LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Ethernet – CSMA/CD Review
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Fall 2005 LAN Technologies and Network Topology Qutaibah Malluhi Computer Science and Engineering Department Qatar University.
Networks Types. Spring 2002Computer Network Applications Data Transfer During the ’70s: Minicomputers became affordable; Need to communicate information;
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
CSCI 4550/8556 Computer Networks Comer, Chapter 8: LAN Technology and Network Topologies.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Media, LAN Technologies, and Network Topologies Lecture 5.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
COMPUTER NETWORKS.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Lecture 2 Computer Communications and Networks Boriana Koleva Room: C54 Phone:
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Local Area Networks.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Chapter 7 - LAN Technologies and Network Topology Direct point-to-point communication Connections in a point-to-point network Reducing the number of communication.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Part IV Local Area Networks (LANs). 2 Classification Terminology  Network technologies classified into three broad categories  Local Area Network.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Chapter Overview Ethernet Token Ring FDDI Wireless Networking.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
COMPUTER NETWORKS CS610 Lecture-7 Hammad Khalid Khan.
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
Chapter 8 LAN Technologies and Network Topology
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
A Taxonomy of Mechanisms for Multi-Access
CS4470 Computer Networking Protocols
Chapter 12 Multiple Access.
CT301 LECTURE 8.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
Network Topologies & Standards
7- chapter Seven Local Area Networks (LAN)
Dr. John P. Abraham Professor UTPA
Presentation transcript:

LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols

Mesh networks Early local networks used dedicated links between each pair of computers Some useful properties –hardware and frame details can be tailored for each link –easy to enforce security and privacy

Disadvantages of meshes Poor scalability

Links between rooms/buildings Many links would follow the same physical path

Shared Communication Channels Shared LANs invented in the 1960s Rely on computers sharing a single medium Computers coordinate their access Low cost But not suitable for wide area - communication delays inhibit coordination

Locality of reference LANs now connect more computers than any other form of network The reason LANs are so popular is due to the principle of locality of reference –physical locality of reference - computers more likely to communicate with those nearby –temporal locality of reference - computer is more likely to communicate with the same computers repeatedly

LAN topologies LANs may be categorised according to topology star

ring bus

Pros and cons Star is more robust but hub may be a bottleneck Ring enables easy coordination but is sensitive to a cable being cut Bus requires less wiring but is also sensitive to a cable being cut

Example bus network: Ethernet Single coaxial cable - the ether - to which computers connect IEEE standard specifies details –data rates –maximum length and minimum separation –frame formats –electrical and physical details

Conceptual flow of Ethernet data Transmitter has exclusive use of the medium

Ethernet coordination The computers can detect when a signal is on the Ether - carrier sense Can only transmit when the Ether is free - carrier sense with multiple access (CSMA) Prevents a computer interrupting an on- going transmission

Collision detection Collisions can occur if computers decide to transmit at the same time Each computer also senses for garbled transmission - a collision Ethernet mechanism is called - carrier sense multiple access with collision detect - CSMA/CD Example of a medium access control (MAC) protocol

Collision recovery Computers must wait after collision before retransmission Choose random delay up to specified max Double the delay for each subsequent collision - binary exponential backoff Difference between bandwidth and throughput

Throughput vs. offered traffic More offered traffic results in more collisions, more backing-off and eventually congestion and reduced throughput

What to do if the medium is busy? Non persistent CSMA (deferential) –if medium is idle, transmit –if busy, wait a random time then try again 1-persistent CSMA (selfish) –if idle, transmit –if busy, listen until idle then transmit p-persistent (compromise) –if idle transmit with probability p and delay one time unit with probability (1-p)

Example bus network - LocalTalk LAN technology for Apple computers MAC protocol is CSMA/CA (collision avoidance) Each computer first sends a small message to reserve the bus

Wireless LANs and CSMA/CA Collision detection does not work because a transmission from one computer may only be received by its immediate neighbours Solution is collision avoidance –sender sends small request message to receiver –receiver responds with a ‘clear to send’ message that received by all adjacent computers

Example ring network - IBM Token Ring MAC protocol based on token passing Computer must wait for permission before transmitting Computer controls the ring until finished Data flows right round the ring –receiver makes a copy –transmitter checks for errors and then removes

Special message called the token grants permission (needs bit stuffing) Computer grabs token, removes it, sends one frame, checks for errors then replaces it

Example ring network - FDDI Overcomes token ring susceptibility to failure through two counter-rotating cables

Example star network - ATM Asynchronous Transfer Mode Uses pairs of optical fibres to connect computers to a central hub

Summary Locality of reference Shared medium Star, bus and ring topologies Medium access control protocols