Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

CHAPTER Practical Token Ring Implementation. Chapter Objectives Give an overview of the Token Ring LAN Describe the characteristics of the Token Ring.
Cisco Academy – Chapter 5 Physical Layer. Physical Layer - 1 defines the electrical, mechanical, procedural, and functional specifications for activating,
CSC 450/550 Part 3: The Medium Access Control Sublayer More Contents on the Engineering Side of Ethernet.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
TDC /502, Summer II Unit 2: Underlying Technologies Transmission media (Section 3.1. Read on your own) Local Area Networks (LANs) –Ethernet.
CSCI 4550/8556 Computer Networks Comer, Chapter 11: Extending LANs: Fiber Modems, Repeaters, Bridges and Switches.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Ethernet Hardware Cabling –Twisted Pair 100 Meter length limit Point to Point –Fiber Expense Point to Point 2000 meter length limit.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Review on Networking Technologies Linda Wu (CMPT )
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
COMPUTER NETWORKS.
IST 228\Ch1\Internetworking1 Collision/Broadcast Domain The term collision domain defines the set of devices for which their frames could collide A broadcast.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Connecting LANs, Backbone Networks, and Virtual LANs
Network Topologies An introduction to Network Topologies and the Link Layer.
Subnetting AND = AND = COMPARED (MINUS) TO =
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
LANs Cabling Topologies Segments and bridges Switches and routers.
Chapter 20 Networks. 4 Questions that need to be answered concerning networks? –How will each computer be identified? –What kind of wire should you run.
TC 361 Data Networking Test Review
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
Network Architecture Layout designed and constructed by: Vicki Kertz.
20 LAN Hardware Overview Version A.01 H3065S Module 2 Slides.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Topologies The structure of the network –Physical topology Actual layout of the media –Logical topology How the hosts access the media.
Local Area Networks Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Communication Networks Fourth Meeting. Types of Networks  What is a circuit network?  Two people are connected and allocated them their own physical.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
Computer Networks Syed Md. Ashraful Karim Lecturer, CSE BU.
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Local Area Networks: Monil Adhikari. Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print serving.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
Data Communications is the Real World OSI Layers 1 & 2 a.k.a TCP/IP Network Interface Layer.
Introduction to Computer Networks Introduction to Computer Networks.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
COMPUTER NETWORKS CS610 Lecture-13 Hammad Khalid Khan.
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Local Area Networks Honolulu Community College
Part III Datalink Layer 10.
Physical & Data-link ISQS 6343 #2 John R. Durrett.
Ethernet and Token Ring LAN Networks
Ethernet and Token Ring LAN Networks
Protocol layering and data
Part III Datalink Layer 10.
LAN Hardware Concepts Module 3 H3065S F.00 [Course Title]
Protocol layering and data
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
SYSTEM ADMINISTRATION Chapter 3
Presentation transcript:

Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision Avoid –Token Passing –Demand Priority Can’t buy this type of hardware any more

Access Methods Carrier Sense Multiple Access with Collision Detection –Ethernet –Senses when the cable is connected (Carrier Sense) –Senses when no traffic is passing to transmit (multiple access) –Senses possible collisions (Collision Detect) –Computers contend for access on the wire –C03dem01, 02, 03, 04, 05, 06

Packet Traffic Network Cable

Collisions Signal 1 Signal Sum of 1 and 2 Ethernet threshold

CSMA/CA Carrier Sense Multiple Access Collision Avoidance –The computer announces that it wants to transmit. –Other computers wait until that computer transmits it’s data –Creates more traffic on the wire –c03dem07

Token Ring Special packets called tokens circulate in a ring from computer to computer. –If a free token is detected then a computer will take control and send it’s data –If a token is destined for a specific computer that computer takes the token –One one computer at a time can use the token so no collisions take place. –C03dem08, 09, 10, 11,12

Demand Priority 100VG-Any LAN (obsolete) –Hubs (repeaters) manage the packet passing by searching for requests –Similar to CSMA/CD except that the hubs be assign priorities. –More efficient since broadcasts are minimized across the network. –Was made obsolete by Ethernet –Vendors don’t sell 100VG NICs anymore –c03dem13,14

