CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.

Slides:



Advertisements
Similar presentations
OSI MODEL Maninder Kaur
Advertisements

CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
CompTIA Network+ Chapter 2
Networking Standards and the OSI Model
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
IP: The Internet Protocol
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
OSI Model.
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
Introduction To Networking
11 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from notes By Lami Kaya, © 2009 Pearson Education.
Chapter 9 Hardware Addressing & Frame Type Identification EE 526 Presentation by Ryan Star.
Review on Networking Technologies Linda Wu (CMPT )
CS335 Networking & Network Administration Tuesday, April 13, 2010.
Chapter 13 Wired LANs: Ethernet
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
COMPUTER NETWORKS.
IST 228\Ch1\Internetworking1 Collision/Broadcast Domain The term collision domain defines the set of devices for which their frames could collide A broadcast.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Lecturer: Tamanna Haque Nipa
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Computer Communication and Networks Muhammad Waseem Iqbal Lecture # 07.
For more notes and topics visit: eITnotes.com.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Ethernet, MAC podvrstva
Wired LANs: Ethernet In Chapter 1, we learned that a local area network (LAN) is a computer network that is designed for a limited geographic area such.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Local Area Networks Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Networks. Common Xmit Media Shared Media Networks are a shared communication resource Only one user can access at a time.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
1 Ch 9 Hardware Addressing and Frame Type Identification.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
DATA LINK CONTROL PROTOCOLS. 2 Introduction Data link control layer – often abbreviated simply to data link layer – is concerned with the transfer of.
Computer Networks Syed Md. Ashraful Karim Lecturer, CSE BU.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
13-LAN, packets, frames and topologies Dr. John Abraham Professor UTPA.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
1 Hardware Addressing and Frame Type Identification.
Lecture Focus: Data Communications and Networking  Data Link Layer  MAC Frame Format Lecture 25 CSCS 311.
Data Communication Network Models
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Data Link Protocols Relates to Lab 2.
+ PPP Protocol. + Outline WAN Data Link Layer protocols Point-to-point serial communications Transmission Synchronization HDLC.
Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.
LAN Topologies Part 1. What is topology? Topology is the physical or logical interconnection of communicating devices Physical Topology: LANtopology,
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
What we’ve learned so far Ch. 6 Ch. 7 Ch. 8 Ch. 10 Ch. 11.
Networks by Topology and Protocols
Circuit Switching Circuit switching refers to a communication mechanism that establishes a path between a sender and receiver with guaranteed isolation.
Local Area Networks: Topologies
Networking Standards and the OSI Model
Department of Engineering Science ES465/CES 440, Intro
Chapter 3: Open Systems Interconnection (OSI) Model
TCP/IP Protocol Suite: Review
13-LAN, packets, frames and topologies
Presentation transcript:

CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science California State University, Long Beach

Local and Wide Area Packet Networks Recall: Packet switching technologies are commonly classified according to the distances they span.

Standards for Packet Format and ID Each packet sent across a packet network must contain the ID of the intended recipient. All senders must agree on the exact details thus standards have been created by various organizations.  The most famous: Institute for Electrical and Electronic Engineers (IEEE) In 1980, IEEE organized the Project 802 LAN/MAN Standards Committee to produce standards for networking.

IEEE 802 Model and Standards IEEE 802 divides Layer 2 of the protocol stack into two conceptual sub-layers: The Logical Link Control (LLC) The LLC sublayer specifies addressing and the use of addresses for multiplexing/demultiplexing. The Media Access Control (MAC) The MAC sublayer specifies how multiple computers share the underlying medium.

Figure 13.6: Examples of the identifiers IEEE has assigned to various LAN standards

LAN Topologies Each network is classified into a category according to its topology (or general shape) and MAC protocol. Examples: Ethernet Bus Ethernet Star (hub or switch) Token Passing Ring Token Passing Bus

LAN Topologies: Bus Bus topology usually consists of a single cable to which computers attach The ends of a bus network must be terminated to prevent electrical signals from reflecting back along the bus Any computer attached to a bus can send on the cable and all computers receive the signal The computers attached to a bus network must coordinate to prevent or manage collisions LAN Topologies: Ring In a ring topology computers are connected in a closed loop (with possible gateways to other networks). Ring topologies usually have a direction associated with the transmission (i.e, clockwise or counterclockwise). In ring topologies, an acknowledgement of successful transmission can be sent for free.

