Chapter 8 LAN Architectures Part II: Understanding Internet Access Technologies.

Slides:



Advertisements
Similar presentations
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Advertisements

Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Chapter 7 Local Area Networks: The Basics
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Chapter 15: LAN Systems Business Data Communications, 4e.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
COMPUTER NETWORKS.
Chapter 2 Review of Computer Network Technology
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Network Access and Transmission Methods Chapter 10.
Chapter 4 Local Area Networks. Layer 2: The Datalink Layer The datalink layer provides point-to- point connectivity between devices over the physical.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Chapter 7 Local Area Networks: The Basics. Topics Definition of LAN Primary function, advantage and disadvantage Difference between Client/Server network.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
1 Networks and Telecommunications. 2 Applying Telecommunications in Business TELECOMMUNICATIONS – the transmission of data between devices in different.
Local Area Networks Chapter 17, Exploring the Digital Domain.
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
CSCI 465 D ata Communications and Networks Lecture 19 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Chapter 21 Topologies Chapter 2. 2 Chapter Objectives Explain the different topologies Explain the structure of various topologies Compare different topologies.
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Chapter2 Networking Fundamentals
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Chapter 11 Local Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis.
Chapter 5 Network Architecture. Physical Topologies Bus Ring Star.
WEBMASTER 3224 PHYSICAL VS LOGICAL COMPONENTS OF THE INTERNET AND NETWORKS.
Networking Topology 1.BUS Topology 2.RING Topology 3.STAR Topology
Business Data Communications, Fourth Edition Chapter 9: Local Area Networks.
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Local Area Networks: Monil Adhikari. Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print serving.
1 Chapter Overview Ethernet Token Ring FDDI Wireless Networking.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Simple LAN Topologies  Terminators stop signals after they have reached their destination  Signal bounce –Phenomenon in which signals travel endlessly.
Local Area Networks a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic.
1 3/13/ :25 Chapter 5Protocol Architecture1 Rivier College CS575: Advanced LANs Chapter 5: Protocol Architecture.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
(C) Ho-Won Jung, Korea University 1 Chapter 7: LAN topologies and media access control College of Business Administration Korea University Fall, 2000 Ho-Won.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
SIMS-201 Computer Networks.
Network Protocols.
Nada Al Dosary CT 1502 Planning and Design of Communication Networks Local Area Networks (LANs) & Networks.
Ethernet and Token Ring LAN Networks
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Business Data Communications, 4e
SIMS-201 Computer Networks.
Chapter 12 Local Area Networks
Chapter 12 Local Area Networks
Ethernet and Token Ring LAN Networks
SYSTEM ADMINISTRATION Chapter 3
Presentation transcript:

Chapter 8 LAN Architectures Part II: Understanding Internet Access Technologies

2 Topics Addressed in Chapter 8 What is meant by LAN architecture? What is meant by LAN architecture? LAN topologies LAN topologies Data link and media access control protocols Data link and media access control protocols Physical layer data encoding in LANs Physical layer data encoding in LANs Ethernet architectures Ethernet architectures Token ring LANs Token ring LANs FDDI and 100VG-AnyLAN FDDI and 100VG-AnyLAN ATM LANs ATM LANs Virtual LANs Virtual LANs Wireless LAN architectures Wireless LAN architectures LAN architecture selection criteria LAN architecture selection criteria IEEE LAN standards IEEE LAN standards

3 What is Meant By LAN Architecture? LAN architecture is the overall design of a LAN. It includes: LAN architecture is the overall design of a LAN. It includes:  LAN hardware  LAN software  LAN topology  Media access control (MAC) protocol The LAN’s network operating system is sometimes also considered to be part of LAN architecture The LAN’s network operating system is sometimes also considered to be part of LAN architecture

