Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.

Slides:



Advertisements
Similar presentations
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Advertisements

Introduction to Network
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 4-1 Multi-Switch Ethernet LAN Operation.
COS 338 Day 7. DAY 7 Agenda Questions? Capstone Proposal must be approved by OCT 6 Submit at any time (prior to Oct 6) using format specified in Capstone.
Networks Terminology and Hardware. Network A network is a group of connected computers that can communicate with each other to share information and equipment,
CSC 450/550 Part 3: The Medium Access Control Sublayer More Contents on the Engineering Side of Ethernet.
Chapter 6 High-Speed LANs1 Chapter 6 High-Speed LANs.
ELC 200 Day 10. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #3 Not Corrected –Still missing 3 assignments –Will be.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Chapter 15: LAN Systems Business Data Communications, 4e.
Larger Site Networks Part2. 2 Ethernet Virtual LANs Hubs versus Switches –Hubs broadcast bits out all ports –Switches usually send a frame out a one port.
1 Version 3.0 Module 3 Networking Media. 2 Version 3.0 Cable Specifications Cables have different specifications and expectations pertaining to performance:
Ethernet LANs Chapter Figure 4-1: A Short History of Ethernet Standards Ethernet –The dominant wired LAN technology today –Only “competitor” is.
Review on Networking Technologies Linda Wu (CMPT )
Conducted and Wireless Media (Part II) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 7, Tuesday 2/21/2007)
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
Chapter 2 Review of Computer Network Technology
Other Ethernet technologies Light Source. Other Ethernet Physical Layer Standards  100Base-X 100 Mbps 100Base-TX uses Cat 5 UTP to desktop  1000Base-X.
Case Study: Pat Lee’s Home PC Network Chapter 1a Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Hardware for Expanding Network. Expanding Networks When do we need expansion:  Network cable is full of data movements  Printing tasks needs.
Network Cabling and Wireless Network
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 5 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications,
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Elements of a Small PC Network LAN Standards –We will focus on LANs that follow the Ethernet standard (80% do) Small Ethernet PC networks use only inexpensive.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Switched and Wireless LANs. 2 Shared media LANs u Limits to Shared Media LANs –FDDI, 100Base-X, 100VG-AnyLAN all shared media LANs v Only one station.
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
7.1 Chapter 7 Transmission Media Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Ethernet LANs Chapter 4 Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only be.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
1 Networks and Telecommunications. 2 Applying Telecommunications in Business TELECOMMUNICATIONS – the transmission of data between devices in different.
Chapter 2 Communications Networks. Introduction Look at: –Telephony Networks (2.2) –OSI Reference Model(2.3) –The Internet (2.4) –Asynchronous Transfer.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Other LAN Technologies. 2 LAN Standards u 802 Working Groups –802.3Ethernet LANs –802.5Token-Ring Networks –802.11Radio LANs – VG-AnyLAN.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Wireless LANs Wireless Technologies for LANs –Radio –Infrared light (as in TV remote control) –Ideal for mobile devices –Useful when wiring would.
ATM Switches Cells Scalable QoS Perspective Virtual Circuits.
CS/IS 465: Data Communication and Networks 1 CS/IS 465 Data Communications and Networks Lecture 28 Martin van Bommel.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.
Other LAN Technologies. 2 LAN Standards u 802 Working Groups –802.3Ethernet LANs –802.5Token-Ring Networks –802.11Radio LANs – VG-AnyLAN.
The Building Blocks: LAN Shared and Switched Ethernet Connecting Devices Ethernet Access Methods Network Operating Systems Best Practice LAN Designs.
Business Data Communications, 4e
Business Data Communications, Fourth Edition Chapter 9: Local Area Networks.
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
Ethernet LANs Chapter 4 Copyright 2004 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 5 th edition.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
1 Chapter Overview Ethernet Token Ring FDDI Wireless Networking.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Ethernet LANs Chapter 4 Panko’s Business Data Networks and Telecommunications, 5th edition Copyright 2005 Prentice-Hall.
Network Media Types COMPUTER NETWORKS 4TH Edition Chapter3
Chapter 12 Local Area Networks
Ethernet LAN 1 1.
Ethernet First network to provide CSMA/CD
Business Data Communications, 4e
Conducted and Wireless Media (Part II)
Chapter 12 Local Area Networks
The Medium Access Control
Presentation transcript:

Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition

2 Other LAN Technologies Large Ethernet networks Wireless LANs ATM LANS and QoS Legacy LANs Token-Ring Networks 10 Mbps Ethernet co-axial cable LANs

3 Figure 5.1: Multi-Switch Ethernet LAN Switch 2 Switch 1 Switch 3 Port 5 on Switch 1 to Port 3 on Switch 2 Port 7 on Switch 2 to Port 4 on Switch 3 C3-2D-55-3B-A9-4F Switch 2, Port 5 A1-44-D5-1F-AA-4C Switch 1, Port 2 E5-BB D3-56 Switch 3, Port 6 D4-55-C4-B6-9F Switch 3, Port 2 B2-CD-13-5B-E4-65 Switch 1, Port 7

4 Switching Table Switch 1 PortStation 2A1-44-D5-1F-AA-4C 7B2-CD-13-5B-E4-65 5C3-2D-55-3B-A9-4F 5D C4-B6-9F 5E5-BB D3-56 Figure 5.1: Multi-Switch Ethernet LAN Switch 2 Switch 1 Port 5 on Switch 1 to Port 3 on Switch 2 A1-44-D5-1F-AA-4C Switch 1, Port 2 B2-CD-13-5B-E4-65 Switch 1, Port 7 E5-BB D3-56 Switch 3, Port 6

5 Figure 5.1: Multi-Switch Ethernet LAN Switch 2 Switch 1 Switch 3 Port 5 on Switch 1 to Port 3 on Switch 2 Port 7 on Switch 2 to Port 4 on Switch 3 C3-2D-55-3B-A9-4F Switch 2, Port 5 Switching Table Switch 2 PortStation 3A1-44-D5-1F-AA-4C 3B2-CD-13-5B-E4-65 5C3-2D-55-3B-A9-4F 7D C4-B6-9F 7E5-BB D3-56 E5-BB D3-56 Switch 3, Port 6

6 Figure 5.1: Multi-Switch Ethernet LAN Switch 2 Switch 3 Port 7 on Switch 2 to Port 4 on Switch 3 A1-44-D5-1F-AA-4C Switch 1, Port 2 D4-55-C4-B6-9F Switch 3, Port 2 Switching Table Switch 3 PortStation 4A1-44-D5-1F-AA-4C 4B2-CD-13-5B-E4-65 4C3-2D-55-3B-A9-4F 2D C4-B6-9F 6E5-BB D3-56 E5-BB D3-56 Switch 3, Port 6

7 Figure 5.2: Hierarchical Ethernet LAN Ethernet Switch F Server Y Server X Client PC1 Only One Possible Path Between Any Two Stations PC Client 2 Ethernet Switch E Ethernet Switch D Ethernet Switch B Ethernet Switch A Ethernet Switch C

8 Figure 5.3: Single Point of Failure in a Switch Hierarchy No Communication Switch 1 Switch 2 Switch 3 Switch Fails A1-44-D5-1F-AA-4C B2-CD-13-5B-E4-65 C3-2D-55-3B-A9-4F D C4-B6-9F E5-BB D3-56

9 Figure C.10: 802.1D Spanning Tree Protocol Switch 1 Switch 2 Switch 3 A1-44-D5-1F-AA-4C B2-CD-13-5B-E4-65 C3-2D-55-3B-A9-4F D C4-B6-9F E5-BB D3-56 Activated Deactivated Normal Operation Loop, but Spanning Tree Protocol Deactivates One Link Module C

10 Figure C.10: 802.1D Spanning Tree Protocol Switch 1 Switch 2 Switch 3 A1-44-D5-1F-AA-4C B2-CD-13-5B-E4-65 C3-2D-55-3B-A9-4F D C4-B6-9F E5-BB D3-56 Deactivated Activated Switch 2 Fails Module C

11 Figure 5.2: Hierarchical Ethernet LAN Core Workgroup Ethernet Switch F Server Y Server X Client PC1 PC Client 2 Workgroup Ethernet Switch E Workgroup Ethernet Switch D Core Ethernet Switch B Core Ethernet Switch A Core Ethernet Switch C