LAN Topologies: Mesh Mesh networks provide a direct connection between every pair of computers. Main disadvantage of a mesh: Cost! Mesh networks are not scalable.  The number of connections needed for a mesh network grows faster than the number of computers. Because connections are expensive, few LANs employ a mesh topology LAN Topologies: Star In star topologies, all computers attach to a central point (or hub). In practice, star networks seldom have a symmetric shape (i.e., the hub is not located an equal distance from all computers).  Instead, a hub often resides in a location separate from the computers attached to it.

Packet Identification, Demultiplexing, MAC Addresses IEEE 802 standards include: packet addressing Consider packets traversing a shared medium as in the figure: Each computer is assigned a unique address and each packet contains the address of the intended recipient. In the IEEE 802 addressing scheme, each address consists of 48 bits. IEEE 802 uses the term Media Access Control address (also called the MAC address, Ethernet address or physical address). Each Network Interface Card (NIC) contains a unique IEEE 802 address assigned when the device was manufactured. IEEE assigns a block of addresses to each vendor and allows the vendor to assign a unique value to each device.

Unicast, Broadcast, and Multicast Addresses The IEEE addressing supports three types of addresses that correspond to three types of packet delivery: The standard specifies that a MAC broadcast address consists of 48 bits that are all 1s (i.e., FF:FF:FF:FF:FF:FF). MAC broadcast can be viewed as a special form of multicast. Each multicast address corresponds to a group of computers. The Broadcast address corresponds to a group that includes all computers on the network.

Unicast, Broadcast, and Multicast Addresses

Frames and Framing Defn: Framing refers to the structure added to a sequence of bits or bytes that allows a sender and receiver to specify and recognize the exact format of the message. In a packet-switched network, each frame corresponds to a packet at Layer 2. A frame consists of two conceptual parts: 1.A header that contains information used to process the frame. 2.A payload that contains the message being sent. Notes: We say the the message is opaque because the network only examines the frame header. The payload can contain an arbitrary sequence of bytes that are only meaningful to the sender and receiver. Some technologies delineate each frame by sending a short prelude before the frame and a short postlude after it.

Frames and Framing Frames depend on the network standard to specify: a minimum/maximum size Format for the message Defn: A hardware packet (or Layer 2 packet) is called a frame. Case 1: Byte Stuffing with RS-232 as an Example Frame Format Used with RS-232 RS-232 is character-oriented (i.e., RS-232 sends characters not individual bits). Two special characters are used to delineate the packet: Start of header (soh) End of text (eot) RS-232 is a serial binary standard for transmitting data. It was a tremendously popular standard for sending serial data in computers over short (<50 feet) distances. It was used with the serial ports in PCs to connect keyboards, mice, etc. Although replaced in newer PCs by USB and Bluetooth, it is still used for some equipment.

Case 1: Byte Stuffing with RS-232 as an Example (Cont’d) Q: What happens when the special characters are used in the message being transmitted? A: We must translate the special characters into alternative form to avoid confusion. This is called byte stuffing. Illustration of Frame with Byte Stuffing: Figure (a) shows the message the sending computer wishes to transmit. Figure (b) shows the Bytes that are actually transmitted. RS-232 Substitution Table

Case 2: Bit Stuffing with PPP as an Example What if the transmission scheme is bit-oriented rather than byte oriented? Two Real-world examples of bit stuffed networks are: HDLC (High-Level Data Link Control), ISO standard PPP (Point-to-Point Protocol) Bit-oriented protocols view the a frame as a collection of bits. A special bit sequence is used at both the beginning and end of frames. PPP is a popular data link layer protocol for communication between two end- points. It provides authentication, encryption, and compression. PPPoE (Point-to- Point Protocol over Ethernet) is often used to provide a link from a modem to an ISP (Internet Service Provider) control protocol check FLAG Information (variable) FLAG The PPP Frame Format

Case 2: Bit Stuffing with PPP as an Example (Cont’d) Problem: This bit sequence ( ) may occur naturally in the bit stream. Solution: Use bit stuffing. Any time five consecutive 1 bits of the data message need to be transmitted, an additional 0 is “stuffed” in following the five 1s. At the receiving end, after five ones a 0 is always removed. Note: Using this scheme it is not possible to make all frames the same size. TRAILERHEADER Data for transmission (passed down from upper Layer 3 at Source): Bit-stuffed frame ready to send by Layer 2: HEADER TRAILER Data delivered (ready to passed up to upper Layer 3 at Destination): Bit-stuffed frame received at destination Layer 2: DATA SENT OVER NETWORK FROM SOURCE TO DESTINATION