Presentation is loading. Please wait.

Presentation is loading. Please wait.

LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.

Similar presentations


Presentation on theme: "LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols."— Presentation transcript:

1 LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols

2 Mesh networks Early local networks used dedicated links between each pair of computers Some useful properties –hardware and frame details can be tailored for each link –easy to enforce security and privacy

3 Disadvantages of meshes Poor scalability

4 Links between rooms/buildings Many links would follow the same physical path

5 Shared Communication Channels Shared LANs invented in the 1960s Rely on computers sharing a single medium Computers coordinate their access Low cost But not suitable for wide area - communication delays inhibit coordination

6 Locality of reference LANs now connect more computers than any other form of network The reason LANs are so popular is due to the principle of locality of reference –physical locality of reference - computers more likely to communicate with those nearby –temporal locality of reference - computer is more likely to communicate with the same computers repeatedly

7 LAN topologies LANs may be categorised according to topology star

8 ring bus

9 Pros and cons Star is more robust but hub may be a bottleneck Ring enables easy coordination but is sensitive to a cable being cut Bus requires less wiring but is also sensitive to a cable being cut

10 Example bus network: Ethernet Single coaxial cable - the ether - to which computers connect IEEE standard specifies details –data rates –maximum length and minimum separation –frame formats –electrical and physical details

11 Conceptual flow of Ethernet data Transmitter has exclusive use of the medium

12 Ethernet coordination The computers can detect when a signal is on the Ether - carrier sense Can only transmit when the Ether is free - carrier sense with multiple access (CSMA) Prevents a computer interrupting an on- going transmission

13 Collision detection Collisions can occur if computers decide to transmit at the same time Each computer also senses for garbled transmission - a collision Ethernet mechanism is called - carrier sense multiple access with collision detect - CSMA/CD Example of a medium access control (MAC) protocol

14 Collision recovery Computers must wait after collision before retransmission Choose random delay up to specified max Double the delay for each subsequent collision - binary exponential backoff Difference between bandwidth and throughput

15 Throughput vs. offered traffic More offered traffic results in more collisions, more backing-off and eventually congestion and reduced throughput

16 What to do if the medium is busy? Non persistent CSMA (deferential) –if medium is idle, transmit –if busy, wait a random time then try again 1-persistent CSMA (selfish) –if idle, transmit –if busy, listen until idle then transmit p-persistent (compromise) –if idle transmit with probability p and delay one time unit with probability (1-p)

17 Example bus network - LocalTalk LAN technology for Apple computers MAC protocol is CSMA/CA (collision avoidance) Each computer first sends a small message to reserve the bus

18 Wireless LANs and CSMA/CA Collision detection does not work because a transmission from one computer may only be received by its immediate neighbours Solution is collision avoidance –sender sends small request message to receiver –receiver responds with a ‘clear to send’ message that received by all adjacent computers

19 Example ring network - IBM Token Ring MAC protocol based on token passing Computer must wait for permission before transmitting Computer controls the ring until finished Data flows right round the ring –receiver makes a copy –transmitter checks for errors and then removes

20 Special message called the token grants permission (needs bit stuffing) Computer grabs token, removes it, sends one frame, checks for errors then replaces it

21 Example ring network - FDDI Overcomes token ring susceptibility to failure through two counter-rotating cables

22 Example star network - ATM Asynchronous Transfer Mode Uses pairs of optical fibres to connect computers to a central hub

23 Summary Locality of reference Shared medium Star, bus and ring topologies Medium access control protocols


Download ppt "LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols."

Similar presentations


Ads by Google