Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.

Slides:



Advertisements
Similar presentations
CompTIA Network+ Chapter 2
Advertisements

1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
COMPUTER NETWORKS.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 1: Internetworking.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Computer Communication and Networks Muhammad Waseem Iqbal Lecture # 07.
For more notes and topics visit: eITnotes.com.
Instructor & Todd Lammle
1 LAN/WAN Interconnectivity Chapter 2. 2 Learning Objectives Explain the OSI reference model, which sets standards for LAN and WAN communications Discuss.
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Chapter 4 Local Area Networks. Layer 2: The Datalink Layer The datalink layer provides point-to- point connectivity between devices over the physical.
Semester 1 CHAPTER 3 Le Chi Trung
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Section 5.1 Explain why standards are necessary for networking
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Local Area Networks Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
Cisco – Chapter 3 LAN. LAN Teaching Topology physical topology is the actual layout of the wire (media) logical topology defines how the media is accessed.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
CT1303 LAN LECTURE 15.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
HNC COMPUTING - Network Concepts 1 Network Concepts Devices Introduction into Network Devices.
McGraw-Hill©The McGraw-Hill Companies, Inc. Chapter 9 Local Area Networks Part I: Basic Concepts and Wired Ethernet LANs.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
By: M.Nadeem Akhtar1 Data Communication Ch 10. By: M.Nadeem Akhtar2 Networks?  LAN  MAN  WAN.
Chapter2 Networking Fundamentals
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
The Saigon CTT Semester 1 CHAPTER 6 Le Chi Trung.
Sybex CCNA Chapter 2: Ethernet Networking and Data Encapsulation Instructor & Todd Lammle.
NET 324 D Networks and Communication Department Lec1 : Network Devices.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
Computer Networks Syed Md. Ashraful Karim Lecturer, CSE BU.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Unit 3 Physical Layer.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Computer Network Architecture Lecture 3: Network Connectivity Devices.
N ETWORKING Standards and Protocols. S TANDARDS AND P ROTOCOLS The OSI Model.
Simple LAN Topologies  Terminators stop signals after they have reached their destination  Signal bounce –Phenomenon in which signals travel endlessly.
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
CHAPTER -II NETWORKING COMPONENTS CPIS 371 Computer Network 1 (Updated on 3/11/2013)
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
Jaringan LAN Pertemuan 04 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2015 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 7: Networking Concepts IT Essentials v6.0.
Chapter 13 Wired LANs: Ethernet
Computer Networks.
Local Area Networks Honolulu Community College
Part III Datalink Layer.
Underlying Technology
ISO-OSI Reference Model and IEEE Standards
Physical and Logical Topologies
CCNA 1 Chapter 5 Ethernet Fundamentals
OSI Model The Seven Layers
Part III Datalink Layer.
Data Link Layer 2019/2/19.
Instructor: Mr. Malik Zaib
Chapter 13 Wired LANs: Ethernet
LEARNING COMPUTER NETWORKS OSI Model (layers). Why a layered model?  Easier to teach communication process.  Speeds development, changes in one layer.
Presentation transcript:

Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained by reference to a universal ‘model’ called the OSI (Open System Interconnect) model. This model attempts to define the operation of various hardware & software components f a ‘network’

OSI Model The OSI model is HIERARCHICAL with seven layers, layer 1 being the bottom (physical) layer. Network OS Hardware A functional network must have components operating at each layer of the model.

The Network Interface Card (NIC) At this point we shall concentrate on ETHERNET version2 cards using 10/100 base T cabling systems. These cards adhere to a standard known as IEEE 802.3u, normally just called ETHERNET. NICs are available from around £6.00. Most modern motherboards have a built in NIC (LAN connector)

NIC The NIC is often referred to as a LAYER 1 (physical layer) device although it actually operates at layer 1 and 2 (data link). At layer 1 the NIC provides the means of physical (electrical & mechanical) access to the network media. At layer 2 the NIC provides Media Access and Logical Link Control by having an embedded ETHERNET chip on board.