4 LAN Topologies There are two types of LAN topologies: physical and logical There are two types of LAN topologies: physical and logical Physical LAN topology refers to the physical layout of the network Physical LAN topology refers to the physical layout of the network  The way in which the communication is configured and how nodes attach to the network  Because the focus is on physical connections among hardware component, physical topologies correspond to the physical layer of the OSI reference model Logical topology is concerned with how messages are passed from node to node within the network Logical topology is concerned with how messages are passed from node to node within the network

5 Physical Topologies LAN’s have three basic physical topologies: LAN’s have three basic physical topologies:  Bus: all nodes attach to a common communication pathway or channel  Ring: the medium forms a loop to which all nodes are attached  Star: uses a central station (hub or switch) to which all other nodes have point-to-point connections; all communication among nodes occurs through this central station These are illustrated in Figure 8-1 These are illustrated in Figure 8-1 Physical star topologies are most common in today’s LANs Physical star topologies are most common in today’s LANs

6 Figure 8-1

7 Bus Topologies In a classic bus topology, the medium consists of a single wire or cable to which other nodes are attached via connectors or transceivers In a classic bus topology, the medium consists of a single wire or cable to which other nodes are attached via connectors or transceivers  Variations include a primary bus with spurs (see Figure 8-2)  Disadvantages include the potential for loose connections or breaks in the bus to disrupt the entire network Early Ethernet LAN implementations were typically physical bus architectures; today, most Ethernet implementations are physical stars Early Ethernet LAN implementations were typically physical bus architectures; today, most Ethernet implementations are physical stars  However, an Ethernet shared media hub is sometimes called a “bus in a box” Both IEEE standard and IEEE standards and their protocols address communication over LANs with bus topologies Both IEEE standard and IEEE standards and their protocols address communication over LANs with bus topologies

8 Ring Topologies In a physical ring topology, the communication medium forms a closed loop (ring) and all stations are connected to the loop In a physical ring topology, the communication medium forms a closed loop (ring) and all stations are connected to the loop  Data is transmitted node-to-node in one direction on the ring (see Figure 8-3)  Similar to a linear bus, the entire network could be disrupted if one of the connectors or links in the ring should fail Physical ring topologies are less common than bus or star topologies Physical ring topologies are less common than bus or star topologies Token ring and FDDI LANs have physical ring topologies Token ring and FDDI LANs have physical ring topologies

9 Figure 8-3

10 IEEE and LANs The most widely used microcomputer ring network is the token passing ring. It conforms to the IEEE standard The most widely used microcomputer ring network is the token passing ring. It conforms to the IEEE standard Token ring networks physically look like a star topology, but technically they are physical rings Token ring networks physically look like a star topology, but technically they are physical rings  Token ring nodes attach to multistation access units (MAUs) – see Figure 8-4  MAUs can be described as “a ring in a box”, because nodes attach to the physical ring by connecting to the MAU (see Figure 8-5)  MAUs can be interconnected to form larger rings (see Figure 8-6) IEEE addresses dual-ring metropolitan area network (MAN) architectures (see Figures 8-24 and 8-25) IEEE addresses dual-ring metropolitan area network (MAN) architectures (see Figures 8-24 and 8-25)

11 Figure 8-4

12 Figure 8-5

13 Figure 8-6

14 Star Topologies In LANs with star topologies, all nodes are connected to some kind of wiring center such as a hub or switch (see Figure 8-7) In LANs with star topologies, all nodes are connected to some kind of wiring center such as a hub or switch (see Figure 8-7)  Today, most LAN implementations physically resemble star topologies Each node is isolated on its own network segment in a physical star topology which minimizes the possibility of total network disruption by a malfunctioning connector, NIC, or link Each node is isolated on its own network segment in a physical star topology which minimizes the possibility of total network disruption by a malfunctioning connector, NIC, or link  However, the network is vulnerable to wiring center failure The use of central connection points also facilitates network traffic monitoring and network management, including network security management The use of central connection points also facilitates network traffic monitoring and network management, including network security management ARCnet was one of the first LAN architectures with a star topology (see Figure 8-8b) ARCnet was one of the first LAN architectures with a star topology (see Figure 8-8b)

