Presentation is loading. Please wait.

Presentation is loading. Please wait.

Local Area Network and IP addressing

Similar presentations


Presentation on theme: "Local Area Network and IP addressing"— Presentation transcript:

1 Local Area Network and IP addressing

2 Primary Function of Local Area Networks
To provide access to hardware and software resources that will allow users to perform one or more of the following activities: File serving A large storage disk drive acts as a central storage repository Print serving Providing the authorization to access a particular printer, accept and queue print jobs, and providing a user access to the print queue to perform administrative duties Video transfers High speed LANs are capable of supporting video image and live video transfers Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 2 2 2 2

3 Primary Function of Local Area Networks (continued)
To provide access to hardware and software resources that will allow users to perform one or more of the following activities (continued): Manufacturing support LANs can support manufacturing and industrial environments Academic support In classrooms, labs, and wireless support Interconnection between multiple systems Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 3 3 3 3

4 Primary Function of Local Area Networks (continued)
Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 4 4 4 4

5 Medium Access Control Protocols
How does a workstation get its data onto the LAN medium? A medium access control protocol is the software that allows workstations to “take turns” at transmitting data Two basic categories: Contention-based protocols (statistical) Round-robin protocols (Deterministic) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 5 5 5 5

6 Contention-Based Protocols
Essentially first-come, first-served Most common example is carrier sense multiple access with collision detection (CSMA/CD) If no one is transmitting, workstation can transmit If someone else is transmitting, workstation “backs off” and waits Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 6 6 6 6

7 Contention-Based Protocols (continued)
If two workstations transmit at same time, collision occurs When two workstations hear collision, they stop transmitting immediately Each workstation backs off a random amount of time and tries again Hopefully, both workstations do not try again at exact same time CSMA/CD is an example of a non-deterministic protocol Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 7 7 7 7

8 CSMA/CD flow chart Data Communications and Computer Networks: A Business User's Approach, Sixth Edition

9 Round Robin based protocol
Bagaimana cara kerjanya? Bandingkan mana yang lebih baik: Dari sisi masa tunggu setiap workstation Dari kapasitas maksimum Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 9

10 LAN TOPOLOGY

11 The Bus/Tree The original topology
Workstation has a network interface card (NIC) that attaches to the bus (a coaxial cable) via a tap Data can be transferred using either baseband digital signals or broadband analog signals Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 11 11 11 11

12 Bus/Tree (continued) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 12 12 12 12

13 The Star-Wired Bus Logically operates as a bus, but physically looks like a star Star design is based on hub All workstations attach to hub Unshielded twisted pair usually used to connect workstation to hub Originally, hub takes incoming signal and immediately broadcasts it out all connected links Hubs can be interconnected to extend size of network Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 13 13 13 13

14 Star-Wired Bus (continued)
Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 14 14 14 14

15 Star-Wired Bus (continued)
Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 15 15 15 15

16 Star-Wired Bus (continued)
Modular connectors and twisted pair make installation and maintenance of star-wired bus better than standard bus Hubs can be interconnected with twisted pair, coaxial cable, or fiber-optic cable Biggest disadvantage = when one station talks, everyone hears it This is called a shared network All devices are sharing the network medium Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 16 16 16 16

17 Switch Switches provide a unique network segment on each port, thereby separating collision domains. Today, network designers are replacing hubs in their wiring closets with switches to increase their network performance and bandwidth while protecting their existing wiring investments. Like bridges, switches learn certain information about the data packets that are received from various computers on the network. Switches use this information to build forwarding tables to determine the destination of data being sent by one computer to another computer on the network. Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 17 17 17

18 Switches: Dedicated Access
Hosts have direct connection to switch Switching: A-to-A’ and B-to-B’ simultaneously, no collisions Switches can be cascaded to expand the network A C’ B switch B’ A’ Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 18 18 18

19 Switches The hub is a simple device that transmits an incoming frame out all the other ports on the hub The switch has intelligence and can filter out and forward frames based on their NIC address A switch maintains internal port table(s) that keep track of which frames arrived on which ports Switches have eliminated many hubs Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 19 19 19 19

