1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY Ethernet Fundamentals.
1 ELEN602 Lecture 10 Review of last lecture –M/G/1 and M/D/1 Results Multi-access Networks Medium Access Control –ALOHA –Slotted ALOHA.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 5 – Collision management.
Introduction to Network-2-. Network types Local Area Network (LAN) High speed, low error data networks that covers small geographic area. There are different.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Ethernet, MAC podvrstva
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
Packet Transmission (Part III) Local Area Networks (LANs)
Wired LANs: Ethernet In Chapter 1, we learned that a local area network (LAN) is a computer network that is designed for a limited geographic area such.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
CCNA1 v3 Module 1 v3 CCNA 1 Module 6 JEOPARDY K. Martin.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Chapter Six The Data Link Layer. Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced.
1Ethernet Lecture # 12 Computer Communication & Networks.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Ethernet Overview it the IEEE standard for Ethernet.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Introduction to Communication Lecture (10) 1. 2 Wired LANs: Ethernet IEEE Project 802 defines the LLC and MAC sublayers for all LANs including Ethernet.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Lec # 23 Data communucation Muhammad Waseem Iqbal 1ethernet.
Data Link Layer Lower Layers Local Area Network Standards
Link Layer 5.1 Introduction and services
CS4470 Computer Networking Protocols
Advanced Computer Networks
Lab 7 – CSMA/CD (Data Link Layer Layer)
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
Protocol layering and data
CCNA 1 Chapter 5 Ethernet Fundamentals
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Link Layer 5.1 Introduction and services
Presentation transcript:

1 Computer Networks Local Area Networks

2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical area (up to ~ 2.5 km) LAN topologies Medium Access Control

3 LAN Topologies

4 Ethernet Segments

5 Two-Level Hub Topology

6 Ring Topology

7 IEEE802 Protocol Suite v.s. OSI

8 802 standards MAC + physical layers –802.3 Bus/tree/star topologies CSMA/CD –802.5 Token Ring – Wireless

9 Encapsulation Application data header TCP IP LLC MAC trailer TCP segment IP datagram LLC PDU MAC frame

10 IEEE802.3: CSMA/CD Ethernet uses CSMA/CD – listens to line before/during sending CSMA/CD: Carrier sense, multiple access with collision detection –collisions detected within short time –colliding transmissions aborted –Persistent or non-persistent retransmission Collision Detection: – On baseband bus, collision produces much higher signal voltage than transmitted signal – For Hub-topology activity on more than one port

11 Transmit Process in IEEE802.3 Assemble frame Channel Busy? Start Transmission Collision Detected? T/x done? Send jamming signal Increment # of attempts Too many attempts? Compute Back-off / Wait Backoff time T/x successful T/x aborted Yes No Yes No Yes No

Collision Detection Node ANode B Node A starts transmission at time 0 At time almost T, node A’s message has almost arrived How can we ensure that A knows about the collision? Node B starts transmission at time T 

Collision Detection contd. Node ANode B Node A starts transmission at time 0 At time almost T, node A’s message has almost arrived Node B starts transmission at time T At time 2T, A is still transmitting and notices a collision 

Collision Detection contd. AB AB AB time = 0 time = T time = 2T

Collision Detection contd. How can A know that a collision has taken place? –There must be a mechanism to insure retransmission on collision –A’s message reaches B at time T –B’s message reaches A at time 2T –So, A must still be transmitting at 2T IEEE specifies max value of 2T to be 51.2 micro.sec. –This relates to maximum distance of 2500m between hosts –At 10Mbps it takes 0.1 micro.sec. to transmit one bit so 512 bits (64B) take 51.2 micro.sec. to send –So, Ethernet frames must be at least 64Bytes long Padding is used if data is less than 64Bytes Send jamming signal after collision is detected to insure all hosts see collision

16 IEEE802.3 Frame Format preamble 7 SFD 12 or 62 destination address source address 2 or 6 lengthdata unit pad FCS 4octets IEEE bit CRC used to synchronize receiver, sender clocks SFD: Start-of-frame delimiter

17 IEEE802.3 MAC Addresses Source and destination MAC addresses. These are the hardware addresses or physical addresses. They are 6 Octets each IEEE Organizationally Unique Identifier (OUI) - allows vendor to build hardware with unique addresses XX XX XX XX XX XX bytes Ethernet MAC Address Vendor Part 24 bits Vendor Assigned 24 bits Windows 2000 > ipconfig /all

18 IEEE802.5 : Token Ring Frames flow in one direction Special bit pattern (token) rotates around ring. The token is 24-bit long Node having a frame to transmit must capture token first Node must release token after done transmitting Node remove frame when it comes back around Round-robin service

19 Token Ring Operation

20 IEEE802.5:Token Ring Token Holding Time (THT) Token Rotation Time –TRT <= # of Active Nodes * THT + Ring Delay –Active nodes denotes the number of nodes that have data to transmit. –Ring latency denotes how long it takes the token to circulate around the ring when no one has data to send. Monitor Station –Introduce additional delay –Detect missing token # of Nodes * THT + Ring Delay –Ring delay- token circulation time

Fiber Distributed Data Interface protocol As opposed to Token Ring's single ring, FDDI, uses two to achieve better results and less chance of failure. In a basic Token Ring network, at any instant there is a single active ring monitor which supplies the master clock for the ring, whereas in FDDI this approach isn't ideal because of the high data rates. Instead, each ring interface has its own local clock, and outgoing data is transmitted using this clock. Due to its dual ring architecture, FDDI has the ability to recover from link and station failures. If a station goes down, the signals are routed around it by a loop formed from the rings. 21