Local Area Networks.

Slides:



Advertisements
Similar presentations
1 Ethernet Wiring Qutaibah Malluhi CSE Department Qatar University.
Advertisements

Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
1 Fall 2005 LAN Technologies and Network Topology Qutaibah Malluhi Computer Science and Engineering Department Qatar University.
1 Fall 2005 Extending LANs Qutaibah Malluhi CSE Department Qatar University Repeaters, Hubs, Bridges, Fiber Modems, and Switches.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
CSCI 4550/8556 Computer Networks Comer, Chapter 10: LAN Wiring, Physical Topology, and Interface Hardware.
Ethernet Kenneth Castelino. Network Architecture - Protocols Physical: Actual signal transmission Data-Link: Framing / Error Detection Network: Routing.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
CSCI 4550/8556 Computer Networks Comer, Chapter 8: LAN Technology and Network Topologies.
CSCI 4550/8556 Computer Networks Comer, Chapter 11: Extending LANs: Fiber Modems, Repeaters, Bridges and Switches.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 8 Introduction to Networks and the Internet.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
Chapter 15: LAN Systems Business Data Communications, 4e.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Chapter 9 Hardware Addressing & Frame Type Identification EE 526 Presentation by Ryan Star.
Review on Networking Technologies Linda Wu (CMPT )
CS335 Networking & Network Administration Tuesday, April 13, 2010.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
COMPUTER NETWORKS.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
For more notes and topics visit: eITnotes.com.
Connecting LANs, Backbone Networks, and Virtual LANs
Network Topologies An introduction to Network Topologies and the Link Layer.
Chapter 11 Extending LANs: Fiber Modems, Repeaters, Bridges, & Switches Hub Bridge Switch.
LAN Wiring & Physical Interfaces Lecture 6. Network Interfaces Every device has some form of a network interfaces. A PC has a Network Interface Card (NIC).
Lecture 2 Computer Communications and Networks Boriana Koleva Room: C54 Phone:
CSC 311 IEEE STANDARD ETHERNET Common Bus topology Uses CSMA/CD Named after “ether”, the imaginary substance many once believed occupied all of space.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Chapter 9 - LAN Wiring, Physical Topology and Interface Hardware Introduction Speeds of LANs and computers Network interface hardware I/O interfaces Network.
Chapter 7 - LAN Technologies and Network Topology Direct point-to-point communication Connections in a point-to-point network Reducing the number of communication.
CT1303 LAN LECTURE 15.
Extending LANs Fiber modems Repeaters Bridges Switches.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
1 Lecture 7 LAN Wiring, Physical Topology, and Interface Hardware Computer Networks CS 4316.
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
1 Part IV Local Area Networks (LANs). 2 Classification Terminology  Network technologies classified into three broad categories  Local Area Network.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
Computer Networks Syed Md. Ashraful Karim Lecturer, CSE BU.
Extending LANs using Repeaters, Bridges, and Switches.
1 Ch 11 Extending LANs Fiber modems, Repeaters, Bridges, and Switches.
Local Area Networks: Monil Adhikari. Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print serving.
NETWORK TOPOLOGY Network topology is the study of the arrangement or mapping of the elements of a network,especially the physical.
Unit 3 Physical Layer.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Physical Layer Issues and Methods Outline Physical Layer Ethernet Technology Physical Layer Encoding Final Exam Review - ??
COMPUTER NETWORKS CS610 Lecture-11 Hammad Khalid Khan.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
COMPUTER NETWORKS CS610 Lecture-13 Hammad Khalid Khan.
LECTURE 11 NET301 11/16/2015Lect IEEE LAN STANDARDS Ethernet LAN (by Xerox): Topology: Bus Transmission Media: Thick Coaxial Cable. Signal: Digital.
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
Chapter 8 LAN Technologies and Network Topology
Networking Devices.
Chapter 12 Local Area Networks
CS4470 Computer Networking Protocols
Business Data Communications, 4e
Chapter 12 Local Area Networks
Local Area Networks (LANs)
Chapter 12 Local Area Networks
Presentation transcript:

Local Area Networks

Mesh Networks Early local networks used dedicated links between each pair of computers Some useful properties hardware and frame details can be tailored for each link easy to enforce security and privacy Poor scalability Many links would follow the same physical path

Shared Communication Channels Shared LANs invented in the 1960s Rely on computers sharing a single medium Computers coordinate their access Media Access Control (MAC) Low cost But not suitable for wide area – communication delays prevent coordination

Locality of Reference LANs now connect more computers than any other form of network The reason LANs are so popular is due to the principle of locality of reference physical locality of reference – computers more likely to communicate with those nearby temporal locality of reference – computer is more likely to communicate with the same computers repeatedly

LAN Topologies LANs may be categorised according to topology Star Ring Bus

Advantages & Disadvantages Star is more robust but hub may be a bottleneck, and use up the most wiring Ring enables easy coordination but is sensitive to a cable cut Bus requires less wiring but is also sensitive to a cable cut

Example Bus Network - Ethernet Single coaxial cable - the ether - to which computers connect Transmitter has exclusive use of the medium IEEE standard (802.3) specifies details data rates maximum length and minimum separation electrical and physical details frame formats Assignment: IEEE 802 standards