20 SWITCH vs HUB SWITCH HUB
Data Communications and Computer Networks: A Business User's Approach, Sixth Edition

21 Switches (continued) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 21 21 21 21

22 Switches (continued) A switch observes each frame that arrives at a port, extracts the source address from the frame, and places that address in the port’s routing table Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 22 22 22 22

23 Switches (continued) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 23 23 23 23

24 Switches (continued) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 24 24 24 24

25 Switches (continued) Workstations that connect to a hub are on a shared segment Workstations that connect to a switch are on a switched segment Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 25 25 25 25

26 Switches (continued) The backplane of a switch is fast enough to support multiple data transfers at one time A switch that employs cut-through architecture is passing on frame before entire frame has arrived at switch Multiple workstations connected to a switch use dedicated segments This is a very efficient way to isolate heavy users from the network Can allow simultaneous access to multiple servers, or multiple simultaneous connections to a single server Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 26 26 26 26

27 Switches (continued) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 27 27 27 27

28 Switches (continued) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 28 28 28 28

29 Providing Multiple Access
Whether shared or dedicated segments are involved, the primary goal of a switch is to isolate a particular pattern of traffic from other patterns of traffic or from the remainder of the network Switches, because of their backplane, can also allow multiple paths of communications to simultaneously occur Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 29 29 29 29

30 Providing Multiple Access (continued)
Using a pair of routers, it is possible to interconnect two switched segments, essentially creating one large local area network Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 30 30 30 30

31 Providing Multiple Access (continued)
Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 31 31 31 31

32 Full-Duplex Switches Allow for simultaneous transmission and reception of data to and from a workstation This full-duplex connection helps to eliminate collisions To support a full-duplex connection to a switch, at least two pairs of wires are necessary One for the receive operation One for the transmit operation Most people install four pairs today, so wiring is not the problem Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 32 32 32 32

33 Full Duplex Switches (continued)
Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 33 33 33 33

34 Virtual LANs Virtual LAN (VLAN) – logical subgroup within a LAN that is created via switches and software rather than by manually moving wiring from one network device to another Even though employees and their actual computer workstations may be scattered throughout the building, LAN switches and VLAN software can be used to create a “network within a network” Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 34 34 34 34

35 Virtual LANs (continued)
A relatively new standard, IEEE 802.1Q, was designed to allow multiple devices to intercommunicate and work together to create a virtual LAN Instead of sending technician to a wiring closet to move a workstation cable from one switch to another, an 802.1Q-compliant switch can be remotely configured by a network administrator Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 35 35 35 35

36 Wired and wireless

37 Wired Ethernet Most common form of LAN today
Star-wired bus is most common topology but bus topology still not totally dead yet Comes in many forms depending upon medium used and transmission speed and technology Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 37 37 37 37

38 Wired Ethernet (continued)
Originally, CSMA/CD was 10 Mbps Then 100 Mbps was introduced Most NICs sold today are 10/100 Mbps Then 1000 Mbps (1 Gbps) was introduced 10 Gbps is now being installed in high-end applications Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 38 38 38 38

39 Wired Ethernet (continued)
1000 Mbps introduces a few interesting wrinkles: Transmission is full-duplex (separate transmit and receive), thus no collisions Prioritization is possible using 802.1p protocol Topology can be star or mesh (for trunks) Used to separate Delay sensitive traffic from loss sensitive traffic Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 39 39 39 39

40 Wired Ethernet (continued)
Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 40 40 40 40

41 Wired Ethernet (continued)
One of the latest features is power over Ethernet (PoE) What if you have a remote device that has an Ethernet connection? It will require a power connection What if you don’t have an electrical outlet nearby? Use PoE Power to drive Ethernet NIC is sent over wiring along with usual Ethernet signals Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 41 41 41 41