12 Figure C.8: Switching Matrix with Queue Switch Matrix Input Queue Incoming Signal Outgoing Signal Port 1 Port 2 Port 3 Port 4 Port 5 Port 6 Port 7 Port 8 Module C

13 Figure 5.4: Workgroup Switches versus Core Switches Ports = 4 Speed = 1 Gbps Maximum input = 4 Gbps Nonblocking switch matrix capacity = 4 Gbps 1 Gbps Switching Matrix 4Gbps Nonblocking

14 Figure 5.4: Workgroup Switches versus Core Switches Connects Typical Port Speeds Switching Matrix Workgroup Switches Client or Server to the Ethernet Network via An access line 10/100 Mbps Lower Percentage of Nonblocking Capacity But not less than 25% Core Switches Ethernet Switches to One Another via A trunk line 100 Mbps, Gigabit Ethernet, 10 Gbps Ethernet 80% or More of Nonblocking Capacity

15 Client A Client B Client C Server DServer E Server Broadcast Figure 5.5: Virtual LAN with Ethernet Switches Server Broadcasting without VLANS Frame is Broadcast Goes to all stations Creates congestion

16 Figure 5.5: Virtual LAN with Ethernet Switches Server Multicasting with VLANS Client A on VLAN1 Client B on VLAN2 Client C on VLAN1 Server D on VLAN2 Server E on VLAN1 Server Broadcast VLANs are collections of servers and their clients Multicasting (some), not Broadcasting (all)

17 Figure 5.6: Tagged Ethernet Frame Source Address (6 Octets) Length (2 Octets) Length of Data Field in Octets 1,500 (Decimal) Maximum Tag Protocol ID (2 Octets) hex; 33,024 decimal Larger than 1,500, So not A Length By looking at the value in the 2 octets after the addresses, the switch can tell if this frame is basic (value < 1,500) or tagged (value = 33,024) Basic MAC FrameTagged MAC Frame Source Address (6 Octets) Tag Control Information (2 Octets) Priority Level (0-7) (3 bits); VLAN ID (12 bits) (1 other bit) Length (2 Octets) Data Field (variable)

18 Figure 5.7: Ethernet Physical Layer Standards Physical Layer Standard Speed Maximum Run Length UTP 10Base-T 100Base-TX 10 Mbps 100 Mbps 100 meters Medium 4-pair Category 3, 4, or 5 4-pair Category Base-T1,000 Mbps100 meters 4-pair Category 5, 4-pair Enhanced Category 5 is preferred

19 Figure 5.7: Ethernet Physical Layer Standards Physical Layer Standard Speed Maximum Run Length Optical Fiber Medium 10Base-F*10 MbpsUP to 2 km* 62.5/125 micron multimode, 850 nm. 100Base-FX100 Mbps412 m 62.5/125 multimode, 1,300 nm, hub 100 Base-FX100 Mbps2 km 62.5/125 multimode, 1,300 nm, switch * Several 10 Mbps fiber standards were defined in 10Base-F.

Wireless LANs

21 Figure 5.8: Typical Wireless LAN Operation with Access Points Switch Client PC Server Large Wired LAN Access Point A Access Point B UTPRadio Link Handoff If mobile computer moves to another access point, it switches service to that access point Notebook CSMA/CA+ACK UTP

22 Figure 5.8: Typical Wireless LAN Operation with Access Points Wireless Notebook NIC Access Point Industry Standard Coffee Cup To Ethernet Switch Antenna (Fan) PC Card Connector

23 Figure 5.8: Typical Wireless LAN Operation with Access Points D-Link Wireless Access Point Using Two Antennas Reduces Multipath Interference (See Ch. 3)

24 Linksys Switch With Built-In Wireless Access Point Using Two Antennas Reduces Multipath Interference (See Ch. 3) Figure 5.8: Typical Wireless LAN Operation with Access Points

25 Figure 5.8: Typical Wireless LAN Operation with Access Points The Wireless Station sends an frame to a server via the access point The access point is a bridge that converts the frame into an Ethernet frame and sends the frame to the server Mobile Station Access Point Ethernet Switch Server Frame Frame