NIC Operation This means that the Network Operating System (NOS) does not need to implement Ethernet. Layer 2 is divided into two sub layers called »LOGICAL LINK CONTROL (LLC) »MEDIA ACCESS CONTROL (MAC)

Logical Link Control The LOGICAL TOPOLOGY of the network is controlled by the LLC sub layer. (Remember, it is possible to have for example a physical star yet a logical ring topology as in token ring ieee systems)

MAC Media access control is the key to Ethernet and all other shared media type networks Ethernet systems use a media access technique called Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Token passing (IBM) and CSMA/CA (Apple) are other LAN possibilities.

MAC Addressing Each node on a network is uniquely identifiable on a universal basis, much like people! This amazing feat is achieved by virtue of a two part MAC address being ‘burnt’ into the NIC at manufacture. This MAC address is a 48 bit (6 byte) binary number, written as a 12 digit hexadecimal number eg. 0067A7C11FB56

MAC address format The first 24 bits of the MAC address define the MANUFACTURER of the device and are allocated to the manufacturer. The last 24 bits are set by the manufacturer. Providing the manufacturer allocates a unique 24 bit number correctly it is impossible for any two NICs to have the same MAC address.

Simplest Possible Network The simplest possible ‘network’ consists of two PC’s fitted with NIC’s linked by a cross-over cable crossover cable Each PC is uniquely identified by its’ MAC address D0CF D0DO76

Software The NICs and cables used to construct this simple LAN exist only at the lower layers of the OSI model. We now need to add software components covering the remaining layers. These components are supplied as part of the PC operating system as is the case with MS or may be supplied by an other vendor as is the case with NOVELL.

OS / NOS The software components required to make the network functional are often referred to as ‘Network Operating System (NOS)’ components, as distinct from Operating System (OS) components. All currently supported Microsoft offerings have software components to allow at least peer to peer capability.

Login When we configure the network software we specify a ‘login’. This specifies the rules (protocol) at layer 5 (Session) and defines such things as how a communication ‘session’ is initiated, managed and terminated.

Minimum Software Needed A ‘driver’ for the NIC, supplied by the manufacturer. This allows the NIC hardware to be controlled by the PC an operates at the data link layer. A ‘protocol’ such as TCP/IP, NetBeui, Ipx/Spx etc. These are components which amongst other things control how information is ‘routed’ in networks. Protocols are sometimes described as ‘sets of rules’ for network operation. ‘Protocols’ operate at layer 3 & 4

Services These are ‘Application Layer’ services provided by the NOS. Examples of services which must be enabled are file and printer sharing Many application layer services are not explicitly installed or enabled and are essentially transparent to the user.

NIC communication All ETHERNET traffic is ultimately between NICs, so it is important to study the nature of this traffic. The actual electronic signals carried by the cables are quite complex pulses, using MANCHESTER II encoding. An exact understanding of the nature of these pulses is not essential for a understanding of networks as such.

NIC Communication These electronic signals are often shown on diagrams as strings of 1’s and 0’s, representing the streams of BINARY NUMBERS (bit streams), flowing between NICs. It is important to understand that these streams of bits are actually grouped into units called ETHERNET FRAMES (FRAMES) All ETHERNET systems use the same FRAME structure and are therefore compatible!

ETHERNET FRAME Again, a complete understanding of the FRAME is not essential, the structure is shown here for completeness and to aid understanding.

ETHERNET FRAME

PC to PC Network D0CF D0DO76

A more complex network With the addition of a HUB (a layer 1) device, a much more complex local area network may be constructed. The software requirements are the same as for the simple PC to PC network outlined earlier. CSMA/CD makes this topology possible !

Hub Based LAN

Switch Operation The switch builds up a table containing the MAC address and port number for all devices connected. if devices are removed or added then the table is updated.

Building The Switch Table Port n Name Node MAC n A324BD3B A324A1CD A24D33D2 A32763E4 A324BD3B A A324A1CD B A24D33D2 C A32763E4 X Switch Table Port MAC Address

Switch Advantages The major advantage of a switch is that it offers a dedicated full bandwidth channel between any two ports and thus any two communicating devices. In base t HUB or base 2/5BUS topologies the bandwidth of the media is shared between all communicating devices. Therefore the performance advantage of a switch compared to a hub can be very pronounced.