Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Repeaters can Mix PHY Standards Repeater NIC BNC AUI Connectors RJ-45 UTPDrop Cables 10Base5 Trunk Cable 10Base2 10Base-T.
DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY Ethernet Fundamentals.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
Networks Types. Spring 2002Computer Network Applications Data Transfer During the ’70s: Minicomputers became affordable; Need to communicate information;
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-2 Local Area Networks (LANs) Frame.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Chapter 9 Hardware Addressing & Frame Type Identification EE 526 Presentation by Ryan Star.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
COMPUTER NETWORKS.
Data Link Layer IS250 Spring 2010
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
Chapter 1-3 The Ethernet LAN. Ethernet The networking protocol used in most modern computer networks is Ethernet. Ethernet is a CSMA/CD LAN protocol.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
Chapter 6 – Layer 2 MAC, Frames, Hex, etc.. Layer 1 / Layer 2 Layer 1 Signals, media, bit streams Layer 2 –Communicates with upper layers using Logical.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
1 Ch 9 Hardware Addressing and Frame Type Identification.
1 Part IV Local Area Networks (LANs). 2 Classification Terminology  Network technologies classified into three broad categories  Local Area Network.
Ethernet Overview it the IEEE standard for Ethernet.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Hardware Addressing and Frame Type Identification.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Wired LAN Technology (Ethernet and 802.3). The Ethernet The first Ethernet was tested in – Invented by Robert Metcalfe in Xerox – Competitive technology:
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
COMPUTER NETWORKS CS610 Lecture-13 Hammad Khalid Khan.
What we’ve learned so far Ch. 6 Ch. 7 Ch. 8 Ch. 10 Ch. 11.
Multiple Access Methods
Now (switched network)
Circuit Switching Circuit switching refers to a communication mechanism that establishes a path between a sender and receiver with guaranteed isolation.
Local Area Networks: Topologies
COMPUTER NETWORKS CS610 Lecture-9 Hammad Khalid Khan.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
CS 457 – Lecture 6 Ethernet Spring 2012.
Chapter 12 Local Area Networks
Multiple Access Methods
Data-link Layer Computer Networks.
Protocol layering and data
Chapter 12 Local Area Networks
Protocol layering and data
Local Area Networks (LANs)
Chapter 12 Local Area Networks
Multiple Access Methods
Presentation transcript:

Local Area Networks: Topologies

2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing uses the identifier known as an address. IEEE (Institute for Electrical and Electronic Engineers) allocates a unique address for each piece of network interface hardware, i.e., a network interface card (NIC) Media Access Control (MAC) address – A device may have multiple MAC addresses depending on how many network interface cards it has.

3 48 bits in hexadecimal number

4 MAC Addresses Composition – Vendor ID + NIC ID VV:VV:VV:NN:NN:NN – IEEE assigns a vendor ID Organizationally Unique ID (OUI) – The vendor assigns a unique NIC value to each device

Exercise: Find MAC address of your computer 1.Start Command Prompt (Start  Run  cmd) and type ipconfig /all 2.Do a google search to find the vendor name of the NIC of your computer

6 Compose a Packet: Step 1 A packet consists of two conceptual parts: – Header that contains metadata, such as an address – Payload that contains the data being sent headerpayload 54:DD:91 11:CA:3B E8:25:32 46:C2:8F I like you 6 bytes dest. address 6 bytes source address bytes

7 Compose a Packet: Step 2 Framing: using extra bits to delineate the start and end of a frame – SOH: Start of Header (ASCII code: ) – EOT: End of Transmission (ASCII code: ) – To enable computer to distinguish two packets, the SOH and EOT must be unique and different from the payload. Frame: Layer-2 packet headerpayloadSOHEOT 1 byte

CRC Compose a Packet: Step 3 Add error checking code – Ethernet use Cyclic Redundancy Check (CRC), a form of channel coding for high-speed data network headerpayloadSOHEOT Cable modulation More on CRC: Chapter 8.13 – 8.14

9 How to Transmit a Packet? Depends on the network type and topology Three main categories of packet switching network:

LAN Example

11 LAN Topologies Each LAN is classified into a category according to its topology or general shape 1980s: IBM Token Ring1990s: Ethernet 2000s - Now: Switched LANNot scalable : Rarely used