15 Figure 8-7

16 Logical Topologies Every LAN has both a physical and logical topology Every LAN has both a physical and logical topology A LAN’s logical topology specifies how messages are passed from node to node within the network A LAN’s logical topology specifies how messages are passed from node to node within the network  It corresponds to the media access control (MAC) protocol used in the LAN Two logical LAN topologies exist: Two logical LAN topologies exist:  Sequential (or logical ring): data is passed from one node to another in a ring-like sequence  Token passing in token ring and FDDI LANs are examples  Broadcast: nodes transmit frames/packets to all other nodes in the network; only the intended recipient processes the entire frame/packet  Ethernet LANs use a logical broadcast topology

17 Data Link Protocols Data link protocols, including those used in LANs, are responsible for establishing the rules by which nodes gain access to a network’s communication medium and exchange messages. Such protocols describe several important aspects of the message exchange process including: Data link protocols, including those used in LANs, are responsible for establishing the rules by which nodes gain access to a network’s communication medium and exchange messages. Such protocols describe several important aspects of the message exchange process including:  Delineation of data  Error control  Addressing  Transparency  Code independence  Media access--this is governed by media access control (MAC) protocols

18 LLC and MAC Sublayers LANs employ two primary data link protocols: contention and token passing LANs employ two primary data link protocols: contention and token passing In IEEE 802 standards, the data link layer is divided into two sublayers LLC and MAC (see Figure 8-10) In IEEE 802 standards, the data link layer is divided into two sublayers LLC and MAC (see Figure 8-10)  LLC (logical link control) is responsible for flow control, message sequencing, message acknowledgement, and error checking  MAC (media access control) enables network nodes to access the communication medium via contention or token passing

19 Figure 8-10

20 CSMA/CD CSMA/CD (Carrier Sense Multiple Access and Collision Detection) is most widely used contention-based MAC used in LANs CSMA/CD (Carrier Sense Multiple Access and Collision Detection) is most widely used contention-based MAC used in LANs  It is the MAC protocol used in Ethernet LANs In a true contention MAC (like CSMA/CD), each node has equal access to the medium In a true contention MAC (like CSMA/CD), each node has equal access to the medium As noted in Table 8-1, each node monitors the medium for data traffic and if none is detected, it begins transmitting data As noted in Table 8-1, each node monitors the medium for data traffic and if none is detected, it begins transmitting data A collision occurs when two or more nodes begin to transmit at the same time A collision occurs when two or more nodes begin to transmit at the same time To avoid collision recurrence, each node waits a random time interval (hardwired in its NIC) before attempting to retransmit To avoid collision recurrence, each node waits a random time interval (hardwired in its NIC) before attempting to retransmit

21 Table 8-1

22 CSMA/CA CSMA/CA (Carrier Sense Multiple Access and Collision Avoidance) is a variation of CSMA/CD used in wireless LANs because it is difficult to detect collisions in such networks CSMA/CA (Carrier Sense Multiple Access and Collision Avoidance) is a variation of CSMA/CD used in wireless LANs because it is difficult to detect collisions in such networks When CSMA/CA is used, each node must wait a random time interval (hardwired in the wireless NIC) after detecting a clear medium before transmitting When CSMA/CA is used, each node must wait a random time interval (hardwired in the wireless NIC) after detecting a clear medium before transmitting

23 Token Passing Token passing is the other major MAC protocol found in LANs Token passing is the other major MAC protocol found in LANs It is used in token ring and FDDI LANs and other networks with logical ring topologies It is used in token ring and FDDI LANs and other networks with logical ring topologies The token is a pre-defined bit pattern that is passed among network attached computers until one of them wants to use the medium to transmit data The token is a pre-defined bit pattern that is passed among network attached computers until one of them wants to use the medium to transmit data Token passing is summarized in Table 8-2 Token passing is summarized in Table 8-2 In token ring networks that resemble physical star topologies, token passing takes place within MAUs (see Figure 8-12) In token ring networks that resemble physical star topologies, token passing takes place within MAUs (see Figure 8-12) Token passing can be used in bus topologies as well as in physical ring topologies (see Figure 8-11) Token passing can be used in bus topologies as well as in physical ring topologies (see Figure 8-11) Table 8-3 compares token passing and CSMA/CD Table 8-3 compares token passing and CSMA/CD

