1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
1 Fall 2005 LAN Technologies and Network Topology Qutaibah Malluhi Computer Science and Engineering Department Qatar University.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Ethernet Kenneth Castelino. Network Architecture - Protocols Physical: Actual signal transmission Data-Link: Framing / Error Detection Network: Routing.
CSCI 4550/8556 Computer Networks Comer, Chapter 8: LAN Technology and Network Topologies.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Media, LAN Technologies, and Network Topologies Lecture 5.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
Data Link Layer IS250 Spring 2010
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Lecture 2 Computer Communications and Networks Boriana Koleva Room: C54 Phone:
Packet Transmission (Part III) Local Area Networks (LANs)
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Component 9 – Networking and Health Information Exchange Unit 1-2 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Local Area Networks.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Chapter 7 - LAN Technologies and Network Topology Direct point-to-point communication Connections in a point-to-point network Reducing the number of communication.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
Chapter Six The Data Link Layer. Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced.
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
1 Part IV Local Area Networks (LANs). 2 Classification Terminology  Network technologies classified into three broad categories  Local Area Network.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Chapter 8-10 Local Area Networks (LANs). Comparison 4e and 5e  Ch 7, 4eCh 8, 5e Ch 10, Forouzan  Ch 8, 4eCh 14, 5e Ch 13, Forouzan  Ch 9, 4eCh 13,
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Networking and Health Information Exchange Unit 1b ISO Open Systems Interconnection (OSI) Component 9/Unit 1b1 Health IT Workforce Curriculum Version 1.0/Fall.
Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
COMPUTER NETWORKS CS610 Lecture-13 Hammad Khalid Khan.
COMPUTER NETWORKS CS610 Lecture-7 Hammad Khalid Khan.
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
Chapter 8 LAN Technologies and Network Topology
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
CS4470 Computer Networking Protocols
Chapter 12 Multiple Access.
Local Area Networks: Topologies
Net301 lecture9 11/5/2015 Lect 9 NET301.
Multiple Access Methods
Data-link Layer Computer Networks.
Local Area Networks (LANs)
Multiple Access Methods
Presentation transcript:

1 LAN Technologies and Network Topology

2 Direct Point-to-Point Communication

3 Disadvantage of Point-to-Point Network

4 Classification Terminology Network technologies classified into three broad categories Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) LAN and WAN most widely deployed

5 The Local Area Network (LAN) Engineering classification Extremely popular (most networks are LANs) Many LAN technologies exist

6 Key Features of a LAN High throughput Relatively low cost Limited to short distance Often rely on shared media

7 Scientific Justification For Local Area Networks A computer is more likely to communicate with computers that are nearby than with computers that are distant. Known as the locality of reference principle

8 Topology Mathematical term Roughly interpreted as ‘‘geometry for curved surfaces’’

9 Network Topology Specifies general ‘‘shape’’ of a network Handful of broad categories Often applied to LAN Primarily refers to interconnections Hides details of actual devices

10 Star Topology Central component of network known as hub Each computer has separate connection to hub

11 Ring Topology No central facility Connections go directly from one computer to another

12 Bus Topology Shared medium forms main interconnect Each computer has a connection to the medium

13 Example Bus Network: Ethernet Most popular LAN Widely used IEEE standard Several generations –Same frame format –Different data rates –Different wiring schemes

14 Shared Medium In A LAN Shared medium used for all transmissions Only one station transmits at any time Stations ‘‘take turns’’ using medium Media Access Control (MAC) policy ensures fairness

15 Illustration of Manchester Encoding used with Ethernet Preamble –Sixty-four alternating 1’s and 0’s sent before the frame

16 Illustration of Ethernet Transmission Only one station transmits at any time Signal propagates across entire cable All stations receive transmission CSMA/CD media access scheme