Ethernet Wiring

Original Thick Ethernet Wiring 10Base5 Coaxial cable and AUI (Attachment Unit Interface) connector Network hardware involves two components network interface card transceiver (transmitter-receiver)

Connection Multiplexing Allows multiple computers to share a transceiver and makes wiring simpler

Thin Ethernet Wiring 10Base2 Thinner wire, no transceiver and simple BNC connector

Thin Ethernet Wiring

Twisted Pair Ethernet 10BaseT Twisted pair cable connects all computers to a central hub

Ethernet Wiring

Wiring Schemes

Comparing Wiring Schemes Thicknet can change computers without disruption Accessing remote transceivers can be difficult Thinnet easier access greater possibility of disconnection Twisted pair cheapest cable/connection failure only affects one machine Is 10BaseT Ethernet a bus or a star physically it is a star logically it is a bus Physical topology can differ from logical topology!!

Network Interface Hardware Network Adapter Card or Network Interface Card (NIC) handles details of transmission independently of the CPU specific to a particular technology sometimes the NIC may need to connect to other hardware in order to connect to the network

NIC Connectors NICs often support all three kinds of connections

Hardware Addressing A LAN provides connectivity for all computers but most communications are one-to-one to avoid unnecessary interruptions, each NIC is assigned a unique numerical address (48 bits) called its hardware address, physical address or MAC address Each frame transmitted across the network includes a destination and a source MAC address field the destination MAC address is decode to determine whether to accept it the source address field is used when a reply is needed

Other Addressing Modes Broadcasting some applications require that a sender transmits a frame to all stations on the network use a special reserved broadcast address as destination all NICs are configured to accept frames with their own address and the broadcast address Promiscuous Mode NICs can often be configured to accept all packets useful for network analysers (sniffers). has security implications

Ethernet Transmission Manchester encoding uses rising and falling edges to encode data Ethernet uses a standard frame format with 48 bits address and a 16 bit frame type field Frame type field used by receivers to decide follow-on processing required Standard frame types are defined by Ethernet standards Preambles consist of alternating 1’s and 0’s that are used for clock synchronization

Explicit Frame Types

Ethernet Coordination The computers can detect when a signal is on the Ether – carrier sense Can transmit only when the Ether is free – carrier sense with multiple access (CSMA), thus preventing a computer interrupting an ongoing transmission Collision can still occur if computers sense the media as free and proceed to transmit at the same time Each computer also senses the transmission to detect for a collision (if signal is garbled) Whole mechanism is called - carrier sense multiple access with collision detect - CSMA/CD

Collision Recovery Computers must wait after collision before retransmission Choose random delay up to specified maximum Double the delay sets for each subsequent collision – binary exponential backoff More offered traffic results in more collisions, more backing off, results in congestion and reduced throughput.

Example Bus Network - LocalTalk LAN technology for Apple computers MAC protocol is CSMA/CA (collision avoidance) Each computer first sends a small message to reserve the bus Another example is wireless LAN hidden station problem exposed station problem

(a)The hidden terminal problem. (b) The exposed station problem. CSMA Problems in Wireless Networks (a)The hidden terminal problem. (b) The exposed station problem. From the book Computer Networks by Tanenbaum

Example Ring Network – IBM Token Ring MAC protocol based on token passing Computer must wait for permission before transmitting Computer controls the ring until finished Data flows right round the ring receiver makes a copy transmitter checks for errors and then removes data and generates a new token

IBM Token Ring (Continued) Special message called token grants permission Computer grabs token, removes it, sends one frame, checks for errors when the frame returns then regenerates a new token into the network

Example Ring Network - FDDI Fiber Distributed Data Interconnect Overcomes token ring weakness to failure, through two counter-rotating cables

Example Star Network - ATM Asynchronous Transfer Mode Uses pairs of optical fibres to connect computers to a central Switch

LAN Extensions Fiber modems Repeaters extend connection between computer and transceiver Repeaters join LAN segments regenerate signals without knowledge of frames

Multiple Repeaters Ethernet standard says no more than four repeaters between two computers Fiber modems can be used between repeaters for long distance extensions Biggest problem with repeaters is that all signals including collisions and noise will be transmitted

Bridges Connect two segments, but work at the frame level Use promiscuous mode and forward all frames Don’t forward incorrect frames (e.g. collisions and noise)

Self-Learning Bridge Only forward a frame if necessary (frame filtering) destination is on the other segment broadcast address is used Bridge learns which segment a computer is on when that computer sends a frame When a frame is received by the bridge extracts source address and updates knowledge inspects destination address and consults the current knowledge for forwarding decisions

Bridge Example of Learning

Bridged Network Planning Parallelism for capacity and performance bridges allow communication on separate segments to occur at the same time computers that communicate frequently with one another should be attached to the same segment

Cycle of Bridges To prevent the problem of infinite loops, an algorithm call distributed spanning tree (DST) is used when a bridge first initializes DST enables a bridge to determine whether any other bridge is already performing forwarding operation in each LAN segment that it attaches If there is, some of its ports will be blocked, creating a logical tree topology on top of the physical one, thus preventing loops.

Switching Switch – a single electronic device that transfers frames between computers Whereas a hub simulates a shared medium, a switch simulated a bridged LAN with one computer per segment Advantage is greater data rate due to parallelism Hubs and switches are combined in LAN design to reduce cost