Packet Contents Contain data for passing between computers –Have timing, begin, and end markers –Have addressing (source/dest) information –Have error detection/correction –Have type identifiers so computers can filter out packets at a low level. –Contain requests for how to pass the packet

Actual Ethernet Frame 62 bits of preamble (alternating 1’s and 0’s) 2 bits Start of Frame Delimiter (2 one’s) Destination Ethernet Address Source Ethernet Address Length or Type Data (if less than 46 bytes then pad to 46) 4 bytes (32 bits) Frame Check Sequence

Ethernet destination Address (first 32 bits) Ethernet Dest (last 16)Ethernet Src (16 bits ) Ethernet source Address (last 32 bits) Type Code or Length of packet (16 bits) Length from 512 to 4096 bytes Ethernet Checksum IP header, TCP header, then your data Ethernet Packet

Network Traffic All of the computers in you local area see all of the packets on the wire and have to decode them and see if a particular packet is addressed to this computer. Each NIC has a unique address assigned to it. When a packet is sent that unique address is build in to the packet. Before connection is established the source computer sends out a broadcast (all 1’s in the data portion of the destination address. The destination system (responds to a specific type of request) then replies with it’s address to finish the connection setup

Network Installations Cross connects –Blocks that connect wall jacks to hubs –May changes/removals easier Patch panels –Allow changes from one network to another –Allow changes to wiring if a hubs fails

Hub Advantages Standard Telephone Wiring Standard Punch Blocks and Cross Connects Ability to disable a single port Easier to monitor traffic patterns Visible Indication of Link Status If a wire is cut only one port is affected –Unless the backbone feed is cut!

5-4-3 Repeater Rule 10MB 3 repeater rule Repeater System 1 Sys 2 Sys3 System 1 can talk to Sys 2 but not Sys3

5-4-3 Rule 5 segments (between repeaters or work groups) 4 repeaters 3 segments can have computers attached. Violation of this rule means one end of the network can’t talk to the other end.

Network Diameter (100MB) 205 Meter Limit Repeater 100M 5M 100M 10MB diameter is 500M

Segmentation of the Network Segmentation can control broadcast traffic on a network Segmentation can enhance security on the network (limited traffic monitoring) Segmentation can be implemented with bridges (2 port) and switches (multi ports) If more segmentation is needed then a routed network may need to be installed.

Switches and Bridges Repeater Bridge

Bridge Insides Interface Filter based on ethernet address LAN A LAN B

Switch Insides A B C D E F G Switching based on ethernet address

100baseT to 10baseT Hub/Bridge 10baseT 100baseT 10baseT hub 100baseT hub 100baseT to 10baseT Bridge Module

10MB Ethernet Rules 3 repeater (populated) limit 5 repeater per segment limit 7 bridges per ethernet lan Cable lengths 1024 stations per ethernet lan

100 MB Ethernet Rules 2 hubs no more than 5 meters apart Total length of network segment is 205 meters. Must use Cat 5 or better cable Punch blocks must be Cat 5 certified

How to get around limits? Hubs Switch ROUTER Other Lans To the Internet (switching based on IP address) Firewall

Token Ring Mic (Media Interface Connector at each computer) 4 or 16 MB/s

MAU or MSAU Multistation Access Unit `` Ring inRing out Computer Ports The MAU allows the ring to be installed in a star topology The MAU isolates a port if the attached computer fails

Token ring operation First computer on the network sends a token The token travels around the ring If a computer wants to transmit it takes control of the token That computer sends it’s data and the frame goes around the ring to the destination computer. The destination computer takes the token and marks the token as received. The token continues until it arrives at the source computer who acknowledges the data. The sending computer then removes the token from the ring and sends a new token.

More token passing One 1 token can be on the ring at one time. The token passing only goes in one direction. Transfer rates are either 4 or 16 MBS IBM POS (Point of Sale) systems still use token ring networks Routers can handle mixed token ring to ethernet networks.

Appletalk LocalTalk –230 Kbps, single twisted pair, obsolete EtherTalk –uses ethernet TokenTalk AppleShare –File Sharing Zones –Sort of like subnets or workgroups

ARCnet ARCnet hubs and nics are still available Uses token bus access method Can handle up to 255 network numbers per network. Uses a single coax or twisted pair cable per computer The cable is different than ethernet cable The cable distances are longer than ethernet 2.5 Mbps speed