17 CSMA/CD Paradigm Multiple Access (MA) –Multiple computers attach to shared media –Each uses same access algorithm Carrier Sense (CS) –Wait until medium idle –Begin to transmit frame Simultaneous transmission possible

18 CSMA/CD Paradigm – con’t Two simultaneous transmissions –Interfere with one another –Called collision CSMA plus Collision Detection (CD) –Listen to medium during transmission –Detect whether another station’s signal interferes –Back off from interference and try again

19 Backoff After Collision When collision occurs –Wait random time t 1, 0 ≤ t 1 ≤ d –Use CSMA and try again If second collision occurs –Wait random time t 2, 0 ≤ t 2 ≤ 2d Double range for each successive collision Called exponential backoff

20 Ethernet -- Collision Detection Collision detection can take as long as 2× One-way propagation delay

21 CSMA/CD A: sense channel, if idle then { transmit and monitor the channel; If detect another transmission then { abort and send jam signal; update # collisions; delay as required by exponential backoff algorithm; goto A } else {done with the frame; set collisions to zero} } else {wait until ongoing transmission is over and goto A}

22 Media Access on a Wireless Net Limited range –Not all stations receive all transmissions –Cannot use CSMA/CD Example in diagram –Maximum transmission distance is d –Stations 1 and 3 do not receive each other’ transmissions

23 Hidden and Exposed Terminal Effects (a) The hidden station problem. (b) The exposed station problem.

24 CSMA/CA Used on wireless LANs Both sides send small message followed by data transmission –‘‘X is about to send to Y’’ –‘‘Y is about to receive from X’’ –Data frame sent from X to Y Purpose: inform all stations in range of X or Y before transmission Known as Collision Avoidance (CA)

25 Wi-Fi Wireless LAN Technology Popular Uses CSMA/CA for media access Standards set by IEEE –802.11b (11 Mbps, shared channel) –802.11a (54 Mbps, shared channel) Named Wi-Fi by consortium of vendors (to enhance popular appeal)

26 Ring Topology Once a popular topology for LANs Bits flow in single direction

27 Token Passing Designed for ring topology Guarantees fair access Token –Special (reserved) message –Small (a few bits)

28 Token Passing Paradigm Station –Waits for token to arrive –Transmits one packet around ring –Transmits token around ring When no station has data to send –Token circulates continuously

29 Token Passing Ring Transmission Station waits for token before sending Signal travels around entire ring Sender receives its own transmission

30 Strengths Of Token Ring Approach Easy detection of –Broken ring –Hardware failures –Interference

31 Weaknesses Of Token Ring Approach Broken wire disables entire ring Point-to-point wiring –Awkward in office environment –Difficult to add/move stations

32 Failure Recovery In Ring Networks Automatic failure recovery Introduced by FDDI Uses two rings Terminology –Dual-attached –Counter rotating –Self healing

33 Illustration Of Failure Recovery Normal operation uses one of two rings Second ring used for loopback during failure

34 Token Passing Ring Technologies ProNet-10 –Operated at 10 Mbps IBM Token Ring –Originally operated at 4 Mbps –Later version operated at 16 Mbps Fiber Distributed Data Interconnect (FDDI) –Operates at 100 Mbps All are now virtually obsolete

35 Summary Local Area Networks –Designed for short distance –Use shared media –Many technologies exist Topology refers to general shape –Bus –Ring –Star

36 Summary – Con’t Address –Unique number assigned to station –Put in frame header –Recognized by hardware Address forms –Unicast –Broadcast –Multicast

37 Summary – Con’t Type information –Describes data in frame –Set by sender –Examined by receiver Frame format –Header contains address and type information –Payload contains data being sent

38 Summary – Con’t Currently popular LAN technology –Ethernet (bus) Older LAN technologies –IBM Token Ring –FDDI (ring) –ATM (star)

39 Summary – Con’t Wiring and topology –Can distinguish Logical topology Physical topology (wiring) –Hub allows Star-shaped bus Star-shaped ring