Star Topology in Detail P-A NIC-A P-C P-B P-D NIC-B NIC-D P-S NIC-1 NIC-2 NIC-4 NIC-C NIC-3

Star Topology in Detail 1.P-A will compose the packet 2.P-A forwards the packet to NIC-A 3.NIC-A calculates the CRC, adds SOH, EOT 4.NIC-A modulates the packet  send out 5.After a while, NIC-1 will receive the m-carrier 6.NIC-1 demodulates the m-carrier and put the packet into a queue 7.P-S checks this packet and find destination is “C” 8.NIC-3 modulates the packet  send out 9.After a while, NIC-C will receive the m-carrier 10.NIC-C demodulates the packet and put it into its cache 11.NIC-C does two checkings; If failed, the packet will be discarded a)Length checking: the payload should be between 46 and 1500 bytes b)CRC checking 12.If the packet passes all checkings, NIC-C will strip off SOH, EOT, CRC, and forward “|C|A|I like you|” to P-C Steps for P-A to send “I like you” to P-C: CRC I like you SOHEOTCAI like youCA

14 Bus Topology Bus topology usually consists of a single cable to which computers are attached. The ends of a bus network must be terminated. – Preventing electrical signals from reflecting back along the bus. P-B NIC-B P-D NIC-D P-A NIC-A P-C NIC-C

Bus Topology in Detail 1.P-A will compose the packet 2.P-A forwards the packet to NIC-A 3.NIC-A calculates the CRC, adds SOH, EOT 4.NIC-A modulates the packet  send out 5.After a while, NIC-C will receive the m-carrier 6.NIC-C demodulates the packet and put it into its cache 7.NIC-C does address checking; if the packet is not for P-C, discard it 8.NIC-C does length and CRC checkings; If failed, the packet will be discarded 9.If the packet passes all checkings, NIC-C will strip off SOH, EOT, CRC, and send “|C|A|I like you|” to P-C Steps for P-A to send “I like you” to P-C: CRCI like youSOHEOTCAI like you C A

Bus Topology When there is a signal on the bus, everybody can sense it. What if multiple computers are sending packets simultaneously? Collisions may happen!

Bus Topology: The Collision Problem Basic solution: CSMA (Carrier Sense Multiple Access) 1.Before any packet is sent out, the sender will first senses its connecting point to see if the bus is idle. 2.If nothing is sensed, it will send out a packet, otherwise it will wait until nothing is sensed. Q1: Do you believe that CSMA can avoid all collisions?

Bus Topology: The Collision Problem Advanced solution: CSMA/CD (CD = Collisions Detection) 1.During the whole transmission period of any packet (after it is send out) the sender keeps on sensing the bus. 2.If any other m-carrier is sensed, stop transmitting instantly; wait for a random amount of time; then retransmit Q2: If collision occurs, who will detect the collision?

Bus Topology: The Collision Problem Advanced solution: CSMA/CD (CD = Collisions Detection) 1.During the whole transmission period of any packet (after it is send out) the sender keeps on sensing the bus. 2.If any other m-carrier is sensed, stop transmitting instantly; wait for a random amount of time; then retransmit Q3: Why do we wait a random amount of time?

Bus Topology: The Collision Problem Advanced solution: CSMA/CD (CD = Collisions Detection) 1.During the whole transmission period of any packet (after it is send out) the sender keeps on sensing the bus. 2.If any other m-carrier is sensed, stop transmitting instantly; wait for a random amount of time; then retransmit Q4: When a NIC senses a collided m-carrier, will the NIC card demodulate it?

Bus Topology: The Collision Problem Advanced solution: CSMA/CD (CD = Collisions Detection) 1.During the whole transmission period of any packet (after it is send out) the sender keeps on sensing the bus. 2.If any other m-carrier is sensed, stop transmitting instantly; wait for a random amount of time; then retransmit Q5: When a NIC senses a collided m-carrier, will the NIC forward the packet to the computer?

22 Why Different Topologies? Ring: – Easy for computers to coordinate access and to detect whether the network is operating correctly – An entire ring network is disabled if one of the cables is cut Star: – Protecting the network from damage to a single cable – No collisions at all – Requiring more wires Bus: – Fewer wires – A network is disabled if someone accidentally cuts the main cable – Difficult to add new devices if no tap exists.