24 Table 8-2

25 Figure 8-12

26 Table 8-3

27 Physical Layer Data Encoding Baseband transmission is common in LANs Baseband transmission is common in LANs When LAN nodes use the communication medium, their NICs transmit digital signals to represent the bits in data link layer protocols frames directly onto the medium When LAN nodes use the communication medium, their NICs transmit digital signals to represent the bits in data link layer protocols frames directly onto the medium Some of the encoding schemes used in LANs are illustrated in Figure These include: Some of the encoding schemes used in LANs are illustrated in Figure These include:  Manchester encoding (used in 10 mbps Ethernet)  4B5B (used in 100 mbps Ethernet)  Differential Manchester encoding (used in token ring LANs)  NRZI (used in FDDI LANs)

28 Figure 8-13

29 Ethernet LAN Architectures IEEE compliant LANs are better known as Ethernet LANs IEEE compliant LANs are better known as Ethernet LANs There are a variety of IEEE compliant LANs (see Table 8-4) There are a variety of IEEE compliant LANs (see Table 8-4) Today, most Ethernet LANs have physical star topologies; some have physical bus topologies Today, most Ethernet LANs have physical star topologies; some have physical bus topologies All Ethernet LANs have broadcast logical topologies and use CSMA/CD as the MAC protocol All Ethernet LANs have broadcast logical topologies and use CSMA/CD as the MAC protocol Figure 8-9 illustrates widely used Ethernet frame formats Figure 8-9 illustrates widely used Ethernet frame formats

30 Table 8-4

31 Figure 8-9

32 Some Key Ethernet Implementations Particularly important Ethernet implementations include: Particularly important Ethernet implementations include:  Fast Ethernet (e.g. 100BaseT and 100BaseFX)  The IEEE 802.3u specification covers Fast Ethernet  Gigabit Ethernet (e.g. 1000BaseT, 1000BaseSX, and 1000BaseLX)  The IEEE 802.3z specification addresses Gigabit Ethernet  Iso-Ethernet enables Ethernet LANs at different geographic locations to be connected over ISDN (see Figure 8-14)  IEEE 802.9a addresses Isochronous Ethernet

33 Figure 8-14

34 Token Ring Architectures Token ring networks are addressed in the IEEE specification Token ring networks are addressed in the IEEE specification Physically, token ring LANs resemble star topologies, but technically they are rings Physically, token ring LANs resemble star topologies, but technically they are rings  Ring is physically implemented in MAUs  UTP is the most common cabling Speed is typically 16 mbps, however, 4 mbps and 100 mbps token ring networks exist Speed is typically 16 mbps, however, 4 mbps and 100 mbps token ring networks exist IEEE frame formats are illustrated in Figure 8-15 IEEE frame formats are illustrated in Figure 8-15

35 Figure 8-15

36 FDDI LANs Fiber Distributed Data Interface (FDDI) was first recognized in ANSI’s X3T9.5 specification Fiber Distributed Data Interface (FDDI) was first recognized in ANSI’s X3T9.5 specification Physically, it has a dual ring topology Physically, it has a dual ring topology It has a sequential/ring logical topology and uses a variation of token passing as the MAC protocol It has a sequential/ring logical topology and uses a variation of token passing as the MAC protocol Key FDDI technologies are identified in Figure 8-16 Key FDDI technologies are identified in Figure 8-16  These include single attached stations (SAS), dual attached stations (DAS), FDDI concentrators, and FDDI/Ethernet bridges FDDI is often used as a backbone network architecture (see Figure 8-18) FDDI is often used as a backbone network architecture (see Figure 8-18)