42 Wireless Ethernet Not really a specific topology
Workstation in a wireless LAN can be anywhere as long as it is within transmitting distance to an access point Several versions of IEEE standard define various forms of wireless LAN connections Workstations reside within Basic Service Set, while multiple basic service sets create an Extended Service Set Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 42 42 42 42

43 Wireless Ethernet (continued)
Two basic components necessary: Client radio Usually a PC card with an integrated antenna installed in a laptop or workstation Access point (AP) An Ethernet port plus a transceiver AP acts as a bridge between the wired and wireless networks and can perform basic routing functions Workstations with client radio cards reside within Basic Service Set, while multiple basic service sets create an Extended Service Set Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 43 43 43 43

44 Wireless Ethernet (continued)
IEEE June 1997 Original wireless standard, capable of transmitting data at 2 Mbps IEEE b (Wireless Fidelity or WiFi) Sep 1999 Second wireless standard, capable of transmitting data at 11 Mbps Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 44 44 44 44

45 Wireless Ethernet (continued)
With directional antennae designed for point-to-point transmission (rare), b can transmit for more than 10 miles (16 km) With an omni-directional antenna on typical AP, range may drop to as little as 100 feet (30 m) Max transmission distance of b: up to 300 feet (90m) with 2.4 GHz frequency Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 45 45 45 45

46 Wireless Ethernet (continued)
IEEE a, introduced in 2002 One of the faster standards Capable of transmitting data at 54 Mbps (theoretical) using the 5-GHz frequency range Max transmission distance of a: up to 90 feet (27m) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 46 46 46 46

47 Wireless Ethernet (continued)
IEEE g Another fast standard, introduced in 2002 Also capable of transmitting data at 54 Mbps (theoretical) but using the same frequencies as b (2.4-GHz) Is backwards compatible with b Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 47 47 47 47

48 Wireless Ethernet (continued)
IEEE n is the latest standard to be approved: Theoretical max data rate: 600Mbps Actual data rate: 100 to 145 Mbps 802.11n uses MIMO technology (multiple input multiple output) Sender and receiver have multiple antennas for optimum reception Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 48 48 48 48

49 Wireless CSMA/CA CA (Collision avoidance) How does CSMA/CA do this?
Protocol does not listen and detect collisions Instead, tries to avoid collisions before they happen How does CSMA/CA do this? All devices, before they transmit, must wait an amount of time called an inter frame space (IFS) Some applications have a short IFS, while others have a long IFS If two applications want to transmit at same time, the application with shorter IFS will go first Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 49 49 49 49

50 CSMA/CA algorithm SIFS: Short IFS PIFS: Point coordinated IFS
DIFS: Distributed IFS Data Communications and Computer Networks: A Business User's Approach, Sixth Edition

51 Wireless LAN problem: Hidden Terminal
STAC STAB STAA A and C are hidden from each other. Both might try to send to B And collide. Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 51

52

53 Solution (partial) : RTS/CTS
CTS: Clear To Send RTS CTS C B A CTS STEPS A sends RTS to B B replies with CTS A can send data should refrain for some time CTS Exposed: RTS, no CTS D Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 53

54 RTS CTS Frame Sequence Station AP RTS CTS Data ACK
Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 54

55 2.4GHz band channels Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 55

56 Frequency Planning Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 56

57 Wireless Standard Data Communications and Computer Networks: A Business User's Approach, Sixth Edition

58 a, b and g Data Communications and Computer Networks: A Business User's Approach, Sixth Edition

59 Ip address and subnetting

60 IP Addresses and subnetting
All devices connected to Internet have either a 32-bit IPv4 address or a 128-bit IPv6 address Think of the IP address as a logical address (possibly temporary), while the 48-bit address on every NIC is the physical, or permanent address Computers, networks and routers use the 32-bit (or 128-bit) binary address, but a more readable form is the dotted decimal notation Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 60 60 60 60 60

61 IP Addresses (continued)
For example, the 32-bit binary address translates to in dotted decimal notation Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 61 61 61 61 61

