Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE802.3 8.4:Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.

Slides:



Advertisements
Similar presentations
Topic 7 Local Area Networks (LAN)
Advertisements

TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology.
CSC 450/550 Part 3: The Medium Access Control Sublayer More Contents on the Engineering Side of Ethernet.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
CSCI 4550/8556 Computer Networks Comer, Chapter 11: Extending LANs: Fiber Modems, Repeaters, Bridges and Switches.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Chapter 13 Wired LANs: Ethernet
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Chapter 2 Review of Computer Network Technology
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
SIMS-201 LAN Basics, MANs, WANs.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
The Ethernet Prepared by: Amer Al-Qadri Ahmad Abdul-Rahman Ismail khistah
Network Devices 1.
Thin Ethernet (10B2 / IEEE 802.3a) Segment length 0.5 m Up to 30 attached nodes Cable flexible and cheap Integrated or external transceiver connected via.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
10-01-K.Steenhaut & J.Tiberghien - VUB 1 Telecommunications Concepts Chapter 3.1 Packet Switched Local Area Networks.
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Chapter 13 Wired LANs: Ethernet
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Local Area Networks.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
CS/IS 465: Data Communication and Networks 1 CS/IS 465 Data Communications and Networks Lecture 28 Martin van Bommel.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Extending LANs Fiber modems Repeaters Bridges Switches.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
Cisco 3 – Switching Concepts Perrine. J Page 16/1/2016 Module 4 The use of bridges and switches for segmentation results in ____? 1.Multiple broadcast.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Semester 3—LAN Switching Chapter 2 Objectives  By the end of this chapter we will be able to perform tasks related to: – Various LAN Communication Problems.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
Computer Networks. Internetworking Devices Network Interface Card (NIC) Repeaters HUB Bridge Switch Router.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
Ethernet Overview it the IEEE standard for Ethernet.
CSCI 465 D ata Communications and Networks Lecture 22 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 Ch 11 Extending LANs Fiber modems, Repeaters, Bridges, and Switches.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
Wired LANs: Ethernet Shashank Srivastava Motilal Nehru national Institute Of Information Technology, Allahabad 4 Sep 2013.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
The Medium Access Control Sublayer
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
The Medium Access Control Sublayer
Presentation transcript:

Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast LAN interconnect technologies

8.1:Introduction PSTN ISDN PBX (private branch exchange)

8.2:LANs LANs are used to interconnect distributed communities of end systems To ensure the transmission bandwidth is shared fairly between all of the attached stations, a number of different medium access control (MAC) methods are used. These include (CSMA/CD) and Token ring

8.3:Ethernet / IEEE802.3 Ethernet networks – and the more recent derivative IEEE802.3 – are used extensively in technical and office environment CSMA/CD –All the stations are attached directly to the same cable/bus,it is said to operate in a multiple access mode –The bus operates in the broadcast mode which means that every frames transmitted is received by all the other stations that are attached to the bus –Because of the broadcast mode,this will result in the contents of the two frames being corrupted and a collision is said to have occurred

CSMA/CD Protocol Carrier Sense before transmission Carrier Sense while transmission Collision: Two or more stations transmitting simultaneously Backoff: Random delay after collision Deference: Defers transmission if channel is sensed busy Collision Window (Slot time): Round-trip propagation delay time plus some carrier sense time. In IEEE 802.3, this value is defined to be 51.2 us.

CSMA/CD Collision Handling Collision Signal is generated by Physical layer. Jam signal (collision enforcement): To make sure that all stations involved in the collision will detect collision. A pattern of 32 bits. Collision backoff and retransmission method (Truncated Binary Exponential Backoff Algorithm, BEBA): – n : number of collisions experienced (n <= 16) – k : Min (n,10) -- Truncation – r : Random delay time (unit: slot time) between 0 <= r < 2 k

CSMA/CD worse-case collision detection

Hub configuration principles

IEEE Frame Format

8.4:Token ring All the stations are connected together by a set of unidirectional links in the form of a ring and all frame transmissions between any of the stations take place over it by circulating the frame around the ring Only one frame transfer can be in progress over the ring at a time Fig 8.5

Token ring network operation

Token ring wiring configuration

Token ring Frame Format

8.5:Bridges There are two types of bridges, the one are used with Ethernet LANs, knows as transparent bridges, and the others with token ring LANs, known as source routing bridges.

Bridge vs Repeater

8.5.1:Transparent bridges With a transparent bridge, as with a repeater,the presence of one (or more) bridges in a route between two communicating stations is transparent to the two stations. All routing decisions are made exclusively by the bridge(s) Fig 8.12 A bridge maintains a forwarding database Bridge learning –Forwarding database to be created in advanced

Transparent bridges(cont.)

8.5.2:Source routing bridges The major difference between a LAN base on source routing bridges and one base on spanning tree bridges is that with the latter the bridges collectively perform the routing operation in a way that is transparent to the end stations. Conversely, with source routing, the end stations perform the routing function. Fig 8.15

Token ring Frame Format

Example

8.6:FDDI FDDI is an optical fiber-based ring network that supports a bit rate of 100 Mbps. It can used for the interconnection of segments spread over a wider geographical area than a single building, such as a university campus or manufacturing plant. Fig 8.18 Use two counter-rotating rings to enhance reliability:primary ring and secondary ring Two type of station: DAS and SAS Fig 8.19

Physical interface

FDDI Frame Format

8.7:High-speed LANs 8.7.1:Fast Ethernet 8.7.2:Switched Fast Ethernet 8.7.3:Gigabit Ethernet

8.7.1:Fast Ethernet Fast Ethernet was to use the same shared, half- duplex transmission mode as Ethernet but to obtain a*10 increase in operational bit rate over 10BaseT while at the same time retaining the same wiring systems, MAC method, and frame format. The major technological hurdle to overcome with Fast Ethernet was how to achieve a bit rate of 100Mbps over 100m of UTP cable. Fig 8.26

Collision detection Fig 8.28 Detect a collision by detecting a signal on pair 2 while it is transmitting and, the hub detects a collision by the presence of a signal on pair 1

8.7.2:Switched Fast Ethernet In order to allow multiple access/transfers to be in progress concurrently, two developments have been made: –Switch hub architecture –Duplex working over the circuits that connect the stations to the hub. Fig 8.29

8.8:LAN protocol

8.8.1:Physical layer

8.8.2:MAC sublayer

8.8.3:LLC sublayer

8.8.4:Network layer IPX –connectionless TCP/IP

8.9:Multicast LAN interconnect technologies 8.9.1:Intersite gateways 8.9.2:ISDN switched connection 8.9.3:Frame relay 8.9.4:High bit rate leased lines

8.9.1:Intersite gateways

8.9.2:ISDN switched connection

8.9.3:Frame relay

8.9.4:High bit rate leased lines

Summary