37 Figure 8-16

38 100VG-AnyLAN 100VG-AnyLAN (aka 100BaseVG) is capable of transporting both IEEE and IEEE frames 100VG-AnyLAN (aka 100BaseVG) is capable of transporting both IEEE and IEEE frames It provides a mechanism for interconnecting 100 mbps token ring and 100BaseT Ethernet LANs via specialized hubs and routers (see Figure 8-20) It provides a mechanism for interconnecting 100 mbps token ring and 100BaseT Ethernet LANs via specialized hubs and routers (see Figure 8-20)  100VG-AnyLAN-compliant adapters are also needed It uses demand priority access (DPA) rather than CSMA/CD as the MAC protocol in order to enable real-time voice and video frames to be given priority over other data frames It uses demand priority access (DPA) rather than CSMA/CD as the MAC protocol in order to enable real-time voice and video frames to be given priority over other data frames

39 Figure 8-20

40 ATM LANs ATM (asynchronous transfer mode) is a switched network architecture that employs 53-octet cells to transmit data ATM (asynchronous transfer mode) is a switched network architecture that employs 53-octet cells to transmit data Two data link layers are defined: Two data link layers are defined:  ATM adaptation layer (AAL)  ATM ATM physical topologies are stars ATM physical topologies are stars ATM NICs with 25 speeds of 25, 100, or 155 mbps are available for workstations ATM NICs with 25 speeds of 25, 100, or 155 mbps are available for workstations Ethernet and token ring LANs can interface with an organization’s ATM backbone network via ATM gateway/access switches (see Figure 8-21) Ethernet and token ring LANs can interface with an organization’s ATM backbone network via ATM gateway/access switches (see Figure 8-21)

41 Figure 8-21

42 Wireless LAN Architectures IEEE x standards are the most important wireless LAN (WLAN) specifications that exist today (see Table 8-6) IEEE x standards are the most important wireless LAN (WLAN) specifications that exist today (see Table 8-6) WLANs are typically implemented as physical stars WLANs are typically implemented as physical stars  Nodes connect to wireless hubs called access points CSMA/CA is the MAC protocol for IEEE compliant LANs CSMA/CA is the MAC protocol for IEEE compliant LANs IEEE addresses FHSS (frequency hopping spread spectrum), DSSS (direct sequence spread spectrum), and diffuse infrared transmission IEEE addresses FHSS (frequency hopping spread spectrum), DSSS (direct sequence spread spectrum), and diffuse infrared transmission  User “roaming” capabilities are also addressed WiFi (Wireless Fidelity) certification has been developed to promote interoperability among WLAN products WiFi (Wireless Fidelity) certification has been developed to promote interoperability among WLAN products The WISPR (Wireless ISP Roaming) standard is designed to enable users to roam from one publicly accessible WLAN to another The WISPR (Wireless ISP Roaming) standard is designed to enable users to roam from one publicly accessible WLAN to another

43 Table 8-6

44 Choosing Among LAN Architectures A number of factors should be considered when selecting among LAN architectures A number of factors should be considered when selecting among LAN architectures Some of the major factors are described in Table 8-7; others are described in Table 8-10) Some of the major factors are described in Table 8-7; others are described in Table 8-10) Especially important factors to consider include: Especially important factors to consider include:  Immediate and recurring LAN costs (see Table 8-8)  Total cost of ownership (TCO)  Number of concurrent users that can be supported  Transmission speed and data throughput  Vendor support  Manageability  Scalability/expandability  Security  Adherence to widely accepted standards

45 Table 8-7

46 IEEE LAN Standards & Committees High-Level Interface High-Level Interface Logical Link Control Logical Link Control CSMA/CD CSMA/CD Token Bus Token Bus Token Ring Token Ring Metropolitan Area Networks (MANs) Metropolitan Area Networks (MANs) Broadband Technical Advisory Group Fiber Optic Technical Advisory Group Integrated Data and Voice Networks LAN Security Wireless LANs Demand Priority Access Method

Chapter 8 LAN Architectures Part II: Understanding Internet Access Technologies