26 Figure 5.8: Typical Wireless LAN Operation with Access Points The server responds, sending an frame to the access point The access point converts the frame into an frame and sends the frame to the mobile station. Mobile Station Access Point Ethernet Switch Server Frame Frame

Wireless LAN Speeds Mbps (rare) 2.4 GHz band (limited in bandwidth) b11 Mbps, 2.4 GHz 3 channels/access point a54 Mbps, 5 GHz (> bandwidth than 2.4 GHz) 11 channels/access point g54 Mbps, 2.4 GHz limited bandwidth

Broadcast Operation The Wireless Stations and Access Points Broadcast their Signals. Only one access point or wireless station may transmit at any moment or signals will become scrambled. Collision About to Occur Access Point Wireless Station Wireless Station

29 Figure 5.9: CSMA/CA + ACK in Wireless LANs CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) Station or access point sender listens for traffic If there is no traffic, can send if there has been no traffic for a specified amount of time If the specified amount of time has not been met, must wait for the specified amount of time. Can then send if the line is still clear Correction

30 Figure 5.9: CSMA/CA + ACK in Wireless LANs CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) Station or access point sender listens for traffic If there is traffic, the sender must wait until traffic stops The sender must then set a random timer and must wait while the timer is running If there is no traffic when the station or access point finishes the wait, it may send Correction

31 Figure 5.9: CSMA/CA + ACK in Wireless LANs ACK (Acknowledgement) Receiver immediately sends back an acknowledgement; no waiting because ACKs have highest priority If sender does not receive the acknowledgement, retransmits using CSMA/CA

32 Who Implements CSMA/CA+ACK? Stations (when they send) Access Points (when they send) Mobile Station Access Point Frame CSMA/CA+ACK

33 Request to Send (RTS) / Clear to Send (CTS) There is a widely used option we should cover. After a station may send, its first message may be a Request-to-Send (RTS) message instead of a data message Only if the other party sends a Clear-to-Send (CTS) message does the sender begin sending data Mobile Station Access Point RTS CTS New

34 Ad Hoc Networks Ad Hoc Mode There is no access point. Stations broadcast to one another directly Not scalable but can be useful for SOHO use NICs automatically come up in ad hoc mode Module C

35 Wired Core / Wireless to the Desktop Normal Networks: Core & Workgroup Switches Core Workgroup Ethernet Switch F Workgroup Ethernet Switch D Core Ethernet Switch B Core Ethernet Switch A Core Ethernet Switch C Workgroup Switches Attach to Stations By UTP Module C

36 Wired Core / Wireless to the Desktop With High-Speed Wireless LANs, Replace Workgroup Switches with Access Points Core Access Point 2 Access Point 1 Core Ethernet Switch B Core Ethernet Switch A Core Ethernet Switch C Access Points Serve Stations Module C

Security Attackers can lurk outside your premises In “war driving,” drive around sniffing out unprotected wireless LANs In “drive by hacking,” eavesdrop on conversations or mount active attacks. Site with WLAN Outside Attacker New

Security By default, security on WLAN NICs and access points is turned off, making external attacks trivial WLAN vendors offer Wired Equivalent Privacy (WEP), but this is weak and easily broken. The Working Group is working on a temporary replacement (TKIP) and longer-term security replacement, i Even if corporate access points can be secured, many departments create unauthorized rogue access points that are seldom secured. New

39 Personal Area Networks (PANs) Connect Devices On or Near a Single User’s Desk PC, Printer, PDA, Notebook Computer, Cellphone Connect Devices On or Near a Single User’s Body Notebook Computer, Printer, PDA, Cellphone The Goal is Cable Elimination

40 Personal Area Networks (PANs) There May be Multiple PANs in an Area May overlap Also called piconets

41 Figure 5.10: versus Bluetooth LANs Focus Speed Bluetooth Large WLANsPersonal Area Network 11 Mbps to 54 Mbps In both directions 722 kbps with back channel of 56 kbps. May increase. Distance 100 meters for b (but shorter in reality) Shorter of a Number of Devices Limited in practice only by bandwidth and traffic Only 10 piconets, each with 8 devices maximum 10 meters (may increase)

