – Header that contains metadata, such as an address contains information used to process the frame – Payload that contains the data being sent contains the message being sent and is usually much larger than the frame header

Frames and Framing A message is opaque –in the sense that the network only examines the frame header –the payload can contain an arbitrary sequence of bytes that are only meaningful to the sender and receiver Some technologies delineate each frame by sending a short prelude before the frame and a short postlude after it Figure (below) illustrates the concept

Frames and Framing Assume that a packet header consists of 6 bytes –the payload consists of an arbitrary number of bytes We can use ASCII character set –the Start Of Header (SOH) character marks the beginning of a frame –and the End Of Transmission (EOT) character marks the end Figure (below) illustrates the format

Byte and Bit Stuffing In the ASCII character set –SOH has hexadecimal value 201 –EOT has the hexadecimal value 204 An important question arises –what happens if the payload of a frame includes one or more bytes with value 201 or 204? The answer lies in a technique known as byte stuffing –that allows transmission of arbitrary data without confusion

Byte and Bit Stuffing To distinguish between data and control information, such as frame delimiters –Sender changes a data to replace each control byte with a sequence –The receiver replaces the sequence with the original one –As a result, a frame can transfer arbitrary data and the underlying system never confuses data with control information The technique is known as byte stuffing –the terms data stuffing and character stuffing are sometimes used A related technique used with systems that transfer a bit stream is known as bit stuffing As an example of byte stuffing, consider a frame as illustrated in Figure 13.11

Byte and Bit Stuffing Because SOH and EOT are used to delimit the frame –those two bytes must not appear in the payload Byte stuffing reserves a third character to mark occurrences of reserved characters in the data –For example, suppose the ASCII character ESC (hex value 1B) has been selected as the third character –When any of the three special characters occur in the data the sender replaces the character with a two-character sequence Figure (below) lists one possible mapping

Byte and Bit Stuffing As the figure specifies –the sender replaces each occurrence of SOH by the two characters ESC + A –each occurrence of EOT by the characters ESC + B –and each occurrence of ESC by the two characters ESC + C A receiver reverses the mapping –by looking for ESC followed by one of A, B, or C and replacing the 2- character combination with the appropriate single character Figure shows an example payload and the same payload after byte stuffing has occurred –Note that once byte stuffing has been performed, neither SOH nor EOT appears anywhere in the payload

Byte and Bit Stuffing 46