Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: - 802.3 Ethernet.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
CIM 2465 Fundamentals of Ethernet1 Fundamentals of Ethernet (Topic 3) Textbook: Networking Basics, CCNA 1 Companion Guide, Cisco Press Cisco Networking.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
LAN Risanuri Hidayat. LAN-Local Area Network A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects.
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
COMPUTER NETWORKS.
Chapter 2 Review of Computer Network Technology
1 Chapter Overview Ethernet FDDI Wireless Networking.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Transparent Bridging. Chapter Goals Understand transparent bridge processes of learning, filtering, forwarding, and flooding. Explain the purpose of the.
Ethernet Two nodes transmit at the same time
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
20 LAN Hardware Overview Version A.01 H3065S Module 2 Slides.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
LAN Topologies and Standards Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
Module 8: Ethernet Switching
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Chapter 5 Network Architecture. Physical Topologies Bus Ring Star.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
Ethernet Overview it the IEEE standard for Ethernet.
Computer Networks Syed Md. Ashraful Karim Lecturer, CSE BU.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
FDDI Network Security.
1 Chapter Overview Ethernet Token Ring FDDI Wireless Networking.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Computer Network Architecture Lecture 3: Network Connectivity Devices.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Local Area Networks a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic.
LECTURE 11 NET301 11/16/2015Lect IEEE LAN STANDARDS Ethernet LAN (by Xerox): Topology: Bus Transmission Media: Thick Coaxial Cable. Signal: Digital.
SIMS-201 Computer Networks.
IEEE standards.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
Network Protocols.
Chapter 3 Computer Networking Hardware
LAN Risanuri Hidayat.
Chapter 12 Local Area Networks
CS4470 Computer Networking Protocols
Protocol layering and data
CCNA 1 Chapter 5 Ethernet Fundamentals
SIMS-201 Computer Networks.
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Presentation transcript:

Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet Token Ring - Fibre Distributed Data Interface (FDDI) - Wireless LAN

LAN Protocols

Ethernet Ethernet is one of a family of network architectures governed by a protocol called Carrier Sense Multiple Access/Collision Detect (CSMA/CD). This type of network follows the Institute of Electrical and Electronic Engineers (IEEE) standard 802.3

CSMA/CD Collision Detect Carrier Sense Multiple Access Listen Wait Send & Listen Access All Terminals Detect Calculate Send

Ethernet Access Media

Ethernet Hubs There are two kinds of hub:  Repeater hubs - Each port of a repeater hub links individual Ethernet media segments together to create a larger network that operates as a single Ethernet LAN.  Switching hubs - This kind of hub provides packet switching, typically based on bridging ports. Each port of a packet switching hub provides a connection to an Ethernet media system that operates as a separate Ethernet LAN. Unlike a repeater hub whose individual ports combine segments together to create a single large LAN, a switching hub makes it possible to divide a set of Ethernet media systems into multiple LANs that are linked together by way of the packet switching electronics in the hub.

Components in an Ethernet System

Twisted-Pair Media System

Destination Address Source Address FCS Number of bytes: SOF = Start of frame FCS = Frame check sequence Minimum frame size = 64 bytes Maximum frame size = 1518 bytes Ethernet Frame Format

MAC Addressing There are two, MAC Layer addresses in an Ethernet frame. The first is the address of the source device and the second is the intended destination device. Each address consists of 48 bits, or 12 hexadecimal digits, which are typically denoted by six, two- digit hexadecimal numbers: C The first six digits (high order) identify the manufacture and the last six digits (low order) are used for a serial number

Multicast Serial NumberManufacturer's Address Octet OrderBit Order Multicast Bit

Fast Ethernet Transmission Medium

Gigabit Ethernet  Latest extension to Ethernet  1000 Mbit/s - 10 times faster than Fast Ethernet  Compatible with existing Ethernet

Token Ring Network

Advantages of Token Ring  High reliability, the ring can continue normal operation despite any single fault  Bypassing inactive stations  Effective use, 95% in Token Ring only whilst 30-40% in Ethernet  Excellent traffic handling  Large maximum frame length  High bandwidth efficiency. 70% in Token Ring, 30% in Ethernet  Many media choices: UTP, STP, coaxial or optical fibre  Supports transmission priority

Frame Formats

Token Ring Management  Sending out a new token if one is lost  Re-sending messages  Ensuring that the token is passed in its proper sequence  Managing congestion  Automatically correcting network errors

Token Ring MSAU Token PC

FDDI Rings Outer ring used for data Inner ring unused except during failure Workstation Failed Station Inner ring unused except during failure Workstation AB

Station Types  Dual attached station (DAS), which is connected to both rings  Single attached station (SAS), which is attached only to the primary ring  Dual attached concentrator (DAC), which is connected to both rings and provides connection for additional stations and concentrators. It is actually the root of a tree  Single attached concentrator (SAC), which is connected only to the primary ring (through a tree)

Main Steps in a Normal Frame Transmission 1. Sending station waits for token. 2. Sending station captures and strips token, and then transmits frames. 3. Sending station issues token at the end of transmission. 4. Destination station copies the transmitted frame and sets the A and C bits (address recognised and frame copied indicators). 5. Sending station removes the data from the ring by stripping the sent (and acknowledged) frame. 6. The first bytes of the frame are not stripped, and continue to circulate on the ring (as a fragment). Each repeating station strips one byte from the fragment, and a transmitting station completely strips it

Frame Formats

Wireless LAN

Peer-to-Peer