42 Figure 5.10: versus Bluetooth LANs Scalability Cost Battery Drain Bluetooth Good through having multiple access points Poor (but may get access points) Probably higherProbably Lower HigherLower DiscoveryNoYes Discovery allows devices to figure out how to work together automatically

43 Figure 5.11: Bluetooth Operation File Synchronization Client PC Slave Notebook Master Printer Slave Printing Cellphone Telephone Piconet 1

44 Figure 5.11: Bluetooth Operation Client PC Notebook Printer Slave Printing Call Through Company Phone System Cellphone Master Telephone Slave Piconet 2

45 Figure 5.11: Bluetooth Operation File Synchronization Client PC Slave Notebook Master Printer Slave Printing Call Through Company Phone System Cellphone Master Telephone Slave Piconet 1 Piconet 2

46 Figure 5.12: Normal Radio Transmission and Spread Spectrum Transmission Channel Bandwidth Required for a specific Signal speed Normal Radio: Use only the required Bandwidth to conserve The frequency spectrum Note: Height of Box Indicates Bandwidth of Channel Shannon’s Law: W = B log 2 (1/S/N) Defines minimum bandwidth needed for a signal of a specific speed.

47 Figure 5.12: Normal Radio Transmission and Spread Spectrum Transmission Channel Bandwidth Required for Signal Frequency Hopping Spread Spectrum (FHSS) Direct Sequence Spread Spectrum (DSSS) b Note: Height of Box Indicates Bandwidth of Channel Wideband but Low-Intensity Signal

48 Figure 5.13: Code Division Multiple Access (CDMA) Spread Spectrum Transmission Client PC 1 Client PC 2 Low-Density Orthogonal Signal 1 Low-Density Orthogonal Signal 2 Server A Server B Radio Spectrum Used in Some Cellular Telephone Systems

49 OFDM Orthogonal Frequency Division Multiplexing (OFDM) Divide a large channel into many subchannels Send part of the signal in each channel Stops using channels with impairment Used in a, g at 54 Mbps Module B Channel Subchannel Impaired Subchannel (Not Used)

50 Spread Spectrum Methods Spread Spectrum Techniques DSSSFHSS (Original ) b DSSS CDMA (Cellular Telephony) OFDM (802.11a, g)

51 Ultrawideband (UWB) EWB Uses Extremely Wide Channels EWB channels are enormously wide—often cutting across several entire service bands Extremely high speeds are possible Can travel through thick walls Because of concerns that EWB may it interfere with services in the service bands spanned, regulators require power to be kept extremely low New Not in Book

52 ATM (Asynchronous Transfer Mode) Ethernet competitor for switched LANs Quality of Service (QoS) for telephony and multimedia transmissions As scalable in speed as Ethernet Highly complex and expensive to buy and manage Not selling well for LANs Increasingly popular for WANs

53 Figure 5.15: Handling Brief Traffic Peaks Traffic Network Capacity Momentary Traffic Peak: Congestion and Latency Time Congestion and Latency

54 Figure 5.15: Handling Brief Traffic Peaks Traffic Network Capacity Traffic Peak Time Quality of Service (QoS) Guarantees in ATM Traffic with Reserved Capacity Always Goes (Voice) Other Traffic Must Wait (Data)

55 Figure 5.15: Handling Brief Traffic Peaks Traffic Overprovisioned Network Capacity Traffic Peak: No Congestion or Latency Time Overprovisioned Traffic Capacity in Ethernet

56 Figure 5.15: Handling Brief Traffic Peaks Traffic Network Capacity Peak Load Time Priority in Ethernet High-Priority Traffic First Low-Priority Waits

57 Figure 5.16: ATM Network with Virtual Circuits Server Client PC ATM Switch 1 ATM Switch 2 ATM Switch 3 ATM Switch 4 ATM Switch 5 ATM switches can be arranged in a mesh, so there are alternative paths. This makes switching slow and expensive.