62 IP Addresses (continued)
When IP addresses were originally created, they were called classfull addresses That is, each IP address fell into particular class A particular class address has a unique network address size and a unique host address size There are basically five types of IP addresses: Classes A, B, C, D and E Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 62 62 62 62 62

63 IP Addresses (continued)
Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 63 63 63 63 63

64 IP Addresses (continued)
When you examine the first decimal value in the dotted decimal notation: All Class A addresses are in the range All Class B addresses are in the range All Class C addresses are in the range 192 – 223 All Class D addresses are in the range 224 – 239 All Class E addresses are in the range Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 64 64 64 64 64

65 IP Addresses (continued)
IP subnet masking Sometimes you have a large number of IP addresses to manage By using subnet masking, you can break the host ID portion of the address into a subnet ID and host ID Example – subnet mask applied to a class B address will break the host ID (normally 16 bits) into an 8-bit subnet ID and an 8-bit host ID Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 65 65 65 65 65

66 IP Addresses (continued)
Today, IP addresses are considered classless addresses With classless addressing, companies (users) do not apply for particular class of addresses Instead, company will get its IP addresses from an Internet service provider (ISP) Most ISPs have already applied for a large number of IP addresses and are willing to lease those addresses to companies Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 66 66 66 66 66

67 IP Addresses (continued)
Example – instead of applying for two Class C addresses, a company could contact an ISP, which would lease 500 IP addresses to the company The addresses are not identified by any class – they are simply a contiguous block of IP addresses Classless addressing has led to a much more efficient allocation of the IP address space A company can lease only as many addresses as it needs Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 67 67 67 67 67

68 Subnetting Division of a network into subnets
For example, division of a Class B address into several Class C addresses Some of the host IDs are used for creating subnet IDs © N. Ganesan, All rights reserved. 68

69 Need for Subnetting Classes A and B have a large number of hosts corresponding to each network ID It may be desirable to subdivide the hosts in Class C subnets Often, there is a limitation on the number of hosts that could be hosted on a single network segment The limitation may be imposed by concerns related to the management of hardware Smaller broadcast domains are more efficient and easy to manage © N. Ganesan, All rights reserved. 69

70 Subnetting Principle Use parts of the host IDs for subnetting purpose
A subnet mask is used to facilitate the flow of traffic between the different subnets and the outside network (hops) A hop is the distance a data packet travels form one node to the other © N. Ganesan, All rights reserved. 70

71 Using Host IDs to Subnet
Subnetted Class B Network 140 15 1 Subnet 1 Full Class B Network 140 15 2 140 15 Subnet 2 140 15 3 Subnet 3 Third octet is borrowed to be used for subnet IDs 71

72 Subnet Configuration ….. Subnet ID (Network Address) 140 15 1 140 15 1
….. 140 15 1 1 140 15 1 254 First Host ID Last Host ID 72

73 Slash notation An IP address in slash notation has all the info we need about the block of addresses assigned to a user/company For example, one address in a block of addresses is /27 27 bits belong to the network ID, and 5 bits belong to the host ID (IPv4 addresses have 32 bits) The network mask has 27 1s followed by 5 0s. In dotted decimal notation that is The number of addresses in the block is 25 = 32 Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 73 73 73 73 73

74 First and last address To find the first address (network address), AND the address ( ) with the network mask ( ) Address: Mask: Result: Which in decimal is /27 The last address (broadcast) is 31 addresses past the first, or /27 Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 74 74 74 74 74

75 Examples(1) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 75 75 75 75

76 Examples(2) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 76 76 76 76

77 IPv6 The next version of the Internet Protocol Main features include:
Simpler header 128-bit IP addresses Priority levels and quality of service parameters No fragmentation Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 77 77 77 77 77

78 IPv6 (continued) Data Communications and Computer Networks: A Business User's Approach, Sixth Edition 78 78 78 78 78

79 Ipv6 Address 79 79

80 IPv6 Address Types 80 80 80 80

81 Thank you


Download ppt "Local Area Network and IP addressing"

Similar presentations


Ads by Google