58 Figure 5.16: ATM Network with Virtual Circuits Server Client PC ATM Switch 1 ATM Switch 2 ATM Switch 3 ATM Switch 4 ATM Switch 5 Virtual Circuit Virtual Circuit ATM selects a single path, called a Virtual circuit, before two stations Begin transmitting. This simplifies Switching and so lowers switching cost

59 Figure 5.16: ATM Network with Virtual Circuits Server Client PC ATM Switch 1 ATM Switch 2 ATM Switch 3 ATM Switch 4 ATM Switch 5 Virtual Circuit Virtual Circuit Virtual Circuit A... B... C... D... Port Switch 4 Switching Table ATM switching tables are as simple as Ethernet switching tables

60 ATM Reduces Switching Costs Virtual circuits simplify switching, reducing switching costs ATM (like Ethernet) is unreliable, also reducing switching costs by avoiding the expense of step-by-step error correction Switches are the most expensive element in most networks, so minimizing switching cost usually is a major goal in network standards

61 Figure 5.17: Virtual Circuit with VPI and VCI Virtual Path is a Path to a Site Virtual Channel is a Connection to a Particular Computer at the Site Switches in Backbone Only Have to Look at the Virtual Path Indicator (VPI) Virtual Channels Virtual Path Site 1 Site 2 ATM Backbone

62 Figure 5.17: ATM Cell Bit 1Bit 4Bit 3Bit 2Bit 8Bit 7Bit 6Bit 5 Virtual Channel Identifier Virtual Path IdentifierVirtual Channel Identifier Reserved Call Loss Priority Payload Type Header Error Check Payload (48 Octets) Virtual Path Identifier VPI: Specifies a VC to site VCI: Specifies a station at site Switches between sites only look at VPI 5 octets of header 48 octets of payload 53 octets total

63 ATM Cells ATM frames are short and fixed in length; called cells Only 53 octets long 5 octets of header 48 octets of data Short length reduces latency at switches Switch may have to wait until entire frame arrives before sending it back out—faster with short cells Fixed length gives predictability for faster processing

Token-Ring Networks Legacy LAN Technologies

65 Token-Ring Networks Ring Topology Inner Ring Outer Ring Frame Normal Operation Dual Ring; normally only one is used

66 Token-Ring Networks Ring is wrapped if there is a break The wrapped ring is still a full ring Break Wrapped Ring

67 Token-Ring Networks Special Frame Called Token Circulates when no station is transmitting For access control, station must have token to send Inner Ring Outer Ring Token

68 Ring Network Technologies Token-Ring Network FDDI (Fiber Distributed Data Interchange) SONET/SDH 16 Mbps100 Mbps: 200 km circumference 54 Mbps to several Gbps Small to Mid-size LANs LAN BackbonesTelephony Lost out to cheaper and eventually faster Ethernet Lost out to faster gigabit Ethernet Growing rapidly in the telephone network core

69 Figure 5.19: Token-Ring Network STP or UTP STP Or Fiber Wiring hubs are called multistation access units (MAUs). Prefers to use shielded twisted pair (STP) wire for runs to stations and to link MAUs but will use UTP for stations and fiber for trunks. STP has two twisted pairs. There is a metal mesh around each pair and around both pairs to reduce interference. STP is bulky and expensive. Multistation Access Unit (MAU)

70 Figure 5.18: Major Legacy Networks Early Ethernet Standards General Only 10 Mbps—shared by all stations Before switches and hubs Used coaxial cable (central wire surrounded by a conducting cylinder) You use this to connect your TV to your VCR Inner Wire Outer Conductor Wrapped in Jacket

71 Figure 5.18: Major Legacy Networks Early Ethernet Standards 10Base5 Multidrop topology Thick trunk cable uses coaxial cable technology; 500-meter limit Drop cable has 15 wires NIC has 15-hole Attachment Unit Interface (AUI) port Trunk Cable Drop Cable 15-Hole AUI Port

72 Figure 5.18: Major Legacy Networks Early Ethernet Standards 10Base2 Daisy chain topology Thin coaxial cable between stations Circular BNC connector BNC Connector

73 Figure 5.18: Major Legacy Networks Ethernet 10Base2 To Next Station T-Connector to Link NIC to next segments NIC

74 Figure 5.18: Major Legacy Networks RJ-45 UTP Connectors BNC Connector 10Base2 T-Connector UTP Thin Coax Ethernet 10Base2: UTP versus BNC Connectors

75 Figure 5.18: Major Legacy Networks Ethernet 10Base2 BNC Connector T-Connector To Next Station